Jean-Luc Danger

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Processor anchor to increase the robustness against fault injection and cyber attacks2022-12-16Paper
Analysis and protection of the two-metric helper data scheme2022-06-17Paper
Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)
Cryptography and Communications
2022-04-01Paper
High Throughput/Gate AES Hardware Architectures Based on Datapath Compression
IEEE Transactions on Computers
2020-10-02Paper
Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem
Advances in Mathematics of Communications
2020-08-26Paper
Security evaluation against side-channel analysis at compilation time
Algebra, Codes and Cryptology
2020-06-29Paper
Predictive aging of reliability of two delay PUFs2018-10-26Paper
Correlated extra-reductions defeat blinded regular exponentiation2018-02-14Paper
Cryptographically Secure Shield for Security IPs Protection
IEEE Transactions on Computers
2017-06-08Paper
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions
IEEE Transactions on Information Theory
2017-05-16Paper
Hardware-enforced protection against buffer overflow using masked program counter
The New Codebreakers
2016-05-02Paper
Improving the Big Mac attack on elliptic curve cryptography
The New Codebreakers
2016-05-02Paper
Analysis and improvements of the DPA contest v4 implementation
Security, Privacy, and Applied Cryptography Engineering
2015-09-18Paper
Boosting higher-order correlation attacks by dimensionality reduction
Security, Privacy, and Applied Cryptography Engineering
2015-09-18Paper
Leakage squeezing: optimal implementation and security evaluation
Journal of Mathematical Cryptology
2014-09-17Paper
Leakage squeezing of order two
Lecture Notes in Computer Science
2014-08-20Paper
Optimal First-Order Masking with Linear and Non-linear Bijections
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
A first-order leak-free masking countermeasure
Lecture Notes in Computer Science
2012-06-08Paper
Towards different flavors of combined side channel attacks
Lecture Notes in Computer Science
2012-06-08Paper
Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
Lecture Notes in Computer Science
2011-12-16Paper
First principal components analysis: a new side channel distinguisher
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Characterization of the electromagnetic side channel in frequency domain
Information Security and Cryptology
2011-07-29Paper
Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper


Research outcomes over time


This page was built for person: Jean-Luc Danger