Author of the publication

From Rational Number Reconstruction to Set Reconciliation and File Synchronization.

, , , , , and . TGC, volume 8191 of Lecture Notes in Computer Science, page 1-18. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT., , , and . COSADE, volume 9689 of Lecture Notes in Computer Science, page 111-129. Springer, (2016)A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA., and . IACR Cryptology ePrint Archive, (2013)Can Code Polymorphism Limit Information Leakage?, , , , , and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 1-21. Springer, (2011)Formal Software Methods for Cryptosystems Implementation Security. (Méthodes logicielles formelles pour la sécurité des implémentations cryptographiques).. Télécom ParisTech, France, (2015)Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic., , and . CoRR, (2015)Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA., and . IACR Cryptology ePrint Archive, (2014)High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures., , , , , and . IACR Cryptology ePrint Archive, (2015)From Rational Number Reconstruction to Set Reconciliation and File Synchronization., , , , , and . TGC, volume 8191 of Lecture Notes in Computer Science, page 1-18. Springer, (2012)A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA., and . CoRR, (2014)Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack., and . IACR Cryptology ePrint Archive, (2013)