Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Franck Rondepierre is active.

Publication


Featured researches published by Franck Rondepierre.


cryptographic hardware and embedded systems | 2017

High Order Masking of Look-up Tables with Common Shares

Jean-Sébastien Coron; Franck Rondepierre; Rina Zeitoun

Masking is an effective countermeasure against side-channel attacks. In this paper, we improve the efficiency of the high-order masking of look-up tables countermeasure introduced at Eurocrypt 2014, based on a combination of three techniques, and still with a proof of security in the Ishai-Sahai-Wagner (ISW) probing model. The first technique consists in proving security under the stronger t-SNI definition, which enables to use n = t+1 shares instead of n = 2t+1 against t-th order attacks. The second technique consists in progressively incrementing the number of shares within the countermeasure, from a single share to n, thereby reducing the complexity of the countermeasure. The third technique consists in adapting the common shares approach introduced by Coron et al. at CHES 2016, so that half of a randomized look-up table can be pre-computed for multiple SBoxes. We show that our techniques perform well in practice. In theory, the combination of the three techniques should lead to a factor 10.7 improvement in efficiency, for a large number of shares. For a practical implementation with a reasonable number of shares, we get a 4.8 speed-up factor for AES.


international conference on e business | 2014

Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model

Sonia Belaïd; Luk Bettale; Emmanuelle Dottax; Laurie Genelle; Franck Rondepierre

As any algorithm manipulating secret data, HMAC is potentially vulnerable to side channel attacks. In 2004, Lemke et al. fully described a differential power attack on HMAC with RIPEMD-160 in the Hamming weight leakage model, and mentioned a possible extension to SHA-1. Later in 2007, McEvoy et al. proposed an attack against HMAC with hash functions from the SHA-2 family, that works in the Hamming distance leakage model. This attack makes strong assumptions on the target implementation. In this paper, we present an attack on HMAC SHA-2 in the Hamming weight leakage model, which advantageously can be used when no information is available on the targeted implementation. Furthermore, we give a full description of an extension of this attack to HMAC SHA-1. We also provide a careful study of the protections to develop in order to minimize the impact of the security on the performances.


international conference on security and cryptography | 2013

Differential power analysis of HMAC SHA-2 in the Hamming weight model

Sonia Belaïd; Luk Bettale; Emmanuelle Dottax; Laurie Genelle; Franck Rondepierre


IACR Cryptology ePrint Archive | 2015

Choosing and generating parameters for low level pairing implementation on BN curves.

Sylvain Duquesne; Nadia El Mrabet; Safia Haloui; Franck Rondepierre


Archive | 2014

Method For Validating A Cryptographic Parameter And Corresponding Device

Emmanuelle Dottax; Franck Rondepierre


Applicable Algebra in Engineering, Communication and Computing | 2018

Choosing and generating parameters for pairing implementation on BN curves

Sylvain Duquesne; Nadia El Mrabet; Safia Haloui; Franck Rondepierre


Archive | 2016

Method for cryptographic encoding on an elliptic curve

Yannick Sierra; Franck Rondepierre


IACR Cryptology ePrint Archive | 2015

Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves.

Franck Rondepierre


Archive | 2014

Validierungsverfahren eines kryptografischen Parameters, und entsprechende Vorrichtung

Emmanuelle Dottax; Franck Rondepierre


Archive | 2012

Method for computing an encoding into an elleptic curve and corresponding cryptographic coprocessor

Yannick Sierra; Franck Rondepierre

Collaboration


Dive into the Franck Rondepierre's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sonia Belaïd

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sylvain Duquesne

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge