Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Opérateurs arithmétiques matériels pour des applications spécifiques. (Hardware arithmetic operators for specific applications).. École normale supérieure de Lyon, France, (2007)Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits., , , , and . IACR Cryptology ePrint Archive, (2014)Compact FPGA Implementations of the Five SHA-3 Finalists., , , , , and . CARDIS, volume 7079 of Lecture Notes in Computer Science, page 217-233. Springer, (2011)Adaptive Chosen-Message Side-Channel Attacks., and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 186-199. (2010)Multi-mode operator for SHA-2 hash functions., , , , and . Journal of Systems Architecture, 53 (2-3): 127-138 (2007)An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks., , , and . IACR Cryptology ePrint Archive, (2011)Improving the Rules of the DPA Contest., , , and . IACR Cryptology ePrint Archive, (2008)Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA., , and . CHES, volume 5747 of Lecture Notes in Computer Science, page 97-111. Springer, (2009)How to Certify the Leakage of a Chip?, , and . EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, page 459-476. Springer, (2014)Carry Prediction and Selection for Truncated Multiplication., , and . SiPS, page 339-344. IEEE, (2006)