Maxime Nassar

According to our database1, Maxime Nassar authored at least 13 papers between 2008 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

Towards Different Flavors of Combined Side Channel Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2011

"Re-synchronization by moments": An efficient solution to align Side-Channel traces.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

"Rank Correction": A New Side-Channel Approach for Secret Key Recovery.
Proceedings of the Security Aspects in Information Technology, 2011

Embedded systems security: An evaluation methodology against Side Channel Attacks.
Proceedings of the 2011 Conference on Design and Architectures for Signal and Image Processing, 2011

2010
Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics.
Int. J. Reconfigurable Comput., 2010

First Principal Components Analysis: A New Side Channel Distinguisher.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation.
Proceedings of the Design, Automation and Test in Europe, 2010

2009
DPL on Stratix II FPGA: What to Expect?.
Proceedings of the ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, 2009

Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow.
Proceedings of the ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, 2009

Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints.
Proceedings of the Design, Automation and Test in Europe, 2009

2008
Place-and-Route Impact on the Security of DPL Designs in FPGAs.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008


  Loading...