What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Assia Tria
Google Scholar
9
publications in security and cryptology related venues
Year
Venue
Title
2014
conf/host
Power supply glitch attacks: Design and evaluation of detection circuits.
Kamil Gomina
Jean-Baptiste Rigaud
Philippe Gendrier
Philippe Candelier
Assia Tria
2014
conf/host
Increasing the efficiency of laser fault injections using fast gate level reverse engineering.
Franck Courbon
Philippe Loubet-Moundi
Jacques J. A. Fournier
Assia Tria
2014
conf/fdtc
On Fault Injections in Generalized Feistel Networks.
Hélène Le Bouder
Gaël Thomas
Yanis Linge
Assia Tria
2013
conf/host
Frontside laser fault injection on cryptosystems - Application to the AES' last round -.
Cyril Roscian
Jean-Max Dutertre
Assia Tria
2013
conf/fdtc
Fault Model Analysis of Laser-Induced Faults in SRAM Memory Cells.
Cyril Roscian
Alexandre Sarafianos
Jean-Max Dutertre
Assia Tria
2012
conf/host
Fault Round Modification Analysis of the advanced encryption standard.
Jean-Max Dutertre
Amir-Pasha Mirbaha
David Naccache
Anne-Lise Ribotta
Assia Tria
Thierry Vaschalde
2012
conf/fdtc
Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES.
Amine Dehbaoui
Jean-Max Dutertre
Bruno Robisson
Assia Tria
2012
conf/fdtc
A DFA on AES Based on the Entropy of Error Distributions.
Ronan Lashermes
Guillaume Reymond
Jean-Max Dutertre
Jacques J. A. Fournier
Bruno Robisson
Assia Tria
2008
conf/fdtc
Error Detection for Borrow-Save Adders Dedicated to ECC Unit.
Julien Francq
Jean-Baptiste Rigaud
Pascal Manet
Assia Tria
Arnaud Tisserand
Coauthors
Alexandre Sarafianos
(1)
Amine Dehbaoui
(1)
Amir-Pasha Mirbaha
(1)
Anne-Lise Ribotta
(1)
Arnaud Tisserand
(1)
Assia Tria
(9)
Bruno Robisson
(2)
Cyril Roscian
(2)
David Naccache
(1)
Franck Courbon
(1)
Gaël Thomas
(1)
Guillaume Reymond
(1)
Hélène Le Bouder
(1)
Jacques J. A. Fournier
(2)
Jean-Baptiste Rigaud
(2)
Jean-Max Dutertre
(5)
Julien Francq
(1)
Kamil Gomina
(1)
Pascal Manet
(1)
Philippe Candelier
(1)
Philippe Gendrier
(1)
Philippe Loubet-Moundi
(1)
Ronan Lashermes
(1)
Thierry Vaschalde
(1)
Yanis Linge
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to