Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

10 results
authFullName_s : David Naccache
authFullName_s : Michael Tunstall
Image document

Randomizing the Montgomery Powering Ladder

Duc-Phong Le , Chik How Tan , Michael Tunstall
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.169-184, ⟨10.1007/978-3-319-24018-3_11⟩
Conference papers hal-01442541v1

Information Security Theory and Practice: Securing the Internet of Things

David Naccache , Damien Sauveron
David Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books hal-01098408v1

When Clocks Fail: On Critical Paths and Clock Faults

Michel Agoyan , Jean-Max Dutertre , David Naccache , Bruno Robisson , Assia Tria
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Conference papers emse-00505344v1
Image document

How to Compartment Secrets

Gaëlle Candel , Rémi Géraud-Stewart , David Naccache
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.3-11, ⟨10.1007/978-3-030-41702-4_1⟩
Conference papers hal-03173906v1
Image document

Secure Delegation of Elliptic-Curve Pairing

Benoît Chevallier-Mames , Jean-Sébastien Coron , Noel Mccullagh , David Naccache , Michael Scott
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.24-35, ⟨10.1007/978-3-642-12510-2_3⟩
Conference papers hal-01056101v1
Image document

Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault

Michael Tunstall , Debdeep Mukhopadhyay , Subidh Ali
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.224-233, ⟨10.1007/978-3-642-21040-2_15⟩
Conference papers hal-01573310v1

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices

Pierangela Samarati , Michael Tunstall , Joachim Posegga , Konstantinos Markantonakis , Damien Sauveron
Springer, LNCS-6033, 2010, Lecture Notes in Computer Science, 978-3-642-12367-2. ⟨10.1007/978-3-642-12368-9⟩
Books hal-01550529v1
Image document

The Polynomial Composition Problem in (ℤ/nℤ)[X]

Marc Joye , David Naccache , Stéphanie Porte
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.1-12, ⟨10.1007/978-3-642-12510-2_1⟩
Conference papers hal-01056103v1
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1
Image document

Improved Fault Analysis of Signature Schemes

Christophe Giraud , Erik W. Knudsen , Michael Tunstall
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.164-181, ⟨10.1007/978-3-642-12510-2_12⟩
Conference papers hal-01056107v1