Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

BibTeX records: Soline Renner

download as .bib file

@phdthesis{DBLP:phd/hal/Renner14,
  author       = {Soline Renner},
  title        = {Protection des algorithmes cryptographiques embarqu{\'{e}}s.
                  (Cryptographic Protection in Embedded Systems)},
  school       = {University of Bordeaux, France},
  year         = {2014},
  url          = {https://tel.archives-ouvertes.fr/tel-01149061},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Renner14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CastagnosRZ13,
  author       = {Guilhem Castagnos and
                  Soline Renner and
                  Gilles Z{\'{e}}mor},
  editor       = {Martijn Stam},
  title        = {High-order Masking by Using Coding Theory and Its Application to {AES}},
  booktitle    = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
                  2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8308},
  pages        = {193--212},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45239-0\_12},
  doi          = {10.1007/978-3-642-45239-0\_12},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/CastagnosRZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BarbuBDGRRZ13,
  author       = {Guillaume Barbu and
                  Alberto Battistello and
                  Guillaume Dabosville and
                  Christophe Giraud and
                  Gu{\'{e}}na{\"{e}}l Renault and
                  Soline Renner and
                  Rina Zeitoun},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Combined Attack on {CRT-RSA} - Why Public Verification Must Not Be
                  Public?},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {198--215},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_13},
  doi          = {10.1007/978-3-642-36362-7\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BarbuBDGRRZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CoronGPRRV12,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Christophe Giraud and
                  Emmanuel Prouff and
                  Soline Renner and
                  Matthieu Rivain and
                  Praveen Kumar Vadnala},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Conversion of Security Proofs from One Leakage Model to Another: {A}
                  New Issue},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {69--81},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_6},
  doi          = {10.1007/978-3-642-29912-4\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/CoronGPRRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}