咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 2 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 14 篇 计算机科学与技术...
    • 11 篇 电子科学与技术(可...
    • 10 篇 信息与通信工程
    • 8 篇 软件工程
    • 5 篇 控制科学与工程
    • 3 篇 动力工程及工程热...
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 水利工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 城乡规划学
    • 1 篇 生物工程
  • 12 篇 理学
    • 7 篇 数学
    • 4 篇 系统科学
    • 1 篇 地理学
    • 1 篇 地球物理学
    • 1 篇 地质学
    • 1 篇 生物学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 11 篇 cryptography
  • 10 篇 field programmab...
  • 6 篇 telecommunicatio...
  • 4 篇 side channel att...
  • 4 篇 circuit faults
  • 4 篇 hardware
  • 3 篇 information anal...
  • 3 篇 doped fiber ampl...
  • 3 篇 demodulation
  • 3 篇 field programmab...
  • 3 篇 protection
  • 3 篇 testing
  • 3 篇 multiple signal ...
  • 3 篇 electromagnetic ...
  • 2 篇 table lookup
  • 2 篇 page description...
  • 2 篇 cmos
  • 2 篇 read only memory
  • 2 篇 performance loss
  • 2 篇 logic gates

机构

  • 7 篇 département come...
  • 3 篇 département come...
  • 2 篇 département d’in...
  • 2 篇 secure-ic s.a.s....
  • 2 篇 microwave engine...
  • 2 篇 secure-ic s.a.s ...
  • 2 篇 labsoc laborator...
  • 2 篇 department of ge...
  • 1 篇 département de c...
  • 1 篇 secure-ic s.a.s....
  • 1 篇 dga/information ...
  • 1 篇 ltci cnrs-umr 51...
  • 1 篇 institut telecom...
  • 1 篇 département d'in...
  • 1 篇 military institu...
  • 1 篇 cnrs ltci labora...
  • 1 篇 esat/scd-cosic k...
  • 1 篇 institut mines-t...
  • 1 篇 département come...
  • 1 篇 department comel...

作者

  • 15 篇 jean-luc danger
  • 14 篇 sylvain guilley
  • 11 篇 guilley sylvain
  • 11 篇 danger jean-luc
  • 7 篇 bernard huyart
  • 7 篇 laurent sauvage
  • 6 篇 shivam bhasin
  • 5 篇 tarik graba
  • 4 篇 houssem maghrebi
  • 4 篇 maxime nassar
  • 4 篇 naccache david
  • 4 篇 murdica cédric
  • 4 篇 yves mathieu
  • 4 篇 nidhal selmane
  • 3 篇 huyart bernard
  • 3 篇 begaud xavier
  • 3 篇 florent flament
  • 3 篇 hajar el arja
  • 3 篇 youssef souissi
  • 3 篇 xavier begaud

语言

  • 44 篇 英文
  • 3 篇 中文
检索条件"机构=Institut Telecom/Telecom-ParisTech - Departement ComElec"
47 条 记 录,以下是11-20 订阅
排序:
Fault attacks on projective-to-affine coordinates conversion
收藏 引用
4th Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2013
作者: Maimuţ, Diana Murdica, Cédric Naccache, David Tibouchi, Mehdi Département d'Informatique École Normale Supérieure 45 rue d'Ulm F-75230 Paris Cedex 05 France Secure-IC S.A.S. 80 avenue des Buttes de Coësmes F-35700 Rennes France Département COMELEC Institut TELECOM TELECOM ParisTech CNRS LTCI Paris France Okamoto Research Laboratory NTT Secure Platform Laboratories 3-9-11 Midori-cho Musashino-shi Tokyo JP-180-8585 Japan
This paper presents a new type of fault attacks on elliptic curves cryptosystems. At EUROCRYPT 2004, Naccache et alii showed that when the result of an elliptic curve scalar multiplication [k] P (computed using a fixe... 详细信息
来源: 评论
Compact patch antenna for Automatic Identification System (AIS)
Compact patch antenna for Automatic Identification System (A...
收藏 引用
2012 15th International Symposium on Antenna Technology and Applied Electromagnetics, ANTEM 2012
作者: Dousset, Thierry Renard, Christian Diez, Hubert Sarrazin, Julien Lepage, Anne Claire Department: RWS-IM/RF-AA Elancourt France Department: DCT/RF/AN Toulouse France Institut Mines-Telecom Telecom ParisTech Department: Comelec Paris 13ème France
This paper presents a radiating element developed for the space AIS application. This element is a compact sized and reduced mass microstrip patch antenna integrating frequency resonant adjustment devices. Theoretical... 详细信息
来源: 评论
A Small and High-Performance Coprocessor for Fingerprint Match-on-Card
A Small and High-Performance Coprocessor for Fingerprint Mat...
收藏 引用
Euromicro Symposium on Digital System Design
作者: Taoufik Chouta Jean-Luc Danger Laurent Sauvage Tarik Graba CNRS LTCI Département COMELEC Institut TELECOM TELECOM ParisTech Paris France
In this paper we put forward a high-performance biometric fingerprint authentication algorithm for Match-On-Card (MOC) applications, compatible with the INCITS 378 and ISO/IEC 19794 standard. An efficient hardware imp... 详细信息
来源: 评论
System-level methods to prevent reverse-engineering, cloning, and Trojan insertion
System-level methods to prevent reverse-engineering, cloning...
收藏 引用
6th International Conference on Information Systems, Management and Technology, ICISTM 2012
作者: Guilley, Sylvain Danger, Jean-Luc Nguyen, Robert Nguyen, Philippe Telecom.-ParisTech. COMELEC Departement CNRS LTCI UMR 5141 46 rue Barrault Paris 75 013 France Secure-IC S.A.S. 80 avenue des Buttes de Coësmes 35 700 Rennes France
The reverse-engineering (RE) is a real threat on high-value circuits. Many unitary solutions have been proposed to make RE difficult. Most of them are low-level, and thus costly to design and to implement. In this pap... 详细信息
来源: 评论
From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic Applications
From Cryptography to Hardware: Analyzing Embedded Xilinx BRA...
收藏 引用
Annual IEEE/ACM International Symposium on Microarchitecture Workshops (MICROW)
作者: Shivam Bhasin Sylvain Guilley Jean-Luc Danger CNRS LTCI Laboratoire Traitement et Communication de lInformation (UMR 5141) Institut MINES-TELECOM Department COMELEC TELECOM ParisTech Paris France
Design of cryptographic applications need special care. For instance, physical attacks like Side-Channel Analysis (SCA) are able to recover the secret key, just by observing the activity of the computation, even for m... 详细信息
来源: 评论
A 0.6 -3.6 GHz CMOS Wideband Demodulator for 4G Mobile Handsets
A 0.6 -3.6 GHz CMOS Wideband Demodulator for 4G Mobile Hands...
收藏 引用
European Microwave Integrated Circuits Conference
作者: Antoine Khy Bernard Huyart Departement d'Electronique et Communications (COMELEC) TELECOM ParisTech
This paper presents a 0.6 - 3.6 GHz CMOS wideband demodulator dedicated to 4G Long Term Evolution - Advanced (LTE-A) mobile handsets. The circuit uses three paths 120° phase shifted from one another instead of on... 详细信息
来源: 评论
Compact patch antenna for Automatic Identification System (AIS)
Compact patch antenna for Automatic Identification System (A...
收藏 引用
International Symposium on Antenna Technology and Applied Electromagnetics and the Canadian Radio Science Meeting, ANTEM/URSI
作者: Thierry Dousset Christian Renard Hubert Diez Julien Sarrazin Anne Claire Lepage Department: RWS-IM/RF-AA Thales Systèmes Aéroportés Elancourt France Department: DCT/RF/AN Centre National d'Etudes Spatiales Toulouse France Institut Mines-Telecom LTCI Department: Comelec Telecom ParisTech Paris France
This paper presents a radiating element developed for the space AIS application. This element is a compact sized and reduced mass microstrip patch antenna integrating frequency resonant adjustment devices. Theoretical... 详细信息
来源: 评论
Formal security evaluation of hardware Boolean masking against second-order attacks
Formal security evaluation of hardware Boolean masking again...
收藏 引用
IEEE International Symposium on Hardware-Oriented Security and Trust
作者: Maghrebi, Houssem Guilley, Sylvain Danger, Jean-Luc Département COMELEC Institut TELECOM TELECOM ParisTech 46 rue Barrault 75 634 Paris Cedex France
The masking countermeasure in hardware has been widely studied, for its simplicity and its efficiency. Notably, no care is required at backend level and the throughput is not affected with respect to an unprotected im... 详细信息
来源: 评论
Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques
Enhancement of simple electro-magnetic attacks by pre-charac...
收藏 引用
作者: Meynard, Olivier Réal, Denis Flament, Florent Guilley, Sylvain Homma, Naofumi Danger, Jean-Luc Département COMELEC Institut TELECOM TELECOM ParisTech Paris France DGA Information Superiority Bruz France Graduate School of Information Sciences Tohoku University Japan
SPA/SEMA (Simple Power/Electro-magnetic Analysis) attacks performed on public-key cryptographic modules implemented on FPGA platforms are well known from the theoretical point of view. However, the practical aspect is... 详细信息
来源: 评论
Formal security evaluation of hardware Boolean masking against second-order attacks
Formal security evaluation of hardware Boolean masking again...
收藏 引用
IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
作者: Houssem Maghrebi Sylvain Guilley Jean-Luc Danger Département COMELEC Institut TELECOM CNRS LTCI (UMR 5141) TELECOM ParisTech Paris France
The masking countermeasure in hardware has been widely studied, for its simplicity and its efficiency. Notably, no care is required at backend level and the throughput is not affected with respect to an unprotected im... 详细信息
来源: 评论