J. Francq, J.B. Rigaud, A. Wurcker | Side-Channel Analysis of the SHA-3 Finalists on SASEBO |
P. Bayon, L. Bossuet, A. Aubert, V. Fischer, F. Poucheret, B. Robisson, P. Maurine | Electromagnetic Attacks on Ring Oscillator-Based True Random Number Generator |
P. Cotret, G. Gogniat, J.P. Diguet, J. Crenne | Self-reconfigurable security-enhanced communications in FPGA-based MPSoCs |
M.J. Sepulveda, G. Gogniat, W. Jiang, M.s Strum, R. Pires, C. Pedraza | NoC-based dynamic security implementation for Multi-application SoC |
S. Tiran, A. Dehbaoui, P. Maurine | Magnitude Squared Coherence based SCA |
A. Moradi, O. Mischke | Glitch-free implementation of masking in modern FPGAs |
P. Maistri, S. Tiran, A. Dehbaoui,P. Maurine, J.M. Dutertre | Countermeasures against EM Analysis |
K. Gaj, J.P. Kaps, B. Y. Brewster, J. Pham, E. Homsirikamol, R. Velegalati | ATHENa 2.0 and ATHENa Database of Results |
J.L. Danger | Some results about the disctinction of Side-Channel Distinguishers based on distributions |
S. Bhasin | Optimal FPGA implementations a of very low-cost countermeasure based on Rotating S-Boxes Masking Countermeasure |
J. Hlavac, M. Platonov, R. Lorencz | PUF on a simple microcontroller |
S. Malipatlolla, T. Feller, S. Huss | Partially reconfigurable TPM Architectures as the Security Anchors of future Embedded IT Systems |
S. Guilley, C. Carlet, H. Maghrebi, J.L. Danger, E. Prouff | Leakage Squeezing -- Defeating Instantaneous (d+1)th-order Correlation Power Analysis with Strictly Less Than d Masks |
P. Maurine, A. Dehbaoui, F. Poucheret, J.M. Dutertre, B. Robisson, A. Tria | On the use of the EM medium as a fault injection means |
A. Cherkaoui, V. Fischer, A Aubert, L. Fesquet | A New Robust True Random Numbers Generator Using Self-Timed Rings |
W. Schindler | Security Evaluation of RNGs - The Updated Evaluation Guidelines AIS 20 and AIS 31 |
P. Haddad, F. Bernard, V. Fischer | On the Way to Monitor Random Number Generation |
Invited talk: F. Regazzoni | Towards the Automatic Application of Countermeasures Against Physical Attacks |
Invited talk: P.L. Cayrel | Recent Progress in Code-based Cryptography |
According to the Data Protection Act of January 6th, 1978, you have at any time, a right of access, rectification and opposition to all of your personal data by contacting us (see "contact" page).