Pablo Rauzy
Pablo Rauzy
Université Paris 8
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
High precision fault injections on the instruction cache of ARMv7-M architectures
L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
A formal proof of countermeasures against fault injection attacks on CRT-RSA
P Rauzy, S Guilley
Journal of Cryptographic Engineering 4, 173-185, 2014
Countermeasures against high-order fault-injection attacks on CRT-RSA
P Rauzy, S Guilley
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 68-82, 2014
Formally proved security of assembly code against power analysis: A case study on balanced logic
P Rauzy, S Guilley, Z Najm
Journal of Cryptographic Engineering 6, 201-216, 2016
Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT
Á Kiss, J Krämer, P Rauzy, JP Seifert
Constructive Side-Channel Analysis and Secure Design: 7th International …, 2016
Formally Proved Security of Assembly Code Against Leakage.
P Rauzy, S Guilley, Z Najm
IACR Cryptol. ePrint Arch. 2013, 554, 2013
Can code polymorphism limit information leakage?
A Amarilli, S Müller, D Naccache, D Page, P Rauzy, M Tunstall
IFIP International Workshop on Information Security Theory and Practices, 1-21, 2011
Formal analysis of CRT-RSA vigilant's countermeasure against the BellCoRe attack: A pledge for formal methods in the field of implementation security
P Rauzy, S Guilley
Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering …, 2014
Can a program reverse-engineer itself?
A Amarilli, D Naccache, P Rauzy, E Simion
Cryptography and Coding: 13th IMA International Conference, IMACC 2011 …, 2011
Using modular extension to provably protect ECC against fault attacks
P Rauzy, M Moreau, S Guilley, Z Najm
Cryptology ePrint Archive, Report 2015/882, 2015
Using modular extension to provably protect Edwards curves against fault attacks
M Dugardin, S Guilley, M Moreau, Z Najm, P Rauzy
Journal of Cryptographic Engineering 7, 321-330, 2017
Capacity: an abstract model of control over personal data
D Le Métayer, P Rauzy
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Physical attacks
N El Mrabet, L Goubin, S Guilley, J Fournier, D Jauvart, M Moreau, ...
Guide to Pairing-Based Cryptography, 12-1-12-32, 2017
A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography.
P Rauzy, M Moreau, S Guilley, Z Najm
IACR Cryptol. ePrint Arch. 2015, 882, 2015
From Rational Number Reconstruction to Set Reconciliation and File Synchronization
A Amarilli, F Ben Hamouda, F Bourse, R Morisset, D Naccache, P Rauzy
International Symposium on Trustworthy Global Computing, 1-18, 2012
Promesses et (dés)illusions : une introduction technocritique aux blockchains
P Rauzy
Terminal. Technologie de l’information, culture & société 136, 2023
Auteur·ices, relecteur·ices : redoublons de prudence face aux effets de modes technologiques
E Blanchard, FL Vigni, P Rauzy
THC: Practical and Cost-Effective Verification of Delegated Computation
P Rauzy, A Nehme
International Conference on Cryptology and Network Security, 513-530, 2021
Guide to Pairing-Based Cryptography
L Goubin, S Guilley, J Fournier, D Jauvart, M Moreau, P Rauzy, ...
CRC Press, 2017
Formal sofwtare methods for cryptosystems implementation security
P Rauzy
Télécom ParisTech, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20