Mehdi-Laurent Akkar
Texas Instruments
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mehdi-Laurent Akkar.
cryptographic hardware and embedded systems | 2001
Mehdi-Laurent Akkar; Christophe Giraud
Since Power Analysis on smart cards was introduced by Paul Kocher [7], many countermeasures have been proposed to protect implementations of cryptographic algorithms. In this paper we propose a new protection principle: the transformed masking method. We apply this method to protect two of the most popular block ciphers: DES and the AES Rijndael. To this end we introduce some transformed S-boxes for DES and a new masking method and its applications to the non-linear part of Rijndael.
international conference on the theory and application of cryptology and information security | 2000
Mehdi-Laurent Akkar; Régis Bevan; Paul Dischamp; Didier Moyart
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we first describe and analyze some different possible models. Then we apply these models to real components and clearly define what can be detected by power analysis (simple, differential, code reverse engineering...). We also study, from a statistical point of view, some new ideas to exploit these models to attack the card by power analysis. Finally we apply these ideas to set up real attacks on cryptographic algorithms or enhance existing ones.
public key cryptography | 2003
Mehdi-Laurent Akkar; Nicolas T. Courtois; Romain Duteuil; Louis Goubin
Sflash is a multivariate signature scheme, and a candidate for standardisation, currently evaluated by the European call for primitives Nessie. The present paper is about the design of a highly optimized implementation of Sflash on a low-cost 8-bit smart card (without coprocessor). On top of this, we will also present a method to protect the implementation protection against power attacks such as Differential Power Analysis.Our fastest implementation of Sflash takes 59 ms on a 8051 based CPU at 10MHz. Though the security of Sflash is not as well understood as for example for RSA, Sflash is apparently the fastest signature scheme known. It is suitable to implement PKI on low-cost smart card, token or palm devices. It allows also to propose secure low-cost payment/banking solutions.
fast software encryption | 2004
Mehdi-Laurent Akkar; Régis Bevan; Louis Goubin
In order to protect a cryptographic algorithm against Power Analysis attacks, a well-known method consists in hiding all the internal data with randomly chosen masks.
fast software encryption | 2003
Mehdi-Laurent Akkar; Louis Goubin
Differential Power Analysis (DPA) on smart-cards was introduced by Paul Kocher [11] in 1998. Since, many countermeasures have been introduced to protect cryptographic algorithms from DPA attacks. Unfortunately these features are known not to be efficient against high order DPA (even of second order). In these paper we will first describe new specialized first order attack and remind how are working high order DPA attacks. Then we will show how these attacks can be applied to two usual actual countermeasures. Eventually we will present a method of protection (and apply it to the DES) which seems to be secure against any order DPA type attacks. The figures of a real implementation of this method will be given too.
Archive | 2014
Steven C. Goss; Gregory R. Conti; Narendar Shankar; Mehdi-Laurent Akkar; Aymeric Vial
Archive | 2006
Mehdi-Laurent Akkar; Aymeric Vial; Olivier Charles Schuepbach
Archive | 2007
Piotr Michal Murawski; Mehdi-Laurent Akkar; Aymeric Vial
Archive | 2006
Aymeric Vial; Mehdi-Laurent Akkar; Narendar Shankar; Steven C. Goss
Archive | 2001
Mehdi-Laurent Akkar; Paul Dischamp