![]() |
|
|
||
|---|---|---|
|
hal-00409024v1
Communication dans un congrès
Sylvain Guilley, Sumanta Chaudhuri, Laurent Sauvage, Tarik Graba, Jean-Luc Danger et al. Shall we trust WDDL? Springer. Future of Trust in Computing, Jun 2008, Berlin, Germany. Vieweg+Teubner, 2, pp.208-215, 2008, Subject Collection "Computer Science". <10.1007/978-3-8348-9324-6_22> |
||
|
hal-00320425v2
Communication dans un congrès
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Philippe Hoogvorst. Area Optimization of Cryptographic Co-Processors Implemented in Dual-Rail with Precharge Positive Logic International Conference on Field Programmable Logic and Applications, Sep 2008, Heidelberg, Germany. IEEE-CS, pp.161-166, 2008, <10.1109/FPL.2008.4629925> |
||
|
hal-00934336v1
Rapport
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. Dynamic Countermeasure Against the Zero Power Analysis [Research Report] IACR Cryptology ePrint Archive 2013: 764 (2013), 2013 |
||
|
hal-00799421v1
Communication dans un congrès
Cedric Murdica, Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, David Naccache. Low-Cost Countermeasure against RPA CARDIS 2012, Nov 2012, Graz, Austria. pp.106-122, 2013 |
||
|
hal-00686565v1
Communication dans un congrès
Cedric Murdica, Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, David Naccache. Same Values Power Analysis Using Special Points on Elliptic Curves Schindler, Werner; Huss, Sorin;. COSADE 2012 - Third International Workshop Constructive Side-Channel Analysis and Secure Design, May 2012, Darmstadt, Germany. 7275, pp.Cédric Murdica, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-29912-4_14> |
||
|
|
||