Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mehdi-Laurent Akkar is active.

Publication


Featured researches published by Mehdi-Laurent Akkar.


cryptographic hardware and embedded systems | 2001

An Implementation of DES and AES, Secure against Some Attacks

Mehdi-Laurent Akkar; Christophe Giraud

Since Power Analysis on smart cards was introduced by Paul Kocher [7], many countermeasures have been proposed to protect implementations of cryptographic algorithms. In this paper we propose a new protection principle: the transformed masking method. We apply this method to protect two of the most popular block ciphers: DES and the AES Rijndael. To this end we introduce some transformed S-boxes for DES and a new masking method and its applications to the non-linear part of Rijndael.


international conference on the theory and application of cryptology and information security | 2000

Power Analysis, What Is Now Possible...

Mehdi-Laurent Akkar; Régis Bevan; Paul Dischamp; Didier Moyart

Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we first describe and analyze some different possible models. Then we apply these models to real components and clearly define what can be detected by power analysis (simple, differential, code reverse engineering...). We also study, from a statistical point of view, some new ideas to exploit these models to attack the card by power analysis. Finally we apply these ideas to set up real attacks on cryptographic algorithms or enhance existing ones.


public key cryptography | 2003

A Fast and Secure Implementation of Sflash

Mehdi-Laurent Akkar; Nicolas T. Courtois; Romain Duteuil; Louis Goubin

Sflash is a multivariate signature scheme, and a candidate for standardisation, currently evaluated by the European call for primitives Nessie. The present paper is about the design of a highly optimized implementation of Sflash on a low-cost 8-bit smart card (without coprocessor). On top of this, we will also present a method to protect the implementation protection against power attacks such as Differential Power Analysis.Our fastest implementation of Sflash takes 59 ms on a 8051 based CPU at 10MHz. Though the security of Sflash is not as well understood as for example for RSA, Sflash is apparently the fastest signature scheme known. It is suitable to implement PKI on low-cost smart card, token or palm devices. It allows also to propose secure low-cost payment/banking solutions.


fast software encryption | 2004

Two Power Analysis Attacks against One-Mask Methods

Mehdi-Laurent Akkar; Régis Bevan; Louis Goubin

In order to protect a cryptographic algorithm against Power Analysis attacks, a well-known method consists in hiding all the internal data with randomly chosen masks.


fast software encryption | 2003

A Generic Protection against High-Order Differential Power Analysis

Mehdi-Laurent Akkar; Louis Goubin

Differential Power Analysis (DPA) on smart-cards was introduced by Paul Kocher [11] in 1998. Since, many countermeasures have been introduced to protect cryptographic algorithms from DPA attacks. Unfortunately these features are known not to be efficient against high order DPA (even of second order). In these paper we will first describe new specialized first order attack and remind how are working high order DPA attacks. Then we will show how these attacks can be applied to two usual actual countermeasures. Eventually we will present a method of protection (and apply it to the DES) which seems to be secure against any order DPA type attacks. The figures of a real implementation of this method will be given too.


Archive | 2014

Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices

Steven C. Goss; Gregory R. Conti; Narendar Shankar; Mehdi-Laurent Akkar; Aymeric Vial


Archive | 2006

Methods and systems involving secure RAM

Mehdi-Laurent Akkar; Aymeric Vial; Olivier Charles Schuepbach


Archive | 2007

Protection against buffer overflow attacks

Piotr Michal Murawski; Mehdi-Laurent Akkar; Aymeric Vial


Archive | 2006

Method and apparatus for secure demand paging for processor devices

Aymeric Vial; Mehdi-Laurent Akkar; Narendar Shankar; Steven C. Goss


Archive | 2001

Method of executing a cryptographic protocol between two electronic entities

Mehdi-Laurent Akkar; Paul Dischamp

Collaboration


Dive into the Mehdi-Laurent Akkar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge