Yves Mathieu

According to our database1, Yves Mathieu authored at least 35 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Jitter Compensation Mechanism for Dynamic Deterministic Networks.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2023

2021
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE.
IEEE Trans. Inf. Forensics Secur., 2021

Formal Evaluation and Construction of Glitch-resistant Masked Functions.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

2020
High Throughput/Gate AES Hardware Architectures Based on Datapath Compression.
IEEE Trans. Computers, 2020

2019
Cache-Timing Attacks Still Threaten IoT Devices.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018

2017
Cryptographically Secure Shield for Security IPs Protection.
IEEE Trans. Computers, 2017

2016
Multi-Valued Routing Tracks for FPGAs in 28nm FDSOI Technology.
CoRR, 2016

2015
Countering early propagation and routing imbalance of DPL designs in a tree-based FPGA.
Proceedings of the 2015 International Conference on IC Design & Technology, 2015

2014
Cryptographically secure shields.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

Balancing WDDL dual-rail logic in a tree-based FPGA to enhance physical security.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

Physical Security Evaluation at an Early Design-Phase: A Side-Channel Aware Simulation Methodology.
Proceedings of the International Workshop on Engineering Simulations for Cyber-Physical Systems, 2014

2013
Design methodology of an ASIC TRNG based on an open-loop delay chain.
Proceedings of the IEEE 11th International New Circuits and Systems Conference, 2013

Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA.
Proceedings of the HASP 2013, 2013

Graphics Composition for Multiview Displays.
Proceedings of the Emerging Technologies for 3D Video: Creation, 2013

2012
Exploration of 3D grid caching strategies for ray-shooting.
J. Real Time Image Process., 2012

Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography.
Int. J. Reconfigurable Comput., 2012

A dual threshold voltage technique for glitch minimization.
Proceedings of the 19th IEEE International Conference on Electronics, Circuits and Systems, 2012

2010
Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics.
Int. J. Reconfigurable Comput., 2010

Cross-Correlation Cartography.
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010

Calibrating a predictive cache emulator for SoC design.
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010

Balancing exploration and exploitation in an adaptive three-dimensional cellular genetic algorithm via a probabilistic selection operator.
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010

2009
Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module.
ACM Trans. Reconfigurable Technol. Syst., 2009

Efficient Data Access Management for FPGA-Based Image Processing SoCs.
Proceedings of the Twentienth IEEE/IFIP International Symposium on Rapid System Prototyping, 2009

DPL on Stratix II FPGA: What to Expect?.
Proceedings of the ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, 2009

Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow.
Proceedings of the ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, 2009

High Efficiency Reconfigurable Cache for Image Processing.
Proceedings of the 2009 International Conference on Engineering of Reconfigurable Systems & Algorithms, 2009

Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints.
Proceedings of the Design, Automation and Test in Europe, 2009

2008
Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008

2007
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors.
IEEE Des. Test Comput., 2007

2005
The "Backend Duplication" Method.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
CMOS Structures Suitable for Secured Hardware.
Proceedings of the 2004 Design, 2004

2003
A coprocessor for real-time MPEG4 facial animation on mobiles.
Proceedings of the First Workshop on Embedded Systems for Real-Time Multimedia, 2003

1988
Architectures for Mass Market 3D Displays.
Proceedings of the 9th European Computer Graphics Conference and Exhibition, 1988


  Loading...