Folgen
Nicolas Veyrat-Charvillon
Nicolas Veyrat-Charvillon
Ubisoft Annecy
Bestätigte E-Mail-Adresse bei ubisoft.com
Titel
Zitiert von
Zitiert von
Jahr
Mutual information analysis: a comprehensive study
L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ...
Journal of Cryptology 24 (2), 269-291, 2011
2882011
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
International Conference on the Theory and Application of Cryptology and …, 2010
2072010
A formal study of power variability issues and side-channel attacks for nanoscale devices
M Renauld, FX Standaert, N Veyrat-Charvillon, D Kamel, D Flandre
Annual International Conference on the Theory and Applications of …, 2011
2022011
Shuffling against side-channel attacks: A comprehensive study with cautionary note
N Veyrat-Charvillon, M Medwed, S Kerckhof, FX Standaert
International Conference on the Theory and Application of Cryptology and …, 2012
1872012
Algebraic side-channel attacks on the AES: Why time also matters in DPA
M Renauld, FX Standaert, N Veyrat-Charvillon
International Workshop on Cryptographic Hardware and Embedded Systems, 97-111, 2009
1782009
Mutual information analysis: how, when and why?
N Veyrat-Charvillon, FX Standaert
International Workshop on Cryptographic Hardware and Embedded Systems, 429-443, 2009
1782009
An optimal key enumeration algorithm and its application to side-channel attacks
N Veyrat-Charvillon, B Gérard, M Renauld, FX Standaert
International Conference on Selected Areas in Cryptography, 390-406, 2012
1712012
Security evaluations beyond computing power
N Veyrat-Charvillon, B Gérard, FX Standaert
Annual International Conference on the Theory and Applications of …, 2013
1112013
How to certify the leakage of a chip?
F Durvaux, FX Standaert, N Veyrat-Charvillon
Annual International Conference on the Theory and Applications of …, 2014
1092014
Soft analytical side-channel attacks
N Veyrat-Charvillon, B Gérard, FX Standaert
International Conference on the Theory and Application of Cryptology and …, 2014
1082014
Compact FPGA implementations of the five SHA-3 finalists
S Kerckhof, F Durvaux, N Veyrat-Charvillon, F Regazzoni, GM Dormale, ...
International Conference on Smart Card Research and Advanced Applications …, 2011
792011
Multi-mode operator for SHA-2 hash functions
R Glabb, L Imbert, G Jullien, A Tisserand, N Veyrat-Charvillon
journal of systems architecture 53 (2-3), 127-138, 2007
632007
Efficient removal of random delays from embedded software implementations using hidden markov models
F Durvaux, M Renauld, FX Standaert, L Oldeneel tot Oldenzeel, ...
International Conference on Smart Card Research and Advanced Applications …, 2012
532012
Generic side-channel distinguishers: Improvements and limitations
N Veyrat-Charvillon, FX Standaert
Annual Cryptology Conference, 354-372, 2011
522011
Efficient selection of time samples for higher-order DPA with projection pursuits
F Durvaux, FX Standaert, N Veyrat-Charvillon, JB Mairy, Y Deville
International Workshop on Constructive Side-Channel Analysis and Secure …, 2015
392015
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4 (4), 259-274, 2014
382014
Adaptive chosen-message side-channel attacks
N Veyrat-Charvillon, FX Standaert
International Conference on Applied Cryptography and Network Security, 186-199, 2010
332010
Improving the Rules of the DPA Contest
FX Standaert, P Bulens, G de Meulenaer, N Veyrat-Charvillon
Cryptology EPrint Archive, 2008
282008
Carry prediction and selection for truncated multiplication
R Michard, A Tisserand, N Veyrat-Charvillon
2006 IEEE Workshop on Signal Processing Systems Design and Implementation …, 2006
272006
Cryptanalysis of the ches 2009/2010 random delay countermeasure
F Durvaux, M Renauld, FX Standaert, LO tot Oldenzeel, ...
Cryptology ePrint Archive, 2012
172012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20