Dernières publications

Mots clés

Differential Power Analysis DPA Security services Field Programmable Gates Array FPGA PUF Gem5 Information leakage Computational modeling Intrusion detection Dual-rail with Precharge Logic DPL Training Filtering Hardware security Aging Convolution Fault attacks MRAM Authentication Security and privacy Costs Simulation Defect modeling Circuit faults Voltage Side-channel analysis ASIC Coq Lightweight cryptography FPGA Receivers Mutual Information Analysis MIA Loop PUF Side-Channel Analysis TRNG Transistors Confusion coefficient Application-specific VLSI designs Logic gates DRAM STT-MRAM Countermeasures SCA Neural networks Elliptic curve cryptography Random access memory Resistance Field programmable gate arrays Magnetic tunneling Temperature sensors Power-constant logic EMFI Internet of Things Dynamic range Differential power analysis DPA OCaml Memory Controller Hardware Randomness Sensors Reverse engineering SoC Fault injection Process variation Formal methods Reliability Machine learning CPA Fault injection attack Masking Switches Electromagnetic Routing Micro-Architectural Attacks Magnetic tunnel junction Side-channel attacks SCA Reverse-engineering Side-Channel Analysis SCA Cryptography Side-channel attack Side-Channel Attacks Masking countermeasure Estimation Linearity Writing 3G mobile communication Energy consumption Formal proof Power demand GSM Security Protocols RSA AES Embedded systems Asynchronous FDSOI Image processing Side-channel attacks Robustness Countermeasure CRT

 

Documents avec texte intégral

219

Références bibliographiques

435

Open access

42 %

Collaborations