Pablo RAUZY

Item

Title
Pablo RAUZY
Given name
Pablo
familyName
RAUZY
Status
MCF
Identifier
scanr:idref194147517
Is Part Of
LIASD PASTIS
personal mailbox
pablo.rauzy@univ-paris8.fr
Nomenclature CNU
CNU 27
firstName
Pablo
Subject
Fault injection
Rank
16
Formal proof
Rank
14
RSA
Rank
11
CRT
Rank
8
Bellcore
Rank
7
OCaml
Rank
7
static analysis
Rank
6
Power Analysis
Rank
4
Bellcore attack
Rank
4
Fault attacks
Rank
3
RSA
Rank
3
formalization
Rank
2
privacy
Rank
2
Control
Rank
2
member
Laboratoire d'Intelligence Artificielle et Sémantique des Données
Start
2016-01-01T00:00:00
End
2023-12-31T00:00:00
Paris 8 University Université Paris 8 Vincennes – Saint-Denis
Start
2016-01-01T00:00:00
End
2023-12-31T00:00:00
Centre national de la recherche scientifique French National Centre for Scientific Research
Start
2014-01-01T00:00:00
End
2017-12-31T00:00:00
Télécom ParisTech
Start
2013-01-01T00:00:00
End
2017-12-31T00:00:00
Laboratoire traitement et communication de l'information
Start
2013-01-01T00:00:00
End
2017-12-31T00:00:00
Institut Polytechnique de Paris
Start
2013-01-01T00:00:00
End
2017-12-31T00:00:00
IMT Atlantique - Bretagne - Pays de la Loire
Start
2013-01-01T00:00:00
End
2017-12-31T00:00:00
publications
Capacity
Is Referenced By
doi10.1145/3176258.3176314
status
author
THC: Practical and Cost-Effective Verification of Delegated Computation
Is Referenced By
doi10.1007/978-3-030-92548-2_27
status
author
Formal Software Methods for Cryptosystems Implementation Security
Is Referenced By
nnt2015-enst-0039
status
author
Auteur·ices, relecteur·ices : redoublons de prudence face aux effets de modes technologiques : Critique de l'article de Serge Surin « Le renouveau de la promesse du vote électronique. Étude du vote par chaîne de blocs au regard du système électoral français »
Is Referenced By
halhal-03741811
status
author
Méthodes logicielles formelles pour la sécurité des implémentations de systèmes cryptographiques
Is Referenced By
nnt2015enst0039
status
author
Physical attacks
Is Referenced By
halhal-01579785
status
author
Can Code Polymorphism Limit Information Leakage?
Is Referenced By
doi10.1007/978-3-642-21040-2_1
status
author
Promesses et (dés)illusions
Is Referenced By
doi10.4000/terminal.9059
status
author
High precision fault injections on the instruction cache of ARMv7-M architectures
Is Referenced By
doi10.1109/hst.2015.7140238
status
author
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Is Referenced By
doi10.1007/978-3-319-43283-0_7
status
author
Using modular extension to provably protect Edwards curves against fault attacks
Is Referenced By
doi10.1007/s13389-017-0167-4
status
author
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA
Is Referenced By
doi10.1109/fdtc.2014.17
status
author
From Rational Number Reconstruction to Set Reconciliation and File Synchronization
Is Referenced By
doi10.1007/978-3-642-41157-1_1
status
author
A formal proof of countermeasures against fault injection attacks on CRT-RSA
Is Referenced By
doi10.1007/s13389-013-0065-3
status
author
Formally proved security of assembly code against power analysis
Is Referenced By
doi10.1007/s13389-015-0105-2
status
author
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
Is Referenced By
doi10.1145/2556464.2556466
status
author

Annotations

There are no annotations for this resource.