The following pages link to Jean-Luc Danger (Q742017):
Displaying 23 items.
- Leakage squeezing: optimal implementation and security evaluation (Q742019) (← links)
- Correlated extra-reductions defeat blinded regular exponentiation (Q1695961) (← links)
- Predictive aging of reliability of two delay PUFs (Q1989632) (← links)
- Processor anchor to increase the robustness against fault injection and cyber attacks (Q2106705) (← links)
- Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) (Q2120987) (← links)
- Analysis and protection of the two-metric helper data scheme (Q2145311) (← links)
- Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem (Q2194513) (← links)
- Improving the Big Mac Attack on Elliptic Curve Cryptography (Q2803645) (← links)
- Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter (Q2803655) (← links)
- Leakage Squeezing of Order Two (Q2876927) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- Towards Different Flavors of Combined Side Channel Attacks (Q2890011) (← links)
- Optimal First-Order Masking with Linear and Non-linear Bijections (Q2900634) (← links)
- Boosting Higher-Order Correlation Attacks by Dimensionality Reduction (Q2946987) (← links)
- Analysis and Improvements of the DPA Contest v4 Implementation (Q2946988) (← links)
- Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions (Q2983346) (← links)
- Cryptographically Secure Shield for Security IPs Protection (Q2989522) (← links)
- Characterization of the Electromagnetic Side Channel in Frequency Domain (Q3019951) (← links)
- First Principal Components Analysis: A New Side Channel Distinguisher (Q3095005) (← links)
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks (Q3104720) (← links)
- Security Evaluation Against Side-Channel Analysis at Compilation Time (Q3294874) (← links)
- High Throughput/Gate AES Hardware Architectures Based on Datapath Compression (Q5125896) (← links)
- Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks (Q5189450) (← links)