Author of the publication

High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication.

, , , , , , and . CRiSIS, volume 10158 of Lecture Notes in Computer Science, page 185-198. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Lashermes, Ronan
add a person with the name Lashermes, Ronan
 

Other publications of authors with the same name

An Evaluation Tool for Physical Attacks., , , , , and . ADHOC-NOW, volume 11104 of Lecture Notes in Computer Science, page 112-119. Springer, (2018)A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs., , , , , , and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 138-156. Springer, (2016)A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs., , , , , , and . J. Hardware and Systems Security, 1 (3): 219-236 (2017)Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults., , and . IACR Cryptology ePrint Archive, (2015)High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication., , , , , , and . CRiSIS, volume 10158 of Lecture Notes in Computer Science, page 185-198. Springer, (2016)How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip., , , , and . WISTP, volume 10741 of Lecture Notes in Computer Science, page 93-109. Springer, (2017)A DFA on AES Based on the Entropy of Error Distributions., , , , , and . FDTC, page 34-43. IEEE Computer Society, (2012)A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems., , , , , , and . IACR Cryptology ePrint Archive, (2016)Let's shock our IoT's heart: ARMv7-M under (fault) attacks., , , and . ARES, page 33:1-33:6. ACM, (2018)On the security of pairing implementations. (Etude de la sécurité des implémentations de couplage).. Versailles Saint-Quentin-en-Yvelines University, France, (2014)