Search Results - "Reymond, Guillaume"
-
1
A DFA on AES Based on the Entropy of Error Distributions
Published in 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (01-09-2012)“…Differential fault analysis (DFA) techniques have been widely studied during the past decade. To our best knowledge, most DFA techniques on the Advanced…”
Get full text
Conference Proceeding -
2
Improving Single-Trace Attacks on the Number-Theoretic Transform for Cortex-M4
Published in 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (01-05-2023)“…The Number-Theoretic Transform (NTT) is a key feature for the efficiency of numerous lattice-based cryptographic schemes. The arithmetic structure of that…”
Get full text
Conference Proceeding -
3
A secure docking module for providing trust in crisis management incidents
Published in 2013 11th IEEE International Conference on Industrial Informatics (INDIN) (01-07-2013)“…In the SECRICOM project where seamless, interoperable crisis management communication is required, strong security and trust must be achieved under hostile…”
Get full text
Conference Proceeding -
4
A hardware pipelined architecture of a scalable Montgomery modular multiplier over GF(2m)
Published in 2013 International Conference on Reconfigurable Computing and FPGAs (ReConFig) (01-12-2013)“…Computing modular multiplication over GF(2 m ) is often a performance critical operation in cryptographic applications. This paper describes the architecture…”
Get full text
Conference Proceeding -
5
La culture visuelle de la science-fiction, entre culture populaire et avant-garde
Published in ReS Futurae (14-05-2014)“…La culture populaire comme l’avant-garde ont suscité des études riches et spécifiques. En faisant dialoguer des spécialistes des deux pôles, ce numéro explore…”
Get full text
Journal Article