Zobrazeno 1 - 10
of 74
pro vyhledávání: '"Yves Mathieu"'
Autor:
Raquel María Fernández, Yves Mathieu, Berta Luzón-Toro, Rocío Núñez-Torres, Antonio González-Meneses, Guillermo Antiñolo, Jeanne Amiel, Salud Borrego
Publikováno v:
PLoS ONE, Vol 8, Iss 1, p e54043 (2013)
Hirschsprung disease (HSCR) is a congenital malformation of the hindgut resulting from a disruption of neural crest cell migration during embryonic development. It has a complex genetic aetiology with several genes involved in its pathogenesis. PHOX2
Externí odkaz:
https://doaj.org/article/57fa4cbc69e3434b89f68c1eb04658d8
Publikováno v:
International Journal of Reconfigurable Computing, Vol 2012 (2012)
Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of dedi
Externí odkaz:
https://doaj.org/article/0cb03a0085e44b0eb715c6dc0107af50
Autor:
Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu
Publikováno v:
International Journal of Reconfigurable Computing, Vol 2010 (2010)
FPGA design of side-channel analysis countermeasures using unmasked dual-rail with precharge logic appears to be a great challenge. Indeed, the robustness of such a solution relies on careful differential placement and routing whereas both FPGA layou
Externí odkaz:
https://doaj.org/article/1ced2e3eda574016927792d179e66295
Publikováno v:
2023 Optical Fiber Communications Conference and Exhibition (OFC).
We compensate jitter between any two unsynchronized endpoints by tracking their clocks and re-creating flows by retiming packets. After implementation over FPGA, we achieve ~10ms synchronization setup time with no more than 70ns jitter.
Autor:
Bevilacqua, Mathieu Cerino, Patricio González-Hormazábal, Mario Abaji, Sebastien Courrier, Francesca Puppo, Yves Mathieu, Alejandra Trangulao, Nicholas Earle, Claudia Castiglioni, Jorge Díaz, Mario Campero, Ricardo Hughes, Carmen Vargas, Rocío Cortés, Karin Kleinsteuber, Ignacio Acosta, J. Andoni Urtizberea, Nicolas Lévy, Marc Bartoli, Martin Krahn, Lilian Jara, Pablo Caviedes, Svetlana Gorokhova, Jorge A.
Publikováno v:
Genes; Volume 13; Issue 6; Pages: 1076
Hereditary myopathies are a group of genetically determined muscle disorders comprising more than 300 entities. In Chile, there are no specific registries of the distinct forms of these myopathies. We now report the genetic findings of a series of Ch
Autor:
Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray, Laurent Sauvage, Yves Mathieu
Publikováno v:
HOST
HOST, Dec 2021, Virtual, United States
HOST, Dec 2021, Virtual, United States
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::117f8b49ff24b8a619c06a521c9ece77
https://hal.telecom-paris.fr/hal-03365025
https://hal.telecom-paris.fr/hal-03365025
Publikováno v:
Industrial Networks and Intelligent Systems
Industrial Networks and Intelligent Systems, 379, Springer International Publishing, pp.465-482, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ⟨10.1007/978-3-030-77424-0_37⟩
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030774233
Industrial Networks and Intelligent Systems, 379, Springer International Publishing, pp.465-482, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ⟨10.1007/978-3-030-77424-0_37⟩
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030774233
Probing attack is considered to be one of the most powerful attack used to break the security and extract confidential information from an embedded system. This attack requires different bespoke equipment’s and expertise. However, for the moment, t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9176ebd40132546ab707e1bd7fa18dd2
https://hal.telecom-paris.fr/hal-03365004
https://hal.telecom-paris.fr/hal-03365004
Autor:
Noriyuki Miura, Shivam Bhasin, Makoto Nagata, Yves Mathieu, Jean-Luc Danger, Rei Ueno, Ville Yli-Mayry, Tarik Graba, Naofumi Homma
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2020, pp.1-1. ⟨10.1109/TIFS.2020.3033441⟩
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2020, pp.1-1. ⟨10.1109/TIFS.2020.3033441⟩
This study investigates a new side-channel leakage observed in the inner rounds of an unrolled hardware implementation of block ciphers in a chosen-input attack scenario. The side-channel leakage occurs in the first round and it can be observed in th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a420e89847d06cb4302502569b527035
https://hdl.handle.net/10356/147414
https://hdl.handle.net/10356/147414
Autor:
Yves Mathieu, Adrien Facon, Sylvain Guilley, Youssef Souissi, Sofiane Takarabt, Laurent Sauvage, Alexander Schaub
Publikováno v:
Lecture Notes in Computer Science
3rd International Conference on Codes, Cryptology, and Information Security (C2SI 2019)
3rd International Conference on Codes, Cryptology, and Information Security (C2SI 2019), Apr 2019, Rabat, Morocco. pp.13-30, ⟨10.1007/978-3-030-16458-4_2⟩
Codes, Cryptology and Information Security ISBN: 9783030164577
C2SI
Lecture Notes in Computer Science-Codes, Cryptology and Information Security
Codes, Cryptology and Information Security-Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings-In Honor of Said El Hajji
3rd International Conference on Codes, Cryptology, and Information Security (C2SI 2019)
3rd International Conference on Codes, Cryptology, and Information Security (C2SI 2019), Apr 2019, Rabat, Morocco. pp.13-30, ⟨10.1007/978-3-030-16458-4_2⟩
Codes, Cryptology and Information Security ISBN: 9783030164577
C2SI
Lecture Notes in Computer Science-Codes, Cryptology and Information Security
Codes, Cryptology and Information Security-Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings-In Honor of Said El Hajji
International audience; Deployed widely and embedding sensitive data, IoT devices depend on the reliability of cryptographic libraries to protect user information. However when implemented on real systems, cryptographic algorithms are vulnerable to s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d54413c22c9063365ed821263754e4d9
https://telecom-paris.hal.science/hal-02319488/document
https://telecom-paris.hal.science/hal-02319488/document
Autor:
Kohei Matsuda, Naofumi Homma, Noriyuki Miura, Shivam Bhasin, Rei Ueno, Tarik Graba, Makoto Nagata, Jean-Luc Danger, Sumio Morioka, Yves Mathieu
Publikováno v:
IEEE Transactions on Computers
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2020, 69 (4), pp.534-548. ⟨10.1109/TC.2019.2957355⟩
IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2020, 69 (4), pp.534-548. ⟨10.1109/TC.2019.2957355⟩
This article proposes highly efficient Advanced Encryption Standard (AES) hardware architectures that support encryption and both encryption and decryption. New operation-reordering and register-retiming techniques presented in this article allow us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::39098415216a42f6b75a8c3314e9a056
https://hdl.handle.net/10356/154464
https://hdl.handle.net/10356/154464