Search

Your search keyword '"Olivier Bronchain"' showing total 12 results

Search Constraints

Start Over You searched for: Author "Olivier Bronchain" Remove constraint Author: "Olivier Bronchain" Topic information technology Remove constraint Topic: information technology
12 results on '"Olivier Bronchain"'

Search Results

1. Exploiting Small-Norm Polynomial Multiplication with Physical Attacks

2. From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium

3. Protecting Dilithium against Leakage

4. Enabling FrodoKEM on Embedded Devices

5. Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit

6. Bitslice Masking and Improved Shuffling

7. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

8. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms

9. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

10. Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations

11. Multi-Tuple Leakage Detection and the Dependent Signal Issue

12. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

Catalog

Books, media, physical & digital resources