Cédric Tavernier

According to our database1, Cédric Tavernier authored at least 25 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Quasi-linear masking against SCA and FIA, with cost amortization.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost.
IACR Cryptol. ePrint Arch., 2023

Quasi-linear masking to protect against both SCA and FIA.
IACR Cryptol. ePrint Arch., 2023

Quasi-linear Masking to Protect Kyber against both SCA and FIA.
IACR Cryptol. ePrint Arch., 2023

A constructive approach to multimedia codes with complete traceability resistant to δ-noise.
Proceedings of the IEEE Information Theory Workshop, 2023

2019
Polynomial direct sum masking to protect against both SCA and FIA.
J. Cryptogr. Eng., 2019

2018
Lift the veil of the block samples from the Warcq chariot burial with 3D digital technologies.
Proceedings of the 3rd Digital Heritage International Congress, 2018

2016
Internal 3D Printing of Intricate Structures.
Proceedings of the Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection, 2016

2015
Touching and Interacting with Inaccessible Cultural Heritage.
Presence Teleoperators Virtual Environ., 2015

On the Doubly Sparse Compressed Sensing Problem.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Optimized linear complementary codes implementation for hardware trojan prevention.
Proceedings of the European Conference on Circuit Theory and Design, 2015

2014
Preservative Approach to Study Encased Archaeological Artefacts.
Proceedings of the Digital Heritage. Progress in Cultural Heritaage: Documentation, Preservation, and Protection, 2014

2011
Soft-decision list decoding of Reed-Muller codes with linear complexity.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
Robust parent-identifying codes.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

2009
Side-channel attacks based on linear approximations.
IACR Cryptol. ePrint Arch., 2009

Multi-Linear cryptanalysis in Power Analysis Attacks MLPA
CoRR, 2009

2008
Improving security and performance of an Ad Hoc network through a multipath routing strategy.
J. Comput. Virol., 2008

List Decoding of Biorthogonal Codes and the Hadamard Transform With Linear Complexity.
IEEE Trans. Inf. Theory, 2008

An improved list decoding algorithm for the second order Reed-Muller codes and its applications.
Des. Codes Cryptogr., 2008

Reed-Solomon codes and multi-path strategies to improve privacy performance over ad hoc networks.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

2007
List decoding of the first-order binary Reed-Muller codes.
Probl. Inf. Transm., 2007

Soft-Decision List Decoding with Linear Complexity for the First-Order Reed-Muller Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2006
List decoding of Reed-Muller codes up to the Johnson bound with almost linear complexity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
On bent and semi-bent quadratic Boolean functions.
IEEE Trans. Inf. Theory, 2005

2004
Testeurs, problemes de reconstruction univaries et multivaries, et application a la cryptanalyse du DES. (Testing, univariate and multivariate reconstruction problems, and application to the DES cryptanalysis).
PhD thesis, 2004


  Loading...