This work has been partially supported by: MultiRad (PAI project funded by Région Auvergne-Rhône-Alpes); and UGA/LPSC/GENESIS platform.International audienc
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
In space applications, the data logging sub-system often requires compression to cope with large amo...
In the atmosphere, it is generally understood that neutrons are the main contributor to the soft err...
Most safety-critical edge-computing devices rely on lightweight cryptography (LWC) algorithms to pro...
This work was partially funded by: MultiRad (PAI project funded by Région Auvergne-Rhône-Alpes); UK ...
This work has been partially supported by: MultiRad project, funded by Région Auvergne-Rhône-Alpes's...
International audienceWith the advance of autonomous systems, security is becoming the most crucial ...
This work has been partially supported by: MultiRad (PAI project funded by Région Auvergne-Rhône-Alp...
International audienceMachine learning (ML) algorithms have been regaining momentum thanks to their ...
This book introduces readers to various radiation soft-error mechanisms such as soft delays, radiati...
Les particules de l'environnement radiatif naturel sont responsables de dysfonctionnements dans les ...
International audienceThis chapter surveys soft errors induced by natural radiation on advanced comp...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
Frontiers in Electronic Testing, Vol. 41, 1st Edition., XVIIISoft Errors in Modern Electronic System...
The security of resource-constrained devices is critical in the IoT field, given that everything is ...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
In space applications, the data logging sub-system often requires compression to cope with large amo...
In the atmosphere, it is generally understood that neutrons are the main contributor to the soft err...
Most safety-critical edge-computing devices rely on lightweight cryptography (LWC) algorithms to pro...
This work was partially funded by: MultiRad (PAI project funded by Région Auvergne-Rhône-Alpes); UK ...
This work has been partially supported by: MultiRad project, funded by Région Auvergne-Rhône-Alpes's...
International audienceWith the advance of autonomous systems, security is becoming the most crucial ...
This work has been partially supported by: MultiRad (PAI project funded by Région Auvergne-Rhône-Alp...
International audienceMachine learning (ML) algorithms have been regaining momentum thanks to their ...
This book introduces readers to various radiation soft-error mechanisms such as soft delays, radiati...
Les particules de l'environnement radiatif naturel sont responsables de dysfonctionnements dans les ...
International audienceThis chapter surveys soft errors induced by natural radiation on advanced comp...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
Frontiers in Electronic Testing, Vol. 41, 1st Edition., XVIIISoft Errors in Modern Electronic System...
The security of resource-constrained devices is critical in the IoT field, given that everything is ...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
In space applications, the data logging sub-system often requires compression to cope with large amo...
In the atmosphere, it is generally understood that neutrons are the main contributor to the soft err...