Search

Your search keyword '"Olivier Bronchain"' showing total 11 results

Search Constraints

Start Over You searched for: Author "Olivier Bronchain" Remove constraint Author: "Olivier Bronchain" Topic t58.5-58.64 Remove constraint Topic: t58.5-58.64
11 results on '"Olivier Bronchain"'

Search Results

1. Exploiting Small-Norm Polynomial Multiplication with Physical Attacks

2. From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium

3. Protecting Dilithium against Leakage

4. Enabling FrodoKEM on Embedded Devices

5. Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit

6. Bitslice Masking and Improved Shuffling

7. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms

8. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

9. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

10. Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations

11. Multi-Tuple Leakage Detection and the Dependent Signal Issue

Catalog

Books, media, physical & digital resources