back to the CryptArchi Home page
| S. Huss, Technische Universität Darmstadt, Germany | On the Synthesis of Side-Channel resistant Cryptographic Modules |
| C. Marchand, L. Bossuet, E. Jung, Lab. Hubert Curien, Université de Saint-Etienne, France | Verification of IP Watermark using Correlation Analysis |
| M. Dichtl, Siemens Corporate Technology, B. Meyer, Infineon AG., Germany | Techniques to Improve the Extraction of Entropy from Circuits with Random Behaviour |
| T. Pöppelmann, T. Güneysu, Ruhr University Bochum, Germany | Implementation Challenges for Ideal Lattice-Based Cryptography on Reconfigurable Hardware |
| P. Maurine, S. Ordas, K. Tobich, L. Guillaume-Sage, CEA, Lab. LIRMM, France | Extending the EM injection fault model |
| Sébastien Tiran et al., Lab. LIRMM, Montpellier, France | ANalysis of Variance and CPA in SCA |
| Sébastien Ordas et al., Lab. LIRMM, Montpellier, France | Efficiency of the RDVFS countermeasure |
| R. Lorencz, F. Kodytek, Czech Technical University Prague, Czech Republic | A novel ring oscillator based PUF on FPGA. |
| S. Guilley, R. Newell, T. Porteboeuf, TELECOM ParisTech, Microsemi corp., Secure-IC | Reliability analysis of digital sensors against perturbations of FPGAs |
| A. Heuser, O. Rioul, S. Guilley, TELECOM ParisTech | When optimal means optimal, Finding optimal distinguishers from the mathematical theory of communication |
| M. Kasper, W. Schindler, SIT, BSI, Germany | Optimal CPA Attack |
| P. Yalla, E. Homsirikamol, J.-P. Kaps, George Mason University, USA | Multi-Purpose Keccak for Modern FPGAs |
| M. U. Sharif, M. Rogawski, K. Gaj, George Mason University, USA | Hardware-Software Codesign of Pairing-Based Cryptosystems for Optimal Performance vs. Flexibility Trade-off |
| C. Mancillas, Dep. of Computer Science, CINVESTAV-IPN, Mexico | Disk Encryption |
| F. Stepanek, M. Novotny, Czech Technical University Prague, Czech Republic | Comparision of various approaches in Fault-Tolerant and Attack-Resistant system design |
| J.L. Danger, TELECOM ParisTech | Architectures of secure FPGAs against physical attacks |
| J. Belohoubek, J. Schmidt, Czech Technical University Prague, Czech Republic | Fully asynchronous QDI implementation of DES in FPGA |
| F. Wiemers, R. Zimmermann, Ruhr University Bochum, Germany | Speed and Area-Optimized Password Search of bcrypt on FPGAs |
| J. Francq, Airbus Defence & Space - CyberSecurity, France | A New Proposal for Lightweight Cryptography: LILLIPUT |
| V. Fischer, D. Lubicz, F. Bernard, N. Bochard, LaHC St-Etienne, DGA-MI, France | Randomness Assessment in oscillator based elementary TRNG |
According to the Data Protection Act of January 6th, 1978, you have at any time, a right of access, rectification and opposition to all of your personal data by contacting us (see "contact" page).
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |