back to the CryptArchi Home page

Proposed talks

  Download full presentations... (restricted access) 

Authors, titles and abstracts

Michal Andrzejczak, Military University of Technology Warsaw, PolandAn Improved Architecture of a Hardware Accelerator for Factoring Integers with Elliptic Curve Method
S. Buchovecká, R. Lórencz, J. Buček, F. Kodýtek, Czech Technical University, Prague Secure authentication and communication for embedded systems using a PUF/TRNG combined circuit
Bertrand Cambou, Northern Arizona University, Flagstaff, Arizona, USA Addressable PUF Generators for Database-free Password Management System
Brice Colombier, Pierre-Alain Moëllic, CEA, Gardanne, FranceSecurity evaluation of countermeasures against physical attacks inserted at compilation time
J-Luc Danger, Risa Yashiro, Tarik Graba, Yves Mathieu, Kazuo Sakiyama, Sylvain Guilley, Télécom ParisTech, FranceMixed PUF-TRNG Circuit using Body Biasing in FD-SOI
Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Télécom ParisTech, FranceConfusing Information
Cyrielle Feron, Vianney Lapotre, Loïc Lagadec, ENSTA Brest, Lab-STICC Lorient, FranceParameter Exploration for Homomorphic Encryption Schemes Analysis
Viktor Fischer, Oto Petura, Ugo Mureddu, Nathalie Bochard, Marek Laban, Lab. Hubert Curien, St-Etienne, FranceHECTOR TRNG design approach and its demonstration
Kris Gaj, Ahmed Ferozpuri, Viet Dang, Duc Nguyen, Farnoud Farahmand, Jens-Peter Kaps, George Mason University, USAPost-Quantum Cryptography in Reconfigurable Hardware: Challenges, Opportunities, and State-of-the-Art
William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Kris Gaj, and Jens-Peter Kaps, George Mason University, USA Evaluation of DPA Protected Implementations of CAESAR Finalists ACORN and Ascon and other Candidates
Stanislav Jeřábek, Martin Novotný, Czech Technical University, Prague Dummy rounds DPA countermeasure
Audrey Lucas, CNRS - IRISA - INRIA, Rennes, FranceA Simulator for Evaluating the Leakage in Arithmetic Circuits.
Cuauhtemoc Mancillas-López, Mridul Nandi, Lab. Hubert Curien, St-Etienne, Indian Statistical Institute, IndiaSpongy-Gift: A New Lightweight Message Authentication Code
Alexandre Menu, Jean-Luc Danger, Jean-Max Dutertre, Elias Kharbouche, Olivier Potin, and Jean-Baptiste Rigaud, Mines St-Etienne, CEA-Tech, Institut Mines-Telecom, Gardanne, FranceTargeting several unpipelined instructions with a single electromagnetic pulse on 8-bit microcontroller
Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat, Lab-STICC Lorient, FranceCache-Based Side-Channel Intrusion Detection using Hardware Performance Counters
Nele Mentens, Edoardo Charbon, Francesco Regazzoni, KU Leuven, Belgium, EPFL, ALaRI, Switzerland Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow
Tania Richmond, Benoit Gerard, Annelie Heuser and Axel Legay, Inria, IRISA, Rennes, FranceSide-channel Information Leakage of the Syndrome Computation in Code-Based Cryptography
Alexander Schaub, J-Luc Danger, Sylvain Guilley, Olivier Rioul, Télécom ParisTech, FranceReliability and Entropy of Delay PUFs: A Theoretical Analysis
Maciej Skorski, IST AustriaEvaluating Min-Entropy of Random Bits by Markov Chains
Felipe Valencia, Francesco Regazzoni, ALaRI - USI, Lugano, Switzerland Fault Attack Resistance of Post Quantum Algorithms



According to the Data Protection Act of January 6th, 1978, you have at any time, a right of access, rectification and opposition to all of your personal data by contacting us (see "contact" page).


Logo Pres Lyon Logo LaHC Logo CNRS Logo LabSticc Logo UBS