- 4
- 2
- 1
- 1
- 1
Philippe Maurine
9
Documents
Identifiants chercheurs
- philippe-maurine
- Google Scholar : https://scholar.google.fr/citations?hl=fr&user=VduRIsgAAAAJ&view_op=list_works&sortby=pubdate
- IdRef : 144880717
- 0000-0002-9706-5710
- Google Scholar : https://scholar.google.fr/citations?user=VduRIsgAAAAJ&hl=fr
Présentation
Publications
- 3
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 5
- 4
- 1
- 4
- 5
- 3
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 2
- 2
|
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality ProofsJournal of Cryptology, 2023, 36, pp.38. ⟨10.1007/s00145-023-09476-0⟩
Article dans une revue
lirmm-03628255v1
|
|
Fit the Joint Moments: How to Attack Any Masking SchemeIEEE Access, 2022, 10, pp.127412-127427. ⟨10.1109/ACCESS.2022.3222760⟩
Article dans une revue
lirmm-03895675v1
|
|
An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit IdentificationIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017, 25 (12), pp.3317-3330. ⟨10.1109/TVLSI.2016.2627525⟩
Article dans une revue
lirmm-01430925v1
|
|
The EVIL Machine: Encode, Visualize and Interpret the LeakageSAC 2023 - 38th ACM/SIGAPP Symposium on Applied Computing, Mar 2023, Tallinn, Estonia. pp.1566-1575, ⟨10.1145/3555776.3577688⟩
Communication dans un congrès
lirmm-04230167v1
|
|
Leakage Assessment through Neural Estimation of the Mutual InformationACNS 2020 - International Conference on Applied Cryptography and Network Security, Oct 2020, Rome, Italy. pp.144-162, ⟨10.1007/978-3-030-61638-0_9⟩
Communication dans un congrès
hal-02980501v1
|
|
On-Chip Fingerprinting of IC Topology for Integrity VerificationDATE 2016 - 19th Design, Automation and Test in Europe Conference and Exhibition, Mar 2016, Dresden, Germany. pp.133-138, ⟨10.3850/9783981537079_0169⟩
Communication dans un congrès
lirmm-01269856v1
|
Granularity and detection capability of an adaptive embedded Hardware Trojan detection systemHOST: Hardware Oriented Security and Trust, May 2016, McLean, VA, United States. pp.135-138, ⟨10.1109/HST.2016.7495571⟩
Communication dans un congrès
lirmm-01434150v1
|
|
|
Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detectionReConFig: ReConFigurable Computing and FPGAs, Dec 2015, Mexico, Mexico. pp.1-6, ⟨10.1109/ReConFig.2015.7393363⟩
Communication dans un congrès
lirmm-01354318v1
|
|
Extraction of intrinsic structure for Hardware Trojan detection2015, pp.2015/912
Autre publication scientifique
lirmm-01319491v1
|