back to the CryptArchi Home page

Presented talks

  Download the printable version of proceedings (full version with all presentations)smolenice castle  

Authors, titles and link to the slides

01- Audrey Lucas, Arnaud Tisserand, CNRS - IRISA - LabSTICC, FranceECC Protections against both Observation and Pertubation Attacks
02- Brice Colombier, Lilian Bossuet, David Hély, Lab. Hubert Curien, St-EtienneCentrality Indicators For Efficient And Scalable Logic Masking
03- Tania Richmond, Laboratoire IMATH, Toulon, FranceLow-complexity DPA Countermeasure for Resource-Constrained Embedded McEliece Implementation
04- Vojtech Miskovsky, Czech Technical University, Prague Influence of Fault Tolerant Design Techniques on Resistance against Differential Power Analysis
05- Jan Belohoubek, Czech Technical University, Prague The Design-Time Side-Channel Information Leakage Estimation
06- J-Luc Danger, Olivier Rioul, Sylvain Guilley, Alexander Schaub, Télécom ParisTechFormalism to assess the Loop-PUF entropy and reliability
07- Wael Adi, Ayoub Mars, S. Mulhem, Technical University of Braunschweig, GermanyClone-resistant structures in Microsemi SoC units
08- Marcel Kleja, Marek Laban, Viktor Fischer, Technical University of Kosice, Micronic, Slovakia Secure Portable USB Data Storage
09- Brice Colombier et al., Lab. Hubert Curien, St-EtienneComplete activation scheme for IP design protection
10- Markus Dichtl, Siemens Corporate Technology, Germany ALESSIO, a Research Project on Updatable Security Components of Persistent Industrial Embedded Systems
11- Markus Dichtl, Siemens Corporate Technology, Germany Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk
12- Viktor Fischer, LaHC St-Etienne, FranceDesign and evaluation of a physical random number generator (guideline for certification)
13- Elie Noumon Allini, Florent Bernard, Viktor Fischer, LaHC St-Etienne, FranceAn illustration of a new certiffication approach for TRNGs
14- Khaled Karray, J-Luc Danger, Sylvain Guilley, Aziz El Aabid, Télécom ParisTechAttack tree construction: an application to the connected vehicle
15- Tomas Fabsic, Ondrej Gallo, Viliam Hromada, Slovak University of Technology, Bratislava, SlovakiaDemonstration of the Acoustic Cryptanalysis
16- Francesco Regazzoni, Felipe Valencia, ALaRI - USI, Lugano, Switzerland Power Analysis Resistance of Lattice-based Cryptosystems
17- Malik Umar Sharif, Ahmed Ferozpuri and Kris Gaj, George Mason University, USALessons Learned from High-Speed Implementation and Benchmarking of Two Post-Quantum Public-Key Cryptosystems
18- Gabriel Gallin, Arnaud Tisserand, CNRS - IRISA - LabSTICC, FranceHardware Architectures for HECC
19- Richard Newell, Microsemi Corp., USAImproving Trust in the FPGA Supply Chain using Blockchain and Keyless-Signature Technology
20- Stanislav Jerabek, Czech Technical University, Prague Dynamic Reconfiguration as Countermeasure against DPA
21- Michal Varchola, CRAYONIC, Eindhoven, NetherlandsCRAYONIC, your trusted digital signature



According to the Data Protection Act of January 6th, 1978, you have at any time, a right of access, rectification and opposition to all of your personal data by contacting us (see "contact" page).


Logo LaHC Logo CNRS Logo Pres Lyon Logo MS Logo MU Logo SAV Logo STU