Charles Guillemet

@P3b7_

CTO . Cryptography, (Hardware) Security research. Interested in Tech, Security, Cryptography, Blockchain. Built the Donjon ()

Grenoble
Vrijeme pridruživanja: rujan 2018.

Medijski sadržaj

  1. 21. sij

    This is the the methodology followed in the Common Criteria security certification framework leading to these "EAL5+" certification.. It comes with an "Attack Method" document which is not public. It's only shared within the certification scheme.

    Prikaži ovu nit
  2. 13. sij

    The disclosure timeline is a bit ... short :/

    Prikaži ovu nit
  3. 8. sij

    Thrilled to attend J.-B. Bédrune presentation on HSM Security at

  4. 8. sij

    Epic story on the security of the Moscow Internet voting system. Feat. Triple El Gamal, 256 bits modulii, publication of decryption key... Previous presentation slides:

  5. 8. sij

    Just arrived at conference! Looking forward!

  6. 17. stu 2019.

    I just entered in the Donjon and I met the first prototype of new toy: "The Silicon Toaster" I'm looking forward to toasting some ICs!

  7. 26. lis 2019.
    Odgovor korisniku/ci

    There are probably few/none TA exploitation in the wild. They have been discovered in 1996, and a lot of more efficient SCA have been discovered almost at the same time Well known, easy to counter, not so efficient Nevertheless, TA and SPA remain good examples to teach SCA :)

  8. 7. lis 2019.
    Odgovor korisnicima

    Thanks for the link, it seems we share similar opinions on the topic :)

  9. 28. ruj 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    Yes, sqrt(2^256) = 2^128 I might have missed some new research, but for instance claims the same... Did I miss something?

  10. 23. ruj 2019.

    1/ My take on Shamir Secret Sharing SSS is an elegant method to split a secret into n shares such that: - Any quorum of k (<= n) shares are enough to reconstruct the secret - Any quorum of m (< k) shares gives NO information on the secret [ex of quorums k=2, n=3 or k=3,n=5]

    Prikaži ovu nit
  11. 28. kol 2019.

    Shaping the Glitch at . A pretty good *science* article giving efficient methods for extracting data from 6 different general purpose MCUs (STM32, MSP430, Renesas 78k) with a very cheap setup Article here:

  12. 21. kol 2019.

    If you're around don't miss our brand new open source Scaffold board. Otherwise, have a look to our Github

  13. 16. srp 2019.

    Interesting article tackling the problem of portability from a device to another in the context of supervised/profiled SCA. I got very good results using similar tricks with an EM signal difficult to retrieve when switching from a device to another

  14. 29. lip 2019.

    For those who like free beers 🍻 :)

  15. 25. lip 2019.

    Our short security study of Ellipal Wallet is online: The findings have been responsibly disclosed, and even gave us a bounty.

  16. 14. lip 2019.

    Very intersting article by . It allows Side Channel Analysis of Trustzone code, using the on-board ADC from the userland On top of that, they used our Open Source tool Lascar for the study 😍 Soon in Chipwhisperer? 🤞

  17. 12. lip 2019.

    Here are the slides of the my presentation last weekend: For those interested, technical blogposts will be published soon.

  18. 10. lip 2019.
    Odgovor korisnicima i sljedećem broju korisnika:
  19. 10. lip 2019.

    The video of my presentation . (It lasts around 30min). Sorry for the Frenglish :)

  20. 9. lip 2019.

    I'll be presenting our findings about wallets security in 1 hour. (12:15 CEST). 🔴 Live here

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·