45 résultats  enregistrer la recherche


  • 1
  • 2
hal-01111463v1  Chapitre d'ouvrage
Vanessa GratzerDavid NaccacheHow to Read a Signature?
David Naccache. Cryptography and Security: From Theory to Applications:Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, 6805, Springer, pp.480-483, 2012, LNCS - Lecture Notes in Computer Science, 978-3-642-28367-3. <10.1007/978-3-642-28368-0_31>
...
hal-00721569v2  Communication dans un congrès
Sébastien BriaisJean-Michel CioranescoJean-Luc DangerSylvain GuilleyDavid Naccache et al.  Random Active Shield
IEEE Computer Society. Fault Diagnosis and Tolerance in Cryptography, Sep 2012, Leuven, Belgium. 11 p., 2012, <10.1109/FDTC.2012.11>
...
inria-00577142v1  Communication dans un congrès
Aurélie BauerJean-Sébastien CoronDavid NaccacheMehdi TibouchiDamien VergnaudOn The Broadcast and Validity-Checking Security of PKCS #1 v1.5 Encryption
Jianying Zhou and Moti Yung. Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Jun 2010, Beijing, China. Springer, 6123, pp.1-18, 2010, Lecture Notes in Computer Science; Applied Cryptography and Network Security, 8th International Conference, ACNS 2010. <10.1007/978-3-642-13708-2_1>
...
emse-01130826v1  Communication dans un congrès
Michel AgoyanJean-Max DutertreAmir-Pasha MirbahaDavid NaccacheAnne-Lise Ribotta et al.  How to Flip a Bit?
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, Jul 2010, Corfu, Greece. <10.1109/IOLTS.2010.5560194>
hal-00934341v1  Communication dans un congrès
Hervé ChabanneJean-Michel CioranescoVincent DespiegelJean-Christophe FondeurDavid NaccacheUsing Hamiltonian Totems as Passwords
SantaCrypt 2013, 2013, Prague, Czech Republic. 2013
hal-00934340v1  Communication dans un congrès
Roman KorkikianDavid NaccacheGuilherme Ozari de AlmeidaInstantaneous Frequency Analysis
DCNET/ICE-B/OPTICS 2013: IS-11 - 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Jul 2013, Reykjavík, Iceland. SciTePress, 2013
hal-00934334v1  Rapport
Roman KorkikianDavid NaccacheGuilherme Ozari de AlmeidaInstantaneous Frequency Analysis
[Research Report] IACR Cryptology ePrint Archive 2013: 320 (2013), 2013
hal-00934335v1  Communication dans un congrès
Diana MaimutCédric MurdicaDavid NaccacheMehdi TibouchiFault Attacks on Projective-to-Affine Coordinates Conversion
COSADE 2013 - 4th International Workshop Constructive Side-Channel Analysis and Secure Design, 2013, Paris, France. Springer, pp.46-61, 2013, <10.1007/978-3-642-40026-1_4>
hal-00934345v1  Communication dans un congrès
Eric BrierDavid NaccacheLi-Yao XiaHow to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling
Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey. 2013
hal-01098408v1  Ouvrage (y compris édition critique et traduction)
David NaccacheDamien SauveronInformation Security Theory and Practice: Securing the Internet of Things
David Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. <10.1007/978-3-662-43826-8>. <http://www.wistp.org/>
hal-01109981v1  Communication dans un congrès
Eric BrierDavid NaccachePhong Q. NguyenMehdi TibouchiModulus Fault Attacks against RSA-CRT Signatures
Bart Preneel; Tsuyoshi Takagi. CHES 2011 - 13th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2011, Nara, Japan. Springer, 6917, pp.192-206, 2011, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-23951-9_13>
hal-01110262v1  Direction d'ouvrage, Proceedings
Luca BreveglieriSylvain GuilleyIsrael KorenDavid NaccacheJunko Takahashi2011 Workshop on Fault Diagnosis and Tolerance in Cryptography
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC, Sep 2011, Nara, Japan. IEEE, 2011
hal-01110245v1  Ouvrage (y compris édition critique et traduction)
David NaccacheEmil SimionAdela MihaitaRuxandra Florentina OlimidAndrei George OprinaCriptografie si securitatea informatiei
Matrix Rom, pp.107, 2011, 978-973-755-675-2
hal-01110250v1  Ouvrage (y compris édition critique et traduction)
Emil SimionMircea AndraşiuDavid NaccacheGeorghe SimionCercetări operaţionale,probabilităţi si criptologie
Editura Academiei Tehnice Militare, pp.292, 2011
hal-01110259v1  Communication dans un congrès
Antoine AmarilliSascha MüllerDavid NaccacheDaniel PagePablo Rauzy et al.  Can code polymorphism limit information leakage?
Claudio A. Ardagna; Jianying Zhou. WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, Jun 2011, Heraklion, Crete, Greece. Springer, 6633, pp.1-21, 2011, LNCS - Lecture Notes in Computer Science
hal-01110216v1  Communication dans un congrès
Jean-Sébastien CoronAvradip MandalDavid NaccacheMehdi TibouchiFully Homomorphic Encryption over the Integers with Shorter Public Keys
Phillip Rogaway. CRYPTO 2011 - 31st Annual Cryptology Conference, Aug 2011, Santa Barbara, CA, United States. Springer, 6841, pp.487-504, 2011, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-22792-9_28>
...
hal-01110463v1  Communication dans un congrès
Jean-Michel CioranescoJean-Luc DangerTarik GrabaSylvain GuilleyYves Mathieu et al.  Cryptographically secure shields
HOST 2014 - IEEE International Symposium on Hardware-Oriented Security and Trust, May 2014, Washington, United States. IEEE, pp.25 - 31, 2014, <10.1109/HST.2014.6855563>
hal-01110939v1  Direction d'ouvrage, Proceedings
David NaccacheCryptography and Security: From Theory to Applications
France. 6805, Springer, pp.318, 2012, LNCS - Lecture Notes in Computer Science, <10.1007/978-3-642-28368-0>
hal-01111541v1  Communication dans un congrès
Jean-Sébastien CoronDavid NaccacheMehdi TibouchiPublic Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
David Pointcheval; Thomas Johansson. EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2012, Cambridge, UK, United Kingdom. Springer, 7237, pp.446-464, 2012, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-29011-4_27>
hal-01110874v1  Chapitre d'ouvrage
David NaccacheDavid PointchevalAutotomic Signatures
David Naccache. Cryptography and Security: From Theory to Applications : Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, 6805, Springer, pp.143-155, 2012, LNCS - Lecture Notes in Computer Science, 978-3-642-28367-3. <10.1007/978-3-642-28368-0_12>
hal-01111484v1  Chapitre d'ouvrage
Guillaume ClaretMichaël MathieuDavid NaccacheGuillaume SegererPhysical Simulation of Inarticulate Robots
David Naccache. Cryptography and Security: From Theory to Applications:Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, 6805, Springer, pp.491-499, 2012, LNCS - Lecture Notes in Computer Science, <10.1007/978-3-642-28368-0_33>
hal-01111533v1  Communication dans un congrès
Sébastien BriaisStéphane CaronJean-Michel CioranescoJean-Luc DangerSylvain Guilley et al.  3D Hardware Canaries
Emmanuel Prouff; Patrick Schaumont. CHES 2012 - 14th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2012, Leuven, Belgium. Springer, 7428, pp.1-22, 2012, LNCS - Lecture Notes in Computer Science. <10.1007/978-3-642-33027-8_1>
emse-00742567v1  Communication dans un congrès
Jean-Max DutertreAmir-Pasha MirbahaDavid NaccacheAnne-Lise RibottaAssia Tria et al.  Fault Round Modification Analysis of the Advanced Encryption Standard
Hardware-Oriented Security and Trust (HOST), 2012, Jun 2012, San Francisco, United States. IEEE, pp.140--145, 2002, <10.1109/HST.2012.6224334>
hal-00934336v1  Rapport
Jean-Luc DangerSylvain GuilleyPhilippe HoogvorstCédric MurdicaDavid NaccacheDynamic Countermeasure Against the Zero Power Analysis
[Research Report] IACR Cryptology ePrint Archive 2013: 764 (2013), 2013
hal-00934337v1  Rapport
Hervé ChabanneJean-Michel CioranescoVincent DespiegelJean-Christophe FondeurDavid NaccacheUsing Hamiltonian Totems as Passwords
[Research Report] IACR Cryptology ePrint Archive 2013: 751 (2013), 2013
hal-00934343v1  Communication dans un congrès
Céline ChevalierDamien GaumontDavid NaccacheHow to (Carefully) Breach a Service Contract?
Open Problems in Mathematical and Computational Sciences Conference, Sep 2013, Istambul, Turkey. 2013
hal-00934347v1  Article dans une revue
Jean-Michel CioranescoHouda FerradiDavid NaccacheCommunicating Covertly through CPU Monitoring
IEEE Security & Privacy, IEEE, 2013, 11 (6), pp.71-73. <10.1109/MSP.2013.140>
hal-00686565v1  Communication dans un congrès
Cedric MurdicaJean-Luc DangerSylvain GuilleyPhilippe HoogvorstDavid NaccacheSame Values Power Analysis Using Special Points on Elliptic Curves
Schindler, Werner; Huss, Sorin;. COSADE 2012 - Third International Workshop Constructive Side-Channel Analysis and Secure Design, May 2012, Darmstadt, Germany. 7275, pp.Cédric Murdica, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-29912-4_14>
...
emse-01130782v1  Communication dans un congrès
Jean-Max DutertreAmir-Pasha MirbahaDavid NaccacheAssia TriaReproducible Single-Byte Laser Fault Injection
6th Conference on Ph.D. Research in Microelectronics & Electronics, PRIME 2010, Jul 2010, Berlin, Germany
  • 1
  • 2