# Ronan Lashermes

According to our database

Collaborative distances:

^{1}, Ronan Lashermes authored at least 16 papers between 2012 and 2018.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2018

Hardware-Assisted Program Execution Integrity: HAPEI.

Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

An Evaluation Tool for Physical Attacks.

Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

Let's shock our IoT's heart: ARMv7-M under (fault) attacks.

Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017

How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip.

Proceedings of the Information Security Theory and Practice, 2017

2016

A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems.

IACR Cryptology ePrint Archive, 2016

A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs.

Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

A Template Attack Against VERIFY PIN Algorithms.

Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Multi-round Side Channel Attack on AES Using Belief Propagation.

Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication.

Proceedings of the Risks and Security of Internet and Systems, 2016

2015

A survey of fault attacks in pairing based cryptography.

Cryptography and Communications, 2015

2014

On the security of pairing implementations. (Etude de la sécurité des implémentations de couplage).

PhD thesis, 2014

A survey of Fault Attacks in Pairing Based Cryptography.

IACR Cryptology ePrint Archive, 2014

A Unified Formalism for Physical Attacks.

IACR Cryptology ePrint Archive, 2014

Practical Validation of Several Fault Attacks against the Miller Algorithm.

Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

2013

Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults.

Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

2012

A DFA on AES Based on the Entropy of Error Distributions.

Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012