Christophe Giraud
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [i7]Christophe Giraud, Nicolas Verzelen:
Partial recovery bounds for clustering with the relaxed K-means. CoRR abs/1807.07547 (2018) - 2016
- [c23]Alberto Battistello, Christophe Giraud:
A Note on the Security of CHES 2014 Symmetric Infective Countermeasure. COSADE 2016: 144-159 - 2015
- [c22]Alberto Battistello, Christophe Giraud:
Lost in Translation: Fault Analysis of Infective Security Proofs. FDTC 2015: 45-53 - [i6]Alberto Battistello, Christophe Giraud:
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure. IACR Cryptology ePrint Archive 2015: 500 (2015) - 2014
- [c21]Christophe Giraud:
On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance. COSADE 2014: 56-68 - [c20]Guillaume Barbu, Christophe Giraud:
New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards. WISTP 2014: 57-75 - 2013
- [c19]Alberto Battistello, Christophe Giraud:
Fault Analysis of Infective AES Computations. FDTC 2013: 101-107 - [c18]Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud, Guénaël Renault, Soline Renner, Rina Zeitoun:
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public? Public Key Cryptography 2013: 198-215 - 2012
- [c17]Guillaume Barbu, Philippe Andouard, Christophe Giraud:
Dynamic Fault Injection Countermeasure - A New Conception of Java Card Security. CARDIS 2012: 16-30 - [c16]Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala:
Conversion of Security Proofs from One Leakage Model to Another: A New Issue. COSADE 2012: 69-81 - [c15]Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud, Mylène Roussellet, Vincent Verneuil:
ROSETTA for Single Trace Analysis. INDOCRYPT 2012: 140-155 - [c14]Guillaume Barbu, Christophe Giraud, Vincent Guerin:
Embedded Eavesdropping on Java Card. SEC 2012: 37-48 - [p1]Christophe Giraud:
Differential Fault Analysis of the Advanced Encryption Standard. Fault Analysis in Cryptography 2012: 55-72 - 2010
- [c13]Christophe Giraud, Vincent Verneuil:
Atomicity Improvement for Elliptic Curve Scalar Multiplication. CARDIS 2010: 80-101 - [c12]Christophe Giraud, Erik Woodward Knudsen, Michael Tunstall:
Improved Fault Analysis of Signature Schemes. CARDIS 2010: 164-181 - [c11]Jean-Sébastien Coron, Christophe Giraud, Nicolas Morin, Gilles Piret, David Vigilant:
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. FDTC 2010: 89-96 - [i5]Christophe Giraud, Vincent Verneuil:
Atomicity Improvement for Elliptic Curve Scalar Multiplication. CoRR abs/1002.4569 (2010) - [i4]Christophe Giraud, Adrian Thillard:
Piret and Quisquater's DFA on AES Revisited. IACR Cryptology ePrint Archive 2010: 440 (2010)
2000 – 2009
- 2009
- [c10]Laurie Genelle, Christophe Giraud, Emmanuel Prouff:
Securing AES Implementation against Fault Attacks. FDTC 2009: 51-62 - [c9]Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra:
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. WISTP 2009: 68-83 - [i3]Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra:
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. IACR Cryptology ePrint Archive 2009: 24 (2009) - 2008
- [c8]Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain:
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. CHES 2008: 1-14 - 2006
- [j1]Christophe Giraud:
An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. IEEE Trans. Computers 55(9): 1116-1120 (2006) - [c7]Emmanuel Prouff, Christophe Giraud, Sébastien Aumônier:
Provably Secure S-Box Implementation Based on Fourier Transform. CHES 2006: 216-230 - [c6]Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau:
Enhanced Security Architecture for Music Distribution on Mobile. ESORICS 2006: 97-109 - 2004
- [c5]
- [c4]
- [c3]
- [c2]
- 2003
- [i2]
- 2002
- [i1]Wieland Fischer, Christophe Giraud, Erik Woodward Knudsen, Jean-Pierre Seifert:
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks. IACR Cryptology ePrint Archive 2002: 7 (2002) - 2001
- [c1]Mehdi-Laurent Akkar, Christophe Giraud:
An Implementation of DES and AES, Secure against Some Attacks. CHES 2001: 309-318
Coauthor Index
last updated on 2019-01-09 01:40 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint