default search action
Michel Agoyan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c13]Maxime Madau, Michel Agoyan, Josep Balasch, Milos Grujic, Patrick Haddad, Philippe Maurine, Vladimir Rozic, Dave Singelée, Bohan Yang, Ingrid Verbauwhede:
The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators. FDTC 2018: 43-48 - 2017
- [j3]Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan:
Smart security management in secure devices. J. Cryptogr. Eng. 7(1): 47-61 (2017) - [c12]Maxime Madau, Michel Agoyan, Philippe Maurine:
An EM Fault Injection Susceptibility Criterion and Its Application to the Localization of Hotspots. CARDIS 2017: 180-195 - 2016
- [c11]Lydie Terras, Yannick Teglia, Michel Agoyan, Régis Leveugle:
Taking into account indirect jumps or calls in continuous control-flow checking. IDT 2016: 125-130 - 2015
- [i2]Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan:
Smart Security Management in Secure Devices. IACR Cryptol. ePrint Arch. 2015: 670 (2015) - 2014
- [j2]Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A model of the leakage in the frequency domain and its application to CPA and DPA. J. Cryptogr. Eng. 4(3): 197-212 (2014) - [c10]Mathieu Carbone, Sébastien Tiran, Sébastien Ordas, Michel Agoyan, Yannick Teglia, Gilles R. Ducharme, Philippe Maurine:
On Adaptive Bandwidth Selection for Efficient MIA. COSADE 2014: 82-97 - [c9]Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A frequency leakage model for SCA. HOST 2014: 97-100 - 2013
- [i1]Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A Frequency Leakage Model and its application to CPA and DPA. IACR Cryptol. ePrint Arch. 2013: 278 (2013) - 2012
- [c8]Benjamin Mounier, Anne-Lise Ribotta, Jacques J. A. Fournier, Michel Agoyan, Assia Tria:
EM Probes Characterisation for Security Analysis. Cryptography and Security 2012: 248-264 - 2011
- [j1]Jacques J. A. Fournier, Jean-Baptiste Rigaud, Sylvain Bouquet, Bruno Robisson, Assia Tria, Jean-Max Dutertre, Michel Agoyan:
Design and characterisation of an AES chip embedding countermeasures. Int. J. Intell. Eng. Informatics 1(3/4): 328-347 (2011) - [c7]Nguyen Minh Huu, Bruno Robisson, Michel Agoyan, Nathalie Drach:
Low-cost recovery for the code integrity protection in secure embedded processors. HOST 2011: 99-104 - [c6]Bruno Robisson, Michel Agoyan, Sébastien Le Henaff, Patrick Soquet, Guillaume Phan, Franck Wajsbürt, Pirouz Bazargan-Sabet:
Implementation of Complex Strategies of Security Insecure Embedded Systems. NTMS 2011: 1-5 - [c5]Driss Aboulkassimi, Michel Agoyan, Laurent Freund, Jacques J. A. Fournier, Bruno Robisson, Assia Tria:
ElectroMagnetic analysis (EMA) of software AES on Java mobile phones. WIFS 2011: 1-6 - 2010
- [c4]Michel Agoyan, Jean-Max Dutertre, David Naccache, Bruno Robisson, Assia Tria:
When Clocks Fail: On Critical Paths and Clock Faults. CARDIS 2010: 182-193 - [c3]Nguyen Minh Huu, Bruno Robisson, Michel Agoyan, Nathalie Drach:
Low-cost fault tolerance on the ALU in simple pipelined processors. DDECS 2010: 28-31 - [c2]Michel Agoyan, Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Anne-Lise Ribotta, Assia Tria:
How to flip a bit? IOLTS 2010: 235-239 - [c1]Jean-Baptiste Rigaud, Jean-Max Dutertre, Michel Agoyan, Bruno Robisson, Assia Tria:
Experimental Fault Injection based on the Prototyping of an AES Cryptosystem. ReCoSoC 2010: 141-147
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint