Benoit Feix
According to our database1,
Benoit Feix
authored at least 20 papers
between 2005 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Defeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force.
Proceedings of the Smart Card Research and Advanced Applications, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
2013
There's Something about m-ary - Fixed-Point Scalar Multiplication Protected against Physical Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
Passive and Active Combined Attacks on AES???Combining Fault Attacks and Side Channel Analysis.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
2008
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
2007
Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis.
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007
2005
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005