Nicolas Veyrat-Charvillon

According to our database1, Nicolas Veyrat-Charvillon authored at least 27 papers between 2005 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014

Soft Analytical Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits.
IACR Cryptol. ePrint Arch., 2014

2013
How to Certify the Leakage of a Chip?
IACR Cryptol. ePrint Arch., 2013

Security Evaluations beyond Computing Power.
Proceedings of the Advances in Cryptology, 2013

2012
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure.
IACR Cryptol. ePrint Arch., 2012

Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Mutual Information Analysis: a Comprehensive Study.
J. Cryptol., 2011

Generic Side-Channel Distinguishers: Improvements and Limitations.
IACR Cryptol. ePrint Arch., 2011

An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2011

Spectral Coherence Analysis - First Experimental Results -.
IACR Cryptol. ePrint Arch., 2011

A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Compact FPGA Implementations of the Five SHA-3 Finalists.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
The World is Not Enough: Another Look on Second-Order DPA.
IACR Cryptol. ePrint Arch., 2010

Adaptive Chosen-Message Side-Channel Attacks.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Mutual Information Analysis: How, When and Why?.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Optimisation d'opérateurs arithmétiques matériels à base d'approximations polynomiales.
Tech. Sci. Informatiques, 2008

Improving the Rules of the DPA Contest.
IACR Cryptol. ePrint Arch., 2008

Efficiency and pseudo-randomness of a variant of Zémor-Tillich hash function.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

2007
Opérateurs arithmétiques matériels pour des applications spécifiques. (Hardware arithmetic operators for specific applications).
PhD thesis, 2007

Multi-mode operator for SHA-2 hash functions.
J. Syst. Archit., 2007

2006
Carry Prediction and Selection for Truncated Multiplication.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2006

2005
Small FPGA polynomial approximations with 3-bit coefficients and low-precision estimations of the powers of x.
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005


  Loading...