Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Olivier Savry"'
Publikováno v:
Cryptography, Vol 6, Iss 2, p 19 (2022)
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attacks have been reported on all its components from the main memory
Externí odkaz:
https://doaj.org/article/a22789ba5d804027b62c94bb096db345
Publikováno v:
2022 25th Euromicro Conference on Digital System Design (DSD)
2022 25th Euromicro Conference on Digital System Design (DSD), Aug 2022, Maspalomas, Spain. pp.556-563, ⟨10.1109/DSD57027.2022.00080⟩
2022 25th Euromicro Conference on Digital System Design (DSD), Aug 2022, Maspalomas, Spain. pp.556-563, ⟨10.1109/DSD57027.2022.00080⟩
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ae26d35bdb23071fb1e82da58beec3f1
https://hal.science/hal-04004062
https://hal.science/hal-04004062
Autor:
E. Bertrand Talaki, Mathieu Bouvier Des Noes, Olivier Savry, David Hely, Simone Bacles-Min, Romain Lemaire
Publikováno v:
2021 IEEE Physical Assurance and Inspection of Electronics (PAINE).
Publikováno v:
DSD
Computing devices became part of our daily world. But being physically accessible they are exposed to a very large panel of physical attacks, which are most of the time underestimated. These systems must include protections against these attacks in o
Autor:
Olivier Savry, Thomas Hiscock
Le début de l'année 2018 a été marqué par la découverte de Spectre et Meltdown, deux failles de sécurité au niveau des processeurs qui remettent en cause plusieurs années d'efforts colossaux à la fois humains et financiers pour augmenter le
Publikováno v:
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO)
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 64, pp.43-52. ⟨10.1016/j.micpro.2018.10.001⟩
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 64, pp.43-52. ⟨10.1016/j.micpro.2018.10.001⟩
Over the last 30 years, a number of secure processor architectures have been proposed to protect software integrity and confidentiality during its distribution and execution. In such architectures, encryption (together with integrity checking) is use
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::133472ab3e8132747bd7e2d27d96b79c
https://hal.uvsq.fr/hal-02176879
https://hal.uvsq.fr/hal-02176879
Publikováno v:
DSD
21st Euromicro Conference on Digital System Design, DSD 2018
21st Euromicro Conference on Digital System Design, DSD 2018, 2018, unknow, France. pp.577-580, ⟨10.1109/DSD.2018.00101⟩
21st Euromicro Conference on Digital System Design, DSD 2018
21st Euromicro Conference on Digital System Design, DSD 2018, 2018, unknow, France. pp.577-580, ⟨10.1109/DSD.2018.00101⟩
International audience; Gentry's breakthrough of Fully Homomorphic Encryption (FHE) in 2009 revolutionized the field of secure computation. Since then, most applications of homomorphic encryption have been oriented towards offloading computations to
Publikováno v:
Psicologia: Teoria e Pesquisa
Psicologia: Teoria e Pesquisa, Universidade de Brasília, 2017
Psicologia: Teoria e Pesquisa, 2017
DSD
Psicologia: Teoria e Pesquisa, Universidade de Brasília, 2017
Psicologia: Teoria e Pesquisa, 2017
DSD
International audience; Over the last 30 years, a number of secure processor architectures have been proposed to protect software integrity and confidentiality during its distribution and execution. In such architectures, encryption (together with in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8322f4739de7d4b8719965ebde68db0f
https://hal.archives-ouvertes.fr/hal-03018747/file/stream-encryption.pdf
https://hal.archives-ouvertes.fr/hal-03018747/file/stream-encryption.pdf
Autor:
Olivier Savry, Pierre-Henri Thevenon
Publikováno v:
Radio Frequency Identification from System to Applications
Nowadays, HF contactless technologies following the ISO 14443 standard are extensively used worldwide. Critical applications like access control or payment require high security guaran‐ tees. However, contactless channels are less secure and offer
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3ecfd38d26fd039a6d202c09b7a027e2
http://www.intechopen.com/articles/show/title/implementation-of-a-countermeasure-to-relay-attacks-for-contactless-hf-systems
http://www.intechopen.com/articles/show/title/implementation-of-a-countermeasure-to-relay-attacks-for-contactless-hf-systems
Autor:
Olivier Savry, Claude Castelluccia, Jean-Benoit Pierrot, Pierre-Henri Thevenon, S. Tmar-Ben Hamida
Publikováno v:
2013 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2013)
2013 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2013), Apr 2013, Dubai, France. pp.1-8, ⟨10.1109/WMNC.2013.6549053⟩
WMNC
2013 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2013), Apr 2013, Dubai, France. pp.1-8, ⟨10.1109/WMNC.2013.6549053⟩
WMNC
Relay attacks are powerful attacks, since they are easy to set-up and can be performed with very limited resources. Furthermore this type of attack is very hard to detect. This paper proposes a novel approach to defend against amplify and forward rel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6480f45b90e37927bb50a2dab884a704
https://hal.archives-ouvertes.fr/hal-03138962
https://hal.archives-ouvertes.fr/hal-03138962