Locked History Actions

Diff for "SPACES Publications"

Differences between revisions 21 and 25 (spanning 4 versions)
Revision 21 as of 2012-02-13 16:53:08
Size: 3158
Editor: snecma18
Comment:
Revision 25 as of 2013-03-29 16:53:33
Size: 3527
Editor: AOrleans-251-1-43-3
Comment:
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:
#acl Known:read,write,revert,delete All:read
= CHES'11 Posters =
#acl UserGroup:read,write,revert,delete All:read
= Posters =


 * [[attachment:ANR_poster|ANR Poster 2013|&do=get]]
Line 6: Line 10:
 * [[attachment:TPT_poster.pdf|Telecom ParisTech poster|&do=get]]  * [[attachment:TPT_poster.pdf|Telecom ParisTech CHES'11 poster|&do=get]]
Line 8: Line 12:
 * [[attachment:Lip6_Poster_CHES2011.pdf|Lip6 poster|&do=get]]  * [[attachment:Lip6_Poster_CHES2011.pdf|Lip6 CHES'11 poster|&do=get]]
Line 13: Line 17:
 * [[attachment:HOST2011_fujimoto.pdf|Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Akihiko Sasaki, Yohei Hori and Akashi Satoh, "A Fast Power Current Analysis Methodology using Capacitor Charging Model for Side Channel Attack Evaluation," HOST2011, pp. 87 - 92, San Diego ,2011.06.|&do=get]]
Line 14: Line 20:
 * [[attachment:11_emc_RSAcarto.pdf|L. Sauvage, S. Guilley, J-L Danger, N. Homma, Y. Hayashi, “Practical Results of EM Cartography on a FPGA-based RSA Hardware Implementation,” EMC2011, pp. 768-772, Liong Beach, August 2011 |&do=get]]  * [[attachment:11_emc_RSAcarto.pdf|L. Sauvage, S. Guilley, J-L Danger, N. Homma, Y. Hayashi, “Practical Results of EM Cartography on a FPGA-based RSA Hardware Implementation,” EMC2011, pp. 768-772, Liong Beach, August 2011|&do=get]]
Line 20: Line 26:

=  Analysis technique =
= Analysis technique =
Line 27: Line 31:
 * [[attachment:Non_Malleable_Codes2.pdf|H. Chabanne, G. Cohen, A. Patey, “Secure Network Coding and Non-Malleable Codes: Protection against Linear Tampering,”  (Under submission)|&do=get]]  * [[attachment:Non_Malleable_Codes2.pdf|H. Chabanne, G. Cohen, A. Patey, “Secure Network Coding and Non-Malleable Codes: Protection against Linear Tampering,” (Under submission)|&do=get]]
Line 29: Line 33:
 * [[attachment:WIFS_11_resynchro.pdf|N. Debande, Y. Souissi, S. Guilley, J-L. Danger, M. Nassar, Thanh-Ha Le, “Re-synchronization by Moments*: an efficient solution to align Side-Channel traces,” WIFS2011, Foz de Iguacu, Brazil, Dec., 2011. |&do=get]]  * [[attachment:WIFS_11_resynchro.pdf|N. Debande, Y. Souissi, S. Guilley, J-L. Danger, M. Nassar, Thanh-Ha Le, “Re-synchronization by Moments*: an efficient solution to align Side-Channel traces,” WIFS2011, Foz de Iguacu, Brazil, Dec., 2011.|&do=get]]

Posters

Modeling, simulation

Physical understanding

Analysis technique