Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

6 results
authFullName_s : David Naccache
Image document

How to Compartment Secrets

Gaëlle Candel , Rémi Géraud-Stewart , David Naccache
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.3-11, ⟨10.1007/978-3-030-41702-4_1⟩
Conference papers hal-03173906v1

When Clocks Fail: On Critical Paths and Clock Faults

Michel Agoyan , Jean-Max Dutertre , David Naccache , Bruno Robisson , Assia Tria
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.182-193, ⟨10.1007/978-3-642-12510-2_13⟩
Conference papers emse-00505344v1

Information Security Theory and Practice: Securing the Internet of Things

David Naccache , Damien Sauveron
David Naccache; Damien Sauveron. Springer, LNCS-8501, 2014, Lecture Notes in Computer Science, 978-3-662-43825-1. ⟨10.1007/978-3-662-43826-8⟩
Books hal-01098408v1
Image document

Secure Delegation of Elliptic-Curve Pairing

Benoît Chevallier-Mames , Jean-Sébastien Coron , Noel Mccullagh , David Naccache , Michael Scott
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.24-35, ⟨10.1007/978-3-642-12510-2_3⟩
Conference papers hal-01056101v1
Image document

The Polynomial Composition Problem in (ℤ/nℤ)[X]

Marc Joye , David Naccache , Stéphanie Porte
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.1-12, ⟨10.1007/978-3-642-12510-2_1⟩
Conference papers hal-01056103v1
Image document

Can code polymorphism limit information leakage?

Antoine Amarilli , Sascha Müller , David Naccache , Daniel Page , Pablo Rauzy , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.1-21, ⟨10.1007/978-3-642-21040-2_1⟩
Conference papers hal-01110259v1