Search Results - "Sauvage, Laurent"

Refine Results
  1. 1

    Précarité, temporalités et conciliation travail-famille chez les musiciens baroques montréalais by Sauvage, Laurent

    Published in Interventions économiques (2017)
    “…S’est développé à Montréal, depuis la fin des années 1980, un « Monde de l’art » particulier articulé autour de l’interprétation de la musique dite ancienne…”
    Get full text
    Journal Article
  2. 2

    Les entreprises en économie sociale face aux défis de l’hybridation des ressources by Sauvage, Laurent, Lachapelle, Nathalie, Tremblay, Diane-Gabrielle

    Published in Interventions économiques (11-06-2021)
    “…This article analyzes the resources, market and non market and non-financial, which are used by Québec social economy firms. This diversification of resources…”
    Get full text
    Journal Article
  3. 3

    Culture de proximité et développement local : vers une grille de la vitalité culturelle des quartiers à Montréal by Klein, Juan-Luis, Tremblay, Diane-Gabrielle, Sauvage, Laurent, Angulo, Wilfredo, Ghaffari, Leila

    Published in Interventions économiques (01-03-2020)
    “…This article deals with the development of local communities, in relation with cultural and creative activities. Research has shown that arts and culture…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Cultural Initiatives and Local Development: A Basis for Inclusive Neighborhood Revitalization by Klein, Juan-Luis, Tremblay, Diane-Gabrielle, Sauvage, Laurent, Ghaffari, Leila, Angulo, Wilfredo

    Published in Urban planning (01-01-2019)
    “…This article focuses on cultural and creative activities and the development of local communities. Several studies on North America, Europe and Latin America…”
    Get full text
    Journal Article
  6. 6

    Aerosol/Cloud Measurements Using Coherent Wind Doppler Lidars by Royer, Philippe, Boquet, Matthieu, Cariou, Jean-Pierre, Sauvage, Laurent, Parmentier, Rémy

    Published in EPJ Web of Conferences (01-01-2016)
    “…The accurate localization and characterization of aerosol and cloud layers is crucial for climate studies (aerosol indirect effect), meteorology (Planetary…”
    Get full text
    Journal Article Conference Proceeding
  7. 7

    Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks by Guilley, S., Sauvage, L., Hoogvorst, P., Pacalet, R., Bertoni, G.M., Chaudhuri, S.

    Published in IEEE transactions on computers (01-11-2008)
    “…Logic styles with constant power consumption are promising solutions to counteract side-channel attacks on sensitive cryptographic devices. Recently, one…”
    Get full text
    Journal Article
  8. 8

    Cloud heights from TOVS Path-B: Evaluation using LITE observations and distributions of highest cloud layers by Stubenrauch, Claudia J., Eddounia, Fadoua, Sauvage, Laurent

    “…Cloud height from the TIROS‐N Operational Vertical Sounder (TOVS) Path‐B climate data set has been evaluated by using vertical profiles of the backscattered…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Hardware Trojan Horses in Cryptographic IP Cores by Bhasin, Shivam, Danger, Jean-Luc, Guilley, Sylvain, Ngo, Xuan Thuy, Sauvage, Laurent

    “…Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic…”
    Get full text
    Conference Proceeding
  11. 11

    Communs culturels et revitalisation territoriale : le cas du quartier Saint-Michel à Montréal by Laurent Dambre-Sauvage, Juan-Luis Klein, Diane-Gabrielle Tremblay

    “…Cet article s’intéresse aux effets territoriaux du tournant participatif des politiques culturelles. Ce tournant se renforce à la faveur de l’évolution…”
    Get full text
    Journal Article
  12. 12

    Blind Cartography for Side Channel Attacks : Cross-Correlation Cartography by Sauvage, Laurent, Guilley, Sylvain, Flament, Florent, Danger, Jean-Luc, Mathieu, Yves

    “…Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved…”
    Get full text
    Journal Article
  13. 13
  14. 14

    Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics by Sauvage, Laurent, Nassar, Maxime, Guilley, Sylvain, Flament, Florent, Danger, Jean-Luc, Mathieu, Yves

    “…FPGA design of side-channel analysis countermeasures using unmasked dual-rail with precharge logic appears to be a great challenge. Indeed, the robustness of…”
    Get full text
    Journal Article
  15. 15

    Aerosol content survey by mini N₂-Raman lidar: Application to local and long-range transport aerosols by Royer, Philippe, Chazette, Patrick, Lardier, Melody, Sauvage, Laurent

    Published in Atmospheric environment (1994) (01-12-2011)
    “…This study shows an aerosol content survey in the low and middle troposphere over Paris with a compact and light Nitrogen-Raman lidar which has been recently…”
    Get full text
    Journal Article
  16. 16

    Aerosol content survey by mini N 2-Raman lidar: Application to local and long-range transport aerosols by Royer, Philippe, Chazette, Patrick, Lardier, Melody, Sauvage, Laurent

    Published in Atmospheric environment (1994) (01-12-2011)
    “…This study shows an aerosol content survey in the low and middle troposphere over Paris with a compact and light Nitrogen-Raman lidar which has been recently…”
    Get full text
    Journal Article
  17. 17

    Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller Instruction Buffer by Trabelsi Ltci, Oualid, Sauvage Ltci, Laurent, Danger Ltci, Jean-Luc

    “…Electromagnetic fault injection (EMFI) is an efficient technique to alter the behavior of microcontrollers in order to extract secret informations. Compared to…”
    Get full text
    Conference Proceeding
  18. 18

    Multi-level formal verification: A new approach against fault injection attack by Sauvage, Laurent, Graba, Tarik, Porteboeuf, Thibault

    Published in Journal of cryptographic engineering (01-04-2017)
    “…Fault injection attack is an extremely powerful technique to extract secrets from an embedded system. Since their introduction, a large number of…”
    Get full text
    Journal Article
  19. 19

    Highlighting Two EM Fault Models While Analyzing a Digital Sensor Limitations by Nabhan, Roukoz, Dutertre, Jean-Max, Rigaud, Jean-Baptiste, Danger, Jean-Luc, Sauvage, Laurent

    “…Fault injection attacks can be carried out against an operating circuit by exposing it to EM perturbations. These attacks can be detected using embedded…”
    Get full text
    Conference Proceeding
  20. 20

    Analysis of Electromagnetic Information Leakage From Cryptographic Devices With Different Physical Structures by Hayashi, Y., Homma, N., Mizuki, T., Aoki, T., Sone, H., Sauvage, L., Danger, J. L.

    “…This paper presents a novel analysis of electromagnetic (EM) information leakage from cryptographic devices, based on the electromagnetic interference (EMI)…”
    Get full text
    Journal Article