Search results for: Emmanuel Prouff
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 9 > 2090 - 2104
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Side-Channel Attacks and Countermeasures II > 413-427
Lecture Notes in Computer Science > Information Security Applications > Application Security/Secure Systems > 227-244
IEEE Transactions on Electromagnetic Compatibility > 2016 > 58 > 4-1 > 1143 - 1150
Designs, Codes and Cryptography > 2017 > 82 > 1-2 > 95-115
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Side Channels II > 216-230
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems > Hardware and Cryptography II > 229-243
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2011 > Secret-Key Cryptography > 153-169
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2009 > Side Channel and Fault Analysis Countermeasures > 171-188
Lecture Notes in Computer Science > Smart Card Research and Advanced Applications > Cryptographic Protocols > 263-277
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > AES > 63-78
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2008 > Side-Channel Analysis 1 > 1-14
Lecture Notes in Computer Science > Fast Software Encryption > Boolean Functions and S-Boxes > 54-73
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Side-Channel Attacks > 200-217
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Differential and Higher Order Attacks > 28-44
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2010 > Cryptanalysis of AES > 262-281