scispace - formally typeset
J

Jean-François Gallais

Researcher at University of Luxembourg

Publications -  5
Citations -  66

Jean-François Gallais is an academic researcher from University of Luxembourg. The author has contributed to research in topics: Side channel attack & Cache. The author has an hindex of 3, co-authored 5 publications receiving 65 citations.

Papers
More filters
Book ChapterDOI

Improved trace-driven cache-collision attacks against embedded AES implementations

TL;DR: Two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES using a new known plaintext attack that can recover a 128-bit key with approximately 30 measurements to reduce the number of key hypotheses to 230.
Book ChapterDOI

Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software

TL;DR: A number of simple micro-architectural modifications to induce or amplify information leakage via faulty computations or variations in the latency and power consumption of certain instructions are described.
Journal ArticleDOI

A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES

TL;DR: A mathematical model is constructed to estimate the maximal number of leakage rounds that can be utilized and the minimal number of cache traces required for a successful MDATDCA on AES and attests that combining TDCAs with algebraic techniques is a very efficient way to improve cache attacks.

Microarchitectural Side-Channel Attacks

TL;DR: This thesis shows that microarchitectural leakages and fault inductions can be exploited in a constructive way when induced by hardware Trojans implemented on general-purpose microprocessors and proposes different attacks against embedded software implementations of the Advanced Encryption Standard in the chosen and known-plaintext scenarios.
Posted Content

Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations.

TL;DR: In this paper, the authors presented two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES, which is comparable to classical Dierential Power Analysis; however, their attacks are able to overcome certain masking techniques.