Jean-Luc Danger

From MaRDI portal
(Redirected from Person:742017)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Processor anchor to increase the robustness against fault injection and cyber attacks2022-12-16Paper
Analysis and protection of the two-metric helper data scheme2022-06-17Paper
Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)
Cryptography and Communications
2022-04-01Paper
High Throughput/Gate AES Hardware Architectures Based on Datapath Compression
IEEE Transactions on Computers
2020-10-02Paper
Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem
Advances in Mathematics of Communications
2020-08-26Paper
Security evaluation against side-channel analysis at compilation time
Algebra, Codes and Cryptology
2020-06-29Paper
Predictive aging of reliability of two delay PUFs2018-10-26Paper
Correlated extra-reductions defeat blinded regular exponentiation2018-02-14Paper
Cryptographically Secure Shield for Security IPs Protection
IEEE Transactions on Computers
2017-06-08Paper
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions
IEEE Transactions on Information Theory
2017-05-16Paper
Hardware-enforced protection against buffer overflow using masked program counter
The New Codebreakers
2016-05-02Paper
Improving the Big Mac attack on elliptic curve cryptography
The New Codebreakers
2016-05-02Paper
Analysis and improvements of the DPA contest v4 implementation
Security, Privacy, and Applied Cryptography Engineering
2015-09-18Paper
Boosting higher-order correlation attacks by dimensionality reduction
Security, Privacy, and Applied Cryptography Engineering
2015-09-18Paper
Leakage squeezing: optimal implementation and security evaluation
Journal of Mathematical Cryptology
2014-09-17Paper
Leakage squeezing of order two
Lecture Notes in Computer Science
2014-08-20Paper
Optimal First-Order Masking with Linear and Non-linear Bijections
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
A first-order leak-free masking countermeasure
Lecture Notes in Computer Science
2012-06-08Paper
Towards different flavors of combined side channel attacks
Lecture Notes in Computer Science
2012-06-08Paper
Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
Lecture Notes in Computer Science
2011-12-16Paper
First principal components analysis: a new side channel distinguisher
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Characterization of the electromagnetic side channel in frequency domain
Information Security and Cryptology
2011-07-29Paper
Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper


Research outcomes over time


This page was built for person: Jean-Luc Danger