Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Victor Lomné is active.

Publication


Featured researches published by Victor Lomné.


design, automation, and test in europe | 2009

Evaluation on FPGA of triple rail logic robustness against DPA and DEMA

Victor Lomné; Philippe Maurine; Lionel Torres; Michel Robert; Rafael Soares; Ney Laert Vilar Calazans

Side channel attacks are known to be efficient techniques to retrieve secret data. In this context, this paper concerns the evaluation of the robustness of triple rail logic against power and electromagnetic analyses on FPGA devices. More precisely, it aims at demonstrating that the basic concepts behind triple rail logic are valid and may provide interesting design guidelines to get DPA resistant circuits which are also more robust against DEMA.


symposium on integrated circuits and systems design | 2008

Evaluating the robustness of secure triple track logic through prototyping

Rafael Soares; Ney Laert Vilar Calazans; Victor Lomné; Philippe Maurine; Lionel Torres; Michel Robert

Side channel attacks are known to be efficient techniques to retrieve secret data. Within this context, this paper proposes to prototype a logic called Secure Triple Track Logic (STTL) on FPGA and evaluate its robustness against power analyses. More precisely, the paper aims at demonstrating that the basic concepts on which this logic leans are valid and may provide interesting design guidelines to obtain secure circuits.


ifip ieee international conference on very large scale integration | 2009

Enhancing electromagnetic attacks using spectral coherence based cartography

Amine Dehbaoui; Victor Lomné; Philippe Maurine; Lionel Torres; Michel Robert

Electro-Magnetic Analysis has been recently identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar from a mathematical point of view, Power or Electro-Magnetic Analyses have different advantages in practice. Among the advantages of EM analysis, the feasibility of attacking limited and bounded area of integrated systems is the key one. However, efficient techniques are required to localize hot spots, characterized by partially data-dependent electromagnetic emissions, at which a Differential Electro-Magnetic Analysis (DEMA) may be applied with success to retrieve the secret key. This paper aims at introducing a pragmatic technique to localize quickly and efficiently these points of interest.


IEEE Transactions on Very Large Scale Integration Systems | 2012

Enhancing Electromagnetic Analysis Using Magnitude Squared Incoherence

Amine Dehbaoui; Victor Lomné; Thomas Ordas; Lionel Torres; Michel Robert; Philippe Maurine

This paper demonstrates that magnitude squared incoherence (MSI) analysis is efficient to localize hot spots, i.e., points at which focused electromagnetic (EM) analyses can be applied with success. It is also demonstrated that MSI may be applied to enhance differential EM analyses (DEMA) based on difference of means (DoM).


design, automation, and test in europe | 2010

Differential power analysis enhancement with statistical preprocessing

Victor Lomné; Amine Dehbaoui; Philippe Maurine; Lionel Torres; Michel Robert

Differential Power Analysis (DPA) is a powerful Side-Channel Attack (SCA) targeting as well symmetric as asymmetric ciphers. Its principle is based on a statistical treatment of power consumption measurements monitored on an Integrated Circuit (IC) computing cryptographic operations. A lot of works have proposed improvements of the attack, but no one focuses on ordering measurements. Our proposal consists in a statistical preprocessing which ranks measurements in a statistically optimized order to accelerate DPA and reduce the number of required measurements to disclose the key.


symposium on integrated circuits and systems design | 2010

A GALS pipeline DES architecture to increase robustness against DPA and DEMA attacks

Rafael Soares; Ney Laert Vilar Calazans; Victor Lomné; Amine Dehbaoui; Philippe Maurine; Lionel Torres

Side channels attacks (SCA) are very effective and low cost methods to extract secret information from supposedly secure cryptosystems. Differential Power Analysis (DPA) and Differential Electromagnetic Analysis (DEMA) are among the most cited attack types. The traditional synchronous design flow used to create such systems favors the leakage of information that enables attackers to draw correlations between data processes and circuit power consumption or electromagnetic radiations. By using well known analysis techniques these correlations may allow that an attacker retrieve secret cryptographic keys. In recent years, several countermeasures against SCA have been proposed. Globally Asynchronous Locally Synchronous (GALS) and fully asynchronous design methods appear as alternatives to design tamper resistant cryptosystems. However, according to previous works they use to achieve this with significant area, throughput, latency and power penalties. This paper proposes a new GALS pipeline architecture for the Data Encryption Standard (DES) that explores the trade-off between circuit area and robustness. Robustness is enhanced by replicating the DES hardware structure in asynchronously communicating module instances, coupled with self-varying operating frequencies. Designs prototyped on FPGAs using the proposed technique and submitted to DEMA attacks presented promising robustness against attacks and throughput superior to previously reported results.


power and timing modeling optimization and simulation | 2010

Modeling time domain magnetic emissions of ICs

Victor Lomné; Philippe Maurine; Lionel Torres; Thomas Ordas; Mathieu Lisart; Jérome Toublanc

ElectroMagnetic (EM) radiations of Integrated Circuits (IC) is for many years a main problem from an ElectroMagnetic Compatibility (EMC) point-of-view. But with the increasing use of secure embedded systems, and the apparition of new attacks based on the exploitation of physical leakages of such secure ICs, it is now also a critical problem for secure IC designers. Indeed, EM radiations of an IC, and more precisely the magnetic component, can be exploited to retrieve sensible data such as, the secret key of cryptographic algorithms. Within this context, this paper aims at introducing a magnetic field simulation flow allowing predicting, with high spatial and time resolutions, the magnetic radiations of IC cores. Such a flow being mandatory to predict the robustness of secure ICs before fabrication against EM attacks.


IEEE Transactions on Emerging Topics in Computing | 2016

Cost-Effective Design Strategies for Securing Embedded Processors

Florent Bruguier; Pascal Benoit; Lionel Torres; Lyonel Barthe; Morgan Bourree; Victor Lomné

Side-channel attacks (SCAs), such as differential power analysis or differential electromagnetic analysis, pose a serious threat to the security of embedded systems. In the literature, few articles address the problem of securing general purpose processors (GPPs) with resourceful countermeasures. However, in many low-cost applications, where security is not critical, cryptographic algorithms are typically implemented in software. Since it has been proved that GPPs are vulnerable to SCAs, it is desirable to develop efficient mechanisms to ensure a certain level of security. In this paper, we extend side-channel countermeasures to the register transfer level description. The challenge is to create a new class of processor that executes embedded software applications, which are intrinsically protected against SCAs. For that purpose, we first investigate how to integrate into the datapath two countermeasures based on masking and hiding approaches. Through an FPGA-based processor, we then evaluate the overhead and the effectiveness of the proposed solutions against time-domain first-order attacks. We finally show that a suitable combination of countermeasures significantly increases the side-channel resistance in a cost-effective way.


reconfigurable computing and fpgas | 2008

Triple Rail Logic Robustness against DPA

Victor Lomné; Thomas Ordas; Philippe Maurine; Lionel Torres; Michel Robert; Rafael Soares; Ney Laert Vilar Calazans

Side channel attacks are known to be efficient techniques to retrieve secret data. Within this context, the scope of this paper is to evaluate, on and for FPGA, the robustness of triple rail logic against power analyses. More precisely, this paper aims at demonstrating that the basic concepts on which leans this logic are valid and may provide interesting design guidelines to obtain DPA (differential power analysis) resistant circuits.


international symposium on electromagnetic compatibility | 2010

Incoherence analysis and its application to time domain EM analysis of secure circuits

Amine Dehbaoui; Thomas Ordas; Victor Lomné; Philippe Maurine; Lionel Torres; Michel Robert

Since several years, Electromagnetic (EM) radiations of ICs are considered as source of noise and interferences from an EM Compatibility (EMC) point-of-view. Electromagnetic interferences (EMI) are unwanted disturbances that affect digital circuits due to electromagnetic conduction or electromagnetic radiation emitted from an internal or external source. Today electromagnetic radiations of ICs also represent vulnerabilities for hardware security modules like smartcards. Recently, from a hardware security point of view, researchers, industrials and governmental agencies are focusing with strong interest on these radiations. This paper aims at introducing a pragmatic technique WGMSI (Weighted Global Magnitude Squared Incoherence) allowing localizing hardware security modules within the whole EM noise generated by the environment or other modules of the circuits.

Collaboration


Dive into the Victor Lomné's collaboration.

Top Co-Authors

Avatar

Lionel Torres

University of Montpellier

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rafael Soares

Pontifícia Universidade Católica do Rio Grande do Sul

View shared research outputs
Top Co-Authors

Avatar

Ney Laert Vilar Calazans

Pontifícia Universidade Católica do Rio Grande do Sul

View shared research outputs
Top Co-Authors

Avatar

Amine Dehbaoui

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Thomas Ordas

University of Montpellier

View shared research outputs
Top Co-Authors

Avatar

Michel Robert

University of Montpellier

View shared research outputs
Top Co-Authors

Avatar

Michel Robert

University of Montpellier

View shared research outputs
Top Co-Authors

Avatar

Amine Dehbaoui

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

A. Dehbaoui

University of Montpellier

View shared research outputs
Researchain Logo
Decentralizing Knowledge