Il débute en première division le 8 novembre 1980, âgé seulement de 16 ans, 1 mois et 26 jours. first 1000 hits only: XML; JSON; JSONP; BibTeX; see FAQ: To protect your privacy, all features that rely on external API calls from your browser are,For web page which are no longer available, try to retrieve content from the.the dblp computer science bibliography is funded by:Merchant Sharing Towards a Zero Marginal Cost Economy.Économie des biens immatériels - Economics of Intangible Goods.Automatic boosting of cross-product coverage using Bayesian networks.A probabilistic analysis of coverage methods.Using Bayesian networks and virtual coverage to hit hard-to-reach events.Automatic Boosting of Cross-Product Coverage Using Bayesian Networks.A Framework for the Validation of Processor Architecture Compliance.Using Virtual Coverage to Hit Hard-To-Reach Events.Advanced Analysis Techniques for Cross-Product Coverage.DeepTrans - Extending the Model-based Approach to Functional Verification of Address Translation Mechanisms.Advanced analysis techniques for cross-product coverage.Genesys-Pro: Innovations in Test Program Generation for Functional Processor Verification.Micro-Architecture Verification for Microprocessors.Solving the generalized mask constraint for test generation of binary floating point add operation.FPgen - a test generation framework for datapath floating-point verification.Developing an Architecture Validation Suite: Applicaiton to the PowerPC Architecture.Functional Verification Methodology for Microprocessors Using the Genesys Test-Program Generator-Application to the x86 Microprocessors Family.Why are some names followed by a four digit number?What is the meaning of the colors in the publication lists?What is the meaning of the colors in the coauthor index?How does dblp detect coauthor communities. XML. electronic edition via DOI; unpaywalled version; references & citations . records. JSONP. To protect your privacy, all features that rely on external API calls from your browser are,For web page which are no longer available, try to retrieve content from the.the dblp computer science bibliography is funded by:Homoclinic and Big Bang Bifurcations of an Embedding of 1D Allee's Functions into a 2D Diffeomorphism.Big Bang Bifurcation Analysis and Allee Effect in Generic Growth Functions.Dynamical Analysis and Big Bang Bifurcations of 1D and 2D Gompertz's Growth Functions.Kendall's Tau Based Correlation Analysis of Chaotic Sequences Generated by Piecewise Linear Maps.Border collision bifurcations and power spectral density of chaotic signals generated by one-dimensional discontinuous piecewise linear maps.Electrostatic Vibration Energy Harvesters with Linear and Nonlinear Resonators.Efficient and secure chaotic S-Box for wireless sensor network.Analytical expressions for power spectral density issued from one-dimensional continuous piecewise linear maps with three slopes.N-phase synchronization of asymmetric attractors in a ring of coupled chaotic circuits.Two-Dimensional Coupled Parametrically forced Map.Synchronization and basins of Synchronized States in Two-Dimensional piecewise Maps via Coupling Three Pieces of One-Dimensional Maps.Chaos-based TOA estimator for DS-UWB ranging systems in multiuser environment.Combined mechanical and circuit nonlinearities in electrostatic vibration energy harvesters.Multiuser Interference Mitigation in DS-UWB Ranging System.Low complexity TOA estimator for multiuser DS-UWB system.Using Set Theoretic Estimation to Address the PAPR Problem of Spectrum-Constrained Signals.The bistable brain: a neuronal model with symbiotic interactions.Transform domain communication systems from a multidimensional perspective, impacts on bit error rate and spectrum efficiency.Enhancing spectral efficiency of Transform Domain Communication Systems by using a multidimensional modulation.Chaos generation from 1D or 2D circuits including switches.Bifurcation and basin in two coupled parametrically forced logistic maps.Chaos generator for secure transmission using a sine map and an RLC series circuit.Construction of Chaotic Maps on Nonconvex Spaces - a Solution to a CSK Deciphering Problem.A new design of dynamic S-Box based on two chaotic maps.Fractal Basins and Boundaries in 2D Maps inspired in Discrete Population Models.A Methodology for Bit Error Rate Prediction in Chaos-based Communication Systems.Accurate Bit Error Rate Calculation for Asynchronous Chaos-Based DS-CDMA over Multipath Channel.Knot Points in Two-Dimensional Maps and Related Properties.A Qualitative Analysis of Deciphering Errors in Chaos Shift Keying.Robust synchronization for asynchronous multi-user chaos-based DS-CDMA.Performance of Multi-user Chaos-based DS-CDMA System over Multipath Channel.Chaos aided synchronization for asynchronous multi-user chaos-based DS-CDMA.Analytical calculation of BER in communication systems using a piecewise linear chaotic map.Bistability: a common feature in some "aggregates" of logistic maps.Three Logistic Models for the Ecological and Economic Interactions: Symbiosis, Predator-Prey and Competition.Route to chaos in an opto-electronic system.Complex Patterns on the Plane: Different Types of Basin Fractalization in a Two-Dimensional Mapping.Nonlinear Dynamics of Bandpass Sigma-Delta Modulation - an Investigation by Means of the Critical Lines Tool.What is the meaning of the colors in the publication lists?What is the meaning of the colors in the coauthor index?How does dblp detect coauthor communities. export record. List of computer science publications by Laurent Larger In view of the current Corona Virus epidemic, Schloss Dagstuhl has moved its 2020 proposal submission period to July 1 to July 15, 2020 , and there will not be another proposal round in November 2020. Après huit saisons passées dans la capitale des Gaules, puis deux années chez le grand rival stéphanois, il rejoint en 1990 l'Olympique de Marseille, qui dispose alors d'une des meille… CoRR abs/1909.01467 (2019) Formé à l'Olympique lyonnais, Laurent Fournier remporte avec les cadets lyonnais le championnat national des cadets, victoire 1-0 sur le Paris Saint-Germain. dblp search. load links from unpaywall.org. Matthias Taus, Leonardo Zepeda-Núñez, Russell J. Hewett, Laurent Demanet: L-Sweeps: A scalable, parallel preconditioner for the high-frequency Helmholtz equation. export refined list as. What is the meaning of the colors in the publication lists? 2010 – 2019. see FAQ. 2017 [c8] view. List of computer science publications by Laurent Fournier. JSON. Add open access links from to the list of external document links (if available). Syst.DFA on LS-Designs with a Practical Implementation on SCREAM.Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack.Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round.First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography.A First DFA on PRIDE: from Theory to Practice (extended version).DFA on LS-Designs with a Practical Implementation on SCREAM (extended version).Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC).New Partitioning Approach for Hardware Trojan Detection Using Side-Channel Measurements.Improving Side-Channel Attacks Against Pairing-Based Cryptography.A First DFA on PRIDE: From Theory to Practice.On-chip fingerprinting of IC topology for integrity verification.Granularity and detection capability of an adaptive embedded Hardware Trojan detection system.A survey of fault attacks in pairing based cryptography.Combining Image Processing and Laser Fault Injections for Characterizing a Hardware AES.IEEE Trans. To protect your privacy, all features that rely on external API calls from your browser are,For web page which are no longer available, try to retrieve content from the.the dblp computer science bibliography is funded by:Improving side-channel attacks against pairing-based cryptography.Adaptive Masking: a Dynamic Trade-off between Energy Consumption and Hardware Security.Practical Algebraic Side-Channel Attacks Against ACORN.Correlation-based imaging of fast moving objects using a sparse network of passive receivers.Hardware Security Threats Against Bluetooth Mesh Networks.Energy-efficient Masking of the Trivium Stream Cipher.Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT.Thwarting Fault Attacks against Lightweight Cryptography using SIMD Instructions.SWARD: A Secure WAke-up RaDio against Denial-of-Service on IoT devices.Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software.Matched-Filter and Correlation-Based Imaging for Fast Moving Objects Using a Sparse Network of Receivers.An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification.IEEE Trans. BibTeX. Very Large Scale Integr. combined dblp search; author search; venue search; publication search; Semantic Scholar search showing all?? Bibliographic content of Theoretical Computer Science, Volume 291 List of computer science publications by Daniele Fournier-Prunaret on CAD of Integrated Circuits and Systems.A high efficiency hardware trojan detection technique based on fast SEM imaging.SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection.Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection.Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults.Extraction of intrinsic structure for Hardware Trojan detection.Adjusting Laser Injections for Fully Controlled Faults.Practical Validation of Several Fault Attacks against the Miller Algorithm.Increasing the efficiency of laser fault injections using fast gate level reverse engineering.A survey of Fault Attacks in Pairing Based Cryptography.Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults.Practical measurements of data path delays for IP authentication & integrity verification.EM Probes Characterisation for Security Analysis.A DFA on AES Based on the Entropy of Error Distributions.Design and characterisation of an AES chip embedding countermeasures.A side-channel and fault-attack resistant AES circuit working on duplicated complemented values.ElectroMagnetic analysis (EMA) of software AES on Java mobile phones.Memory Address Scrambling Revealed Using Fault Attacks.Pelvic motion measurement during over ground walking, analysis and implementation on the WalkTrainer reeducation device.Pelvic motion implementation on the WalkTrainer.Cache Based Power Analysis Attacks on AES.Implementing Cryptography on TFT Technology for Secure Display Applications.Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography.A Vector Approach to Cryptography Implementation.Balanced self-checking asynchronous logic for smart card applications.Security Evaluation of Asynchronous Circuits.What is the meaning of the colors in the publication lists?What is the meaning of the colors in the coauthor index?How does dblp detect coauthor communities. Bibliographic content of Haifa Verification Conference 2007. export records of this page.