Search results for: Jean-Luc Danger
Journal of Electronic Testing > 2018 > 34 > 5 > 571-586
Journal of Hardware and Systems Security > 2018 > 2 > 2 > 162-178
IEEE Transactions on Computer-Aided Design of Integrated Circuits and... > 2017 > 36 > 11 > 1779 - 1789
IEEE Transactions on Computer-Aided Design of Integrated Circuits and... > 2017 > 36 > 8 > 1327 - 1339
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Security and Cryptography > 208-223
Lecture Notes in Computer Science > Information Security and Cryptology > Hardware and Software Issues > 471-486
Lecture Notes in Computer Science > Reconfigurable Computing: Architectures, Tools and Applications > Reconfigurable Computing Hardware and Systems > 87-98
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Side-Channel Attacks > 195-207
Lecture Notes in Computer Science > Field Programmable Logic and Applications > Short Papers > 396-404
Lecture Notes in Computer Science > Security Aspects in Information Technology > Cryptanalysis/Side Channel Attacks > 128-143
Lecture Notes in Computer Science > Progress in Cryptology – INDOCRYPT 2011 > Side-Channel Attacks > 22-39
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2010 > Side Channel Attack > 407-419
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Algorithms > 100-115