F
Frédéric Valette
Publications - 8
Citations - 540
Frédéric Valette is an academic researcher. The author has contributed to research in topics: Modular exponentiation & Scalar multiplication. The author has an hindex of 8, co-authored 8 publications receiving 523 citations.
Papers
More filters
Book ChapterDOI
The Doubling Attack - Why Upwards Is Better than Downwards
TL;DR: A new attack against a classical implementation of critical operations such as modular exponentiation, or scalar multiplication in the elliptic curve setting that only requires two queries to the device is proposed.
Proceedings ArticleDOI
Fault Attack on Elliptic Curve Montgomery Ladder Implementation
TL;DR: It is shown how, with few faults, one can retrieve the full secret exponent even if classical countermeasures are employed to prevent fault attacks on elliptic curve scalar product algorithms.
Journal Article
Power attack on small RSA public exponent
Pierre-Alain Fouque,Sébastien Kunz-Jacques,Gwenaëlle Martinet,Frédéric Muller,Frédéric Valette +4 more
TL;DR: A new attack on RSA when the public exponent is short, for instance 3 or 2 16 +1, and when the classical exponent randomization is used, and it is shown that such information can be gained from sliding window implementations not protected against SPA.
Book ChapterDOI
Power attack on small RSA public exponent
Pierre-Alain Fouque,Sébastien Kunz-Jacques,Gwenaëlle Martinet,Frédéric Muller,Frédéric Valette +4 more
TL;DR: In this article, the problem of recovering the RSA private key when non consecutive bits of it leak from the implementation was studied, and it was shown that such information can be gained from sliding window implementations not protected against Simple Power Analysis (SPA).
Journal Article
Authenticated on-line encryption
TL;DR: In this article, the authors investigate the authenticated encryption paradigm and its security against blockwise adaptive adversaries, mounting chosen ciphertext attacks on on-the-fly cryptographic devices and propose a generic construction called Decrypt-Then-Mask, and prove its security in the blockwise adversarial model.