back to the CryptArchi Home page

Submitted talks

Updated frequently

Titles and abstracts

M. Agoyan, B. Robisson, P. Bazargan-Sabet, G. Phan, S. Le HenaffSmart On Smart: An innovative secured system architecture concept
F. Arnault, T. Berger, C. Lauradoux, M. Minier, B. PousseNew LFSRs and FCSRs representations for stream ciphers hardware and software design
S. ChaumetteThe relationship between hardware design and software level security in highly dynamic mobile ad hoc networks
J. Crenne, R. Tessier, P. Cotret, G. Gogniat, J. P. DiguetSecuring External Shared Memory in Multi-FPGA Context
F. Devic, L. Torres, B. BadrignansSecure protocol implementation for remote bitstream update preventing replay attacks on FPGA
J. Di Battista, B. Rouzeyre, L. Torres, J. C. CourregeSide-Channel improvement by laser stimulation
M. Dichtl and B. MeyerUsing Higher Harmonics of Ring Oscillators for Physical Random Number Generation on FPGAs
G. Di Natale, M. L. Flottes, B. Rouzeyre, M. ValkaWaveforms re-alignment to improve DPA attacks
M. Drutarovsky and M. VarcholaAnalysis of Randomness Sources in Transition Effect Ring Oscillator based TRNG
J. Francq et C. ThuilletHigh-Speed Implementation of the SHA-3 Candidate Shabal
K. Gaj, J. P. Kaps, V. Amirineni, M. Rogawski, E. Homsirikamol, B. Y. Brewster, J. Pham, and M. VarcholaATHENa - Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware using FPGAs
L. Gaspar, V. FischerCryptographic processor with secured key management
J. Hlavac, M. Hadacek, R. LorenczGenerating true random bits on general-purpose microcontrollers
A. Idrissa, A. Aubert, T. Fournel, V. FischerSecure Protocols for Serverless Remote Product Authentication
C. Lauradoux, M. Minier, T. Risset, W. ZnaidiWhy should we find new universal hash functions with good hardware implementation ?
D. LubiczOn the security of oscillator-based random number generators
H. Maghrebi, J. L. Danger and S. GuilleyLeakage Squeezing Countermeasure Against High Order Attacks
M. Nassar, Y. Souissi, S. Guilley and J. L. DangerThe "Rank Correction" Technique to Improve Side-Channel Attacks
P. Nguyen, H. TriquiPinpointing the leakage of dual-rail logics in FPGAs
M. Rogawski, E. Homsirikamol and K. GajSHA-3 Competition in Hardware - Methodology, Tools, and Results of Comparing Fourteen Round 2 SHA-3 Candidates using Reconfigurable Hardware
W. Schindler, M. Kasper, M. StottingerThe Stochastic Approach in Power Analysis - An Efficient Attack and Useful Tool for Target-Oriented Design




Logo LaHC Logo Pres Lyon Logo IT Logo TSE Logo CNRS Logo UJM Logo TPT Logo SIC