Nicolas Veyrat-Charvillon
From MaRDI portal
Person:656514
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| An optimal key enumeration algorithm and its application to side-channel attacks Selected Areas in Cryptography | 2015-12-04 | Paper |
| Soft analytical side-channel attacks Lecture Notes in Computer Science | 2015-01-16 | Paper |
| How to certify the leakage of a chip? Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
| Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount? Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
| Shuffling against side-channel attacks: a comprehensive study with cautionary note Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
| Masking with randomized look up tables. Towards preventing side-channel attacks of all orders Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
| Mutual information analysis: a comprehensive study Journal of Cryptology | 2012-01-18 | Paper |
| Generic side-channel distinguishers: improvements and limitations Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
| A formal study of power variability issues and side-channel attacks for nanoscale devices Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
| The world is not enough: another look on second-order DPA Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
| Adaptive chosen-message side-channel attacks Applied Cryptography and Network Security | 2010-07-06 | Paper |
| Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA Lecture Notes in Computer Science | 2009-11-10 | Paper |
| Mutual Information Analysis: How, When and Why? Lecture Notes in Computer Science | 2009-11-10 | Paper |
Research outcomes over time
This page was built for person: Nicolas Veyrat-Charvillon