11 results on '"Olivier Bronchain"'
Search Results
2. Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
3. From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium.
4. Enabling FrodoKEM on Embedded Devices.
5. Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
6. Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs.
7. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.
8. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter.
9. Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations.
10. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
11. Multi-Tuple Leakage Detection and the Dependent Signal Issue.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.