- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Security and Verification in Computing
- Cryptography and Residue Arithmetic
- Numerical Methods and Algorithms
- Polynomial and algebraic computation
- DNA and Biological Computing
- Embedded Systems Design Techniques
- Complexity and Algorithms in Graphs
- Parallel Computing and Optimization Techniques
- Advanced Steganography and Watermarking Techniques
- semigroups and automata theory
- Network Security and Intrusion Detection
- Advanced Authentication Protocols Security
- Advanced Optimization Algorithms Research
- Logic, Reasoning, and Knowledge
- Fault Detection and Control Systems
- Diverse Scientific and Engineering Research
- Statistical Mechanics and Entropy
CryptoExperts (France)
2016-2025
University of Luxembourg
2007-2014
Oberthur Technologies (France)
2007-2009
Second order Differential Power Analysis (2O-DPA) is a powerful side-channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA, higher may be employed but it implies nonnegligible overhead. In this context, there need know how efficient 2O-DPA can be, in evaluate resistance of implementation uses first and, possibly, some hardware countermeasures. Different methods mounting practical have been proposed literature. However, not yet clear which...