Matthieu Rivain

ORCID: 0000-0002-9855-4161
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Cryptography and Residue Arithmetic
  • Numerical Methods and Algorithms
  • Polynomial and algebraic computation
  • DNA and Biological Computing
  • Embedded Systems Design Techniques
  • Complexity and Algorithms in Graphs
  • Parallel Computing and Optimization Techniques
  • Advanced Steganography and Watermarking Techniques
  • semigroups and automata theory
  • Network Security and Intrusion Detection
  • Advanced Authentication Protocols Security
  • Advanced Optimization Algorithms Research
  • Logic, Reasoning, and Knowledge
  • Fault Detection and Control Systems
  • Diverse Scientific and Engineering Research
  • Statistical Mechanics and Entropy

CryptoExperts (France)
2016-2025

University of Luxembourg
2007-2014

Oberthur Technologies (France)
2007-2009

Second order Differential Power Analysis (2O-DPA) is a powerful side-channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2O-DPA, higher may be employed but it implies nonnegligible overhead. In this context, there need know how efficient 2O-DPA can be, in evaluate resistance of implementation uses first and, possibly, some hardware countermeasures. Different methods mounting practical have been proposed literature. However, not yet clear which...

10.1109/tc.2009.15 article EN IEEE Transactions on Computers 2009-01-20
Coming Soon ...