关注
Christophe Giraud
Christophe Giraud
Cryptography and Product Security Group Manager at IDEMIA
在 idemia.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
An implementation of DES and AES, secure against some attacks
ML Akkar, C Giraud
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
8802001
Dfa on aes
C Giraud
Advanced Encryption Standard–AES: 4th International Conference, AES 2004 …, 2005
5342005
A survey on fault attacks
C Giraud, H Thiebeauld
Smart Card Research and Advanced Applications VI: IFIP 18th World Computer …, 2004
1892004
An RSA implementation resistant to fault attacks and to simple power analysis
C Giraud
IEEE Transactions on computers 55 (9), 1116-1120, 2006
1812006
Parallel scalar multiplication on general elliptic curves over hedged against Non-Differential Side-Channel Attacks
W Fischer, C Giraud, EW Knudsen, JP Seifert
Cryptology ePrint Archive, 2002
1242002
Conversion of security proofs from one leakage model to another: A new issue
JS Coron, C Giraud, E Prouff, S Renner, M Rivain, PK Vadnala
International Workshop on Constructive Side-Channel Analysis and Secure …, 2012
862012
ROSETTA for single trace analysis: Recovery of secret exponent by triangular trace analysis
C Clavier, B Feix, G Gagnerot, C Giraud, M Roussellet, V Verneuil
Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012
682012
Fault analysis of infective AES computations
A Battistello, C Giraud
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 101-107, 2013
642013
Atomicity improvement for elliptic curve scalar multiplication
C Giraud, V Verneuil
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
582010
Fault resistant RSA implementation
C Giraud
Fault Diagnosis and Tolerance in Cryptography, 142-151, 2005
552005
A systematic appraisal of side channel evaluation strategies
M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ...
Security Standardisation Research: 6th International Conference, SSR 2020 …, 2020
472020
Fault attacks on signature schemes
C Giraud, EW Knudsen
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
472004
On second-order fault analysis resistance for CRT-RSA implementations
E Dottax, C Giraud, M Rivain, Y Sierra
Information Security Theory and Practice. Smart Devices, Pervasive Systems …, 2009
442009
Fault attacks and countermeasures on Vigilant's RSA-CRT algorithm
JS Coron, C Giraud, N Morin, G Piret, D Vigilant
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 89-96, 2010
362010
Provably secure S-box implementation based on Fourier transform
E Prouff, C Giraud, S Aumônier
Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006
342006
Piret and Quisquater's DFA on AES Revisited
C Giraud, A Thillard
Cryptology ePrint Archive, 2010
302010
A note on the security of CHES 2014 symmetric infective countermeasure
A Battistello, C Giraud
Constructive Side-Channel Analysis and Secure Design: 7th International …, 2016
232016
Securing AES implementation against fault attacks
L Genelle, C Giraud, E Prouff
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 51-62, 2009
222009
Attack and improvement of a secure S-box calculation based on the Fourier transform
JS Coron, C Giraud, E Prouff, M Rivain
Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008
222008
Embedded eavesdropping on java card
G Barbu, C Giraud, V Guerin
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
172012
系统目前无法执行此操作,请稍后再试。
文章 1–20