Dernières publications

Mots clés

Micro-Architectural Attacks Side-channel attacks Elliptic curve cryptography Confusion coefficient Differential Power Analysis DPA Process variation Application-specific VLSI designs Defect modeling Neural networks Side-channel analysis TRNG Differential power analysis DPA Robustness 3G mobile communication Reliability Convolution Writing Countermeasure Image processing Formal proof Aging Estimation Reverse-engineering Power-constant logic Side-Channel Analysis Side-channel attacks SCA Cryptography Filtering Hardware Dual-rail with Precharge Logic DPL Machine learning Simulation Information leakage Field programmable gate arrays SCA MRAM GSM Transistors Formal methods Intrusion detection Protocols Internet of Things Dynamic range Training Costs Security and privacy Random access memory Circuit faults FDSOI Fault injection Asynchronous Power demand Hardware security Linearity PUF EMFI Countermeasures Switches AES RSA Mutual Information Analysis MIA CPA Fault attacks Field Programmable Gates Array FPGA Authentication Resistance Reverse engineering Logic gates OCaml Magnetic tunneling Sensors CRT Masking Side-channel attack Energy consumption Fault injection attack Side-Channel Analysis SCA Embedded systems Memory Controller Receivers Security ASIC Gem5 STT-MRAM Side-Channel Attacks Loop PUF Computational modeling Magnetic tunnel junction DRAM Security services Randomness Routing Temperature sensors SoC Lightweight cryptography Electromagnetic Masking countermeasure FPGA Voltage Coq

 

Documents avec texte intégral

219

Références bibliographiques

435

Open access

42 %

Collaborations