Maxime Lecomte
Orcid: 0000-0002-9985-7586
According to our database1,
Maxime Lecomte
authored at least 21 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Approche hybride de modélisation explicable du métabolisme des écosystèmes microbiens. (Hybrid approach for explainable metabolic modelling of microbial ecosystems).
PhD thesis, 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs.
J. Cryptol., October, 2023
Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Microprocess. Microsystems, 2023
IACR Cryptol. ePrint Arch., 2023
2022
Donât Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022
2020
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Proceedings of the Smart Card Research and Advanced Applications, 2019
2017
An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification.
IEEE Trans. Very Large Scale Integr. Syst., 2017
2016
Granularity and detection capability of an adaptive embedded Hardware Trojan detection system.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015