Karine Villegas
Gemalto
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Karine Villegas.
international conference on selected areas in cryptography | 2007
Frederic Amiel; Benoit Feix; Karine Villegas
Power Analysis has been deeply studied since 1998 in order to improve the security of tamper resistant products such as Trusted Platform Module (TPM). The study has evolved from initial basic techniques like simple and differential power analysis to more complex models such as correlation. However, works on correlation techniques have essentially been focused on symmetric cryptography. We analyze here the interests of this technique when applied to different smartcard coprocessors dedicated to asymmetric cryptography implementations. This study leads us to discover and realize new attacks on RSA and ECC type algorithms with fewer curves than classical attacks. We also present how correlation analysis is a powerful tool to reverse engineer asymmetric implementations.
conference on risks and security of internet and systems | 2010
Pierre Girard; Karine Villegas; Jean-Louis Lanet; Aude Plateaux
We propose in this paper to reuse the existing payment infrastructure to introduce a proof of transaction genuineness computed by a smart card chip. The idea is to divide the amount of the transaction into several sub-amounts, which added together give the total amount. The sub-amounts are function of a secret shared with the bank, which can verify that the split is correct, thus proving that the transaction is authentic. We provide here a description of the algorithm and its implementation in a .NET card.
financial cryptography | 2010
Jean-Sébastien Coron; Aline Gouget; Pascal Paillier; Karine Villegas
SPAKE is a cryptographic protocol that provides lightweight transactions in contact-less applications. In this protocol a verifier (a reader or terminal) authenticates a prover (a contact-less card) relative to a certification authority. Additionally, the prover and the verifier must establish a session key for secure messaging. Contrarily to previous solutions such as MIFARE, the protocol is asymmetric in order to allow SAM1-less, low cost readers. Because contact-less transactions are subject to very strong time limitations, the protocol also achieves high-speed computations while providing a customizable security level.
smart card research and advanced application conference | 2002
Marc Joye; Karine Villegas
Archive | 2002
Marc Joye; Karine Villegas
Archive | 2004
Karine Villegas; Marc Joye; Bewnoit Chevallier-Mames
Archive | 2003
Marc Joye; Karine Villegas
Archive | 2002
Marc Joye; Pascal Paillier; Florence Ques-Rochat; Karine Villegas; Nathalie Feyt; Benoit Chevallier Mames
Archive | 2010
Karine Villegas; Aline Gouget; Louis Goubin; Pascal Paillier
medical image computing and computer assisted intervention | 2013
Masayuki Abe; Kazumaro Aoki; Giuseppe Ateniese; Roberto Maria Avanzi; Zuzana Beerliova; Olivier Billet; Alex Biryukov; Ian F. Blake; Colin Boyd; Eric Brier; Aniello Castiglione; Juyoung Cha; Aldar Chan; Liqun Chen; Kookrae Cho; Scott Contini; Paolo D'Arco; Jintai Ding; Christophe Doche; Orr Dunkelman; Matthias Fitzi; Pierre Alain Fouque; Jacques J. A. Fournier; Kouichi Fujisaki; Eiichiro Fujisaki; Jun Furukawa; David Galindo; Shai Halevi; Helena Handschuh; Chris Heneghan