Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds of attacks, especially those targeting the disclosure of encryption keys. It is well known that manipulating confidential keys by the processor as ordinary data can represent a threat: a change in the program code (malicious or unintentional) can cause the unencrypted confidential key to leave the security area. This way, the security of the whole system would be irrecoverably compromised. The aim of our work was to search for flexible and reconfigurable hardware architectures, which can provide high security of confidential keys during their generation, storage and exchange while implementing common symmetric key cryptographic modes and proto...
This thesis concerns the study of the yield criterion of the porous materials using the homogeneizat...
This thesis studies distributed optimization problems with different observation structuresand appli...
Packet classification consists of matching packet headers against a set of pre-defined rules, and pe...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
Les architectures des processeurs et coprocesseurs cryptographiques se montrent fréquemment vulnérab...
The most commonly used encryption techniques in cryptography are based on problems in number theory....
The objective of this thesis is to develop intrusion detection and alert correlation techniques gear...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
En cryptographie moderne, un système de chiffrement est traditionnellement étudié dans le modèle dit...
This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem ba...
RÉSUMÉ: L'explosion des connexions des systèmes industriels liées au cyberespace a engendré une augm...
Security has become an important challenge in current software and system development. Most of desig...
In this document, an efficient iterative receiver for digital communication systems is investigated....
L'Internet des objets (IdO) est en train de transformer l'industrie traditionnelle en une industrie ...
Cyber physical systems (CPS) denote systems that embed programmable components in order to control a...
This thesis concerns the study of the yield criterion of the porous materials using the homogeneizat...
This thesis studies distributed optimization problems with different observation structuresand appli...
Packet classification consists of matching packet headers against a set of pre-defined rules, and pe...
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds o...
Les architectures des processeurs et coprocesseurs cryptographiques se montrent fréquemment vulnérab...
The most commonly used encryption techniques in cryptography are based on problems in number theory....
The objective of this thesis is to develop intrusion detection and alert correlation techniques gear...
Our society extensively relies on communications systems. Because such systems are used to exchange ...
En cryptographie moderne, un système de chiffrement est traditionnellement étudié dans le modèle dit...
This thesis is about algorithmic problems arising when someone wants to imple-ment a cryptosystem ba...
RÉSUMÉ: L'explosion des connexions des systèmes industriels liées au cyberespace a engendré une augm...
Security has become an important challenge in current software and system development. Most of desig...
In this document, an efficient iterative receiver for digital communication systems is investigated....
L'Internet des objets (IdO) est en train de transformer l'industrie traditionnelle en une industrie ...
Cyber physical systems (CPS) denote systems that embed programmable components in order to control a...
This thesis concerns the study of the yield criterion of the porous materials using the homogeneizat...
This thesis studies distributed optimization problems with different observation structuresand appli...
Packet classification consists of matching packet headers against a set of pre-defined rules, and pe...