back to the CryptArchi Home page

Selected talks

Click on the link to read the abstract of the talk   Download full presentations... (restricted access) 

Authors, titles and abstracts: final list

J. Francq, J.B. Rigaud, A. WurckerSide-Channel Analysis of the SHA-3 Finalists on SASEBO
P. Bayon, L. Bossuet, A. Aubert, V. Fischer, F. Poucheret, B. Robisson, P. MaurineElectromagnetic Attacks on Ring Oscillator-Based True Random Number Generator
P. Cotret, G. Gogniat, J.P. Diguet, J. CrenneSelf-reconfigurable security-enhanced communications in FPGA-based MPSoCs
M.J. Sepulveda, G. Gogniat, W. Jiang, M.s Strum, R. Pires, C. PedrazaNoC-based dynamic security implementation for Multi-application SoC
S. Tiran, A. Dehbaoui, P. MaurineMagnitude Squared Coherence based SCA
A. Moradi, O. MischkeGlitch-free implementation of masking in modern FPGAs
P. Maistri, S. Tiran, A. Dehbaoui,P. Maurine, J.M. DutertreCountermeasures against EM Analysis
K. Gaj, J.P. Kaps, B. Y. Brewster, J. Pham, E. Homsirikamol, R. VelegalatiATHENa 2.0 and ATHENa Database of Results
J.L. DangerSome results about the disctinction of Side-Channel Distinguishers based on distributions
S. BhasinOptimal FPGA implementations a of very low-cost countermeasure based on Rotating S-Boxes Masking Countermeasure
J. Hlavac, M. Platonov, R. LorenczPUF on a simple microcontroller
S. Malipatlolla, T. Feller, S. HussPartially reconfigurable TPM Architectures as the Security Anchors of future Embedded IT Systems
S. Guilley, C. Carlet, H. Maghrebi, J.L. Danger, E. ProuffLeakage Squeezing -- Defeating Instantaneous (d+1)th-order Correlation Power Analysis with Strictly Less Than d Masks
P. Maurine, A. Dehbaoui, F. Poucheret, J.M. Dutertre, B. Robisson, A. TriaOn the use of the EM medium as a fault injection means
A. Cherkaoui, V. Fischer, A Aubert, L. FesquetA New Robust True Random Numbers Generator Using Self-Timed Rings
W. SchindlerSecurity Evaluation of RNGs - The Updated Evaluation Guidelines AIS 20 and AIS 31
P. Haddad, F. Bernard, V. FischerOn the Way to Monitor Random Number Generation
Invited talk: F. RegazzoniTowards the Automatic Application of Countermeasures Against Physical Attacks
Invited talk: P.L. CayrelRecent Progress in Code-based Cryptography



According to the Data Protection Act of January 6th, 1978, you have at any time, a right of access, rectification and opposition to all of your personal data by contacting us (see "contact" page).


Logo LaHC Logo Pres Lyon Logo IT Logo MS Logo TSE Logo CNRS Logo UJM