咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 2 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 14 篇 计算机科学与技术...
    • 11 篇 电子科学与技术(可...
    • 10 篇 信息与通信工程
    • 8 篇 软件工程
    • 5 篇 控制科学与工程
    • 3 篇 动力工程及工程热...
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 水利工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 城乡规划学
    • 1 篇 生物工程
  • 12 篇 理学
    • 7 篇 数学
    • 4 篇 系统科学
    • 1 篇 地理学
    • 1 篇 地球物理学
    • 1 篇 地质学
    • 1 篇 生物学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 11 篇 cryptography
  • 10 篇 field programmab...
  • 6 篇 telecommunicatio...
  • 4 篇 side channel att...
  • 4 篇 circuit faults
  • 4 篇 hardware
  • 3 篇 information anal...
  • 3 篇 doped fiber ampl...
  • 3 篇 demodulation
  • 3 篇 field programmab...
  • 3 篇 protection
  • 3 篇 testing
  • 3 篇 multiple signal ...
  • 3 篇 electromagnetic ...
  • 2 篇 table lookup
  • 2 篇 page description...
  • 2 篇 cmos
  • 2 篇 read only memory
  • 2 篇 performance loss
  • 2 篇 logic gates

机构

  • 7 篇 département come...
  • 3 篇 département come...
  • 2 篇 département d’in...
  • 2 篇 secure-ic s.a.s....
  • 2 篇 microwave engine...
  • 2 篇 secure-ic s.a.s ...
  • 2 篇 labsoc laborator...
  • 2 篇 department of ge...
  • 1 篇 département de c...
  • 1 篇 secure-ic s.a.s....
  • 1 篇 dga/information ...
  • 1 篇 ltci cnrs-umr 51...
  • 1 篇 institut telecom...
  • 1 篇 département d'in...
  • 1 篇 military institu...
  • 1 篇 cnrs ltci labora...
  • 1 篇 esat/scd-cosic k...
  • 1 篇 institut mines-t...
  • 1 篇 département come...
  • 1 篇 department comel...

作者

  • 15 篇 jean-luc danger
  • 14 篇 sylvain guilley
  • 11 篇 guilley sylvain
  • 11 篇 danger jean-luc
  • 7 篇 bernard huyart
  • 7 篇 laurent sauvage
  • 6 篇 shivam bhasin
  • 5 篇 tarik graba
  • 4 篇 houssem maghrebi
  • 4 篇 maxime nassar
  • 4 篇 naccache david
  • 4 篇 murdica cédric
  • 4 篇 yves mathieu
  • 4 篇 nidhal selmane
  • 3 篇 huyart bernard
  • 3 篇 begaud xavier
  • 3 篇 florent flament
  • 3 篇 hajar el arja
  • 3 篇 youssef souissi
  • 3 篇 xavier begaud

语言

  • 44 篇 英文
  • 3 篇 中文
检索条件"机构=Institut Telecom/Telecom-ParisTech - Departement ComElec"
47 条 记 录,以下是1-10 订阅
排序:
Multi-tone signal optimization for wireless power transfer in the presence of wireless communication links
arXiv
收藏 引用
arXiv 2019年
作者: Mouris, Boules A. Ghauch, Hadi Thobaben, Ragnar Jonsson, B.L.G. KTH Royal Institute of Technology Stockholm 100 44 Sweden Department of COMELEC Telecom-ParisTech Institut Mines-Telecom Paris France
In this paper, we study optimization of multi-tone signals for wireless power transfer (WPT) systems. We investigate different non-linear energy harvesting models. Two of them are adopted to optimize the multi-tone si... 详细信息
来源: 评论
Preface
Lecture Notes in Geoinformation and Cartography
收藏 引用
Lecture Notes in Geoinformation and Cartography 2019年 v-vi页
作者: Altan, Orhan Chandra, Madhu Sunar, Filiz Tanzi, Tullio Joseph Department of Geomatics Faculty of Civil Engineering Istanbul Technical University Istanbul Turkey Microwave Engineering and Electromagnetic Theory Technische Universität Chemnitz Chemnitz Germany Department of Geomatics Faculty of Civil Engineering Istanbul Technical University Istanbul Turkey LabSoC Laboratory COMELEC Department Campus SophiaTech Institut Mines-Telecom-Telecom ParisTech Biot France
来源: 评论
Inserting permanent fault input dependence on PTM to improve robustness evaluation  16
Inserting permanent fault input dependence on PTM to improve...
收藏 引用
Proceedings of the 29th Symposium on Integrated Circuits and Systems Design: Chip on the Mountains
作者: Rafael B. Schivittz Rafaél Fritz Denis T. Franco Lirida Naviner Cristina Meinhardt Paulo F. Butzen Universidade Federal do Rio Grande - FURG Universidade Federal do Rio Grande - FURG and Universidade Federal de Pelotas - UFPEL Institut TELECOM Télécom-ParisTech LTCI-CNRS COMELEC Paris France
Many of the nanometer CMOS challenges are seriously compromising the gains attained with technology scaling, mainly impacting the yield and the circuit reliability. To cope with these problems, new design methodologie... 详细信息
来源: 评论
Improving the big mac attack on elliptic curve cryptography
Improving the big mac attack on elliptic curve cryptography
收藏 引用
International Conference on The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, 2010
作者: Danger, Jean-Luc Guilley, Sylvain Hoogvorst, Philippe Murdica, Cédric Naccache, David Secure-IC S.A.S 80 Avenue des Buttes de Cöesmes Rennes35700 France Département COMELEC Institut TELECOM TELECOM ParisTech CNRS LTCI Paris France Département d’informatique École Normale Supérieure 45 rue d’Ulm Paris Cedex 0575230 France
At CHES 2001, Walter introduced the Big Mac attack against an implementation of rsa. It is an horizontal collision attack, based on the detection of common operands in two multiplications. The attack is very powerful ... 详细信息
来源: 评论
Safe-errors on SPA protected implementations with the atomicity technique
Safe-errors on SPA protected implementations with the atomic...
收藏 引用
International Conference on The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, 2010
作者: Fouque, Pierre-Alain Guilley, Sylvain Murdica, Cédric Naccache, David Institut Universitaire de France Université de Rennes 1 Rennes France Secure-IC S.A.S 80 avenue des Buttes de Cöesmes Rennes35700 France Département COMELEC Institut TELECOM TELECOM ParisTech CNRS LTCI Paris France Département d’informatique École normale supérieure 45 rue d’Ulm Paris Cedex 0575230 France
ECDSA is one of the most important public-key signature scheme, however it is vulnerable to lattice attack once a few bits of the nonces are leaked. To protect Elliptic Curve Cryptography (ecc) against Simple Power An... 详细信息
来源: 评论
Encoding the state of integrated circuits: A proactive and reactive protection against Hardware Trojans Horses  9
Encoding the state of integrated circuits: A proactive and r...
收藏 引用
9th Workshop on Embedded Systems Security, WESS 2014
作者: Ngo, Xuan Thuy Guilley, Sylvain Bhasin, Shivam Danger, Jean-Luc Najm, Zakaria Institut MINES-TELECOM TELECOM ParisTech Department COMELEC 46 rue Barrault Paris cedex 1375 634 France Secure-IC S.A.S. 80 avenue des Buttes de Coësmes Rennes35 700 France
Hardware Trojan Horses (HTH) are a serious threat to semiconductor industry with significant economic impact. However, most of the research in HTH focuses on detection. We propose the concept of "encoded circuit&... 详细信息
来源: 评论
Balancing WDDL dual-rail logic in a tree-based FPGA to enhance physical security
Balancing WDDL dual-rail logic in a tree-based FPGA to enhan...
收藏 引用
International Conference on Field Programmable Logic and Applications
作者: Emna Amouri Shivam Bhasin Yves Mathieu Tarik Graba Jean-Luc Danger Habib Mehrez CNRS LTCI (UMR 5141) Departement COMELEC Institut TELECOM/TELECOM ParisTech. Paris France LIP6 Universite Pierre et Marie Curie 4 Paris France
The Tree-based FPGA offers better density and timing determinism than traditional mesh-based FPGA. Moreover, thanks to its multilevel structure, it offers greater easiness to balance dual signals in terms of routing r... 详细信息
来源: 评论
Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA
Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs F...
收藏 引用
2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013
作者: Cherif, Zouha Danger, Jean-Luc Lozac'h, Florent Mathieu, Yves Bossuet, Lilian Departement COMELEC TELECOM ParisTech France TELECOM ParisTech Secure-IC S.A.S. France Laboratoire Hubert Curien Université de Lyon France
This paper presents a comparative study of delay Physically Unclonable Functions (PUFs) designed in CMOS-65nm technology platforms: ASIC and FPGA (Xilinx Virtex-5). The performances are analyzed for two types of silic... 详细信息
来源: 评论
A low-entropy first-degree secure provable masking scheme for resource-constrained devices
A low-entropy first-degree secure provable masking scheme fo...
收藏 引用
8th Workshop on Embedded Systems Security, WESS 2013
作者: Bhasin, Shivam Danger, Jean-Luc Guilley, Sylvain Najm, Zakaria Institut Mines-Telecom Telecom ParisTech Department Comelec 46 rue Barrault 75634 Paris Cedex France Secure-IC S.A.S. 80 avenue des Buttes de Coësmes 35700 Rennes France
The trend in the protection against side-channel analysis is to be more secure with little consideration for the cost. However in small devices like RFID, traditional security solutions might be impractical due to lim... 详细信息
来源: 评论
Low-cost countermeasure against RPA
Low-cost countermeasure against RPA
收藏 引用
11th Conference on Smart Card Research and Applications, CARDIS 2012
作者: Danger, Jean-Luc Guilley, Sylvain Hoogvorst, Philippe Murdica, Cédric Naccache, David Secure-IC S.A.S. 80 avenue des Buttes de Coësmes F-35700 Rennes France Département COMELEC Institut TELECOM TELECOM ParisTech Paris France École Normale Supérieure Département d'Informatique 45 rue d'Ulm F-75230 Paris Cedex 05 France
On smart-cards, Elliptic Curve Cryptosystems (ECC) can be vulnerable to Side Channel Attacks such as the Refined Power Analysis (RPA). This attack takes advantage of the apparition of special points of the form (0, y)... 详细信息
来源: 评论