Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Le Bouder, Hélène"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Le Bouder, Hélène
Cette thèse se situe dans la cryptanalyse physique des algorithmes de chiffrement par blocs. Un algorithme cryptographique est conçu pour être mathématiquement robuste. Cependant, une fois implémenté dans un circuit, il est possible d'attaquer
Externí odkaz:
http://www.theses.fr/2014EMSE0759/document
Publikováno v:
ACM Computing Surveys
ACM Computing Surveys, 2022, 54 (6), pp.1-36. ⟨10.1145/3453153⟩
ACM Computing Surveys, 2022, 54 (6), pp.1-36. ⟨10.1145/3453153⟩
International audience; Ransomware remains an alarming threat in the 21 st century. It has evolved from being a simple scare tactic into a complex malware capable of evasion. Formerly, end-users were targeted via mass infection campaigns. Nevertheles
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::fb6ed7e2910e4d6e2beb04680479e17b
https://hal.science/hal-03672901
https://hal.science/hal-03672901
Autor:
Houssein Meraneh, Awaleh, Clavier, Christophe, Le Bouder, Hélène, Maillard, Julien, Thomas, Gaël
Publikováno v:
SECRYPT 2022
SECRYPT 2022, 2022, Lisbonne, Portugal
SECRYPT 2022, 2022, Lisbonne, Portugal
International audience; Elephant is a finalist to the NIST lightweight cryptography competition. In this paper, the first theoretical blind side channel attack against the authenticated encryption algorithm Elephant is presented. More precisely, we a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::60f6ec39c77ee8e523bd7f0468962666
https://hal.science/hal-03672917/document
https://hal.science/hal-03672917/document
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Lanet, Jean-Louis1 jean-louis.lanet@inria.fr, Le Bouder, Hélène1 helene.le-bouder@inria.fr, Benattou, Mohammed2 mbenattou@yahoo.fr, Legay, Axel1 axel.legay@inria.fr
Publikováno v:
International Journal of Information Security. Aug2018, Vol. 17 Issue 4, p395-409. 15p.
Publikováno v:
ARES 2020: 15th International Conference on Availability, Reliability and Security
ARES 2020: 15th International Conference on Availability, Reliability and Security, Aug 2020, Dublin (effectué en visioconférence), Ireland. ⟨10.1145/3407023.3407031⟩
ARES 2020: 15th International Conference on Availability, Reliability and Security, Aug 2020, Dublin (effectué en visioconférence), Ireland. ⟨10.1145/3407023.3407031⟩
International audience; This study focuses on automatically detecting wrong implementations of specification in Java Card programs, without any knowledge on the source code or the specification itself. To achieve this, an approach based on Natural La
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::cc37164b19febcd9279c48f5ddc07432
https://inria.hal.science/hal-02933668/document
https://inria.hal.science/hal-02933668/document
Autor:
Zerkane, Salaheddine, Le Gall, Guillaume, Le Bouder, Hélène, Montavont, Nicolas, Papadopoulos, Georgios
Publikováno v:
[Research Report] IMT ATLANTIQUE. 2020
This document describes the requirements for Wireless communications in Battery Management System (BMS), and contains a first evaluation of what are the requirements in terms of security.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::1041ab58e5aed6b712996ac17b87a437
https://hal.archives-ouvertes.fr/hal-02884989/file/battery_security_context.pdf
https://hal.archives-ouvertes.fr/hal-02884989/file/battery_security_context.pdf
Autor:
Zerkane, Salaheddine, Le Gall, Guillaume, Le Bouder, Hélène, Montavont, Nicolas, Papadopoulos, Georgios
Publikováno v:
[Research Report] IMT ATLANTIQUE. 2020
This document describes the requirements for Wireless communications in Battery Management System (BMS), and contains a first evaluation of what are the requirements in terms of security.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::1041ab58e5aed6b712996ac17b87a437
https://hal.archives-ouvertes.fr/hal-02884989/file/battery_security_context.pdf
https://hal.archives-ouvertes.fr/hal-02884989/file/battery_security_context.pdf
Publikováno v:
Procedia Computer Science
EUSPN 2019 : 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks
EUSPN 2019 : 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Nov 2019, Coimbra, Portugal. pp.70-76, ⟨10.1016/j.procs.2019.09.445⟩
EUSPN 2019 : 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks
EUSPN 2019 : 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Nov 2019, Coimbra, Portugal. pp.70-76, ⟨10.1016/j.procs.2019.09.445⟩
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::1bd41863e2e2e05e04fa30cdc9840f19
https://hal.inria.fr/hal-01950822
https://hal.inria.fr/hal-01950822