Segui
Jean-Luc Danger
Jean-Luc Danger
LTCI, Télécom Paris, Institut Polytechnique de Paris
Email verificata su enst.fr - Home page
Titolo
Citata da
Citata da
Anno
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs
M Nassar, Y Souissi, S Guilley, JL Danger
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012
2162012
Practical setup time violation attacks on AES
N Selmane, S Guilley, JL Danger
2008 Seventh European Dependable Computing Conference, 91-96, 2008
2022008
Hardware Trojan horses in cryptographic IP cores
S Bhasin, JL Danger, S Guilley, XT Ngo, L Sauvage
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 15-29, 2013
1672013
lambda-min decoding algorithm of regular and irregular LDPC codes
E Boutillon, F Guillou, JL Danger
3nd International Symposium on Turbo Codes & Related Topics, 2003
1522003
High speed true random number generator based on open loop structures in FPGAs
JL Danger, S Guilley, P Hoogvorst
Microelectronics journal 40 (11), 1650-1656, 2009
1352009
NICV: normalized inter-class variance for detection of side-channel leakage
S Bhasin, JL Danger, S Guilley, Z Najm
2014 International Symposium on Electromagnetic Compatibility, Tokyo, 310-313, 2014
1172014
High precision fault injections on the instruction cache of ARMv7-M architectures
L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
1132015
BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation
M Nassar, S Bhasin, JL Danger, G Duc, S Guilley
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010
1132010
Efficient FPGA implementation of Gaussian noise generator for communication channel emulation
JL Danger, A Ghazel, E Boutillon, H Laamari
ICECS 2000. 7th IEEE International Conference on Electronics, Circuits and …, 2000
1062000
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses
XT Ngo, S Bhasin, JL Danger, S Guilley, Z Najm
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
992015
An easy-to-design PUF based on a single oscillator: The loop PUF
Z Cherif, JL Danger, S Guilley, L Bossuet
2012 15th Euromicro Conference on Digital System Design, 156-162, 2012
992012
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures
YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger
IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2012
852012
Design of high speed AWGN communication channel emulator
E Boutillon, JL Danger, A Ghazel
Analog Integrated Circuits and Signal Processing 34, 133-142, 2003
842003
WDDL is protected against setup time violation attacks
N Selmane, S Bhasin, S Guilley, T Graba, JL Danger
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 73-83, 2009
822009
Generic description and synthesis of LDPC decoders
F Guilloud, E Boutillon, J Tousch, JL Danger
IEEE transactions on Communications 55 (11), 2084-2091, 2007
812007
Design and performance analysis of a high speed AWGN communication channel emulator
A Ghazel, E Boutillon, JL Danger, G Gulak, H Laamari
2001 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2001
812001
Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors
JL Danger, S Guilley, S Bhasin, M Nassar
2009 3rd International Conference on Signals, Circuits and Systems (SCS), 1-8, 2009
782009
Analysis and improvements of the DPA contest v4 implementation
S Bhasin, N Bruneau, JL Danger, S Guilley, Z Najm
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
712014
Laser-induced single-bit faults in flash memory: Instructions corruption on a 32-bit microcontroller
B Colombier, A Menu, JM Dutertre, PA Moëllic, JB Rigaud, JL Danger
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
702019
Cryptographically secure shields
JM Cioranesco, JL Danger, T Graba, S Guilley, Y Mathieu, D Naccache, ...
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
702014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20