Search

Your search keyword '"Olivier Bronchain"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Olivier Bronchain" Remove constraint Author: "Olivier Bronchain"
47 results on '"Olivier Bronchain"'

Search Results

1. Exploiting Small-Norm Polynomial Multiplication with Physical Attacks

2. From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium

3. Protecting Dilithium against Leakage

4. Enabling FrodoKEM on Embedded Devices

5. Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit

6. Bitslice Masking and Improved Shuffling

7. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

8. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms

9. MOE: Multiplication Operated Encryption with Trojan Resilience

10. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

11. Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher

12. Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations

13. Multi-Tuple Leakage Detection and the Dependent Signal Issue

33. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

35. Reducing risks through simplicity: high side-channel security for lazy engineers

36. MOE: Multiplication Operated Encryption with Trojan Resilience

37. How to Fool a Black Box Machine Learning Based Side-Channel Security Evaluation

38. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough

39. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography A Practical Guide Through the Leakage-Resistance Jungle

40. Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher

41. Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations

42. Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended

44. Side-channel analysis of a learning parity with physical noise processor

46. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations

47. Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?

Catalog

Books, media, physical & digital resources