back to the CryptArchi Home page
01- Audrey Lucas, Arnaud Tisserand, CNRS - IRISA - LabSTICC, France | ECC Protections against both Observation and Pertubation Attacks |
02- Brice Colombier, Lilian Bossuet, David Hély, Lab. Hubert Curien, St-Etienne | Centrality Indicators For Efficient And Scalable Logic Masking |
03- Tania Richmond, Laboratoire IMATH, Toulon, France | Low-complexity DPA Countermeasure for Resource-Constrained Embedded McEliece Implementation |
04- Vojtech Miskovsky, Czech Technical University, Prague | Influence of Fault Tolerant Design Techniques on Resistance against Differential Power Analysis |
05- Jan Belohoubek, Czech Technical University, Prague | The Design-Time Side-Channel Information Leakage Estimation |
06- J-Luc Danger, Olivier Rioul, Sylvain Guilley, Alexander Schaub, Télécom ParisTech | Formalism to assess the Loop-PUF entropy and reliability |
07- Wael Adi, Ayoub Mars, S. Mulhem, Technical University of Braunschweig, Germany | Clone-resistant structures in Microsemi SoC units |
08- Marcel Kleja, Marek Laban, Viktor Fischer, Technical University of Kosice, Micronic, Slovakia | Secure Portable USB Data Storage |
09- Brice Colombier et al., Lab. Hubert Curien, St-Etienne | Complete activation scheme for IP design protection |
10- Markus Dichtl, Siemens Corporate Technology, Germany | ALESSIO, a Research Project on Updatable Security Components of Persistent Industrial Embedded Systems |
11- Markus Dichtl, Siemens Corporate Technology, Germany | Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk |
12- Viktor Fischer, LaHC St-Etienne, France | Design and evaluation of a physical random number generator (guideline for certification) |
13- Elie Noumon Allini, Florent Bernard, Viktor Fischer, LaHC St-Etienne, France | An illustration of a new certiffication approach for TRNGs |
14- Khaled Karray, J-Luc Danger, Sylvain Guilley, Aziz El Aabid, Télécom ParisTech | Attack tree construction: an application to the connected vehicle |
15- Tomas Fabsic, Ondrej Gallo, Viliam Hromada, Slovak University of Technology, Bratislava, Slovakia | Demonstration of the Acoustic Cryptanalysis |
16- Francesco Regazzoni, Felipe Valencia, ALaRI - USI, Lugano, Switzerland | Power Analysis Resistance of Lattice-based Cryptosystems |
17- Malik Umar Sharif, Ahmed Ferozpuri and Kris Gaj, George Mason University, USA | Lessons Learned from High-Speed Implementation and Benchmarking of Two Post-Quantum Public-Key Cryptosystems |
18- Gabriel Gallin, Arnaud Tisserand, CNRS - IRISA - LabSTICC, France | Hardware Architectures for HECC |
19- Richard Newell, Microsemi Corp., USA | Improving Trust in the FPGA Supply Chain using Blockchain and Keyless-Signature Technology |
20- Stanislav Jerabek, Czech Technical University, Prague | Dynamic Reconfiguration as Countermeasure against DPA |
21- Michal Varchola, CRAYONIC, Eindhoven, Netherlands | CRAYONIC, your trusted digital signature |
According to the Data Protection Act of January 6th, 1978, you have at any time, a right of access, rectification and opposition to all of your personal data by contacting us (see "contact" page).
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |