Dernières publications

Mots clés

Image processing RSA Application-specific VLSI designs Loop PUF DRAM Differential Power Analysis DPA Masking countermeasure Intrusion detection Magnetic tunnel junction Magnetic tunneling Security and privacy SCA Countermeasures Embedded systems Random access memory SoC Simulation GSM Electromagnetic Cryptography Security Aging Coq Training Voltage Side-channel analysis Fault injection attack Convolution MRAM Fault injection Dynamic range TRNG FDSOI Reliability CPA Receivers Authentication Temperature sensors Energy consumption Reverse engineering 3G mobile communication Internet of Things Transistors CRT Side-channel attacks SCA Side-Channel Attacks Asynchronous Gem5 Switches Hardware Logic gates Hardware security Side-Channel Analysis Dual-rail with Precharge Logic DPL ASIC Routing PUF Confusion coefficient EMFI Writing Formal methods Memory Controller Sensors Lightweight cryptography Randomness Field Programmable Gates Array FPGA STT-MRAM Power demand Defect modeling Filtering FPGA Differential power analysis DPA Costs Masking Side-Channel Analysis SCA Formal proof Robustness Fault attacks Field programmable gate arrays Side-channel attack OCaml Countermeasure Resistance Security services Micro-Architectural Attacks Linearity Circuit faults Reverse-engineering Protocols Information leakage Mutual Information Analysis MIA Side-channel attacks Estimation Power-constant logic Neural networks Process variation AES Machine learning Computational modeling Elliptic curve cryptography

 

Documents avec texte intégral

219

Références bibliographiques

436

Open access

42 %

Collaborations