Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Inès Ben El Ouahma"'
Autor:
Damien Couroussé, Karine Heydemann, Inès Ben El Ouahma, Quentin L. Meunier, Nicolas Belleville
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2020, 39 (11), pp.1-1. ⟨10.1109/TCAD.2020.3012237⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, 39 (11), pp.1-1. ⟨10.1109/TCAD.2020.3012237⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2020, 39 (11), pp.1-1. ⟨10.1109/TCAD.2020.3012237⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, 39 (11), pp.1-1. ⟨10.1109/TCAD.2020.3012237⟩
International audience; Side-channel attacks are amongst the major threats for embedded systems and IoT devices. Masking is one of the most used countermeasure against such attacks, but its application remains a difficult process. We propose a target
Publikováno v:
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, Springer, 2019, pp.1-12. ⟨10.1007/s13389-019-00205-7⟩
Journal of Cryptographic Engineering, Springer, 2019, pp.1-12. ⟨10.1007/s13389-019-00205-7⟩
Masking is a popular countermeasure against side-channel attacks, which randomizes secret data with random and uniform variables called masks. At software level, masking is usually added in the source code and its effectiveness needs to be verified.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3a43cb40707ec25680bb6bc43974bc44
https://hal.sorbonne-universite.fr/hal-02102873
https://hal.sorbonne-universite.fr/hal-02102873
Publikováno v:
Security Proofs for Embedded Systems
Security Proofs for Embedded Systems, Sep 2017, Taipei, China
PROOFS
Security Proofs for Embedded Systems, Sep 2017, Taipei, China
PROOFS
International audience; Masking is a popular countermeasure against side-channel attacks, which randomizes secret data with random and uniform variables called masks. At software level, masking is usually added in the source code and its effectivenes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6ab75288662ca5177fbda2ff64a5f889
https://hal.archives-ouvertes.fr/hal-01612463
https://hal.archives-ouvertes.fr/hal-01612463