Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Liardet, Pierre Yvan"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
From theory to practice: horizontal attacks on protected implementations of modular exponentiations.
Publikováno v:
Journal of Cryptographic Engineering; Apr2019, Vol. 9 Issue 1, p37-52, 16p
Publikováno v:
YACC'2012: Yet Another Conference on Cryptography
YACC'2012: Yet Another Conference on Cryptography, Sep 2012, Porquerolles Island, France
YACC'2012: Yet Another Conference on Cryptography, Sep 2012, Porquerolles Island, France
International audience; Nowadays fault attacks are widely deployed against secure devices by hardware evaluation centers. While the least expensive fault injection techniques, like clock or voltage glitches, are well taken into account in secure devi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::a56aaf4e9d28c20a5f604d7c30f6fc9c
https://hal-lirmm.ccsd.cnrs.fr/lirmm-00762035
https://hal-lirmm.ccsd.cnrs.fr/lirmm-00762035
Autor:
Diop, Ibrahima, Carbone, Mathieu, Ordas, Sebastien, Linge, Yanis, Liardet, Pierre Yvan, Maurine, Philippe
Publikováno v:
Smart Card Research & Advanced Applications (9783319312705); 2016, p143-157, 15p
Autor:
Liardet, Pierre-Yvan
Cette thèse donne un aperçu des différentes attaques que doivent contrer les implémentations et propose quelques solutions en distinguant trois niveaux, le niveau hardware, le niveau mathématique et le niveau algorithmique. L'état de l'art fait
Externí odkaz:
http://tel.archives-ouvertes.fr/tel-00196855
http://tel.archives-ouvertes.fr/docs/00/19/68/55/PDF/These_Liardet.pdf
http://tel.archives-ouvertes.fr/docs/00/19/68/55/PDF/These_Liardet.pdf
Autor:
Liardet, Pierre-Yvan
Publikováno v:
domain_stic.othe. Université Montpellier II-Sciences et Techniques du Languedoc, 2007. Français
This thesis develops an overview of the so called Side Channel Attacks (SCA). In order to counter these attacks against implementations, it is proposed solutions at three different levels : the hardware level, the mathematic level and the algorithmic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::46f2b76f57309713e719812de05ad9bf
https://tel.archives-ouvertes.fr/tel-00196855
https://tel.archives-ouvertes.fr/tel-00196855
Autor:
Liardet, Pierre-Yvan
Publikováno v:
domain_stic.othe. Université Montpellier II-Sciences et Techniques du Languedoc, 2007. Français
This thesis develops an overview of the so called Side Channel Attacks (SCA). In order to counter these attacks against implementations, it is proposed solutions at three different levels : the hardware level, the mathematic level and the algorithmic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::46f2b76f57309713e719812de05ad9bf
https://tel.archives-ouvertes.fr/tel-00196855
https://tel.archives-ouvertes.fr/tel-00196855
Autor:
Bouesse, Ghislain, Robisson, B., Liardet, Pierre-Yvan, Renaudin, M., Beigné, E., Prevosto, S.
Publikováno v:
XIX Conference on Design of Circuits and Integrated Systems (DCIS'04)
XIX Conference on Design of Circuits and Integrated Systems (DCIS'04), Nov 2004, Bordeaux, France
XIX Conference on Design of Circuits and Integrated Systems (DCIS'04), Nov 2004, Bordeaux, France
International audience; This paper presents the first concrete results of Differential Power Analysis applied on secured Quasi Delay Insensitive asynchronous logic. In fact, the properties of QDI asynchronous circuits (1-of-N encoded data and four-ph
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::28e798f62790cffb684e765add106cf1
https://hal.archives-ouvertes.fr/hal-01399172
https://hal.archives-ouvertes.fr/hal-01399172