Yves Mathieu

According to our database1, Yves Mathieu authored at least 36 papers between 1988 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Optimized Co-Design of Delta Sigma Modulators and Fir-DACs for High Speed Transmitters.
Proceedings of the 23rd IEEE Interregional NEWCAS Conference, 2025

2023
Jitter Compensation Mechanism for Dynamic Deterministic Networks.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2023

2021
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE.
IEEE Trans. Inf. Forensics Secur., 2021

Formal Evaluation and Construction of Glitch-resistant Masked Functions.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

2020
High Throughput/Gate AES Hardware Architectures Based on Datapath Compression.
IEEE Trans. Computers, 2020

2019
Cache-Timing Attacks Still Threaten IoT Devices.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018

2017
Cryptographically Secure Shield for Security IPs Protection.
IEEE Trans. Computers, 2017

2016
Multi-Valued Routing Tracks for FPGAs in 28nm FDSOI Technology.
CoRR, 2016

2015
Countering early propagation and routing imbalance of DPL designs in a tree-based FPGA.
Proceedings of the 2015 International Conference on IC Design & Technology, 2015

2014
Cryptographically secure shields.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

Balancing WDDL dual-rail logic in a tree-based FPGA to enhance physical security.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

Physical Security Evaluation at an Early Design-Phase: A Side-Channel Aware Simulation Methodology.
Proceedings of the International Workshop on Engineering Simulations for Cyber-Physical Systems, 2014

2013
Design methodology of an ASIC TRNG based on an open-loop delay chain.
Proceedings of the IEEE 11th International New Circuits and Systems Conference, 2013

Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA.
Proceedings of the HASP 2013, 2013

Graphics Composition for Multiview Displays.
Proceedings of the Emerging Technologies for 3D Video: Creation, 2013

2012
Exploration of 3D grid caching strategies for ray-shooting.
J. Real Time Image Process., 2012

Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography.
Int. J. Reconfigurable Comput., 2012

A dual threshold voltage technique for glitch minimization.
Proceedings of the 19th IEEE International Conference on Electronics, Circuits and Systems, 2012

2010
Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics.
Int. J. Reconfigurable Comput., 2010

Cross-Correlation Cartography.
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010

Calibrating a predictive cache emulator for SoC design.
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010

Balancing exploration and exploitation in an adaptive three-dimensional cellular genetic algorithm via a probabilistic selection operator.
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010

2009
Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module.
ACM Trans. Reconfigurable Technol. Syst., 2009

Efficient Data Access Management for FPGA-Based Image Processing SoCs.
Proceedings of the Twentienth IEEE/IFIP International Symposium on Rapid System Prototyping, 2009

DPL on Stratix II FPGA: What to Expect?.
Proceedings of the ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, 2009

Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow.
Proceedings of the ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, 2009

High Efficiency Reconfigurable Cache for Image Processing.
Proceedings of the 2009 International Conference on Engineering of Reconfigurable Systems & Algorithms, 2009

Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints.
Proceedings of the Design, Automation and Test in Europe, 2009

2008
Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008

2007
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors.
IEEE Des. Test Comput., 2007

2005
The "Backend Duplication" Method.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
CMOS Structures Suitable for Secured Hardware.
Proceedings of the 2004 Design, 2004

2003
A coprocessor for real-time MPEG4 facial animation on mobiles.
Proceedings of the First Workshop on Embedded Systems for Real-Time Multimedia, 2003

1988
Architectures for Mass Market 3D Displays.
Proceedings of the 9th European Computer Graphics Conference and Exhibition, 1988


  Loading...