Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Vincent Migliore"'
Publikováno v:
Applied Sciences, Vol 12, Iss 3, p 1452 (2022)
Microarchitectural attacks exploit target hardware properties to break software isolation techniques used by the processor. These attacks are extremely powerful and hard to detect since the determination of the program execution’s impact on the mic
Externí odkaz:
https://doaj.org/article/92d55e6d34ea4f55b181f2b92de236f3
Autor:
Rémi Adelin, Cyrius Nugier, Éric Alata, Vincent Nicomette, Vincent Migliore, Mohamed Kaâniche
Publikováno v:
Journal of Computer Virology and Hacking Techniques
Journal of Computer Virology and Hacking Techniques, 2022, ⟨10.1007/s11416-022-00426-1⟩
Journal of Computer Virology and Hacking Techniques, 2022, ⟨10.1007/s11416-022-00426-1⟩
International audience; Modern vehicles are expected to integrate a variety of connectivity features to enrich safety, entertainment, and driver comfort. This connectivity raises confidentiality and privacy concerns with the risk for the driver to lo
Autor:
Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, Vincent Migliore, Mamuri Nawan, Kashif Nawaz
Publikováno v:
Code-Based Cryptography ISBN: 9783031296888
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6b389fe7888c1eb75601b9a6a9c27de9
https://doi.org/10.1007/978-3-031-29689-5_4
https://doi.org/10.1007/978-3-031-29689-5_4
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices
Autor:
Mohamed Kaaniche, Vincent Nicomette, Eric Alata, Vincent Migliore, Malcolm Bourdon, Pierre-François Gimenez, Youssef Laarouchi
Publikováno v:
19th IEEE International Symposium on Network Computing and Applications (NCA 2020)
19th IEEE International Symposium on Network Computing and Applications (NCA 2020), Nov 2020, Cambridge, MA, United States. ⟨10.1109/NCA51143.2020.9306726⟩
NCA
19th IEEE International Symposium on Network Computing and Applications (NCA 2020), Nov 2020, Cambridge, MA, United States. ⟨10.1109/NCA51143.2020.9306726⟩
NCA
International audience; Energy providers are massively deploying devices to manage distributed resources or equipment. These devices are used for example to manage the energy of smart factories efficiently or to monitor the infrastructure of smart-gr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bc1970bae592a74788bc429781e9edd4
https://hal.laas.fr/hal-03328251/document
https://hal.laas.fr/hal-03328251/document
Publikováno v:
EuroS&P Workshops
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Sep 2020, Genova, Italy. ⟨10.1109/EuroS&PW51379.2020.00100⟩
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Sep 2020, Genova, Italy. ⟨10.1109/EuroS&PW51379.2020.00100⟩
International audience; Cache side-channel attacks consist, for a malicious process, to infer the current state of the cache by measuring the time it takes to access the memory, and indirectly gain knowledge about other processes sharing this same ph
Autor:
Vincent Migliore, Maria Mendez Real, Vianney Lapotre, Arnaud Tisserand, Caroline Fontaine, Guy Gogniat
Publikováno v:
IEEE Transactions on Computers
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2018, 67 (3), pp.335-347. ⟨10.1109/TC.2016.2645204⟩
BASE-Bielefeld Academic Search Engine
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2018, 67 (3), pp.335-347. ⟨10.1109/TC.2016.2645204⟩
BASE-Bielefeld Academic Search Engine
Somewhat Homomorphic Encryption (SHE) schemes allow to carry out operations on data in the cipher domain. In a cloud computing scenario, personal information can be processed secretly, inferring a high level of confidentiality. For many years, practi
Publikováno v:
IEEE Transactions on Computers
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2018, ⟨10.1109/TC.2018.2808962⟩
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2018, ⟨10.1109/TC.2018.2808962⟩
International audience; Post-quantum cryptography gets increasing attention lately, as we have to prepare alternative cryptographic solutions that will resist attacks from quantum computers. A very large effort is being done to replace the usual prim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f8d592cd1c4d6fd4c898b1fbc773f2ed
https://hal.archives-ouvertes.fr/hal-02128623
https://hal.archives-ouvertes.fr/hal-02128623
Autor:
Caroline Fontaine, Vianney Lapotre, Maria Mendez Real, Arnaud Tisserand, Vincent Migliore, Russell Tessier, Guy Gogniat, Cédric Seguin
Publikováno v:
ACM Transactions on Embedded Computing Systems (TECS)
ACM Transactions on Embedded Computing Systems (TECS), ACM, 2017, 16 (5s), ⟨10.1145/3126558⟩
ACM Transactions on Embedded Computing Systems (TECS), ACM, 2017, 16 (5s), ⟨10.1145/3126558⟩
International audience; Somewhat Homomorphic Encryption (SHE) schemes can be used to carry out operations on ciphered data. In a cloud computing scenario, personal information can be processed secretly, inferring a high level of confidentiality. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5060d1b0af751753d8eb25fa34e80bfd
https://hal.archives-ouvertes.fr/hal-01630065/file/TECS-2017.pdf
https://hal.archives-ouvertes.fr/hal-01630065/file/TECS-2017.pdf
Autor:
Caroline Fontaine, Guillaume Bonnoron, Vianney Lapotre, Adeline Roux-Langlois, Vincent Herbert, Vincent Migliore, Guy Gogniat
Publikováno v:
Proceedings C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security
C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security
C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security, Apr 2017, Rabat, Morocco. pp.68-82, ⟨10.1007/978-3-319-55589-8_5⟩
Codes, Cryptology and Information Security ISBN: 9783319555881
C2SI
Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney, Lapotre, Vincent Migliore, Adeline Roux-Langlois
C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security
C2SI 2017 : 2nd International Conference on Codes, Cryptology and Information Security, Apr 2017, Rabat, Morocco. pp.68-82, ⟨10.1007/978-3-319-55589-8_5⟩
Codes, Cryptology and Information Security ISBN: 9783319555881
C2SI
Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney, Lapotre, Vincent Migliore, Adeline Roux-Langlois
International audience; The proposed article aims, for readers, to learn about the existing efforts to secure and implement Somewhat/Fully Homomorphic Encryption (\,(S/F)HE\,) schemes and the problems to be tackled in order to progress toward their a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ba4295cb25c11fb70971d77abcbc4663
https://hal.archives-ouvertes.fr/hal-01596540
https://hal.archives-ouvertes.fr/hal-01596540
Autor:
Maria Mendez Real, Arnaud Tisserand, Guy Gogniat, Vianney Lapotre, Vincent Migliore, Caroline Fontaine
Publikováno v:
International Conference on Field-Programmable Technology (FPT)
International Conference on Field-Programmable Technology (FPT), Dec 2016, Xi’an, China. ⟨10.1109/FPT.2016.7929535⟩
HAL
BASE-Bielefeld Academic Search Engine
FPT
International Conference on Field-Programmable Technology (FPT), Dec 2016, Xi’an, China. ⟨10.1109/FPT.2016.7929535⟩
HAL
BASE-Bielefeld Academic Search Engine
FPT
International audience; Most practical Somewhat Homomorphic Encryption (SHE) schemes require the implementation of fast polynomial arithmetic in the ring Zq[X]/f (X), for a given modulus q and an irreducible polynomial f (X). That is why hardware acc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::15cf029af6c148acc052f69fb823aeca
https://hal.archives-ouvertes.fr/hal-01427642
https://hal.archives-ouvertes.fr/hal-01427642