Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Cagli, Eleonora"'
Publikováno v:
Journal of Cryptographic Engineering; 20240101, Issue: Preprints p1-26, 26p
Autor:
Masure, Loïc, Belleville, Nicolas, Cagli, Eleonora, Cornélie, Marie-Angela, Couroussé, Damien, Dumas, Cécile, Maingault, Laurent
Publikováno v:
Computer Security – ESORICS 2020
ESORICS 2020: Computer Security
ESORICS 2020: Computer Security, Sep 2020, Guildford, United Kingdom. pp.440-460, ⟨10.1007/978-3-030-58951-6_22⟩
ESORICS 2020: Computer Security
ESORICS 2020: Computer Security, Sep 2020, Guildford, United Kingdom. pp.440-460, ⟨10.1007/978-3-030-58951-6_22⟩
ESORICS 2020 - European Symposium on Research in Computer Security; International audience; $Code\ polymorphism$ is a way to efficiently address the challenge of automatically applying the hiding of sensitive information leakage, as a way to protect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::6b6bbda2fa5fc563b5679619e3838643
https://hal-cea.archives-ouvertes.fr/cea-03483683
https://hal-cea.archives-ouvertes.fr/cea-03483683
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Cagli, Eleonora
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université, 2018. English. ⟨NNT : 2018SORUS295⟩
Cryptographic integrated circuits may be vulnerable to attacks based on the observation of information leakages conducted during the cryptographic algorithms' executions, the so-called Side-Channel Attacks. Nowadays the presence of several countermea
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::027f6fb5f7a60ee1fdf1f148251dbe5c
https://tel.archives-ouvertes.fr/tel-02494260
https://tel.archives-ouvertes.fr/tel-02494260
Autor:
Cagli, Eleonora
Publikováno v:
Cryptography and Security [cs.CR]. Sorbonne Université, 2018. English. ⟨NNT : 2018SORUS295⟩
Cryptographic integrated circuits may be vulnerable to attacks based on the observation of information leakages conducted during the cryptographic algorithms' executions, the so-called Side-Channel Attacks. Nowadays the presence of several countermea
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::027f6fb5f7a60ee1fdf1f148251dbe5c
https://tel.archives-ouvertes.fr/tel-02494260
https://tel.archives-ouvertes.fr/tel-02494260
In the context of the security evaluation of cryptographic implementations, profiling attacks (aka Template Attacks) play a fundamental role. Nowadays the most popular Template Attack strategy consists in approximating the information leakages by Gau
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2659::14bac32a1bf77bc93597e015c9ffaf86
https://zenodo.org/record/1404232
https://zenodo.org/record/1404232
Publikováno v:
Smart Card Research & Advanced Applications (9783319312705); 2016, p15-33, 19p
Publikováno v:
2013 IEEE Workshop on Applications of Signal Processing to Audio & Acoustics; 2013, p1-4, 4p
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Cryptographic Hardware and Embedded Systems – CHES 2017
Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference
Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, Sep 2017, Taipei, Taiwan
Lecture Notes in Computer Science-Cryptographic Hardware and Embedded Systems – CHES 2017
Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference
Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, Sep 2017, Taipei, Taiwan
International audience; In the context of the security evaluation of cryptographic implementations, profiling attacks (aka Template Attacks) play a fundamental role. Nowadays the most popular Template Attack strategy consists in approximating the inf
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::f8afbbfaa381f56bb56e7f8c63a4b26c
Autor:
Zhou, Yuanyuan
Side-channel analysis (SCA) is one pillar of security evaluations of cryptographic algorithm implementations. Due to different widely used SCA countermeasures and new evaluation requirements of using more side-channel traces and applying deep learnin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1493::30e77aca42808c9e8eaccd6761fe529c
https://hdl.handle.net/2078.1/274438
https://hdl.handle.net/2078.1/274438