Logo Lab-STICCFrom sensors to knowledge: Communicate and decide

Search

Your search query : Side Channel Attacks
6 results found

Cryptographic implementations

  Page under construction....   We work on various types of cryptographic implementations for both hardware (ASICs and FPGAs) and software targets (from microcontrollers to high-end multicore processors): (hyper)-ellipitic curve cryptography (ECC) h…

Read more

NASSER Yehya

Read more

Cyber

The laboratory is developing a very strong expertise in cybersecurity. It has a wide range of skills related to cybersecurity issues in the fields of software and hardware architectures, communications and networks, critical systems and risks related…

Read more

WG security

The working group (WG) "hardware security" aims to present and discuss contributions as well as technical and bibliographic studies from team members and guests on topics such as: hardware cyber-security, secure circuits, security of embedded softwar…

Read more

Seminars

Team seminars are given by ARCAD members and visiting collaborators (students and researchers), they are open to all pole and lab members. Usual format: 30 et 40 minutes presentation followed by 15 to 20 minutes for questions and discussion.     2022…

Read more

GOGNIAT Guy

Guy Gogniat is a Professor in ECE with the Université Bretagne Sud, Lorient, France, where he has been since 1998. In 2005, he spent one year as an invited Researcher with the University of Massachusetts, Amherst, USA, where he worked on embedded sys…

Read more