5 résultats  enregistrer la recherche


...
hal-00409024v1  Communication dans un congrès
Sylvain GuilleySumanta ChaudhuriLaurent SauvageTarik GrabaJean-Luc Danger et al.  Shall we trust WDDL?
Springer. Future of Trust in Computing, Jun 2008, Berlin, Germany. Vieweg+Teubner, 2, pp.208-215, 2008, Subject Collection "Computer Science". <10.1007/978-3-8348-9324-6_22>
...
hal-00320425v2  Communication dans un congrès
Sylvain GuilleyLaurent SauvageJean-Luc DangerPhilippe HoogvorstArea Optimization of Cryptographic Co-Processors Implemented in Dual-Rail with Precharge Positive Logic
International Conference on Field Programmable Logic and Applications, Sep 2008, Heidelberg, Germany. IEEE-CS, pp.161-166, 2008, <10.1109/FPL.2008.4629925>
hal-00934336v1  Rapport
Jean-Luc DangerSylvain GuilleyPhilippe HoogvorstCédric MurdicaDavid NaccacheDynamic Countermeasure Against the Zero Power Analysis
[Research Report] IACR Cryptology ePrint Archive 2013: 764 (2013), 2013
hal-00799421v1  Communication dans un congrès
Cedric MurdicaJean-Luc DangerSylvain GuilleyPhilippe HoogvorstDavid NaccacheLow-Cost Countermeasure against RPA
CARDIS 2012, Nov 2012, Graz, Austria. pp.106-122, 2013
hal-00686565v1  Communication dans un congrès
Cedric MurdicaJean-Luc DangerSylvain GuilleyPhilippe HoogvorstDavid NaccacheSame Values Power Analysis Using Special Points on Elliptic Curves
Schindler, Werner; Huss, Sorin;. COSADE 2012 - Third International Workshop Constructive Side-Channel Analysis and Secure Design, May 2012, Darmstadt, Germany. 7275, pp.Cédric Murdica, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-29912-4_14>