CINXE.COM

Sécurité & sureté – LIRMM

<!doctype html> <html lang="fr-FR"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=10.0, user-scalable=yes"> <link rel="profile" href="http://gmpg.org/xfn/11"> <title>Sécurité &amp; sureté &#8211; LIRMM</title> <meta name='robots' content='max-image-preview:large' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <link rel="alternate" href="https://www.lirmm.fr/security-safety/" hreflang="en" /> <link rel="alternate" href="https://www.lirmm.fr/securite/" hreflang="fr" /> <link rel='dns-prefetch' href='//www.lirmm.fr' /> <link rel="alternate" type="application/rss+xml" title="LIRMM &raquo; Flux" href="https://www.lirmm.fr/feed/" /> <link rel="alternate" type="application/rss+xml" title="LIRMM &raquo; Flux des commentaires" href="https://www.lirmm.fr/comments/feed/" /> <script type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.lirmm.fr\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.7.1"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='wp-hal-style1-css' href='https://www.lirmm.fr/wp-content/plugins/hal/css/style.css?ver=6.7.1' type='text/css' media='all' /> <link rel='stylesheet' id='osm-map-css-css' href='https://www.lirmm.fr/wp-content/plugins/osm/css/osm_map.css?ver=6.7.1' type='text/css' media='all' /> <link rel='stylesheet' id='osm-ol3-css-css' href='https://www.lirmm.fr/wp-content/plugins/osm/js/OL/7.1.0/ol.css?ver=6.7.1' type='text/css' media='all' /> <link rel='stylesheet' id='osm-ol3-ext-css-css' href='https://www.lirmm.fr/wp-content/plugins/osm/css/osm_map_v3.css?ver=6.7.1' type='text/css' media='all' /> <link rel='stylesheet' id='ivory-search-styles-css' href='https://www.lirmm.fr/wp-content/plugins/add-search-to-menu/public/css/ivory-search.min.css?ver=5.5.8' type='text/css' media='all' /> <link rel='stylesheet' id='newsletter-css' href='https://www.lirmm.fr/wp-content/plugins/newsletter/style.css?ver=8.6.3' type='text/css' media='all' /> <link rel='stylesheet' id='ics-calendar-css' href='https://www.lirmm.fr/wp-content/plugins/ics-calendar/assets/style.min.css?ver=11.3.7' type='text/css' media='all' /> <link rel='stylesheet' id='elementor-icons-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/lib/eicons/css/elementor-icons.min.css?ver=5.32.0' type='text/css' media='all' /> <link rel='stylesheet' id='elementor-frontend-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=3.25.10' type='text/css' media='all' /> <link rel='stylesheet' id='swiper-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/lib/swiper/v8/css/swiper.min.css?ver=8.4.5' type='text/css' media='all' /> <link rel='stylesheet' id='e-swiper-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/css/conditionals/e-swiper.min.css?ver=3.25.10' type='text/css' media='all' /> <link rel='stylesheet' id='elementor-post-417-css' href='https://www.lirmm.fr/wp-content/uploads/sites/3/elementor/css/post-417.css?ver=1727815697' type='text/css' media='all' /> <link rel='stylesheet' id='e-popup-style-css' href='https://www.lirmm.fr/wp-content/plugins/elementor-pro/assets/css/conditionals/popup.min.css?ver=3.25.4' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-5-all-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/lib/font-awesome/css/all.min.css?ver=3.25.10' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-4-shim-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/lib/font-awesome/css/v4-shims.min.css?ver=3.25.10' type='text/css' media='all' /> <link rel='stylesheet' id='widget-testimonial-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/css/widget-testimonial.min.css?ver=3.25.10' type='text/css' media='all' /> <link rel='stylesheet' id='widget-text-editor-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/css/widget-text-editor.min.css?ver=3.25.10' type='text/css' media='all' /> <link rel='stylesheet' id='widget-toggle-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/css/widget-toggle.min.css?ver=3.25.10' type='text/css' media='all' /> <link rel='stylesheet' id='elementor-post-19076-css' href='https://www.lirmm.fr/wp-content/uploads/sites/3/elementor/css/post-19076.css?ver=1728398094' type='text/css' media='all' /> <link rel='stylesheet' id='font-awesome-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/lib/font-awesome/css/font-awesome.min.css?ver=4.7.0' type='text/css' media='all' /> <link rel='stylesheet' id='customify-style-css' href='https://www.lirmm.fr/wp-content/themes/customify/style.min.css?ver=0.4.8' type='text/css' media='all' /> <style id='customify-style-inline-css' type='text/css'> #masthead.sticky-active .site-header-inner {box-shadow: 0px 5px 10px 0px rgba(50,50,50,0.06) ;;}.header-top .header--row-inner,body:not(.fl-builder-edit) .button,body:not(.fl-builder-edit) button:not(.menu-mobile-toggle, .components-button, .customize-partial-edit-shortcut-button),body:not(.fl-builder-edit) input[type="button"]:not(.ed_button),button.button,input[type="button"]:not(.ed_button, .components-button, .customize-partial-edit-shortcut-button),input[type="reset"]:not(.components-button, .customize-partial-edit-shortcut-button),input[type="submit"]:not(.components-button, .customize-partial-edit-shortcut-button),.pagination .nav-links > *:hover,.pagination .nav-links span,.nav-menu-desktop.style-full-height .primary-menu-ul > li.current-menu-item > a,.nav-menu-desktop.style-full-height .primary-menu-ul > li.current-menu-ancestor > a,.nav-menu-desktop.style-full-height .primary-menu-ul > li > a:hover,.posts-layout .readmore-button:hover{ background-color: #235787;}.posts-layout .readmore-button {color: #235787;}.pagination .nav-links > *:hover,.pagination .nav-links span,.entry-single .tags-links a:hover,.entry-single .cat-links a:hover,.posts-layout .readmore-button,.posts-layout .readmore-button:hover{ border-color: #235787;}.customify-builder-btn{ background-color: #c3512f;}body{ color: #686868;}abbr, acronym { border-bottom-color: #686868;}a { color: #1e4b75;}a:hover,a:focus,.link-meta:hover, .link-meta a:hover{ color: #111111;}h2 + h3,.comments-area h2 + .comments-title,.h2 + h3,.comments-area .h2 + .comments-title,.page-breadcrumb { border-top-color: #eaecee;}blockquote,.site-content .widget-area .menu li.current-menu-item > a:before{ border-left-color: #eaecee;}@media screen and (min-width: 64em) { .comment-list .children li.comment { border-left-color: #eaecee; } .comment-list .children li.comment:after { background-color: #eaecee; }}.page-titlebar, .page-breadcrumb,.posts-layout .entry-inner { border-bottom-color: #eaecee;}.header-search-form .search-field,.entry-content .page-links a,.header-search-modal,.pagination .nav-links > *,.entry-footer .tags-links a, .entry-footer .cat-links a,.search .content-area article,.site-content .widget-area .menu li.current-menu-item > a,.posts-layout .entry-inner,.post-navigation .nav-links,article.comment .comment-meta,.widget-area .widget_pages li a, .widget-area .widget_categories li a, .widget-area .widget_archive li a, .widget-area .widget_meta li a, .widget-area .widget_nav_menu li a, .widget-area .widget_product_categories li a, .widget-area .widget_recent_entries li a, .widget-area .widget_rss li a,.widget-area .widget_recent_comments li{ border-color: #eaecee;}.header-search-modal::before { border-top-color: #eaecee; border-left-color: #eaecee;}@media screen and (min-width: 48em) { .content-sidebar.sidebar_vertical_border .content-area { border-right-color: #eaecee; } .sidebar-content.sidebar_vertical_border .content-area { border-left-color: #eaecee; } .sidebar-sidebar-content.sidebar_vertical_border .sidebar-primary { border-right-color: #eaecee; } .sidebar-sidebar-content.sidebar_vertical_border .sidebar-secondary { border-right-color: #eaecee; } .content-sidebar-sidebar.sidebar_vertical_border .sidebar-primary { border-left-color: #eaecee; } .content-sidebar-sidebar.sidebar_vertical_border .sidebar-secondary { border-left-color: #eaecee; } .sidebar-content-sidebar.sidebar_vertical_border .content-area { border-left-color: #eaecee; border-right-color: #eaecee; } .sidebar-content-sidebar.sidebar_vertical_border .content-area { border-left-color: #eaecee; border-right-color: #eaecee; }}article.comment .comment-post-author {background: #6d6d6d;}.pagination .nav-links > *,.link-meta,.link-meta a,.color-meta,.entry-single .tags-links:before,.entry-single .cats-links:before{ color: #6d6d6d;}h1, h2, h3, h4, h5, h6 { color: #2b2b2b;}.site-content .widget-title { color: #444444;}#page-cover {background-image: url("https://zzz.lirmm.fr/wp-content/uploads/sites/3/2020/05/PhotosLIRMM.jpg?t=1589463320276");}#page-cover {background-repeat: repeat;}.header--row:not(.header--transparent).header-top .header--row-inner {background-color: #ffffff;} .sub-menu .li-duplicator {display:none !important;}.header-search_icon-item .header-search-modal {border-style: solid;} .header-search_icon-item .search-field {border-style: solid;} .dark-mode .header-search_box-item .search-form-fields, .header-search_box-item .search-form-fields {border-style: solid;} a.item--button {color: #ffffff; text-decoration-color: #ffffff;background-color: #969696;} #cb-row--footer-main .footer--row-inner {background-color: rgba(112,108,102,0.85)}#blog-posts .posts-layout .entry-media {border-radius: 0px;}#blog-posts .posts-layout .entry-thumbnail img {transform: scale(1);}#blog-posts .posts-layout .entry-media:hover .entry-thumbnail img {transform: scale(1);}body {background-color: #FFFFFF;} .site-content .content-area {background-color: #FFFFFF;} /* CSS for desktop */.sticky.sticky-active .header--row.header-top.header--sticky .customify-grid, .sticky.sticky-active .header--row.header-top.header--sticky .style-full-height .primary-menu-ul > li > a {min-height: 53px;}.sticky.sticky-active .header--row.header-main.header--sticky .customify-grid, .sticky.sticky-active .header--row.header-main.header--sticky .style-full-height .primary-menu-ul > li > a {min-height: 20px;}.sticky.sticky-active .header--row.header-bottom.header--sticky .customify-grid, .sticky.sticky-active .header--row.header-bottom.header--sticky .style-full-height .primary-menu-ul > li > a {min-height: 0px;}#page-cover .page-cover-inner {min-height: 430px;}#page-titlebar {text-align: left;}#page-titlebar {padding-left: 13px;} .header--row.header-top .customify-grid, .header--row.header-top .style-full-height .primary-menu-ul > li > a {min-height: 33px;}.header--row.header-main .customify-grid, .header--row.header-main .style-full-height .primary-menu-ul > li > a {min-height: 37px;}.header--row.header-bottom .customify-grid, .header--row.header-bottom .style-full-height .primary-menu-ul > li > a {min-height: 37px;}.site-header .site-branding img { max-width: 329px; } .site-header .cb-row--mobile .site-branding img { width: 329px; }.header--row .builder-first--nav-icon {text-align: right;}.header-search_icon-item .search-submit {margin-left: -40px;}.header-search_box-item .search-submit{margin-left: -40px;} .header-search_box-item .woo_bootster_search .search-submit{margin-left: -40px;} .header-search_box-item .header-search-form button.search-submit{margin-left:-40px;}.header--row .builder-first--primary-menu {text-align: right;}.header-social-icons.customify-builder-social-icons li a { font-size: 17px; }.header-social-icons.customify-builder-social-icons li a {padding: 0.1em;}.header-social-icons.customify-builder-social-icons li {margin-left: 2px; margin-right: 2px;}#cb-row--footer-main .footer--row-inner {margin-top: 0px;margin-right: 0px;margin-bottom: 0px;margin-left: 0px;padding-top: 9px;padding-right: 9px;padding-bottom: 9px;padding-left: 9px;} #cb-row--footer-top .footer--row-inner {margin-top: 0px;margin-right: 0px;margin-bottom: 0px;margin-left: 0px;padding-top: 0px;padding-right: 0px;padding-bottom: 0px;padding-left: 0px;} #blog-posts .posts-layout .entry .entry-media {padding-top: 100%;}/* CSS for tablet */@media screen and (max-width: 1024px) { #page-cover .page-cover-inner {min-height: 250px;}.header--row .builder-first--nav-icon {text-align: right;}.header-search_icon-item .search-submit {margin-left: -40px;}.header-search_box-item .search-submit{margin-left: -40px;} .header-search_box-item .woo_bootster_search .search-submit{margin-left: -40px;} .header-search_box-item .header-search-form button.search-submit{margin-left:-40px;} }/* CSS for mobile */@media screen and (max-width: 568px) { #page-cover .page-cover-inner {min-height: 200px;}.header--row.header-top .customify-grid, .header--row.header-top .style-full-height .primary-menu-ul > li > a {min-height: 33px;}.header--row .builder-first--nav-icon {text-align: right;}.header-search_icon-item .search-submit {margin-left: -40px;}.header-search_box-item .search-submit{margin-left: -40px;} .header-search_box-item .woo_bootster_search .search-submit{margin-left: -40px;} .header-search_box-item .header-search-form button.search-submit{margin-left:-40px;} } </style> <link rel='stylesheet' id='customify-customify-pro-e5f8b3e5ddc639f8d7216e1f77f80a8a-css' href='http://www.lirmm.fr/wp-content/uploads/sites/3/customify-pro/customify-pro-e5f8b3e5ddc639f8d7216e1f77f80a8a.css?ver=20241130014602' type='text/css' media='all' /> <link rel='stylesheet' id='eael-general-css' href='https://www.lirmm.fr/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/css/view/general.min.css?ver=6.0.10' type='text/css' media='all' /> <link rel='stylesheet' id='google-fonts-1-css' href='https://fonts.googleapis.com/css?family=Roboto%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic&#038;display=auto&#038;ver=6.7.1' type='text/css' media='all' /> <link rel='stylesheet' id='elementor-icons-shared-0-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/lib/font-awesome/css/fontawesome.min.css?ver=5.15.3' type='text/css' media='all' /> <link rel='stylesheet' id='elementor-icons-fa-solid-css' href='https://www.lirmm.fr/wp-content/plugins/elementor/assets/lib/font-awesome/css/solid.min.css?ver=5.15.3' type='text/css' media='all' /> <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin><script type="text/javascript" id="jquery-core-js-extra"> /* <![CDATA[ */ var Customify_Pro_JS = {"header_sticky_up":"","scrolltop_duration":"500","scrolltop_offset":"100","megaMenu":{"ajax_url":"https:\/\/www.lirmm.fr\/wp-admin\/admin-ajax.php","loading_icon":"<div class=\"mega-spinner\"><div class=\"uil-squares-css\" style=\"transform:scale(0.4);\"><div><div><\/div><\/div><div><div><\/div><\/div><div><div><\/div><\/div><div><div><\/div><\/div><div><div><\/div><\/div><div><div><\/div><\/div><div><div><\/div><\/div><div><div><\/div><\/div><\/div><\/div>","theme_support":[]},"cn_cookie_expiry":"hour","infinity_load":{"posts":{"enable":1,"load_type":"auto","loading_text":"Loading","load_more_text":"Load More"},"products":{"enable":1,"load_type":"auto","loading_text":"Loading","load_more_text":"Load More"}}}; /* ]]> */ </script> <script type="text/javascript" src="https://www.lirmm.fr/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/OL/2.13.1/OpenLayers.js?ver=6.7.1" id="osm-ol-library-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/OSM/openlayers/OpenStreetMap.js?ver=6.7.1" id="osm-osm-library-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/OSeaM/harbours.js?ver=6.7.1" id="osm-harbours-library-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/OSeaM/map_utils.js?ver=6.7.1" id="osm-map-utils-library-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/OSeaM/utilities.js?ver=6.7.1" id="osm-utilities-library-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/osm-plugin-lib.js?ver=6.7.1" id="OsmScript-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/polyfill/v2/polyfill.min.js?features=requestAnimationFrame%2CElement.prototype.classList%2CURL&amp;ver=6.7.1" id="osm-polyfill-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/OL/7.1.0/ol.js?ver=6.7.1" id="osm-ol3-library-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/osm-v3-plugin-lib.js?ver=6.7.1" id="osm-ol3-ext-library-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/osm-metabox-events.js?ver=6.7.1" id="osm-ol3-metabox-events-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/osm/js/osm-startup-lib.js?ver=6.7.1" id="osm-map-startup-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/elementor/assets/lib/font-awesome/js/v4-shims.min.js?ver=3.25.10" id="font-awesome-4-shim-js"></script> <link rel="https://api.w.org/" href="https://www.lirmm.fr/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.lirmm.fr/wp-json/wp/v2/pages/19076" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.lirmm.fr/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.7.1" /> <link rel="canonical" href="https://www.lirmm.fr/securite/" /> <link rel='shortlink' href='https://www.lirmm.fr/?p=19076' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.lirmm.fr/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.lirmm.fr%2Fsecurite%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.lirmm.fr/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.lirmm.fr%2Fsecurite%2F&#038;format=xml" /> <script type="text/javascript"> /** all layers have to be in this global array - in further process each map will have something like vectorM[map_ol3js_n][layer_n] */ var vectorM = [[]]; /** put translations from PHP/mo to JavaScript */ var translations = []; /** global GET-Parameters */ var HTTP_GET_VARS = []; </script><!-- OSM plugin V6.1.6: did not add geo meta tags. --> <meta name="generator" content="Elementor 3.25.10; features: additional_custom_breakpoints, e_optimized_control_loading; settings: css_print_method-external, google_font-enabled, font_display-auto"> <style> .e-con.e-parent:nth-of-type(n+4):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+4):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } @media screen and (max-height: 1024px) { .e-con.e-parent:nth-of-type(n+3):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+3):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } } @media screen and (max-height: 640px) { .e-con.e-parent:nth-of-type(n+2):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+2):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } } </style> <link rel="icon" href="https://www.lirmm.fr/wp-content/uploads/sites/3/2020/05/cropped-iconeLIRMM-32x32.jpg" sizes="32x32" /> <link rel="icon" href="https://www.lirmm.fr/wp-content/uploads/sites/3/2020/05/cropped-iconeLIRMM-192x192.jpg" sizes="192x192" /> <link rel="apple-touch-icon" href="https://www.lirmm.fr/wp-content/uploads/sites/3/2020/05/cropped-iconeLIRMM-180x180.jpg" /> <meta name="msapplication-TileImage" content="https://www.lirmm.fr/wp-content/uploads/sites/3/2020/05/cropped-iconeLIRMM-270x270.jpg" /> <style type="text/css" id="wp-custom-css"> .customify-container, .layout-contained { max-width: 100% !important; } .page-breadcrumb-list {text-transform: lowercase; font-size: 15px} .annuaire-personne{ border-bottom-style: solid; border-bottom-width: 2px; border-bottom-color : #f0f0f0; } li.current-cat {background-color; #F9F9F9;} /* CSS pour widget listcategory li.post_tag { color:#4632DA; } li.categories { color:#4632DA; } li.categories { ... } li.cat-item { ... } li.cat-item-7 { ... } li.current-cat { ... } li.current-cat-parent { ... } ul.children { ... } */ /*reduce hight of copyright footer*/ .footer-bottom .footer--row-inner { padding-top: .8em; padding-bottom: .8em; } .site-footer .widget-title { color: #fff!important; } /* .nav-menu-desktop .menu-item { height: auto !important; z-index: 1 !important; } */ /* pour que les longs menus ne se trouvent pas en arrière plan */ .site-header { z-index: 999; } .inline-block { display: inline-block; margin-right: 6px; } </style> <style type="text/css" media="screen">.is-menu path.search-icon-path { fill: #848484;}body .popup-search-close:after, body .search-close:after { border-color: #848484;}body .popup-search-close:before, body .search-close:before { border-color: #848484;}</style></head> <body class="page-template-default page page-id-19076 wp-custom-logo customify content-sidebar main-layout-content-sidebar sidebar_vertical_border site-full-width menu_sidebar_slide_left no-cookie-bar elementor-default elementor-template-full-width elementor-kit-417 elementor-page elementor-page-19076"> <div id="page" class="site box-shadow"> <a class="skip-link screen-reader-text" href="#site-content">Aller au contenu</a> <a class="close is-size-medium close-panel close-sidebar-panel" href="#"> <span class="hamburger hamburger--squeeze is-active"> <span class="hamburger-box"> <span class="hamburger-inner"><span class="screen-reader-text">Menu</span></span> </span> </span> <span class="screen-reader-text">Fermer</span> </a><header id="masthead" class="site-header header-v2"><div id="masthead-inner" class="site-header-inner"> <div class="header-top header--row layout-fullwidth header--sticky" id="cb-row--header-top" data-row-id="top" data-show-on="desktop mobile"> <div class="header--row-inner header-top-inner light-mode"> <div class="customify-container"> <div class="customify-grid cb-row--desktop hide-on-mobile hide-on-tablet customify-grid-middle"><div class="row-v2 row-v2-top no-center"><div class="col-v2 col-v2-left"><div class="item--inner builder-item--html" data-section="header_html" data-item-id="html" ><div class="builder-header-html-item item--html"><p><a href="https://www.lirmm.fr"><img decoding="async" src="/wp-content/uploads/sites/3/2021/04/Logo-LIRMM-long_329x113.png" alt="logo LIRMM" /></a></p> </div></div></div><div class="col-v2 col-v2-right"><div class="item--inner builder-item--html_3" data-section="header_html_3" data-item-id="html_3" ><div class="builder-header-html_3-item item--html"><div class="inline-block"> <a href="https://muse.edu.umontpellier.fr/" target="_blank"><img decoding="async" src="/wp-content/uploads/sites/3/2022/02/logo_muse_50.png" alt="logo Muse, Montpellier Université d’Excellence" /></a></div> <div class="inline-block"> <a href="https://www.umontpellier.fr/" target="_blank"><img decoding="async" src="/wp-content/uploads/sites/3/2022/02/logo_um_50.png" alt="logo Université de Montpellier" /></a></div> <div class="inline-block"> <a href="https://www.cnrs.fr/" target="_blank"><img decoding="async" src="/wp-content/uploads/sites/3/2024/01/LOGO_CNRS_BLEU_50x49.png" alt="logo Centre National de la Recherche Scientifique" /></a></div> </div></div><div class="item--inner builder-item--html_2" data-section="header_html_2" data-item-id="html_2" ><div class="builder-header-html_2-item item--html"><div class="inline-block"> <a href="https://www.univ-montp3.fr/" target="_blank"><img decoding="async" src="/wp-content/uploads/sites/3/2022/02/logo_UPVM_50.png" alt="logo Montpellier Université Paul Valéry" /></a></div> <div class="inline-block"> <a href="https://www.univ-perp.fr" target="_blank"><img decoding="async" src="/wp-content/uploads/sites/3/2022/02/logo_UPVD_50.png" alt="Logo Université Perpignan Via Domitia" /></a></div> <div class="inline-block"> <a href="https://www.inria.fr/fr" target="_blank"><img decoding="async" src="/wp-content/uploads/sites/3/2022/02/logo_inria_rouge_50.png" alt="logo inria" /></a></div> </div></div></div></div></div><div class="cb-row--mobile hide-on-desktop customify-grid customify-grid-middle"><div class="row-v2 row-v2-top no-center"><div class="col-v2 col-v2-left"><div class="item--inner builder-item--html" data-section="header_html" data-item-id="html" ><div class="builder-header-html-item item--html"><p><a href="https://www.lirmm.fr"><img decoding="async" src="/wp-content/uploads/sites/3/2021/04/Logo-LIRMM-long_329x113.png" alt="logo LIRMM" /></a></p> </div></div></div><div class="col-v2 col-v2-right"><div class="item--inner builder-item--nav-icon" data-section="header_menu_icon" data-item-id="nav-icon" > <button type="button" class="menu-mobile-toggle item-button is-size-desktop-medium is-size-tablet-medium is-size-mobile-medium" aria-label="nav icon"> <span class="hamburger hamburger--squeeze"> <span class="hamburger-box"> <span class="hamburger-inner"></span> </span> </span> <span class="nav-icon--label hide-on-tablet hide-on-mobile">Menu</span></button> </div></div></div></div> </div> </div> </div> <div class="header-main header--row layout-full-contained header--sticky" id="cb-row--header-main" data-row-id="main" data-show-on="desktop mobile"> <div class="header--row-inner header-main-inner light-mode"> <div class="customify-container"> <div class="customify-grid cb-row--desktop hide-on-mobile hide-on-tablet customify-grid-middle"><div class="row-v2 row-v2-main no-center"><div class="col-v2 col-v2-left"><div class="item--inner builder-item--primary-menu has_menu" data-section="header_menu_primary" data-item-id="primary-menu" ><nav id="site-navigation-main-desktop" class="site-navigation primary-menu primary-menu-main nav-menu-desktop primary-menu-desktop style-border-bottom"><ul id="menu-menu-principal" class="primary-menu-ul menu nav-menu"><li id="menu-item--main-desktop-981" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-981"><a><span class="link-before">Accueil<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--main-desktop-2586" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2586"><a href="https://www.lirmm.fr/presentation/"><span class="link-before">Présentation</span></a></li> <li id="menu-item--main-desktop-72" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-72"><a href="https://www.lirmm.fr/organisation/"><span class="link-before">Organisation</span></a></li> <li id="menu-item--main-desktop-81" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-81"><a href="https://www.lirmm.fr/historique/"><span class="link-before">Historique</span></a></li> </ul> </li> <li id="menu-item--main-desktop-1032" class="menu-item menu-item-type-custom menu-item-object-custom current-menu-ancestor menu-item-has-children menu-item-1032"><a><span class="link-before">Recherche<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--main-desktop-2824" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-2824"><a href="#"><span class="link-before">Départements<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--main-desktop-388" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-388"><a href="https://www.lirmm.fr/departement-informatique/"><span class="link-before">Informatique</span></a></li> <li id="menu-item--main-desktop-433" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-433"><a href="https://www.lirmm.fr/departement-microelectronique/"><span class="link-before">Microélectronique</span></a></li> <li id="menu-item--main-desktop-432" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-432"><a href="https://www.lirmm.fr/departement-robotique/"><span class="link-before">Robotique</span></a></li> </ul> </li> <li id="menu-item--main-desktop-15653" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-15653"><a href="https://www.lirmm.fr/equipes/"><span class="link-before">Équipes</span></a></li> <li id="menu-item--main-desktop-17661" class="menu-item menu-item-type-custom menu-item-object-custom current-menu-ancestor current-menu-parent menu-item-has-children menu-item-17661"><a href="#"><span class="link-before">Axes transverses<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--main-desktop-17478" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-17478"><a href="https://www.lirmm.fr/mer-ocean/"><span class="link-before">Axe transverse Mer et Océan</span></a></li> <li id="menu-item--main-desktop-17848" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-17848"><a href="https://www.lirmm.fr/logique/"><span class="link-before">Logiques</span></a></li> <li id="menu-item--main-desktop-19095" class="menu-item menu-item-type-post_type menu-item-object-page current-menu-item page_item page-item-19076 current_page_item menu-item-19095"><a href="https://www.lirmm.fr/securite/" aria-current="page"><span class="link-before">Sécurité &amp; sureté</span></a></li> <li id="menu-item--main-desktop-21258" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-21258"><a href="https://www.lirmm.fr/intelligence-artificielle/"><span class="link-before">Axe IA et Science des données</span></a></li> <li id="menu-item--main-desktop-23478" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-23478"><a href="https://www.lirmm.fr/sciences-du-logiciel/"><span class="link-before">Sciences du logiciel</span></a></li> </ul> </li> <li id="menu-item--main-desktop-20358" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-20358"><a href="https://www.lirmm.fr/plateformes/"><span class="link-before">Plateformes<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--main-desktop-395" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-395"><a href="https://www.lirmm.fr/plateformes/plateformes-en-informatique/"><span class="link-before">Informatique</span></a></li> <li id="menu-item--main-desktop-406" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-406"><a href="https://www.lirmm.fr/plateformes/plateformes-en-microelectronique/"><span class="link-before">Microélectronique</span></a></li> <li id="menu-item--main-desktop-405" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-405"><a href="https://www.lirmm.fr/plateformes/plateforme-en-robotique/"><span class="link-before">Robotique</span></a></li> </ul> </li> <li id="menu-item--main-desktop-3101" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3101"><a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/"><span class="link-before">Publications</span></a></li> <li id="menu-item--main-desktop-214" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-214"><a href="https://www.lirmm.fr/theses-soutenues/"><span class="link-before">Thèses soutenues</span></a></li> <li id="menu-item--main-desktop-3103" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-3103"><a href="#"><span class="link-before">Projets internationaux<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--main-desktop-27057" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-27057"><a href="https://www.lirmm.fr/projets-europeens/"><span class="link-before">Europe</span></a></li> <li id="menu-item--main-desktop-228" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-228"><a href="https://www.lirmm.fr/irp-et-lia/"><span class="link-before">IRP et LIA</span></a></li> </ul> </li> <li id="menu-item--main-desktop-4229" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-4229"><a href="#"><span class="link-before">Projets nationaux<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--main-desktop-2986" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2986"><a href="https://www.lirmm.fr/programmes-dinvestissements-davenir/"><span class="link-before">PIA</span></a></li> <li id="menu-item--main-desktop-26957" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-26957"><a href="https://www.lirmm.fr/projets-anr/"><span class="link-before">Projets ANR</span></a></li> </ul> </li> <li id="menu-item--main-desktop-213" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-213"><a href="https://www.lirmm.fr/animations-scientifiques-du-lirmm/"><span class="link-before">Animations scientifiques</span></a></li> </ul> </li> <li id="menu-item--main-desktop-1033" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-1033"><a><span class="link-before">Partenariats<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--main-desktop-160" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-160"><a href="https://www.lirmm.fr/presentation-partenariats/"><span class="link-before">Présentation</span></a></li> <li id="menu-item--main-desktop-14937" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-14937"><a href="#"><span class="link-before">Actualités et séminaires<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--main-desktop-14951" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-14951"><a href="/category/partenariat/"><span class="link-before">Actualités</span></a></li> <li id="menu-item--main-desktop-18531" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-18531"><a href="https://www.lirmm.fr/seminaires-de-valorisation/"><span class="link-before">Séminaires de valorisation</span></a></li> </ul> </li> <li id="menu-item--main-desktop-5281" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-5281"><a href="https://www.lirmm.fr/domaines-dexpertise/"><span class="link-before">Domaines d’expertise</span></a></li> <li id="menu-item--main-desktop-5280" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-5280"><a href="https://www.lirmm.fr/partenariat-creation-dentreprise/"><span class="link-before">Partenariat &amp; Création d’entreprise</span></a></li> </ul> </li> <li id="menu-item--main-desktop-3035" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-3035"><a href="https://www.lirmm.fr/etudier-au-lirmm/"><span class="link-before">Étudier au LIRMM</span></a></li> <li id="menu-item--main-desktop-15881" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-15881"><a href="#"><span class="link-before">Nos engagements<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--main-desktop-19984" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-19984"><a href="https://www.lirmm.fr/green-lirmm/"><span class="link-before">Green LIRMM<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--main-desktop-22752" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22752"><a href="https://www.lirmm.fr/mobilite/"><span class="link-before">Mobilité</span></a></li> <li id="menu-item--main-desktop-22751" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22751"><a href="https://www.lirmm.fr/energie/"><span class="link-before">Énergie</span></a></li> <li id="menu-item--main-desktop-22765" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22765"><a href="https://www.lirmm.fr/numerique/"><span class="link-before">Numérique</span></a></li> <li id="menu-item--main-desktop-22790" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22790"><a href="https://www.lirmm.fr/dechets/"><span class="link-before">Déchets</span></a></li> <li id="menu-item--main-desktop-22789" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22789"><a href="https://www.lirmm.fr/evenements/"><span class="link-before">Événements</span></a></li> <li id="menu-item--main-desktop-22788" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22788"><a href="https://www.lirmm.fr/recherche/"><span class="link-before">Recherche</span></a></li> <li id="menu-item--main-desktop-22787" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22787"><a href="https://www.lirmm.fr/divers/"><span class="link-before">Divers</span></a></li> </ul> </li> <li id="menu-item--main-desktop-18412" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-18412"><a href="https://www.lirmm.fr/science-ouverte/"><span class="link-before">Science Ouverte<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--main-desktop-25253" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25253"><a href="https://www.lirmm.fr/generaliser-lacces-ouvert-aux-publications/"><span class="link-before">Généraliser l’accès ouvert aux publications scientifiques</span></a></li> <li id="menu-item--main-desktop-25254" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25254"><a href="https://www.lirmm.fr/gerer-et-partager-les-donnees-de-recherche/"><span class="link-before">Gérer et partager les données de recherche pour les rendre réutilisables</span></a></li> <li id="menu-item--main-desktop-25252" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25252"><a href="https://www.lirmm.fr/algorithmes-codes-sources-et-logiciels-libres/"><span class="link-before">Algorithmes, codes sources et logiciels libres</span></a></li> <li id="menu-item--main-desktop-25255" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25255"><a href="https://www.lirmm.fr/les-enjeux-de-la-science-ouverte/"><span class="link-before">Les enjeux de la Science Ouverte</span></a></li> </ul> </li> <li id="menu-item--main-desktop-16506" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-16506"><a href="https://www.lirmm.fr/egalite-parite/"><span class="link-before">Égalité-parité</span></a></li> </ul> </li> <li id="menu-item--main-desktop-17598" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-17598"><a href="#"><span class="link-before">Actualités<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--main-desktop-4082" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-4082"><a href="https://www.lirmm.fr/category/prix-et-recompenses/"><span class="link-before">Prix et récompenses</span></a></li> <li id="menu-item--main-desktop-4315" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-4315"><a href="https://www.lirmm.fr/category/presse/"><span class="link-before">Presse</span></a></li> <li id="menu-item--main-desktop-4316" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-4316"><a href="https://www.lirmm.fr/category/evenements/"><span class="link-before">Évènements</span></a></li> </ul> </li> <li id="menu-item--main-desktop-9418" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-9418"><a href="https://www.lirmm.fr/annuaire/"><span class="link-before">Annuaire</span></a></li> <li id="menu-item--main-desktop-14729" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-14729"><a href="https://www.lirmm.fr/contact-et-acces/"><span class="link-before">contact &#038; accès</span></a></li> <li id="menu-item--main-desktop-25679" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25679"><a href="https://www.lirmm.fr/recrutement-au-lirmm/"><span class="link-before">Emplois</span></a></li> <li id="menu-item--main-desktop-27323-en" class="lang-item lang-item-9 lang-item-en lang-item-first menu-item menu-item-type-custom menu-item-object-custom menu-item-27323-en"><a href="https://www.lirmm.fr/security-safety/" hreflang="en-GB" lang="en-GB"><span class="link-before"><img src="data:image/png;base64,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" alt="English" width="16" height="11" style="width: 16px; height: 11px;" /></span></a></li> <li id="menu-item--main-desktop-27323-fr" class="lang-item lang-item-12 lang-item-fr current-lang menu-item menu-item-type-custom menu-item-object-custom menu-item-27323-fr"><a href="https://www.lirmm.fr/securite/" hreflang="fr-FR" lang="fr-FR"><span class="link-before"><img src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAALCAMAAABBPP0LAAAAbFBMVEVzldTg4ODS0tLxDwDtAwDjAADD0uz39/fy8vL3k4nzgna4yOixwuXu7u7s6+zn5+fyd2rvcGPtZljYAABrjNCpvOHrWkxegsqfs93NAADpUUFRd8THAABBa7wnVbERRKa8vLyxsLCoqKigoKClCvcsAAAAXklEQVR4AS3JxUEAQQAEwZo13Mk/R9w5/7UERJCIGIgj5qfRJZEpPyNfCgJTjMR1eRRnJiExFJz5Mf1PokWr/UztIjRGQ3V486u0HO55m634U6dMcf0RNPfkVCTvKjO16xHA8miowAAAAABJRU5ErkJggg==" alt="Français" width="16" height="11" style="width: 16px; height: 11px;" /></span></a></li> </ul></nav></div></div><div class="col-v2 col-v2-right"><div class="item--inner builder-item--search_icon" data-section="search_icon" data-item-id="search_icon" ><div class="header-search_icon-item item--search_icon"> <a class="search-icon" href="#" aria-label="open search tool"> <span class="ic-search"> <svg aria-hidden="true" focusable="false" role="presentation" xmlns="http://www.w3.org/2000/svg" width="20" height="21" viewBox="0 0 20 21"> <path fill="currentColor" fill-rule="evenodd" d="M12.514 14.906a8.264 8.264 0 0 1-4.322 1.21C3.668 16.116 0 12.513 0 8.07 0 3.626 3.668.023 8.192.023c4.525 0 8.193 3.603 8.193 8.047 0 2.033-.769 3.89-2.035 5.307l4.999 5.552-1.775 1.597-5.06-5.62zm-4.322-.843c3.37 0 6.102-2.684 6.102-5.993 0-3.31-2.732-5.994-6.102-5.994S2.09 4.76 2.09 8.07c0 3.31 2.732 5.993 6.102 5.993z"></path> </svg> </span> <span class="ic-close"> <svg version="1.1" id="Capa_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" width="612px" height="612px" viewBox="0 0 612 612" fill="currentColor" style="enable-background:new 0 0 612 612;" xml:space="preserve"><g><g id="cross"><g><polygon points="612,36.004 576.521,0.603 306,270.608 35.478,0.603 0,36.004 270.522,306.011 0,575.997 35.478,611.397 306,341.411 576.521,611.397 612,575.997 341.459,306.011 " /></g></g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g></svg> </span> <span class="arrow-down"></span> </a> <div class="header-search-modal-wrapper"> <form role="search" class="header-search-modal header-search-form" action="https://www.lirmm.fr/"> <label> <span class="screen-reader-text">Rechercher :</span> <input type="search" class="search-field" placeholder="Recherche..." value="" name="s" title="Rechercher :" /> </label> <button type="submit" class="search-submit" aria-label="submit search"> <svg aria-hidden="true" focusable="false" role="presentation" xmlns="http://www.w3.org/2000/svg" width="20" height="21" viewBox="0 0 20 21"> <path fill="currentColor" fill-rule="evenodd" d="M12.514 14.906a8.264 8.264 0 0 1-4.322 1.21C3.668 16.116 0 12.513 0 8.07 0 3.626 3.668.023 8.192.023c4.525 0 8.193 3.603 8.193 8.047 0 2.033-.769 3.89-2.035 5.307l4.999 5.552-1.775 1.597-5.06-5.62zm-4.322-.843c3.37 0 6.102-2.684 6.102-5.993 0-3.31-2.732-5.994-6.102-5.994S2.09 4.76 2.09 8.07c0 3.31 2.732 5.993 6.102 5.993z"></path> </svg> </button> </form> </div> </div></div></div></div></div><div class="cb-row--mobile hide-on-desktop customify-grid customify-grid-middle"><div class="row-v2 row-v2-main no-left no-center"><div class="col-v2 col-v2-right"><div class="item--inner builder-item--search_icon" data-section="search_icon" data-item-id="search_icon" ><div class="header-search_icon-item item--search_icon"> <a class="search-icon" href="#" aria-label="open search tool"> <span class="ic-search"> <svg aria-hidden="true" focusable="false" role="presentation" xmlns="http://www.w3.org/2000/svg" width="20" height="21" viewBox="0 0 20 21"> <path fill="currentColor" fill-rule="evenodd" d="M12.514 14.906a8.264 8.264 0 0 1-4.322 1.21C3.668 16.116 0 12.513 0 8.07 0 3.626 3.668.023 8.192.023c4.525 0 8.193 3.603 8.193 8.047 0 2.033-.769 3.89-2.035 5.307l4.999 5.552-1.775 1.597-5.06-5.62zm-4.322-.843c3.37 0 6.102-2.684 6.102-5.993 0-3.31-2.732-5.994-6.102-5.994S2.09 4.76 2.09 8.07c0 3.31 2.732 5.993 6.102 5.993z"></path> </svg> </span> <span class="ic-close"> <svg version="1.1" id="Capa_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" width="612px" height="612px" viewBox="0 0 612 612" fill="currentColor" style="enable-background:new 0 0 612 612;" xml:space="preserve"><g><g id="cross"><g><polygon points="612,36.004 576.521,0.603 306,270.608 35.478,0.603 0,36.004 270.522,306.011 0,575.997 35.478,611.397 306,341.411 576.521,611.397 612,575.997 341.459,306.011 " /></g></g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g><g></g></svg> </span> <span class="arrow-down"></span> </a> <div class="header-search-modal-wrapper"> <form role="search" class="header-search-modal header-search-form" action="https://www.lirmm.fr/"> <label> <span class="screen-reader-text">Rechercher :</span> <input type="search" class="search-field" placeholder="Recherche..." value="" name="s" title="Rechercher :" /> </label> <button type="submit" class="search-submit" aria-label="submit search"> <svg aria-hidden="true" focusable="false" role="presentation" xmlns="http://www.w3.org/2000/svg" width="20" height="21" viewBox="0 0 20 21"> <path fill="currentColor" fill-rule="evenodd" d="M12.514 14.906a8.264 8.264 0 0 1-4.322 1.21C3.668 16.116 0 12.513 0 8.07 0 3.626 3.668.023 8.192.023c4.525 0 8.193 3.603 8.193 8.047 0 2.033-.769 3.89-2.035 5.307l4.999 5.552-1.775 1.597-5.06-5.62zm-4.322-.843c3.37 0 6.102-2.684 6.102-5.993 0-3.31-2.732-5.994-6.102-5.994S2.09 4.76 2.09 8.07c0 3.31 2.732 5.993 6.102 5.993z"></path> </svg> </button> </form> </div> </div></div></div></div></div> </div> </div> </div> <div id="header-menu-sidebar" class="header-menu-sidebar menu-sidebar-panel light-mode"><div id="header-menu-sidebar-bg" class="header-menu-sidebar-bg"><div id="header-menu-sidebar-inner" class="header-menu-sidebar-inner"><div class="builder-item-sidebar mobile-item--search_box"><div class="item--inner" data-item-id="search_box" data-section="search_box"><div class="header-search_box-item item--search_box"> <form role="search" class="header-search-form " action="https://www.lirmm.fr/"> <div class="search-form-fields"> <span class="screen-reader-text">Rechercher :</span> <input type="search" class="search-field" placeholder="Recherche..." value="" name="s" title="Rechercher :" /> </div> <button type="submit" class="search-submit" aria-label="Submit Search"> <svg aria-hidden="true" focusable="false" role="presentation" xmlns="http://www.w3.org/2000/svg" width="20" height="21" viewBox="0 0 20 21"> <path fill="currentColor" fill-rule="evenodd" d="M12.514 14.906a8.264 8.264 0 0 1-4.322 1.21C3.668 16.116 0 12.513 0 8.07 0 3.626 3.668.023 8.192.023c4.525 0 8.193 3.603 8.193 8.047 0 2.033-.769 3.89-2.035 5.307l4.999 5.552-1.775 1.597-5.06-5.62zm-4.322-.843c3.37 0 6.102-2.684 6.102-5.993 0-3.31-2.732-5.994-6.102-5.994S2.09 4.76 2.09 8.07c0 3.31 2.732 5.993 6.102 5.993z"></path> </svg> </button> </form> </div></div></div><div class="builder-item-sidebar mobile-item--primary-menu mobile-item--menu "><div class="item--inner" data-item-id="primary-menu" data-section="header_menu_primary"><nav id="site-navigation-sidebar-mobile" class="site-navigation primary-menu primary-menu-sidebar nav-menu-mobile primary-menu-mobile style-border-bottom"><ul id="menu-menu-principal" class="primary-menu-ul menu nav-menu"><li id="menu-item--sidebar-mobile-981" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-981"><a><span class="link-before">Accueil<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--sidebar-mobile-2586" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2586"><a href="https://www.lirmm.fr/presentation/"><span class="link-before">Présentation</span></a></li> <li id="menu-item--sidebar-mobile-72" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-72"><a href="https://www.lirmm.fr/organisation/"><span class="link-before">Organisation</span></a></li> <li id="menu-item--sidebar-mobile-81" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-81"><a href="https://www.lirmm.fr/historique/"><span class="link-before">Historique</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-1032" class="menu-item menu-item-type-custom menu-item-object-custom current-menu-ancestor menu-item-has-children menu-item-1032"><a><span class="link-before">Recherche<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--sidebar-mobile-2824" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-2824"><a href="#"><span class="link-before">Départements<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--sidebar-mobile-388" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-388"><a href="https://www.lirmm.fr/departement-informatique/"><span class="link-before">Informatique</span></a></li> <li id="menu-item--sidebar-mobile-433" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-433"><a href="https://www.lirmm.fr/departement-microelectronique/"><span class="link-before">Microélectronique</span></a></li> <li id="menu-item--sidebar-mobile-432" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-432"><a href="https://www.lirmm.fr/departement-robotique/"><span class="link-before">Robotique</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-15653" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-15653"><a href="https://www.lirmm.fr/equipes/"><span class="link-before">Équipes</span></a></li> <li id="menu-item--sidebar-mobile-17661" class="menu-item menu-item-type-custom menu-item-object-custom current-menu-ancestor current-menu-parent menu-item-has-children menu-item-17661"><a href="#"><span class="link-before">Axes transverses<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--sidebar-mobile-17478" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-17478"><a href="https://www.lirmm.fr/mer-ocean/"><span class="link-before">Axe transverse Mer et Océan</span></a></li> <li id="menu-item--sidebar-mobile-17848" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-17848"><a href="https://www.lirmm.fr/logique/"><span class="link-before">Logiques</span></a></li> <li id="menu-item--sidebar-mobile-19095" class="menu-item menu-item-type-post_type menu-item-object-page current-menu-item page_item page-item-19076 current_page_item menu-item-19095"><a href="https://www.lirmm.fr/securite/" aria-current="page"><span class="link-before">Sécurité &amp; sureté</span></a></li> <li id="menu-item--sidebar-mobile-21258" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-21258"><a href="https://www.lirmm.fr/intelligence-artificielle/"><span class="link-before">Axe IA et Science des données</span></a></li> <li id="menu-item--sidebar-mobile-23478" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-23478"><a href="https://www.lirmm.fr/sciences-du-logiciel/"><span class="link-before">Sciences du logiciel</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-20358" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-20358"><a href="https://www.lirmm.fr/plateformes/"><span class="link-before">Plateformes<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--sidebar-mobile-395" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-395"><a href="https://www.lirmm.fr/plateformes/plateformes-en-informatique/"><span class="link-before">Informatique</span></a></li> <li id="menu-item--sidebar-mobile-406" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-406"><a href="https://www.lirmm.fr/plateformes/plateformes-en-microelectronique/"><span class="link-before">Microélectronique</span></a></li> <li id="menu-item--sidebar-mobile-405" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-405"><a href="https://www.lirmm.fr/plateformes/plateforme-en-robotique/"><span class="link-before">Robotique</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-3101" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-3101"><a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/"><span class="link-before">Publications</span></a></li> <li id="menu-item--sidebar-mobile-214" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-214"><a href="https://www.lirmm.fr/theses-soutenues/"><span class="link-before">Thèses soutenues</span></a></li> <li id="menu-item--sidebar-mobile-3103" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-3103"><a href="#"><span class="link-before">Projets internationaux<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--sidebar-mobile-27057" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-27057"><a href="https://www.lirmm.fr/projets-europeens/"><span class="link-before">Europe</span></a></li> <li id="menu-item--sidebar-mobile-228" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-228"><a href="https://www.lirmm.fr/irp-et-lia/"><span class="link-before">IRP et LIA</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-4229" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-4229"><a href="#"><span class="link-before">Projets nationaux<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--sidebar-mobile-2986" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-2986"><a href="https://www.lirmm.fr/programmes-dinvestissements-davenir/"><span class="link-before">PIA</span></a></li> <li id="menu-item--sidebar-mobile-26957" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-26957"><a href="https://www.lirmm.fr/projets-anr/"><span class="link-before">Projets ANR</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-213" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-213"><a href="https://www.lirmm.fr/animations-scientifiques-du-lirmm/"><span class="link-before">Animations scientifiques</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-1033" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-1033"><a><span class="link-before">Partenariats<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--sidebar-mobile-160" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-160"><a href="https://www.lirmm.fr/presentation-partenariats/"><span class="link-before">Présentation</span></a></li> <li id="menu-item--sidebar-mobile-14937" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-14937"><a href="#"><span class="link-before">Actualités et séminaires<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--sidebar-mobile-14951" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-14951"><a href="/category/partenariat/"><span class="link-before">Actualités</span></a></li> <li id="menu-item--sidebar-mobile-18531" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-18531"><a href="https://www.lirmm.fr/seminaires-de-valorisation/"><span class="link-before">Séminaires de valorisation</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-5281" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-5281"><a href="https://www.lirmm.fr/domaines-dexpertise/"><span class="link-before">Domaines d’expertise</span></a></li> <li id="menu-item--sidebar-mobile-5280" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-5280"><a href="https://www.lirmm.fr/partenariat-creation-dentreprise/"><span class="link-before">Partenariat &amp; Création d’entreprise</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-3035" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-3035"><a href="https://www.lirmm.fr/etudier-au-lirmm/"><span class="link-before">Étudier au LIRMM</span></a></li> <li id="menu-item--sidebar-mobile-15881" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-15881"><a href="#"><span class="link-before">Nos engagements<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--sidebar-mobile-19984" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-19984"><a href="https://www.lirmm.fr/green-lirmm/"><span class="link-before">Green LIRMM<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--sidebar-mobile-22752" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22752"><a href="https://www.lirmm.fr/mobilite/"><span class="link-before">Mobilité</span></a></li> <li id="menu-item--sidebar-mobile-22751" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22751"><a href="https://www.lirmm.fr/energie/"><span class="link-before">Énergie</span></a></li> <li id="menu-item--sidebar-mobile-22765" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22765"><a href="https://www.lirmm.fr/numerique/"><span class="link-before">Numérique</span></a></li> <li id="menu-item--sidebar-mobile-22790" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22790"><a href="https://www.lirmm.fr/dechets/"><span class="link-before">Déchets</span></a></li> <li id="menu-item--sidebar-mobile-22789" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22789"><a href="https://www.lirmm.fr/evenements/"><span class="link-before">Événements</span></a></li> <li id="menu-item--sidebar-mobile-22788" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22788"><a href="https://www.lirmm.fr/recherche/"><span class="link-before">Recherche</span></a></li> <li id="menu-item--sidebar-mobile-22787" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-22787"><a href="https://www.lirmm.fr/divers/"><span class="link-before">Divers</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-18412" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children menu-item-18412"><a href="https://www.lirmm.fr/science-ouverte/"><span class="link-before">Science Ouverte<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-1"> <li id="menu-item--sidebar-mobile-25253" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25253"><a href="https://www.lirmm.fr/generaliser-lacces-ouvert-aux-publications/"><span class="link-before">Généraliser l’accès ouvert aux publications scientifiques</span></a></li> <li id="menu-item--sidebar-mobile-25254" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25254"><a href="https://www.lirmm.fr/gerer-et-partager-les-donnees-de-recherche/"><span class="link-before">Gérer et partager les données de recherche pour les rendre réutilisables</span></a></li> <li id="menu-item--sidebar-mobile-25252" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25252"><a href="https://www.lirmm.fr/algorithmes-codes-sources-et-logiciels-libres/"><span class="link-before">Algorithmes, codes sources et logiciels libres</span></a></li> <li id="menu-item--sidebar-mobile-25255" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25255"><a href="https://www.lirmm.fr/les-enjeux-de-la-science-ouverte/"><span class="link-before">Les enjeux de la Science Ouverte</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-16506" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-16506"><a href="https://www.lirmm.fr/egalite-parite/"><span class="link-before">Égalité-parité</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-17598" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-17598"><a href="#"><span class="link-before">Actualités<span class="nav-icon-angle">&nbsp;</span></span></a> <ul class="sub-menu sub-lv-0"> <li id="menu-item--sidebar-mobile-4082" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-4082"><a href="https://www.lirmm.fr/category/prix-et-recompenses/"><span class="link-before">Prix et récompenses</span></a></li> <li id="menu-item--sidebar-mobile-4315" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-4315"><a href="https://www.lirmm.fr/category/presse/"><span class="link-before">Presse</span></a></li> <li id="menu-item--sidebar-mobile-4316" class="menu-item menu-item-type-taxonomy menu-item-object-category menu-item-4316"><a href="https://www.lirmm.fr/category/evenements/"><span class="link-before">Évènements</span></a></li> </ul> </li> <li id="menu-item--sidebar-mobile-9418" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-9418"><a href="https://www.lirmm.fr/annuaire/"><span class="link-before">Annuaire</span></a></li> <li id="menu-item--sidebar-mobile-14729" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-14729"><a href="https://www.lirmm.fr/contact-et-acces/"><span class="link-before">contact &#038; accès</span></a></li> <li id="menu-item--sidebar-mobile-25679" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-25679"><a href="https://www.lirmm.fr/recrutement-au-lirmm/"><span class="link-before">Emplois</span></a></li> <li id="menu-item--sidebar-mobile-27323-en" class="lang-item lang-item-9 lang-item-en lang-item-first menu-item menu-item-type-custom menu-item-object-custom menu-item-27323-en"><a href="https://www.lirmm.fr/security-safety/" hreflang="en-GB" lang="en-GB"><span class="link-before"><img src="data:image/png;base64,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" alt="English" width="16" height="11" style="width: 16px; height: 11px;" /></span></a></li> <li id="menu-item--sidebar-mobile-27323-fr" class="lang-item lang-item-12 lang-item-fr current-lang menu-item menu-item-type-custom menu-item-object-custom menu-item-27323-fr"><a href="https://www.lirmm.fr/securite/" hreflang="fr-FR" lang="fr-FR"><span class="link-before"><img src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAALCAMAAABBPP0LAAAAbFBMVEVzldTg4ODS0tLxDwDtAwDjAADD0uz39/fy8vL3k4nzgna4yOixwuXu7u7s6+zn5+fyd2rvcGPtZljYAABrjNCpvOHrWkxegsqfs93NAADpUUFRd8THAABBa7wnVbERRKa8vLyxsLCoqKigoKClCvcsAAAAXklEQVR4AS3JxUEAQQAEwZo13Mk/R9w5/7UERJCIGIgj5qfRJZEpPyNfCgJTjMR1eRRnJiExFJz5Mf1PokWr/UztIjRGQ3V486u0HO55m634U6dMcf0RNPfkVCTvKjO16xHA8miowAAAAABJRU5ErkJggg==" alt="Français" width="16" height="11" style="width: 16px; height: 11px;" /></span></a></li> </ul></nav></div></div><div class="builder-item-sidebar mobile-item--social-icons"><div class="item--inner" data-item-id="social-icons" data-section="header_social_icons"></div></div><div class="builder-item-sidebar mobile-item--button"><div class="item--inner" data-item-id="button" data-section="header_button"><a href="" class="item--button customify-btn customify-builder-btn is-icon-before"><i class="fa fa-book"></i> ANNUAIRE</a></div></div></div></div></div></div></header> <div id="page-titlebar" class="page-header--item page-titlebar "> <div class="page-titlebar-inner customify-container"> <h1 class="titlebar-title h4">Sécurité &amp; sureté</h1> </div> </div> <div id="site-content" class="site-content"> <div class="customify-container"> <div class="customify-grid"> <main id="main" class="content-area customify-col-9_sm-12"> <div data-elementor-type="wp-page" data-elementor-id="19076" class="elementor elementor-19076" data-elementor-post-type="page"> <section class="elementor-section elementor-top-section elementor-element elementor-element-1f7bf0b elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="1f7bf0b" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f47d401" data-id="f47d401" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-f4ec323 elementor-widget elementor-widget-testimonial" data-id="f4ec323" data-element_type="widget" data-widget_type="testimonial.default"> <div class="elementor-widget-container"> <div class="elementor-testimonial-wrapper"> <div class="elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-aside"> <div class="elementor-testimonial-meta-inner"> <div class="elementor-testimonial-image"> <a href="mailto:philippe.maurine@lirmm.fr" target="_blank"><img decoding="async" width="128" height="128" src="https://www.lirmm.fr/wp-content/uploads/sites/3/2020/10/LIRMM_Philippe_Maurine.jpg" class="attachment-full size-full wp-image-2988" alt="" /></a> </div> <div class="elementor-testimonial-details"> <a class="elementor-testimonial-name" href="mailto:philippe.maurine@lirmm.fr" target="_blank">Philippe MAURINE</a> <a class="elementor-testimonial-job" href="mailto:philippe.maurine@lirmm.fr" target="_blank">Animateur</a> </div> </div> </div> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-348e8e6" data-id="348e8e6" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-079b7b0 elementor-widget elementor-widget-testimonial" data-id="079b7b0" data-element_type="widget" data-widget_type="testimonial.default"> <div class="elementor-widget-container"> <div class="elementor-testimonial-wrapper"> <div class="elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-aside"> <div class="elementor-testimonial-meta-inner"> <div class="elementor-testimonial-image"> <a href="mailto:fabien.laguillaumie@lirmm.fr" target="_blank"><img loading="lazy" decoding="async" width="491" height="407" src="https://www.lirmm.fr/wp-content/uploads/sites/3/2020/12/Cyril_Bouvier_LIRMM.jpg" class="attachment-full size-full wp-image-6817" alt="" srcset="https://www.lirmm.fr/wp-content/uploads/sites/3/2020/12/Cyril_Bouvier_LIRMM.jpg 491w, https://www.lirmm.fr/wp-content/uploads/sites/3/2020/12/Cyril_Bouvier_LIRMM-300x249.jpg 300w" sizes="(max-width: 491px) 100vw, 491px" /></a> </div> <div class="elementor-testimonial-details"> <a class="elementor-testimonial-name" href="mailto:fabien.laguillaumie@lirmm.fr" target="_blank">Fabien LAGUILLAUMIE</a> <a class="elementor-testimonial-job" href="mailto:fabien.laguillaumie@lirmm.fr" target="_blank">Animateur</a> </div> </div> </div> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-56f26df elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="56f26df" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-167bb17" data-id="167bb17" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-56528cb elementor-widget elementor-widget-text-editor" data-id="56528cb" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <h4 style="text-align: justify"><span style="color: #ff6600">Présentation</span></h4><p style="text-align: justify">La massification des données échangées, l&rsquo;hétérogénéité des supports de stockage et de traitement et la diversification des usages induits par ces données ont déclenché ces dernières années une multiplication des attaques logicielles et matérielles, touchant tout type de support : objets connectés déployés dans les domiciles et l&rsquo;environnement professionnel, systèmes et infrastructures critiques, données personnelles,&#8230; Face à  cette situation, la cybersécurité est devenue un enjeu majeur pour protéger les citoyens et les entreprises.</p><p style="text-align: justify">Les activités des chercheurs du LIRMM touchent à tous les aspects de la cybersécurité : des aspects informatiques aux aspects matériels. Elles s&rsquo;incrivent au niveau national dans le cadre des GDR sécurité, IM, ISIS et SoC² et au niveau régional dans celui du récent Institut de Cybersécurité de l&rsquo;Occitanie. Elles donnent lieu à de nombreuses collaborations académiques internationales et industrielles. Les innovations du LIRMM ont d&rsquo;ailleurs conduits à la création de deux entreprises : Algodone, NinjaLab.</p> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-5b68eab elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5b68eab" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0cafe66" data-id="0cafe66" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-cda3247 elementor-widget elementor-widget-text-editor" data-id="cda3247" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <h4 style="text-align: justify"><span style="color: #ff6600">Thèmes et axes d&rsquo;activités<br /></span></h4><ul><li style="text-align: justify">Données multimédias : crypto-compression d&rsquo;images, sécurisation de maillages 3D, insertion de données cachées dans le domaine chiffré, stéganographie</li><li style="text-align: justify">Cryptographie et ses fondements algorithmiques : conception de protocoles cryptographiques avancés, arithmétique algorithmique, algorithmes de factorisation et de logarithme discret</li><li style="text-align: justify">Cryptographie post quantique : conception de systèmes post-quantiques, fondements mathématiques des objets sous-jacents, intégration et attaques matérielles d&rsquo;implémentations d&rsquo;algorithmes post-quantiques.</li><li style="text-align: justify">Protection de la vie privée : anonymat, confidentialité différentielle, gestion des données anonymes</li><li style="text-align: justify">Protocoles sécurisés de calculs distribués : cryptographie distribuée, blockchain, calcul sécurisé sur les bases de données</li><li style="text-align: justify">Interface matériel-logiciel : corruption mémoire, code-reuse, injection de code</li><li style="text-align: justify">Attaques et contremesures matérielles : attaques par canaux cachés, par injection de fautes, micro-architecturales (cache-based attacks, rowhammer et dispositifs de test intégré)</li><li style="text-align: justify">Intégrité et authenticité des systèmes intégrés: prévention et détection de chevaux de troie matériels, de surproduction, protection et authentification d&rsquo;IPs.</li><li style="text-align: justify">Conception matérielle pour la sécurité: processeurs, accélérateurs, contre-mesures.</li><li style="text-align: justify">Sûreté : sûreté logicielle, sûreté de fonctionnement, méthodes formelles, tolérance aux fautes à divers domaines applicatifs (robotique, systèmes embarqués, &#8230;)</li></ul> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-031d70a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="031d70a" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-824a496" data-id="824a496" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-77119e3 elementor-widget elementor-widget-toggle" data-id="77119e3" data-element_type="widget" data-widget_type="toggle.default"> <div class="elementor-widget-container"> <div class="elementor-toggle"> <div class="elementor-toggle-item"> <div id="elementor-tab-title-1241" class="elementor-tab-title" data-tab="1" role="button" aria-controls="elementor-tab-content-1241" aria-expanded="false"> <span class="elementor-toggle-icon elementor-toggle-icon-left" aria-hidden="true"> <span class="elementor-toggle-icon-closed"><i class="fas fa-caret-right"></i></span> <span class="elementor-toggle-icon-opened"><i class="elementor-toggle-icon-opened fas fa-caret-up"></i></span> </span> <a class="elementor-toggle-title" tabindex="0">Permanents impliqués</a> </div> <div id="elementor-tab-content-1241" class="elementor-tab-content elementor-clearfix" data-tab="1" role="region" aria-labelledby="elementor-tab-title-1241"><ul><li>R. Akbarinia (Zenith)</li><li>P. Benoit (ADAC)</li><li>C. Bouvier (STI-AR)</li><li>F. Bruguier (ADAC)</li><li>A. Casteltort (WEBCUBE)</li><li>D. Crestani (EXPLORE)</li><li>D. Delahaye (MAREL)</li><li>M. Chaumont (ICAR)</li><li>S. Dupuis (TEST)</li><li>M. L. Flottes (TEST)</li><li>J.-M. Gallière (SmartIES)</li><li>P. Giorgi (ECO)</li><li>K. Godary-Dejean (EXPLORE)</li><li>B. Grenet (ECO)</li><li>E. Guerrini (ECO)</li><li>L. Imbert (ECO)</li><li>F. Laguillaumie (ECO)</li><li>R. Lebreton (ECO)</li><li>A. Laurent (WEBCUBE)</li><li>P. Maurine (SmartIES)</li><li>C. Negre (DALI)</li><li>W. Puech (ICAR)</li><li>A. Romanchenko (ESCAPE)</li><li>B. Rouzeyre (TEST)</li><li>L. Torres (ADAC)</li><li>V. Zucca (DALI)</li><li>T. Roche (NinjaLab)</li><li>V. Lomné (NinjaLab)</li></ul></div> </div> <div class="elementor-toggle-item"> <div id="elementor-tab-title-1242" class="elementor-tab-title" data-tab="2" role="button" aria-controls="elementor-tab-content-1242" aria-expanded="false"> <span class="elementor-toggle-icon elementor-toggle-icon-left" aria-hidden="true"> <span class="elementor-toggle-icon-closed"><i class="fas fa-caret-right"></i></span> <span class="elementor-toggle-icon-opened"><i class="elementor-toggle-icon-opened fas fa-caret-up"></i></span> </span> <a class="elementor-toggle-title" tabindex="0">Animation scientifique</a> </div> <div id="elementor-tab-content-1242" class="elementor-tab-content elementor-clearfix" data-tab="2" role="region" aria-labelledby="elementor-tab-title-1242"><ul> <li>Séminaire ECO de Mahshid Riahinia (École normale supérieure, CNRS) : « Fast Public-Key Silent OT and More from Constrained Naor-Reingold » – Mardi 19 novembre 2024</li><li>Séminaire ECO de Anaïs Barthoulot (LIRMM) : « Adapting Identity-based Encryption with Wildcards to Access Control » – Mardi 1 octobre 2024</li><li>Séminaire ECO de&nbsp; Gabrielle Beck (Johns Hopkins University) : « Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline-Finding Ecosystem » – Mardi 17 septembre 2024</li><li>Séminaire ECO de Loïc Masure (LIRMM, CNRS) : « Computing over masked data with provable security » – Mardi 3 septembre 2024</li><li>Séminaire ECO de Anamaria Costache (Norwegian University of Science and Technology) : « On the security of approximate homomorphic encryption » – Mercredi 10 juillet 2024</li><li>Séminaire ECO de Bastien Vialla (Orange) : « FHE &amp; AI: a Concrete Use-Case » – Mercredi 3 juillet 2024<br></li><li>Séminaire ECO de Rishiraj Bhattacharyya (University of Birmingham) : « Group Signature with Helper » – Mardi 2 juillet 2024<br></li><li>Séminaire ECO de Aurore Guillevic (Loria) : « More Embedded Curves for SNARK-Pairing-Friendly Curves » – Jeudi 6 juin 2024<br></li><li>Séminaire ECO de Cyrius Nugier (ENAC) : « Cryptographie basée sur les codes accélérée par le calcul en mémoire » – Mercredi 22 mai 2024<br></li><li>Séminaire ECO de Malika Izabachène (École Polytechnique) : « Plug-and-play sanitization for TFHE » – Vendredi 5 avril 2024</li><li>Séminaire ECO de Lennart Braun (Aarhus University) : « Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures From VOLE-in-the-Head » – Mercredi 20 mars 2024</li> <li>Séminaire ECO de Clémence Bouvier (Universität Bochum) : « On thenew generation of symmetric primitives: the AOP (Arithmetization-Oriented Primitives) » – Vendredi 15 mars 2024</li> <li>Séminaire ECO de Mark Simkin (Ethereum Foundation) : « How to Compress Encrypted Data » – Mercredi 13 mars 2024</li> <li>Séminaire ECO de Florette Martinez (LIP6) : « Discussion autour du Knapsack Generator » – Lundi 5 février 2024</li> <li>Séminaire ECO de Pierre Briaud (Simula UiB) : « Variants of the Decoding Problem and algebraic cryptanalysis » – Lundi 29 janvier 2024</li> <li>Séminaire ECO de Lucas Ottow (LIRMM) : « Secure Computations on Shared Polynomials and Application to Private Set Operations » – Mardi 12 décembre 2023</li> <li>Séminaire ECO/Escape de Laurent Imbert (CNRS, LIRMM) : « Masking Kyber Compression » – Mercredi 17 mai 2023</li> <li>Séminaire ECO/Escape de Maxime Bombar (LIX) : « Correlated Pseudorandomness from the Hardness of Decoding Quasi-Abelian Codes» – Mercredi 19 avril 2023</li> <li>Séminaire ECO/Escape de Anaïs Barthoulot (Orange) : « Cryptographic Accumulators » – Vendredi 14 avril 2023</li> <li>Séminaire ECO/Escape de Léo Robert (Université Clermont Auvergne) : « How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. » – Mercredi 22 mars 2023</li> <li>Séminaire ECO/Escape de Clementine Gritti (University of Canterbury) : « Internet of Things: From modern cryptography to post-quantum cryptography » – Vendredi 17 mars 2023</li> <li>Séminaire ECO/Escape de Nicolas Aragon (NAQUIDIS Center) : « LRPC codes with multiple syndromes: near ideal-size KEMs without ideals» – Vendredi 17 février 2023</li> <li>Séminaire ECO/Escape de Andrea Lesavourey, (Irisa) : « Log-S-unit lattices using Explicit Stickelberger Generators to solve Approx Ideal-SVP » – vendredi 3 février 2023</li> <li>Séminaire ECO/Escape de Cyril Bouvier (CNRS, LIRMM) : « How to compute with imaginary quadratic forms ? » – mercredi 14 décembre 2022</li> <li>Séminaire ECO/Escape de Carles Padro (Universitat Politècnica de Catalunya) : « Information Inequalities and Representations of Matroids » – vendredi 9 décembre 2022</li> <li>Séminaire ECO/Escape de Michela Ceria (Università degli Studi di Bari) : « Some hypersurfaces over finite fields, minimal codes and secret sharing schemes » – vendredi 18 novembre 2022</li> <li>Séminaire ECO/ESCAPE de Maxime Bros (Université de Limoges) : « RQC revisited and more cryptanalysis for Rank-based Cryptography » – Mercredi 19 octobre 2022</li> <li>Séminaire ECO/ESCAPE de Katharina Boudgoust (Aarhus University) : « Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem » – Mercredi 12 octobre 2022</li> <li>Séminaire ECO/ESCAPE de Dan Roche (United States Naval Academy) : « Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS) » – Mercredi 13 juillet 2022</li> <li>Séminaire ECO/ESCAPE de Carla Mascia (Università di Trento) : « Commutative algebra applied to coding theory and cryptography » – Lundi 11 juillet 2022</li> <li>Séminaire de Valence Cristiani (CEA) &nbsp;«Fit The Joint Moments ! &nbsp;A Generic Unsupervised Side-Channel Attack Against any Masking Scheme at any Order » – &nbsp;Mercredi 15 juin 2022</li> <li>Séminaire ECO/ESCAPE de Grigory Solomatov (Tel Aviv University) : « Fast list decoding of algebraic geometry codes » &#8211; Mercredi 27 avril 2022</li> <li>Séminaire ECO/ESCAPE de Gabrielle De Micheli (University of California, San Diego) : « Énumération de réseaux pour Tower NFS : un calcul de logarithme discret de 521 bits » &#8211; Jeudi 21 avril 2022</li> <li>Séminaire ECO/ESCAPE de Julien Lavauzelle (Université Paris 8, LAGA) « Private Information Retrieval with a coding-theoretic perspective » – Mercredi 23 mars 2022</li> <li>Journée Cybersécurité du 26 novembre 2021</li> <li>Séminaire ECO/ESCAPE d&rsquo;Alice Pellet-Mary (CNRS, IMB) « On the hardness of the NTRU problem » &#8211; Mercredi 15 décembre 2021</li> <li>Séminaire ECO/ESCAPE de Laurent Imbert, LIRMM, CNRS, Université de Montpellier « An Alternative Approach for SIDH Arithmetic » &#8211; Mercredi 19 mai 2021</li> <li>Séminaire ECO/ESCAPE de Cyril Bouvier, LIRMM, CNRS, Université de Montpellier « Introduction to Isogeny-Based Cryptography » &#8211; Mercredi 12 mai 2021</li> </ul> <div>&nbsp;</div> <div>&nbsp;</div></div> </div> <div class="elementor-toggle-item"> <div id="elementor-tab-title-1243" class="elementor-tab-title" data-tab="3" role="button" aria-controls="elementor-tab-content-1243" aria-expanded="false"> <span class="elementor-toggle-icon elementor-toggle-icon-left" aria-hidden="true"> <span class="elementor-toggle-icon-closed"><i class="fas fa-caret-right"></i></span> <span class="elementor-toggle-icon-opened"><i class="elementor-toggle-icon-opened fas fa-caret-up"></i></span> </span> <a class="elementor-toggle-title" tabindex="0">Publications</a> </div> <div id="elementor-tab-content-1243" class="elementor-tab-content elementor-clearfix" data-tab="3" role="region" aria-labelledby="elementor-tab-title-1243"><p><a href="https://hal-lirmm.ccsd.cnrs.fr/AXESECULIRMM/" target="_blank" rel="noopener">Collection HAL Sécurité &amp; Sûreté</a></p></div> </div> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-5512cd1 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5512cd1" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-089d1ac" data-id="089d1ac" data-element_type="column"> <div class="elementor-widget-wrap"> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-fd4fa77 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="fd4fa77" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aeb2129" data-id="aeb2129" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-5998b9a elementor-widget elementor-widget-shortcode" data-id="5998b9a" data-element_type="widget" data-widget_type="shortcode.default"> <div class="elementor-widget-container"> <div class="elementor-shortcode"><div id="wphal-content"><ul id="wphal-menu"><li><a href="#publications" onclick="displayElem('publications'); return false;" style="font-size:18px;text-decoration: none">Publications</a></li><li><a href="#filtres" onclick="return false;" style="font-size:18px;text-decoration: none;cursor:default">Métadonnées</a><ul id="wphal-filtres"><li><a href="#keywords" onclick="displayElem('wphal-keywords'); return false;" style="margin:1px;text-decoration: none">Mots-clefs</a></li><li><a href="#auteurs" onclick="displayElem('wphal-auteurs'); return false;" style="margin:1px;text-decoration: none">Auteurs</a></li><li><a href="#revues" onclick="displayElem('wphal-revues'); return false;" style="margin:1px;text-decoration: none">Revues</a></li><li><a href="#annees" onclick="displayElem('wphal-annees'); return false;" style="margin:1px;text-decoration: none">Année de production</a></li><li><a href="#labs" onclick="displayElem('wphal-labs'); return false;" style="margin:1px;text-decoration: none">Laboratoires</a></li><li><a href="#depts" onclick="displayElem('wphal-depts'); return false;" style="margin:1px;text-decoration: none">Départements</a></li><li><a href="#equipes" onclick="displayElem('wphal-equipes'); return false;" style="margin:1px;text-decoration: none">Équipes de recherche</a></li></ul></li></ul><br /><hr><div id="meta"> <div class="display" id="wphal-contact" style="display: none"> <h3 class="wphal-titre">Contact</h3> <ul id="wphal-cont" style="list-style-type: none"></ul> </div> <div class="display" id="wphal-disciplines" style="display: none"> <h3 class="wphal-titre">Disciplines</h3></div> <div class="display" id="wphal-keywords" style="display: none"> <h3 class="wphal-titre">Mots-clefs</h3><div id="wphal-keys"><a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22Countermeasures%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Countermeasures</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22Cryptographie%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cryptographie</a>&nbsp;<a style="display: inline-block;font-size:22px" href="https://hal.science/search/index/?q=keyword_s:%22Cryptography%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cryptography</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22Deep+Learning%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Deep Learning</a>&nbsp;<a style="display: inline-block;font-size:14px" href="https://hal.science/search/index/?q=keyword_s:%22FPGA%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">FPGA</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22Fault+Injection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault Injection</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22Fault+attacks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault attacks</a>&nbsp;<a style="display: inline-block;font-size:14px" href="https://hal.science/search/index/?q=keyword_s:%22Fault+injection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault injection</a>&nbsp;<a style="display: inline-block;font-size:25px" href="https://hal.science/search/index/?q=keyword_s:%22Hardware+security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hardware security</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22Multimedia+security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Multimedia security</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22RSA%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">RSA</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22Reliability%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Reliability</a>&nbsp;<a style="display: inline-block;font-size:25px" href="https://hal.science/search/index/?q=keyword_s:%22Security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Security</a>&nbsp;<a style="display: inline-block;font-size:14px" href="https://hal.science/search/index/?q=keyword_s:%22Side-channel+attacks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Side-channel attacks</a>&nbsp;<a style="display: inline-block;font-size:16px" href="https://hal.science/search/index/?q=keyword_s:%22Steganalysis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Steganalysis</a>&nbsp;<a style="display: inline-block;font-size:14px" href="https://hal.science/search/index/?q=keyword_s:%22Steganography%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Steganography</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22St%C3%A9ganalyse%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Stéganalyse</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22St%C3%A9ganographie%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Stéganographie</a>&nbsp;<a style="display: inline-block;font-size:15px" href="https://hal.science/search/index/?q=keyword_s:%22S%C3%A9curit%C3%A9%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Sécurité</a>&nbsp;<a style="display: inline-block;font-size:13px" href="https://hal.science/search/index/?q=keyword_s:%22Watermarking%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Watermarking</a>&nbsp;</div><div id="keysuite" style="display:none"><span id="trikeywords"><button type="button" class="trial" id="trikey" onclick="toggleSort(this, true, 'wphal-keyw', 'wphal-keyword', 'trikey'); return false;" style="font-size:16px;text-decoration: none">Tri Alphabétique</button><button type="button" class="trioc" id="trinbkey" onclick="toggleSort(this, false, 'wphal-keyw', 'wphal-keyword', 'trinbkey'); return false;" style="font-size:16px;text-decoration: none">Tri Occurrence</button></span><ul class="wphal-keyword"><div id="wphal-keyw"><li class="metadata" data-percentage="45"><a href="https://hal.science/search/index/?q=keyword_s:%22Hardware+security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hardware security</a><span class="wphal-nbmetadata">45</span></li><li class="metadata" data-percentage="44"><a href="https://hal.science/search/index/?q=keyword_s:%22Security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Security</a><span class="wphal-nbmetadata">44</span></li><li class="metadata" data-percentage="35"><a href="https://hal.science/search/index/?q=keyword_s:%22Cryptography%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cryptography</a><span class="wphal-nbmetadata">35</span></li><li class="metadata" data-percentage="18"><a href="https://hal.science/search/index/?q=keyword_s:%22Steganalysis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Steganalysis</a><span class="wphal-nbmetadata">18</span></li><li class="metadata" data-percentage="15"><a href="https://hal.science/search/index/?q=keyword_s:%22S%C3%A9curit%C3%A9%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Sécurité</a><span class="wphal-nbmetadata">15</span></li><li class="metadata" data-percentage="12"><a href="https://hal.science/search/index/?q=keyword_s:%22Fault+injection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault injection</a><span class="wphal-nbmetadata">12</span></li><li class="metadata" data-percentage="12"><a href="https://hal.science/search/index/?q=keyword_s:%22Side-channel+attacks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Side-channel attacks</a><span class="wphal-nbmetadata">12</span></li><li class="metadata" data-percentage="12"><a href="https://hal.science/search/index/?q=keyword_s:%22Steganography%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Steganography</a><span class="wphal-nbmetadata">12</span></li><li class="metadata" data-percentage="11"><a href="https://hal.science/search/index/?q=keyword_s:%22FPGA%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">FPGA</a><span class="wphal-nbmetadata">11</span></li><li class="metadata" data-percentage="10"><a href="https://hal.science/search/index/?q=keyword_s:%22Cryptographie%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cryptographie</a><span class="wphal-nbmetadata">10</span></li><li class="metadata" data-percentage="10"><a href="https://hal.science/search/index/?q=keyword_s:%22Deep+Learning%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Deep Learning</a><span class="wphal-nbmetadata">10</span></li><li class="metadata" data-percentage="10"><a href="https://hal.science/search/index/?q=keyword_s:%22Fault+attacks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault attacks</a><span class="wphal-nbmetadata">10</span></li><li class="metadata" data-percentage="9"><a href="https://hal.science/search/index/?q=keyword_s:%22Countermeasures%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Countermeasures</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="9"><a href="https://hal.science/search/index/?q=keyword_s:%22Watermarking%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Watermarking</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="8"><a href="https://hal.science/search/index/?q=keyword_s:%22Fault+Injection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault Injection</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="8"><a href="https://hal.science/search/index/?q=keyword_s:%22Multimedia+security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Multimedia security</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="8"><a href="https://hal.science/search/index/?q=keyword_s:%22RSA%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">RSA</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="8"><a href="https://hal.science/search/index/?q=keyword_s:%22Reliability%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Reliability</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="8"><a href="https://hal.science/search/index/?q=keyword_s:%22St%C3%A9ganalyse%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Stéganalyse</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="8"><a href="https://hal.science/search/index/?q=keyword_s:%22St%C3%A9ganographie%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Stéganographie</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="7"><a href="https://hal.science/search/index/?q=keyword_s:%22Hardware%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hardware</a><span class="wphal-nbmetadata">7</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=keyword_s:%22Binary+field%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Binary field</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=keyword_s:%22Data+hiding%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Data hiding</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=keyword_s:%22Fault+tolerance%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault tolerance</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=keyword_s:%22Hardware+Security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hardware Security</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=keyword_s:%22Image+encryption%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Image encryption</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=keyword_s:%22Integrated+circuits%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Integrated circuits</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=keyword_s:%22JPEG2000%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">JPEG2000</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=keyword_s:%22Privacy%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Privacy</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=keyword_s:%22Binary+polynomial+multiplication%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Binary polynomial multiplication</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=keyword_s:%22Computer+arithmetic%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Computer arithmetic</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=keyword_s:%22Deep+learning%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Deep learning</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=keyword_s:%22Modular+exponentiation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Modular exponentiation</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=keyword_s:%22Scalar+multiplication%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Scalar multiplication</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=keyword_s:%22Side+channel+attacks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Side channel attacks</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=keyword_s:%22Side-channel+analysis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Side-channel analysis</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=keyword_s:%22TCQ%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">TCQ</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22AES%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">AES</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Differential+privacy%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Differential privacy</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22EM+fault+injection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">EM fault injection</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Elliptic+curve+cryptography%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Elliptic curve cryptography</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Encryption%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Encryption</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Insertion+de+donn%C3%A9es+cach%C3%A9es%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Insertion de données cachées</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Machine+learning%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Machine learning</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Rowhammer%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Rowhammer</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Side+Channel+Attacks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Side Channel Attacks</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Signal+processing+in+the+encrypted+domain%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Signal processing in the encrypted domain</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Soft+errors%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Soft errors</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Test%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Test</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=keyword_s:%22Test+and+Security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Test and Security</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%223D+object%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">3D object</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Attacks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Attacks</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Block+recombination%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Block recombination</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Blockchain%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Blockchain</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22CADO-NFS%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">CADO-NFS</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Circuit+faults%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Circuit faults</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Circuits+int%C3%A9gr%C3%A9s%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Circuits intégrés</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Clustering%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Clustering</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Cofactorization%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cofactorization</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Context+saving%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Context saving</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Convolutional+Neural+Network%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Convolutional Neural Network</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Covering+systems+of+congruences%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Covering systems of congruences</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22DRAM%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">DRAM</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Dependability%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dependability</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Design-for-Trust%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Design-for-Trust</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Detectability+map%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Detectability map</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Detection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Detection</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Differential+Power+Analysis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Differential Power Analysis</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Differential+power+analysis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Differential power analysis</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Double-base+representation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Double-base representation</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Education%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Education</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Efficient+arithmetic%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Efficient arithmetic</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Electromagnetic+Analysis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Electromagnetic Analysis</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Elliptic+curve+method%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Elliptic curve method</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Elliptic+curves%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Elliptic curves</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Ensemble+classifiers%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ensemble classifiers</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Fault+Attack%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault Attack</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Fault+model%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault model</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Finite+field%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Finite field</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Gossip%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Gossip</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22H264%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">H264</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22IoT%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">IoT</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22K-means%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">K-means</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Laser%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laser</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Laser+fault+injection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laser fault injection</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Logic+Locking%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Logic Locking</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Logic+locking%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Logic locking</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Montgomery+curve%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Montgomery curve</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Mutual+information%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Mutual information</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Neural+networks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Neural networks</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Oracle%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Oracle</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Overproduction%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Overproduction</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Polynomial+Modular+Number+System%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Polynomial Modular Number System</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22RNS%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">RNS</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Randomization%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Randomization</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Randomized+algorithms%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Randomized algorithms</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Reversible+data+hiding%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Reversible data hiding</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Robustness%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Robustness</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Rotation-based+embedding%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Rotation-based embedding</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Scan+Encryption%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Scan Encryption</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Side+channel+analysis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Side channel analysis</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Simulation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Simulation</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Software%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Software</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Supersingular+isogeny+Diffie-Hellman%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Supersingular isogeny Diffie-Hellman</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22S%C3%A9curit%C3%A9+mat%C3%A9rielle%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Sécurité matérielle</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Tatouage%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Tatouage</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Time-series%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Time-series</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Toeplitz+matrix%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Toeplitz matrix</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Trust%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Trust</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=keyword_s:%22Twisted+Edwards+curve%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Twisted Edwards curve</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%223D+Object%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">3D Object</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%223D+selective+encryption%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">3D selective encryption</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22AMNS%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">AMNS</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Active+video+fingerprinting%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Active video fingerprinting</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Addition+Chains%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Addition Chains</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Analysis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Analysis</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Apprentissage+profond%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Apprentissage profond</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Approximate+computing%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Approximate computing</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Arithmetic%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Arithmetic</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Arithmetic+operator%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Arithmetic operator</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Arithm%C3%A9tique+des+corps+finis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Arithmétique des corps finis</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Arithm%C3%A9tique+des+ordinateurs%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Arithmétique des ordinateurs</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Attaques%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Attaques</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Authentication%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Authentication</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Automatic+write-back%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Automatic write-back</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Built-in+current+sensors%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Built-in current sensors</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22CNN%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">CNN</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Caches%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Caches</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Carte+de+d%C3%A9tectabilit%C3%A9%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Carte de détectabilité</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Channel+correlation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Channel correlation</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Clocks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Clocks</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Cloud%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cloud</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Co-occurrences%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Co-occurrences</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Computational+modeling%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Computational modeling</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Computer+architecture%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Computer architecture</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Concurrent+detection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Concurrent detection</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Content+Protection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Content Protection</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Controlled+development%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Controlled development</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Correlation+power+analysis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Correlation power analysis</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Cover-Source+Mismatch%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cover-Source Mismatch</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Cryptosystem%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cryptosystem</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22DES%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">DES</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22DPA%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">DPA</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Data+Security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Data Security</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Decentralized+network%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Decentralized network</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Digital+Signature%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Digital Signature</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Dirty+Paper+Trellis+Code%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dirty Paper Trellis Code</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Dirty+Paper+Trellis+Codes%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dirty Paper Trellis Codes</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Double-base+number+system%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Double-base number system</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22ECC%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">ECC</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22EM+injection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">EM injection</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22EM+susceptibility%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">EM susceptibility</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Efficient+Software+Implementation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Efficient Software Implementation</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Elliptic+Curves%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Elliptic Curves</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Elliptic+curve%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Elliptic curve</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Ensemble+de+classifieurs%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ensemble de classifieurs</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Fault%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Fault+Attacks%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault Attacks</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Fault+detection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fault detection</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Fiabilit%C3%A9%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fiabilité</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22GAN%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">GAN</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Gem5%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Gem5</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22H264%2FAVC%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">H264/AVC</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Hardware+Trojan%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hardware Trojan</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Hardware+Trojans%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hardware Trojans</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Hardware+security+implementation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hardware security implementation</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Hardware+trojans%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hardware trojans</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Hiding%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hiding</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22High+rate%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">High rate</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Homomorphic+encryption%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Homomorphic encryption</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Horner+scheme%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Horner scheme</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22IP+protection%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">IP protection</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Identity+Based+Cryptography%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Identity Based Cryptography</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Image+security%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Image security</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Injection+de+fautes%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Injection de fautes</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Integrated+circuit+modeling%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Integrated circuit modeling</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Internet+des+Objets%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Internet des Objets</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Internet+of+Things%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Internet of Things</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Interpolation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Interpolation</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22JPEG%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">JPEG</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22JTAG%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">JTAG</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Joint+watermarking+and+video+compression%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Joint watermarking and video compression</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Karatsuba%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Karatsuba</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Linearly+homomorphic+encryption%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Linearly homomorphic encryption</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Logic+style%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Logic style</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22MSB+prediction%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">MSB prediction</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Machine+Learning%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Machine Learning</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Masking%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Masking</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Memory+Storage%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Memory Storage</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Microarchitecture%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Microarchitecture</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Microcontrollers%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Microcontrollers</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Million+images%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Million images</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Mitigation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Mitigation</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Mixed-radix+number+system%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Mixed-radix number system</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Modular+Exponentiation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Modular Exponentiation</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Modular+multiplication%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Modular multiplication</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Multi-party+computation%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Multi-party computation</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Multimedia+data%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Multimedia data</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Multiplication+scalaire%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Multiplication scalaire</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=keyword_s:%22Needles%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Needles</a><span class="wphal-nbmetadata">2</span></li></div></ul></div><button type="button" style="text-decoration: none" id="wphal-key" onclick="visibilitekey('wphal-keys','keysuite', 'trikeywords'); return false;">Liste complète</button></div> <div class="display" id="wphal-auteurs" style="display: none"> <h3 class="wphal-titre">Auteurs</h3><span id="triauteurs"><button type="button" class="trial" id="triaut" onclick="toggleSort(this, true, 'wphal-aut', 'auteursuite', 'triaut'); return false;" style="font-size:16px;text-decoration: none">Tri Alphabétique</button><button type="button" class="trioc" id="trinbaut" onclick="toggleSort(this, false, 'wphal-aut', 'auteursuite', 'trinbaut'); return false;" style="font-size:16px;text-decoration: none">Tri Occurrence</button></span><ul class="wphal-auteurs" style="list-style-type: none"><div id="wphal-aut"><li class="metadata" data-percentage="58"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:9890+AND+collCode_s:(AXESECULIRMM)" target="_blank">Chaumont Marc</a><span class="wphal-nbmetadata">58</span></li><li class="metadata" data-percentage="49"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:22073+AND+collCode_s:(AXESECULIRMM)" target="_blank">Maurine Philippe</a><span class="wphal-nbmetadata">49</span></li><li class="metadata" data-percentage="46"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:6353+AND+collCode_s:(AXESECULIRMM)" target="_blank">Puech William</a><span class="wphal-nbmetadata">46</span></li><li class="metadata" data-percentage="33"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:9897+AND+collCode_s:(AXESECULIRMM)" target="_blank">Di Natale Giorgio</a><span class="wphal-nbmetadata">33</span></li><li class="metadata" data-percentage="32"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:3580+AND+collCode_s:(AXESECULIRMM)" target="_blank">Flottes Marie-Lise</a><span class="wphal-nbmetadata">32</span></li><li class="metadata" data-percentage="32"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:6246+AND+collCode_s:(AXESECULIRMM)" target="_blank">Imbert Laurent</a><span class="wphal-nbmetadata">32</span></li><li class="metadata" data-percentage="31"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:940359+AND+collCode_s:(AXESECULIRMM)" target="_blank">Negre Christophe</a><span class="wphal-nbmetadata">31</span></li><li class="metadata" data-percentage="28"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:22024+AND+collCode_s:(AXESECULIRMM)" target="_blank">Rouzeyre Bruno</a><span class="wphal-nbmetadata">28</span></li><li class="metadata" data-percentage="26"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:3919+AND+collCode_s:(AXESECULIRMM)" target="_blank">Benoit Pascal</a><span class="wphal-nbmetadata">26</span></li><li class="metadata" data-percentage="24"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:929667+AND+collCode_s:(AXESECULIRMM)" target="_blank">Torres Lionel</a><span class="wphal-nbmetadata">24</span></li><div id="auteursuite" style="display:none"><li class="metadata" data-percentage="21"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:21600+AND+collCode_s:(AXESECULIRMM)" target="_blank">Puteaux Pauline</a><span class="wphal-nbmetadata">21</span></li><li class="metadata" data-percentage="19"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:443+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bruguier Florent</a><span class="wphal-nbmetadata">19</span></li><li class="metadata" data-percentage="18"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1708+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dutertre Jean-Max</a><span class="wphal-nbmetadata">18</span></li><li class="metadata" data-percentage="13"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Hasan+Anwar%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hasan Anwar</a><span class="wphal-nbmetadata">13</span></li><li class="metadata" data-percentage="13"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:184676+AND+collCode_s:(AXESECULIRMM)" target="_blank">Valea Emanuele</a><span class="wphal-nbmetadata">13</span></li><li class="metadata" data-percentage="13"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:21616+AND+collCode_s:(AXESECULIRMM)" target="_blank">Mushtaq Maria</a><span class="wphal-nbmetadata">13</span></li><li class="metadata" data-percentage="12"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:170594+AND+collCode_s:(AXESECULIRMM)" target="_blank">Robert Jean-Marc</a><span class="wphal-nbmetadata">12</span></li><li class="metadata" data-percentage="12"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:6243+AND+collCode_s:(AXESECULIRMM)" target="_blank">Comby Frédéric</a><span class="wphal-nbmetadata">12</span></li><li class="metadata" data-percentage="11"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:171106+AND+collCode_s:(AXESECULIRMM)" target="_blank">Yedroudj Mehdi</a><span class="wphal-nbmetadata">11</span></li><li class="metadata" data-percentage="11"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:3543+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dupuis Sophie</a><span class="wphal-nbmetadata">11</span></li><li class="metadata" data-percentage="10"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:170933+AND+collCode_s:(AXESECULIRMM)" target="_blank">Novo David</a><span class="wphal-nbmetadata">10</span></li><li class="metadata" data-percentage="9"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1119537+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laguillaumie Fabien</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="9"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:172965+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bosio Alberto</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="9"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:3616+AND+collCode_s:(AXESECULIRMM)" target="_blank">Tisserand Arnaud</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="9"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:489+AND+collCode_s:(AXESECULIRMM)" target="_blank">Méloni Nicolas</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="9"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:735900+AND+collCode_s:(AXESECULIRMM)" target="_blank">Possamai Bastos Rodrigo</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="9"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:859402+AND+collCode_s:(AXESECULIRMM)" target="_blank">Lomné Victor</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="8"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1044+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bouvier Cyril</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="8"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1259672+AND+collCode_s:(AXESECULIRMM)" target="_blank">France Loïc</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="7"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Goudia+Dalila%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Goudia Dalila</a><span class="wphal-nbmetadata">7</span></li><li class="metadata" data-percentage="7"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1027436+AND+collCode_s:(AXESECULIRMM)" target="_blank">da Silva Mathieu</a><span class="wphal-nbmetadata">7</span></li><li class="metadata" data-percentage="7"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:5042+AND+collCode_s:(AXESECULIRMM)" target="_blank">El Mrabet Nadia</a><span class="wphal-nbmetadata">7</span></li><li class="metadata" data-percentage="7"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:740458+AND+collCode_s:(AXESECULIRMM)" target="_blank">Girard Patrick</a><span class="wphal-nbmetadata">7</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Badrignans+Benoit%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Badrignans Benoit</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1104840+AND+collCode_s:(AXESECULIRMM)" target="_blank">Toulemont Julien</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:169692+AND+collCode_s:(AXESECULIRMM)" target="_blank">Gogniat Guy</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:18065+AND+collCode_s:(AXESECULIRMM)" target="_blank">Virazel Arnaud</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:4454+AND+collCode_s:(AXESECULIRMM)" target="_blank">Galliere Jean-Marc J.-M.</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:7442+AND+collCode_s:(AXESECULIRMM)" target="_blank">Giorgi Pascal</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:7448+AND+collCode_s:(AXESECULIRMM)" target="_blank">Subsol Gérard</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:7674+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bas Patrick</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:860544+AND+collCode_s:(AXESECULIRMM)" target="_blank">Plantard Thomas</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:885906+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bossuet Lilian</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:938334+AND+collCode_s:(AXESECULIRMM)" target="_blank">Robert Michel</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22de+Castro+Stephan%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">de Castro Stephan</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1130713+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dehbaoui Amine</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1131390+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ordas Thomas</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1263935+AND+collCode_s:(AXESECULIRMM)" target="_blank">Masure Loïc</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1417354+AND+collCode_s:(AXESECULIRMM)" target="_blank">Deveautour Bastien</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1499+AND+collCode_s:(AXESECULIRMM)" target="_blank">Robisson Bruno</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:176738+AND+collCode_s:(AXESECULIRMM)" target="_blank">Zakaria Ahmad</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:19099+AND+collCode_s:(AXESECULIRMM)" target="_blank">Beugnon Sebastien</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1947+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bajard Jean-Claude</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:736550+AND+collCode_s:(AXESECULIRMM)" target="_blank">Maistri Paolo</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:749865+AND+collCode_s:(AXESECULIRMM)" target="_blank">Leveugle Régis</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:938633+AND+collCode_s:(AXESECULIRMM)" target="_blank">Izard Thomas</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:938935+AND+collCode_s:(AXESECULIRMM)" target="_blank">Shahid Zafar</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:942964+AND+collCode_s:(AXESECULIRMM)" target="_blank">Kouider Sarra</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:971482+AND+collCode_s:(AXESECULIRMM)" target="_blank">Castagnos Guilhem</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Devic+Florian%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Devic Florian</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Hadj+Said+Naima%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hadj Said Naima</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Mahboubi+Sakina%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Mahboubi Sakina</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Ordas+S%C3%A9bastien%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ordas Sébastien</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1016070+AND+collCode_s:(AXESECULIRMM)" target="_blank">Zucca Vincent</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1021863+AND+collCode_s:(AXESECULIRMM)" target="_blank">Kooli Maha</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1033867+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cozzi Maxime</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1081129+AND+collCode_s:(AXESECULIRMM)" target="_blank">Nguyen Quang-Linh</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1111870+AND+collCode_s:(AXESECULIRMM)" target="_blank">Camponogara-Viera Raphael Andreoni</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1120139+AND+collCode_s:(AXESECULIRMM)" target="_blank">Chancel Geoffrey</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1122+AND+collCode_s:(AXESECULIRMM)" target="_blank">Allard Tristan</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1140761+AND+collCode_s:(AXESECULIRMM)" target="_blank">Jansen van Rensburg Bianca</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1162276+AND+collCode_s:(AXESECULIRMM)" target="_blank">Pasquet Jérôme</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1261611+AND+collCode_s:(AXESECULIRMM)" target="_blank">Pedeboy Jean-Pierre</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:16208+AND+collCode_s:(AXESECULIRMM)" target="_blank">Guilley Sylvain</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:172604+AND+collCode_s:(AXESECULIRMM)" target="_blank">Valduriez Patrick</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:172647+AND+collCode_s:(AXESECULIRMM)" target="_blank">Akbarinia Reza</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:172896+AND+collCode_s:(AXESECULIRMM)" target="_blank">Masseglia Florent</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:175676+AND+collCode_s:(AXESECULIRMM)" target="_blank">Danger Jean-Luc</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:184443+AND+collCode_s:(AXESECULIRMM)" target="_blank">Itier Vincent</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:3271+AND+collCode_s:(AXESECULIRMM)" target="_blank">Pacitti Esther</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:6242+AND+collCode_s:(AXESECULIRMM)" target="_blank">Nouet Pascal</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:739628+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fischer Viktor</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:9636+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cogranne Rémi</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:976353+AND+collCode_s:(AXESECULIRMM)" target="_blank">Lecomte Maxime</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Adikari+Jithra%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Adikari Jithra</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Agoyan+Michel%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Agoyan Michel</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Byrne+Andrew%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Byrne Andrew</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Candelier+Philippe%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Candelier Philippe</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Cenk+Murat%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cenk Murat</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Dimitrov+Vassil%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dimitrov Vassil</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Dumont+Mathieu%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dumont Mathieu</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Lisart+Mathieu%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Lisart Mathieu</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Marnane+William+P.%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Marnane William P.</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Mutschler+Camille%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Mutschler Camille</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Namin+Ashkan+Hosseinzadeh%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Namin Ashkan Hosseinzadeh</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Papadimitriou+Athanasios%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Papadimitriou Athanasios</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Popovici+Emanuel%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Popovici Emanuel</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Poucheret+Fran%C3%A7ois%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Poucheret François</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1010418+AND+collCode_s:(AXESECULIRMM)" target="_blank">Standaert François-Xavier</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1087005+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ruiz Hugo</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1120142+AND+collCode_s:(AXESECULIRMM)" target="_blank">Vasselle Aurélien</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1261160+AND+collCode_s:(AXESECULIRMM)" target="_blank">Francq Julien</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1296749+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cristiani Valence</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1413164+AND+collCode_s:(AXESECULIRMM)" target="_blank">Carrera Rodriguez Rafael</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1443429+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dalmasso Loïc</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:170358+AND+collCode_s:(AXESECULIRMM)" target="_blank">Magnier Baptiste</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:172470+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dilillo Luigi</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:174633+AND+collCode_s:(AXESECULIRMM)" target="_blank">Montesinos Philippe</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1813+AND+collCode_s:(AXESECULIRMM)" target="_blank">Lapotre Vianney</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:20368+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bhatti Muhammad Khurram</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:2213+AND+collCode_s:(AXESECULIRMM)" target="_blank">Beroulle Vincent</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:3313+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hely David</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:4600+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cotret Pascal</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:607+AND+collCode_s:(AXESECULIRMM)" target="_blank">Diguet Jean-Philippe</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:6351+AND+collCode_s:(AXESECULIRMM)" target="_blank">Mailly Frédérick</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:739898+AND+collCode_s:(AXESECULIRMM)" target="_blank">Crenne Jérémie</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:740304+AND+collCode_s:(AXESECULIRMM)" target="_blank">Matana Luza Lucas</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:748839+AND+collCode_s:(AXESECULIRMM)" target="_blank">Traiola Marcello</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:751964+AND+collCode_s:(AXESECULIRMM)" target="_blank">Hébrail Georges</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:7641+AND+collCode_s:(AXESECULIRMM)" target="_blank">Guerrini Eleonora</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:837538+AND+collCode_s:(AXESECULIRMM)" target="_blank">Aubert Alain</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:8598+AND+collCode_s:(AXESECULIRMM)" target="_blank">Sassatelli Gilles</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Abdulrahman+Hasan%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Abdulrahman Hasan</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Akram+Ayaz%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Akram Ayaz</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Barthe+Lyonel%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Barthe Lyonel</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Calazans+Ney%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Calazans Ney</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Carbone+Mathieu%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Carbone Mathieu</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Castagnos+Guilhem%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Castagnos Guilhem</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Crowe+Francis%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Crowe Francis</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Doche+Christophe%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Doche Christophe</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Druyer+R%C3%A9my%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Druyer Rémy</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Faber+Louis-Barthelemy%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Faber Louis-Barthelemy</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Gendrier+Philippe%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Gendrier Philippe</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Glabb+Ryan%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Glabb Ryan</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Jacobson+Jr+Michael+J.%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Jacobson Jr Michael J.</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Jullien+Graham+A.%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Jullien Graham A.</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Kim+Andrey%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Kim Andrey</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Madau+Maxime%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Madau Maxime</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Manet+Pascal%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Manet Pascal</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Merandat+Marc%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Merandat Marc</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Perin+Guilherme%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Perin Guilherme</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Roche+Thomas%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Roche Thomas</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Soares+Rafael+A.%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Soares Rafael A.</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Teglia+Yannick%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Teglia Yannick</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Tuama+Amel%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Tuama Amel</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Verbauwhede+Ingrid%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Verbauwhede Ingrid</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Veyrat-Charvillon+Nicolas%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Veyrat-Charvillon Nicolas</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Wang+Zichi%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Wang Zichi</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Zhang+Xinpeng%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Zhang Xinpeng</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1042513+AND+collCode_s:(AXESECULIRMM)" target="_blank">Moraes Fernando Gehm</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1046031+AND+collCode_s:(AXESECULIRMM)" target="_blank">Pradarelli Béatrice</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1080162+AND+collCode_s:(AXESECULIRMM)" target="_blank">Farooq Umer</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1083506+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cheng Yuanqing</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1087364+AND+collCode_s:(AXESECULIRMM)" target="_blank">Oulad-Amara Ahmed</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1090420+AND+collCode_s:(AXESECULIRMM)" target="_blank">Pibre Lionel</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1091860+AND+collCode_s:(AXESECULIRMM)" target="_blank">Canard Sébastien</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1103401+AND+collCode_s:(AXESECULIRMM)" target="_blank">Sanchez Ernesto</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1111870+AND+collCode_s:(AXESECULIRMM)" target="_blank">Viera Raphael</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1113332+AND+collCode_s:(AXESECULIRMM)" target="_blank">Xu Kangwei</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1113333+AND+collCode_s:(AXESECULIRMM)" target="_blank">Zhang Dongrong</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1113334+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ren Qiang</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1113870+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ruospo Annachiara</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1172398+AND+collCode_s:(AXESECULIRMM)" target="_blank">Benblidia Nadjia</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:11982+AND+collCode_s:(AXESECULIRMM)" target="_blank">Wali Imran</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1219665+AND+collCode_s:(AXESECULIRMM)" target="_blank">Winterhalter Théo</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1296671+AND+collCode_s:(AXESECULIRMM)" target="_blank">Moos Thorben</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1369356+AND+collCode_s:(AXESECULIRMM)" target="_blank">Riadi Nassim</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1411783+AND+collCode_s:(AXESECULIRMM)" target="_blank">Lamari Selena</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:1734+AND+collCode_s:(AXESECULIRMM)" target="_blank">Duquesne Sylvain</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:173561+AND+collCode_s:(AXESECULIRMM)" target="_blank">Urtado Christelle</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:173879+AND+collCode_s:(AXESECULIRMM)" target="_blank">Tucker Ida</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:19099+AND+collCode_s:(AXESECULIRMM)" target="_blank">Beugnon Sébastien</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:20368+AND+collCode_s:(AXESECULIRMM)" target="_blank">Khurram Bhatti Muhammad</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:21517+AND+collCode_s:(AXESECULIRMM)" target="_blank">Raoult Jérémy</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:22146+AND+collCode_s:(AXESECULIRMM)" target="_blank">Tibermacine Chouki</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:3587+AND+collCode_s:(AXESECULIRMM)" target="_blank">Rigaud Jean-Baptiste</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:6226+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ienco Dino</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:770119+AND+collCode_s:(AXESECULIRMM)" target="_blank">Standaert François-Xavier</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:835911+AND+collCode_s:(AXESECULIRMM)" target="_blank">Razafindraibe Alin</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:836786+AND+collCode_s:(AXESECULIRMM)" target="_blank">Gomes Mesquita Daniel</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:847136+AND+collCode_s:(AXESECULIRMM)" target="_blank">Doulcier Marion</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:8482+AND+collCode_s:(AXESECULIRMM)" target="_blank">Vauttier Sylvain</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:8583+AND+collCode_s:(AXESECULIRMM)" target="_blank">Azaïs Florence</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:8588+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bringay Sandra</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:864381+AND+collCode_s:(AXESECULIRMM)" target="_blank">Tria Assia</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:867940+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fournier Jacques Jean-Alain</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:919829+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bayon Pierre</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:933427+AND+collCode_s:(AXESECULIRMM)" target="_blank">Bousselam Kaouthar</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:940860+AND+collCode_s:(AXESECULIRMM)" target="_blank">Valette Nicolas</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:942843+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dehbaoui Amine</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:954578+AND+collCode_s:(AXESECULIRMM)" target="_blank">Sill Torres Frank</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:962895+AND+collCode_s:(AXESECULIRMM)" target="_blank">Guillaume-Sage Ludovic</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:968652+AND+collCode_s:(AXESECULIRMM)" target="_blank">Paindavoine Marie</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:968653+AND+collCode_s:(AXESECULIRMM)" target="_blank">Vialla Bastien</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:974891+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ba Papa-Sidy</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:978131+AND+collCode_s:(AXESECULIRMM)" target="_blank">Ducharme Gilles R.</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:983494+AND+collCode_s:(AXESECULIRMM)" target="_blank">Lesavourey Andrea</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authIdPerson_i:990392+AND+collCode_s:(AXESECULIRMM)" target="_blank">Sonza Reorda Matteo</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="1"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Al+Badawi+Ahmad%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Al Badawi Ahmad</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><img decoding="async" alt="user" src="https://www.lirmm.fr/wp-content/plugins/hal//img/user.svg" style="width:16px;margin-left:2px;margin-right:2px" /><a href="https://hal.science/search/index/?q=authLastNameFirstName_s:%22Alidori+Riccardo%22+AND+collCode_s:(AXESECULIRMM)" target="_blank">Alidori Riccardo</a><span class="wphal-nbmetadata">1</span></li></div></div></ul><button type="button" style="text-decoration: none" id="wphal-auteur" onclick="visibilite('auteursuite'); return false;">Liste complète</button></div> <div class="display" id="wphal-affiliated" style="display: none"> <h3 class="wphal-titre">Auteurs de la structure</h3></div> <div class="display" id="wphal-revues" style="display: none"> <h3 class="wphal-titre">Revues</h3><span id="trirevues"><button type="button" class="trial" id="trirev" onclick="toggleSort(this, true, 'wphal-rev', 'revuesuite', 'trirev'); return false;" style="font-size:16px;text-decoration: none">Tri Alphabétique</button><button type="button" class="trioc" id="trinbrev" onclick="toggleSort(this, false, 'wphal-rev', 'revuesuite', 'trinbrev'); return false;" style="font-size:16px;text-decoration: none">Tri Occurrence</button></span><ul class="wphal-revues"><div id="wphal-rev"><li class="metadata" data-percentage="11"><a href="https://hal.science/search/index/?q=journalId_i:5369+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Transactions on Computers</a><span class="wphal-nbmetadata">11</span></li><li class="metadata" data-percentage="9"><a href="https://hal.science/search/index/?q=journalId_i:77297+AND+collCode_s:(AXESECULIRMM)" target="_blank">Journal of Cryptographic Engineering</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=journalId_i:107030+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Access</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=journalId_i:87997+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Transactions on Emerging Topics in Computing</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=journalId_i:14064+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Transactions on Multimedia</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=journalId_i:5404+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Transactions on Very Large Scale Integration (VLSI) Systems</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:104600+AND+collCode_s:(AXESECULIRMM)" target="_blank">Proceedings on Privacy Enhancing Technologies</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:15323+AND+collCode_s:(AXESECULIRMM)" target="_blank">Journal of Cryptology</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:17084+AND+collCode_s:(AXESECULIRMM)" target="_blank">Microelectronics Reliability</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:17094+AND+collCode_s:(AXESECULIRMM)" target="_blank">Microprocessors and Microsystems: Embedded Hardware Design</a><span class="wphal-nbmetadata">2</span></li><div id="revuesuite" style="display:none"><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:19594+AND+collCode_s:(AXESECULIRMM)" target="_blank">Theoretical Computer Science</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:51350+AND+collCode_s:(AXESECULIRMM)" target="_blank">Journal of Integrated Circuits and Systems</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:5362+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Transactions on Circuits and Systems for Video Technology</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:5368+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:70584+AND+collCode_s:(AXESECULIRMM)" target="_blank">ACM Journal on Emerging Technologies in Computing Systems</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=journalId_i:858698+AND+collCode_s:(AXESECULIRMM)" target="_blank">IACR Communications in Cryptology</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:106388+AND+collCode_s:(AXESECULIRMM)" target="_blank">Advances in Mathematics of Communications</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:1087+AND+collCode_s:(AXESECULIRMM)" target="_blank">Informatica</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:109186+AND+collCode_s:(AXESECULIRMM)" target="_blank">Electronics</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:111780+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Transactions on Circuits and Systems I: Regular Papers</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:116688+AND+collCode_s:(AXESECULIRMM)" target="_blank">Applied Sciences</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:11928+AND+collCode_s:(AXESECULIRMM)" target="_blank">Communications in Nonlinear Science and Numerical Simulation</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:12847+AND+collCode_s:(AXESECULIRMM)" target="_blank">Electronics Letters</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:14016+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Computer Architecture Letters</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:14058+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Transactions on Information Forensics and Security</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:14186+AND+collCode_s:(AXESECULIRMM)" target="_blank">Information Processing Letters</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:14192+AND+collCode_s:(AXESECULIRMM)" target="_blank">Information Systems</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:15396+AND+collCode_s:(AXESECULIRMM)" target="_blank">Journal of Electronic Testing: : Theory and Applications</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:16283+AND+collCode_s:(AXESECULIRMM)" target="_blank">Journal of Systems Architecture</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:16477+AND+collCode_s:(AXESECULIRMM)" target="_blank">Journal of Visual Communication and Image Representation</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:167167+AND+collCode_s:(AXESECULIRMM)" target="_blank">Electronic Imaging</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:16936+AND+collCode_s:(AXESECULIRMM)" target="_blank">Mathematics of Computation</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:169500+AND+collCode_s:(AXESECULIRMM)" target="_blank">Collection numérique de l’AMUE, Agence de mutualisation des universités et établissements d'enseignement supérieur</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:17083+AND+collCode_s:(AXESECULIRMM)" target="_blank">Microelectronics Journal</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:17657+AND+collCode_s:(AXESECULIRMM)" target="_blank">Optics Communications</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:18946+AND+collCode_s:(AXESECULIRMM)" target="_blank">Signal Processing: Image Communication</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:37521+AND+collCode_s:(AXESECULIRMM)" target="_blank">International Journal of High Performance Systems Architecture (IJHPSA)</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:40490+AND+collCode_s:(AXESECULIRMM)" target="_blank">Signal, Image and Video Processing</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:45765+AND+collCode_s:(AXESECULIRMM)" target="_blank">Journal of Computers (JCP)</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:5333+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Communications Magazine</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:58980+AND+collCode_s:(AXESECULIRMM)" target="_blank">Security and communication networks</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:6477+AND+collCode_s:(AXESECULIRMM)" target="_blank">Journal of Systems and Software</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:66757+AND+collCode_s:(AXESECULIRMM)" target="_blank">IEEE Design &amp; Test</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:81640+AND+collCode_s:(AXESECULIRMM)" target="_blank">International Journal of Image Processing and Visual Communication (IJIPVC)</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:82582+AND+collCode_s:(AXESECULIRMM)" target="_blank">Journal of Software Engineering and Applications</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:9481+AND+collCode_s:(AXESECULIRMM)" target="_blank">ACM SIGACT News</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=journalId_i:95550+AND+collCode_s:(AXESECULIRMM)" target="_blank">CMC-Computers, Materials &amp; Continua</a><span class="wphal-nbmetadata">1</span></li></div></div></ul><button type="button" style="text-decoration: none" id="wphal-revue" onclick="visibiliterevues('revuesuite'); return false;">Liste complète</button></div> <div class="display" id="wphal-annees" style="display: none"> <h3 class="wphal-titre">Année de production</h3><span id="triannees"><button type="button" class="trial" id="trian" onclick="toggleSort(this, true, 'wphal-an', 'anneesuite', 'trian'); return false;" style="font-size:16px;text-decoration: none">Tri Alphabétique</button><button type="button" class="trioc" id="trinban" onclick="toggleSort(this, false, 'wphal-an', 'anneesuite', 'trinban'); return false;" style="font-size:16px;text-decoration: none">Tri Occurrence</button></span><ul class="wphal-annees"><div id="wphal-an"><li class="metadata" data-percentage="22"><a href="https://hal.science/search/index/?q=producedDateY_i:2024+AND+collCode_s:(AXESECULIRMM)" target="_blank">2024</a><span class="wphal-nbmetadata">22</span></li><li class="metadata" data-percentage="17"><a href="https://hal.science/search/index/?q=producedDateY_i:2023+AND+collCode_s:(AXESECULIRMM)" target="_blank">2023</a><span class="wphal-nbmetadata">17</span></li><li class="metadata" data-percentage="25"><a href="https://hal.science/search/index/?q=producedDateY_i:2022+AND+collCode_s:(AXESECULIRMM)" target="_blank">2022</a><span class="wphal-nbmetadata">25</span></li><li class="metadata" data-percentage="37"><a href="https://hal.science/search/index/?q=producedDateY_i:2021+AND+collCode_s:(AXESECULIRMM)" target="_blank">2021</a><span class="wphal-nbmetadata">37</span></li><li class="metadata" data-percentage="28"><a href="https://hal.science/search/index/?q=producedDateY_i:2020+AND+collCode_s:(AXESECULIRMM)" target="_blank">2020</a><span class="wphal-nbmetadata">28</span></li><li class="metadata" data-percentage="28"><a href="https://hal.science/search/index/?q=producedDateY_i:2019+AND+collCode_s:(AXESECULIRMM)" target="_blank">2019</a><span class="wphal-nbmetadata">28</span></li><li class="metadata" data-percentage="20"><a href="https://hal.science/search/index/?q=producedDateY_i:2018+AND+collCode_s:(AXESECULIRMM)" target="_blank">2018</a><span class="wphal-nbmetadata">20</span></li><li class="metadata" data-percentage="20"><a href="https://hal.science/search/index/?q=producedDateY_i:2017+AND+collCode_s:(AXESECULIRMM)" target="_blank">2017</a><span class="wphal-nbmetadata">20</span></li><li class="metadata" data-percentage="25"><a href="https://hal.science/search/index/?q=producedDateY_i:2016+AND+collCode_s:(AXESECULIRMM)" target="_blank">2016</a><span class="wphal-nbmetadata">25</span></li><li class="metadata" data-percentage="20"><a href="https://hal.science/search/index/?q=producedDateY_i:2015+AND+collCode_s:(AXESECULIRMM)" target="_blank">2015</a><span class="wphal-nbmetadata">20</span></li><div id="anneesuite" style="display:none"><li class="metadata" data-percentage="16"><a href="https://hal.science/search/index/?q=producedDateY_i:2014+AND+collCode_s:(AXESECULIRMM)" target="_blank">2014</a><span class="wphal-nbmetadata">16</span></li><li class="metadata" data-percentage="21"><a href="https://hal.science/search/index/?q=producedDateY_i:2013+AND+collCode_s:(AXESECULIRMM)" target="_blank">2013</a><span class="wphal-nbmetadata">21</span></li><li class="metadata" data-percentage="23"><a href="https://hal.science/search/index/?q=producedDateY_i:2012+AND+collCode_s:(AXESECULIRMM)" target="_blank">2012</a><span class="wphal-nbmetadata">23</span></li><li class="metadata" data-percentage="19"><a href="https://hal.science/search/index/?q=producedDateY_i:2011+AND+collCode_s:(AXESECULIRMM)" target="_blank">2011</a><span class="wphal-nbmetadata">19</span></li><li class="metadata" data-percentage="9"><a href="https://hal.science/search/index/?q=producedDateY_i:2010+AND+collCode_s:(AXESECULIRMM)" target="_blank">2010</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="17"><a href="https://hal.science/search/index/?q=producedDateY_i:2009+AND+collCode_s:(AXESECULIRMM)" target="_blank">2009</a><span class="wphal-nbmetadata">17</span></li><li class="metadata" data-percentage="9"><a href="https://hal.science/search/index/?q=producedDateY_i:2008+AND+collCode_s:(AXESECULIRMM)" target="_blank">2008</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="16"><a href="https://hal.science/search/index/?q=producedDateY_i:2007+AND+collCode_s:(AXESECULIRMM)" target="_blank">2007</a><span class="wphal-nbmetadata">16</span></li><li class="metadata" data-percentage="8"><a href="https://hal.science/search/index/?q=producedDateY_i:2006+AND+collCode_s:(AXESECULIRMM)" target="_blank">2006</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=producedDateY_i:2005+AND+collCode_s:(AXESECULIRMM)" target="_blank">2005</a><span class="wphal-nbmetadata">2</span></li></div></div></ul><button type="button" style="text-decoration: none" id="wphal-annee" onclick="visibiliteannee('anneesuite'); return false;">Liste complète</button></div> <div class="display" id="wphal-insts" style="display: none"> <h3 class="wphal-titre">Institutions</h3></div> <div class="display" id="wphal-labs" style="display: none"> <h3 class="wphal-titre">Laboratoires</h3><span id="trilabs"><button type="button" class="trial" id="trilab" onclick="toggleSort(this, true, 'wphal-labo', 'labsuite', 'trilab'); return false;" style="font-size:16px;text-decoration: none">Tri Alphabétique</button><button type="button" class="trioc" id="trinblab" onclick="toggleSort(this, false, 'wphal-labo', 'labsuite', 'trinblab'); return false;" style="font-size:16px;text-decoration: none">Tri Occurrence</button></span><ul class="wphal-labs"><div id="wphal-labo"><li class="metadata" data-percentage="315"><a href="https://hal.science/search/index/?q=labStructId_i:181+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier</a><span class="wphal-nbmetadata">315</span></li><li class="metadata" data-percentage="67"><a href="https://hal.science/search/index/?q=labStructId_i:1100620+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier</a><span class="wphal-nbmetadata">67</span></li><li class="metadata" data-percentage="13"><a href="https://hal.science/search/index/?q=labStructId_i:410272+AND+collCode_s:(AXESECULIRMM)" target="_blank">Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189</a><span class="wphal-nbmetadata">13</span></li><li class="metadata" data-percentage="12"><a href="https://hal.science/search/index/?q=labStructId_i:1044023+AND+collCode_s:(AXESECULIRMM)" target="_blank">Techniques de l'Informatique et de la Microélectronique pour l'Architecture des systèmes intégrés</a><span class="wphal-nbmetadata">12</span></li><li class="metadata" data-percentage="12"><a href="https://hal.science/search/index/?q=labStructId_i:194599+AND+collCode_s:(AXESECULIRMM)" target="_blank">Department of Electrical and Computer Engineering [Waterloo]</a><span class="wphal-nbmetadata">12</span></li><li class="metadata" data-percentage="11"><a href="https://hal.science/search/index/?q=labStructId_i:34586+AND+collCode_s:(AXESECULIRMM)" target="_blank">Inria Sophia Antipolis - Méditerranée</a><span class="wphal-nbmetadata">11</span></li><li class="metadata" data-percentage="8"><a href="https://hal.science/search/index/?q=labStructId_i:484335+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Traitement et Communication de l'Information</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="8"><a href="https://hal.science/search/index/?q=labStructId_i:486345+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance</a><span class="wphal-nbmetadata">8</span></li><li class="metadata" data-percentage="7"><a href="https://hal.science/search/index/?q=labStructId_i:104751+AND+collCode_s:(AXESECULIRMM)" target="_blank">Inria Bordeaux - Sud-Ouest</a><span class="wphal-nbmetadata">7</span></li><li class="metadata" data-percentage="7"><a href="https://hal.science/search/index/?q=labStructId_i:17835+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Hubert Curien</a><span class="wphal-nbmetadata">7</span></li><div id="labsuite" style="display:none"><li class="metadata" data-percentage="7"><a href="https://hal.science/search/index/?q=labStructId_i:27730+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut de Mathématiques de Bordeaux</a><span class="wphal-nbmetadata">7</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=labStructId_i:22302+AND+collCode_s:(AXESECULIRMM)" target="_blank">NETHEOS</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=labStructId_i:30860+AND+collCode_s:(AXESECULIRMM)" target="_blank">Centre Microélectronique de Provence - Site Georges Charpak (CMP-GC)</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=labStructId_i:40214+AND+collCode_s:(AXESECULIRMM)" target="_blank">Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=labStructId_i:631+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut de Mathématiques et de Modélisation de Montpellier</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=labStructId_i:640+AND+collCode_s:(AXESECULIRMM)" target="_blank">Techniques de l'Informatique et de la Microélectronique pour l'Architecture des systèmes intégrés</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=labStructId_i:103907+AND+collCode_s:(AXESECULIRMM)" target="_blank">Centre for Information Security and Cryptography</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=labStructId_i:179701+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut des Nanotechnologies de Lyon</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=labStructId_i:225986+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Signal Image Parole</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=labStructId_i:35418+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire de l'Informatique du Parallélisme</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="5"><a href="https://hal.science/search/index/?q=labStructId_i:40217+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire d'Intégration des Systèmes et des Technologies</a><span class="wphal-nbmetadata">5</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=labStructId_i:103906+AND+collCode_s:(AXESECULIRMM)" target="_blank">Pacific Institute for the Mathematical Sciences</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=labStructId_i:105128+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut de Recherche en Informatique et Systèmes Aléatoires</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=labStructId_i:1065712+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Informatique et Société Numérique</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=labStructId_i:193057+AND+collCode_s:(AXESECULIRMM)" target="_blank">Secure-IC S.A.S</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=labStructId_i:21439+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut de Recherche en Communications et en Cybernétique de Nantes</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=labStructId_i:214+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire de Génie Informatique et Ingénierie de Production</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=labStructId_i:28046+AND+collCode_s:(AXESECULIRMM)" target="_blank">Advanced Technologies in Information Processing Systems</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=labStructId_i:490899+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut de Recherche en Informatique et Systèmes Aléatoires</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=labStructId_i:108312+AND+collCode_s:(AXESECULIRMM)" target="_blank">Orange Labs [Caen]</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=labStructId_i:197411+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institute of Information and Communication Technologies, Electronics and Applied Mathematics</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=labStructId_i:255534+AND+collCode_s:(AXESECULIRMM)" target="_blank">CEA Tech en régions</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=labStructId_i:37363+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dept. of Electrical and Electronic Engineering</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=labStructId_i:419153+AND+collCode_s:(AXESECULIRMM)" target="_blank">Inria Rennes – Bretagne Atlantique</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=labStructId_i:68760+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut de Mathématiques de Toulon - EA 2134</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:104752+AND+collCode_s:(AXESECULIRMM)" target="_blank">Inria Lille - Nord Europe</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:104812+AND+collCode_s:(AXESECULIRMM)" target="_blank">Coordination Nationale de la Formation en Microélectronique</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:1100796+AND+collCode_s:(AXESECULIRMM)" target="_blank">EuroMov - Digital Health in Motion</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:129671+AND+collCode_s:(AXESECULIRMM)" target="_blank">Inria Nancy - Grand Est</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:156353+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dept. of Electr. and Comp. Eng.</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:162010+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Traitement et Communication de l'Information</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:182888+AND+collCode_s:(AXESECULIRMM)" target="_blank">Territoires, Environnement, Télédétection et Information Spatiale</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:201652+AND+collCode_s:(AXESECULIRMM)" target="_blank">Samsung Advanced Institute of Technology</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:206040+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Lorrain de Recherche en Informatique et ses Applications</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:206430+AND+collCode_s:(AXESECULIRMM)" target="_blank">Department of Electrical Engineering - K.U.Leuven</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:2497+AND+collCode_s:(AXESECULIRMM)" target="_blank">Inria Grenoble - Rhône-Alpes</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:27801+AND+collCode_s:(AXESECULIRMM)" target="_blank">Centre for Advanced Computing - Algorithms and Cryptography</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:3127+AND+collCode_s:(AXESECULIRMM)" target="_blank">Équipe de Recherche Commune CEA - EMSE (SESAM : Secured Embedded Systems And Microelectronics)</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:482681+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire de Conception et d'Intégration des Systèmes</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=labStructId_i:86790+AND+collCode_s:(AXESECULIRMM)" target="_blank">Inria Paris-Rocquencourt</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:101004+AND+collCode_s:(AXESECULIRMM)" target="_blank">Sciences and Technologies of Image and Telecommunications</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:1042161+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Jean Kuntzmann</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:1043276+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire de Radio-Fréquence et d'Intégration de Circuits</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:104738+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire d'Informatique Avancée de Saint-Denis</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:1089025+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut d'Électronique et des Technologies du numéRique</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:1100731+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut d’Electronique et des Systèmes</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:1100744+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut Montpelliérain Alexander Grothendieck</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:116261+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut Charles Delaunay</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:118511+AND+collCode_s:(AXESECULIRMM)" target="_blank">Inria Saclay - Ile de France</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:1315+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire d'informatique de l'école normale supérieure</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:1330+AND+collCode_s:(AXESECULIRMM)" target="_blank">Unité de Glycobiologie Structurale et Fonctionnelle - UMR 8576</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:15511+AND+collCode_s:(AXESECULIRMM)" target="_blank">UCL Crypto Group</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:155422+AND+collCode_s:(AXESECULIRMM)" target="_blank">Faculty of Informatics [Lugano]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:187196+AND+collCode_s:(AXESECULIRMM)" target="_blank">CROCUS Technology</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:188843+AND+collCode_s:(AXESECULIRMM)" target="_blank">ESEO-Tech</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:19461+AND+collCode_s:(AXESECULIRMM)" target="_blank">IMEC</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:199324+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:199970+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Jean Alexandre Dieudonné</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:2071+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire d'informatique de l'École polytechnique [Palaiseau]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:223962+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut Universitaire Technologique de Nîmes</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:234428+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dipartimento di Elettronica e Telecomunicazioni [Torino]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:234508+AND+collCode_s:(AXESECULIRMM)" target="_blank">School of Communication and Information Engineering [Shanghai]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:241078+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire d'Informatique Fondamentale d'Orléans</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:252057+AND+collCode_s:(AXESECULIRMM)" target="_blank">ONERA - The French Aerospace Lab [Toulouse]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:25697+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire de Conception et d'Intégration des Systèmes</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:26598+AND+collCode_s:(AXESECULIRMM)" target="_blank">Department of Computer Science [York]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:27787+AND+collCode_s:(AXESECULIRMM)" target="_blank">Computer Science Department [UCLA]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:27863+AND+collCode_s:(AXESECULIRMM)" target="_blank">Advances Technology Information Processing Systems</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:3191+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire de Physique Appliquée et d'Automatique</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:31978+AND+collCode_s:(AXESECULIRMM)" target="_blank">Parallélisme, Réseaux, Systèmes, Modélisation</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:34204+AND+collCode_s:(AXESECULIRMM)" target="_blank">Departamento de Engenharia Elétrica [Minas Gerais]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:39735+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut Supérieur des Sciences Appliquées et de Technologie de Sousse</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:416262+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut d’Electronique et des Systèmes</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:44558+AND+collCode_s:(AXESECULIRMM)" target="_blank">CEFET-RN</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:456202+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire de Recherche pour le Developpement des Systemes Informatises [Blida]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:46939+AND+collCode_s:(AXESECULIRMM)" target="_blank">Intel Corporation [Santa Clara]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:47251+AND+collCode_s:(AXESECULIRMM)" target="_blank">School of Computer and Communication Sciences - EPFL</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:510+AND+collCode_s:(AXESECULIRMM)" target="_blank">Centre de recherche et de restauration des musées de France</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:51517+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Toulousain de Technologie et d'Ingénierie des Systèmes</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:536335+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire pluridisciplinaire de recherche en ingénierie des systèmes, mécanique et énergétique</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:541703+AND+collCode_s:(AXESECULIRMM)" target="_blank">LIP6</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:56663+AND+collCode_s:(AXESECULIRMM)" target="_blank">Institut universitaire de France</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:57022+AND+collCode_s:(AXESECULIRMM)" target="_blank">Procédés, Matériaux et Energie Solaire</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:609+AND+collCode_s:(AXESECULIRMM)" target="_blank">Botanique et Modélisation de l'Architecture des Plantes et des Végétations</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:7104+AND+collCode_s:(AXESECULIRMM)" target="_blank">Department of Computer Science [Santa Barbara]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:82231+AND+collCode_s:(AXESECULIRMM)" target="_blank">Department of Computer Science [Calgary]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:86058+AND+collCode_s:(AXESECULIRMM)" target="_blank">Industrial Systems Institute [Patras]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=labStructId_i:95421+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire d'Informatique de Nantes Atlantique</a><span class="wphal-nbmetadata">1</span></li></div></div></ul><button type="button" style="text-decoration: none" id="wphal-lab" onclick="visibilitelab('labsuite'); return false;">Liste complète</button></div> <div class="display" id="wphal-depts" style="display: none"> <h3 class="wphal-titre">Départements</h3><span id="tridept"><button type="button" class="trial" id="tridept" onclick="toggleSort(this, true, 'wphal-dpt', 'deptsuite', 'tridept'); return false;" style="font-size:16px;text-decoration: none">Tri Alphabétique</button><button type="button" class="trioc" id="trinbdept" onclick="toggleSort(this, false, 'wphal-dpt', 'deptsuite', 'trinbdept'); return false;" style="font-size:16px;text-decoration: none">Tri Occurrence</button></span><ul class="wphal-depts"><div id="wphal-dpt"><li class="metadata" data-percentage="15"><a href="https://hal.science/search/index/?q=deptStructId_i:3124+AND+collCode_s:(AXESECULIRMM)" target="_blank">Département Systèmes et Architectures Sécurisés</a><span class="wphal-nbmetadata">15</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=deptStructId_i:554513+AND+collCode_s:(AXESECULIRMM)" target="_blank">Département Communications &amp; Electronique</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=deptStructId_i:1071779+AND+collCode_s:(AXESECULIRMM)" target="_blank">Département Systèmes et Circuits Intégrés Numériques</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=deptStructId_i:250928+AND+collCode_s:(AXESECULIRMM)" target="_blank">Department of Electrical Engineering [KU Leuven]</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=deptStructId_i:419370+AND+collCode_s:(AXESECULIRMM)" target="_blank">GESTION DES DONNÉES ET DE LA CONNAISSANCE</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=deptStructId_i:121818+AND+collCode_s:(AXESECULIRMM)" target="_blank">Département Informatique et Réseaux</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=deptStructId_i:423083+AND+collCode_s:(AXESECULIRMM)" target="_blank">Department of Algorithms, Computation, Image and Geometry</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:136233+AND+collCode_s:(AXESECULIRMM)" target="_blank">École normale supérieure - Cachan, antenne de Bretagne</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:185035+AND+collCode_s:(AXESECULIRMM)" target="_blank">​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​ISIS Neutron and Muon Source</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:209299+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dpt di Scienze Cliniche e di Comunità [Milano]</a><span class="wphal-nbmetadata">1</span></li><div id="deptsuite" style="display:none"><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:392179+AND+collCode_s:(AXESECULIRMM)" target="_blank">Electronique, Informatique, Automatique et Systèmes</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:40873+AND+collCode_s:(AXESECULIRMM)" target="_blank">Département Communications &amp; Electronique</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:419364+AND+collCode_s:(AXESECULIRMM)" target="_blank">ARCHITECTURE</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:430050+AND+collCode_s:(AXESECULIRMM)" target="_blank">Dipartimento di Ingegneria Elettrica e delle Tecnologie dell'Informazione [Napoli]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:473225+AND+collCode_s:(AXESECULIRMM)" target="_blank">CEA Tech en région Sud</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:491183+AND+collCode_s:(AXESECULIRMM)" target="_blank">ARCHITECTURE</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:491188+AND+collCode_s:(AXESECULIRMM)" target="_blank">LANGAGE ET GÉNIE LOGICIEL</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:491231+AND+collCode_s:(AXESECULIRMM)" target="_blank">GESTION DES DONNÉES ET DE LA CONNAISSANCE</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=deptStructId_i:528160+AND+collCode_s:(AXESECULIRMM)" target="_blank">Département Ingénierie Logiciels et Systèmes</a><span class="wphal-nbmetadata">1</span></li></div></div></ul><button type="button" style="text-decoration: none" id="wphal-dept" onclick="visibilitedept('deptsuite'); return false;">Liste complète</button></div> <div class="display" id="wphal-equipes" style="display: none"> <h3 class="wphal-titre">Équipes de recherche</h3><span id="triequipe"><button type="button" class="trial" id="triequipe" onclick="toggleSort(this, true, 'wphal-rteam', 'equipesuite', 'triequipe'); return false;" style="font-size:16px;text-decoration: none">Tri Alphabétique</button><button type="button" class="trioc" id="trinbequipe" onclick="toggleSort(this, false, 'wphal-rteam', 'equipesuite', 'trinbequipe'); return false;" style="font-size:16px;text-decoration: none">Tri Occurrence</button></span><ul class="wphal-equipes"><div id="wphal-rteam"><li class="metadata" data-percentage="76"><a href="https://hal.science/search/index/?q=rteamStructId_i:388375+AND+collCode_s:(AXESECULIRMM)" target="_blank">Image &amp; Interaction</a><span class="wphal-nbmetadata">76</span></li><li class="metadata" data-percentage="48"><a href="https://hal.science/search/index/?q=rteamStructId_i:408080+AND+collCode_s:(AXESECULIRMM)" target="_blank">Conception et Test de Systèmes MICroélectroniques</a><span class="wphal-nbmetadata">48</span></li><li class="metadata" data-percentage="40"><a href="https://hal.science/search/index/?q=rteamStructId_i:393062+AND+collCode_s:(AXESECULIRMM)" target="_blank">Digits, Architectures et Logiciels Informatiques</a><span class="wphal-nbmetadata">40</span></li><li class="metadata" data-percentage="33"><a href="https://hal.science/search/index/?q=rteamStructId_i:487992+AND+collCode_s:(AXESECULIRMM)" target="_blank">Test and dEpendability of microelectronic integrated SysTems</a><span class="wphal-nbmetadata">33</span></li><li class="metadata" data-percentage="30"><a href="https://hal.science/search/index/?q=rteamStructId_i:388155+AND+collCode_s:(AXESECULIRMM)" target="_blank">Arithmétique informatique</a><span class="wphal-nbmetadata">30</span></li><li class="metadata" data-percentage="29"><a href="https://hal.science/search/index/?q=rteamStructId_i:487993+AND+collCode_s:(AXESECULIRMM)" target="_blank">Smart Integrated Electronic Systems</a><span class="wphal-nbmetadata">29</span></li><li class="metadata" data-percentage="22"><a href="https://hal.science/search/index/?q=rteamStructId_i:394902+AND+collCode_s:(AXESECULIRMM)" target="_blank">Exact Computing</a><span class="wphal-nbmetadata">22</span></li><li class="metadata" data-percentage="21"><a href="https://hal.science/search/index/?q=rteamStructId_i:487991+AND+collCode_s:(AXESECULIRMM)" target="_blank">ADAptive Computing</a><span class="wphal-nbmetadata">21</span></li><li class="metadata" data-percentage="16"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100632+AND+collCode_s:(AXESECULIRMM)" target="_blank">Image &amp; Interaction</a><span class="wphal-nbmetadata">16</span></li><li class="metadata" data-percentage="14"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100643+AND+collCode_s:(AXESECULIRMM)" target="_blank">Smart Integrated Electronic Systems</a><span class="wphal-nbmetadata">14</span></li><div id="equipesuite" style="display:none"><li class="metadata" data-percentage="10"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100637+AND+collCode_s:(AXESECULIRMM)" target="_blank">Exact Computing</a><span class="wphal-nbmetadata">10</span></li><li class="metadata" data-percentage="10"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100641+AND+collCode_s:(AXESECULIRMM)" target="_blank">ADAptive Computing</a><span class="wphal-nbmetadata">10</span></li><li class="metadata" data-percentage="10"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100642+AND+collCode_s:(AXESECULIRMM)" target="_blank">Test and dEpendability of microelectronic integrated SysTems</a><span class="wphal-nbmetadata">10</span></li><li class="metadata" data-percentage="9"><a href="https://hal.science/search/index/?q=rteamStructId_i:141072+AND+collCode_s:(AXESECULIRMM)" target="_blank">Scientific Data Management</a><span class="wphal-nbmetadata">9</span></li><li class="metadata" data-percentage="7"><a href="https://hal.science/search/index/?q=rteamStructId_i:90160+AND+collCode_s:(AXESECULIRMM)" target="_blank">Lithe and fast algorithmic number theory</a><span class="wphal-nbmetadata">7</span></li><li class="metadata" data-percentage="6"><a href="https://hal.science/search/index/?q=rteamStructId_i:554453+AND+collCode_s:(AXESECULIRMM)" target="_blank">Secure and Safe Hardware</a><span class="wphal-nbmetadata">6</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=rteamStructId_i:1071824+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Fonctions Innovantes pour circuits Mixtes</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=rteamStructId_i:491393+AND+collCode_s:(AXESECULIRMM)" target="_blank">Lab-STICC_UBS_CACS_MOCS</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="4"><a href="https://hal.science/search/index/?q=rteamStructId_i:527407+AND+collCode_s:(AXESECULIRMM)" target="_blank">INL - Conception de Systèmes Hétérogènes</a><span class="wphal-nbmetadata">4</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=rteamStructId_i:101271+AND+collCode_s:(AXESECULIRMM)" target="_blank">Computer Security and Industrial Cryptography [KU Leuven]</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=rteamStructId_i:1085913+AND+collCode_s:(AXESECULIRMM)" target="_blank">Laboratoire Modélisation et Sûreté des Systèmes</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=rteamStructId_i:247407+AND+collCode_s:(AXESECULIRMM)" target="_blank">Declarative &amp; Reliable management of Uncertain, user-generated Interlinked Data</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="3"><a href="https://hal.science/search/index/?q=rteamStructId_i:409262+AND+collCode_s:(AXESECULIRMM)" target="_blank">ADVanced Analytics for data SciencE</a><span class="wphal-nbmetadata">3</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=rteamStructId_i:1081156+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cybersécurité et Cryptographie</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100626+AND+collCode_s:(AXESECULIRMM)" target="_blank">Models And Reuse Engineering, Languages</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100635+AND+collCode_s:(AXESECULIRMM)" target="_blank">Digits, Architectures et Logiciels Informatiques</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=rteamStructId_i:1169815+AND+collCode_s:(AXESECULIRMM)" target="_blank">Analyse cryptographique et arithmétique</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=rteamStructId_i:178327+AND+collCode_s:(AXESECULIRMM)" target="_blank">Arithmetic and Computing</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=rteamStructId_i:388266+AND+collCode_s:(AXESECULIRMM)" target="_blank">Methods, Algorithms for Operations REsearch</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=rteamStructId_i:394760+AND+collCode_s:(AXESECULIRMM)" target="_blank">Systèmes complexes, automates et pavages</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="2"><a href="https://hal.science/search/index/?q=rteamStructId_i:450090+AND+collCode_s:(AXESECULIRMM)" target="_blank">Cryptology, arithmetic : algebraic methods for better algorithms</a><span class="wphal-nbmetadata">2</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:1003571+AND+collCode_s:(AXESECULIRMM)" target="_blank">Declarative &amp; Reliable management of Uncertain, user-generated Interlinked Data</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:101047+AND+collCode_s:(AXESECULIRMM)" target="_blank">Centro Cardiologico Monzino [Milano]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:1042196+AND+collCode_s:(AXESECULIRMM)" target="_blank">Calculs Algébriques et Systèmes Dynamiques</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:1071247+AND+collCode_s:(AXESECULIRMM)" target="_blank">Architectures matérielles spécialisées pour l’ère post loi-de-Moore</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:107463+AND+collCode_s:(AXESECULIRMM)" target="_blank">Automatic mesh generation and advanced methods</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100621+AND+collCode_s:(AXESECULIRMM)" target="_blank">Scientific Data Management</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100623+AND+collCode_s:(AXESECULIRMM)" target="_blank">Robotique médicale et mécanismes parallèles</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100631+AND+collCode_s:(AXESECULIRMM)" target="_blank">Système Multi-agent, Interaction, Langage, Evolution</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100639+AND+collCode_s:(AXESECULIRMM)" target="_blank">ADVanced Analytics for data SciencE</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:1100732+AND+collCode_s:(AXESECULIRMM)" target="_blank">Radiations et composants</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:1102082+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fiabilité et Systèmes en Environnements Contraints</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:201313+AND+collCode_s:(AXESECULIRMM)" target="_blank">Geometry, arithmetic, algorithms, codes and encryption</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:2446+AND+collCode_s:(AXESECULIRMM)" target="_blank">Usage-centered design, analysis and improvement of information systems</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:388310+AND+collCode_s:(AXESECULIRMM)" target="_blank">Fouille de données environnementales</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:388379+AND+collCode_s:(AXESECULIRMM)" target="_blank">Radiations et composants</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:388693+AND+collCode_s:(AXESECULIRMM)" target="_blank">Gestion de Données Distribuées [Nantes]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:389915+AND+collCode_s:(AXESECULIRMM)" target="_blank">Lab-STICC_UBS_CACS_MOCS</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:394081+AND+collCode_s:(AXESECULIRMM)" target="_blank">Probabilités et statistiques</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:394933+AND+collCode_s:(AXESECULIRMM)" target="_blank">School of Electronics and Information Engineering, Beihang University, 100191 Beijing, China</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:395113+AND+collCode_s:(AXESECULIRMM)" target="_blank">Interactive Digital Humans</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:418091+AND+collCode_s:(AXESECULIRMM)" target="_blank">ESEO - Groupe Modélisation Mathématique de Systèmes Mécaniques</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:432644+AND+collCode_s:(AXESECULIRMM)" target="_blank">Self-adaptation for distributed services and large software systems</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:432650+AND+collCode_s:(AXESECULIRMM)" target="_blank">Machine Learning in Information Networks</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:473017+AND+collCode_s:(AXESECULIRMM)" target="_blank">DPACA [Gardanne]</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:475163+AND+collCode_s:(AXESECULIRMM)" target="_blank">WEB Architecture x Semantic WEB x WEB of Data</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:491215+AND+collCode_s:(AXESECULIRMM)" target="_blank">Threat Analysis and Mitigation for Information Security</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:541721+AND+collCode_s:(AXESECULIRMM)" target="_blank">ALgorithms for coMmunicAtion SecuriTY</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:554447+AND+collCode_s:(AXESECULIRMM)" target="_blank">System on Chip</a><span class="wphal-nbmetadata">1</span></li><li class="metadata" data-percentage="1"><a href="https://hal.science/search/index/?q=rteamStructId_i:58651+AND+collCode_s:(AXESECULIRMM)" target="_blank">Energy Efficient Computing ArchItectures with Embedded Reconfigurable Resources</a><span class="wphal-nbmetadata">1</span></li></div></div></ul><button type="button" style="text-decoration: none" id="wphal-equipe" onclick="visibiliteequipe('equipesuite'); return false;">Liste complète</button></div> <div class="display" id="publications"><div class="counter-doc"><span class="wphal-nbtot">382 </span>documents</div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Articles dans une revue<span class="wphal-nbmetadata" style="margin-left:10px">85 document</span></h3><div class="grp-content"><ul><li>Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan. Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. <i>Proceedings on Privacy Enhancing Technologies</i>, 2024, 2024 (4), pp.583-604. <a target="_blank" href="https://dx.doi.org/10.56553/popets-2024-0131">&#x27E8;10.56553/popets-2024-0131&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-04659467v1">&#x27E8;hal-04659467&#x27E9;</a></li><li>Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, Amir Moradi, et al.. Randomness Generation for Secure Hardware Masking. <i>IACR Communications in Cryptology</i>, 2024, 1 (2), <a target="_blank" href="https://dx.doi.org/10.62056/akdkp2fgx">&#x27E8;10.62056/akdkp2fgx&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04639398v1">&#x27E8;lirmm-04639398&#x27E9;</a></li><li>Camille Mutschler, Laurent Imbert, Thomas Roche. Inspector Gadget A Toolbox for Fair Comparison of Masking Gadgets Application to Crystals-Kyber Compression. <i>IACR Communications in Cryptology</i>, 2024, 1 (2), <a target="_blank" href="https://dx.doi.org/10.62056/ah5wommol">&#x27E8;10.62056/ah5wommol&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04639866v1">&#x27E8;lirmm-04639866&#x27E9;</a></li><li>Muayad J. Aljafar, Florence Azaïs, Marie-Lise Flottes, Samuel Pagliarini. Utilizing layout effects for analog logic locking. <i>Journal of Cryptographic Engineering</i>, 2024, 14 (2), pp.311-324. <a target="_blank" href="https://dx.doi.org/10.1007/s13389-024-00350-8">&#x27E8;10.1007/s13389-024-00350-8&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04658699v1">&#x27E8;lirmm-04658699&#x27E9;</a></li><li>Théophile Mandon. Sciences de l'Homme et Société/Sciences de l'information et de la communication. <i>Collection numérique de l’AMUE, Agence de mutualisation des universités et établissements d'enseignement supérieur</i>, 2024, Sécurité des SI : La cybersécurité au cœur de la stratégie de l'ESRI (Saison 2). <a target="_blank" href="https://hal.science/hal-04793550v1">&#x27E8;hal-04793550&#x27E9;</a></li><li>Loïc France, Florent Bruguier, David Novo, Maria Mushtaq, Pascal Benoit. Reducing the Silicon Area Overhead of Counter-Based Rowhammer Mitigations. <i>IEEE Computer Architecture Letters</i>, 2024, IEEE Computer Architecture Letters, 23 (1), pp.61-64. <a target="_blank" href="https://dx.doi.org/10.1109/LCA.2023.3328824">&#x27E8;10.1109/LCA.2023.3328824&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04420368v1">&#x27E8;lirmm-04420368&#x27E9;</a></li><li>Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie. I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups. <i>Journal of Cryptology</i>, 2023, 36 (3), pp.17. <a target="_blank" href="https://dx.doi.org/10.1007/s00145-023-09459-1">&#x27E8;10.1007/s00145-023-09459-1&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03863678v2">&#x27E8;lirmm-03863678v2&#x27E9;</a></li><li>Pauline Puteaux, Félix Yriarte, William Puech. A Secret JPEG Image Sharing Method Over <i>GF</i>(2<i> M </i>) Galois Fields. <i>IEEE Transactions on Circuits and Systems for Video Technology</i>, 2023, 33 (6), pp.3030-3042. <a target="_blank" href="https://dx.doi.org/10.1109/tcsvt.2022.3225644">&#x27E8;10.1109/tcsvt.2022.3225644&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-04119035v1">&#x27E8;hal-04119035&#x27E9;</a></li><li>Salma Ben Mamia, Pauline Puteaux, William Puech, Kais Bouallegue. From Diffusion to Confusion of RGB Pixels Using a New Chaotic System for Color Image Encryption. <i>IEEE Access</i>, 2023, 11, pp.49350-49366. <a target="_blank" href="https://dx.doi.org/10.1109/ACCESS.2023.3276483">&#x27E8;10.1109/ACCESS.2023.3276483&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-04660601v1">&#x27E8;hal-04660601&#x27E9;</a></li><li>Arthur Beckers, Sylvain Guilley, Philippe Maurine, Colin O'Flynn, Stjepan Picek. (Adversarial) Electromagnetic Disturbance in the Industry. <i>IEEE Transactions on Computers</i>, 2023, 72 (2), pp.414-422. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2022.3224373">&#x27E8;10.1109/TC.2022.3224373&#x27E9;</a>. <a target="_blank" href="https://telecom-paris.hal.science/hal-03874307v1">&#x27E8;hal-03874307&#x27E9;</a></li><li>Karama Abdelhedi, Faten Chaabane, Faten Chaabane, William Puech, Chokri Ben Amar. A Novel Robust Spread Spectrum Watermarking Scheme for 3D Video Traitor Tracing. <i>IEEE Access</i>, 2023, 11, pp.93487-93499. <a target="_blank" href="https://dx.doi.org/10.1109/ACCESS.2023.3308494">&#x27E8;10.1109/ACCESS.2023.3308494&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-04660626v1">&#x27E8;hal-04660626&#x27E9;</a></li><li>Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker. Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts Proactive and Adaptive Security. <i>Theoretical Computer Science</i>, 2023, 939, pp.78-104. <a target="_blank" href="https://dx.doi.org/10.1016/j.tcs.2022.10.016">&#x27E8;10.1016/j.tcs.2022.10.016&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03927198v1">&#x27E8;hal-03927198&#x27E9;</a></li><li>Valence Cristiani, Maxime Lecomte, Philippe Maurine. Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs. <i>Journal of Cryptology</i>, 2023, 36, pp.38. <a target="_blank" href="https://dx.doi.org/10.1007/s00145-023-09476-0">&#x27E8;10.1007/s00145-023-09476-0&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03628255v1">&#x27E8;lirmm-03628255&#x27E9;</a></li><li>Bianca Jansen van Rensburg, William Puech, Jean-Pierre Pedeboy. A Format Compliant Encryption Method for 3D Objects Allowing Hierarchical Decryption. <i>IEEE Transactions on Multimedia</i>, 2023, 25, pp.7196-7207. <a target="_blank" href="https://dx.doi.org/10.1109/TMM.2022.3219616">&#x27E8;10.1109/TMM.2022.3219616&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-04661238v1">&#x27E8;hal-04661238&#x27E9;</a></li><li>Hector Roussille, Önder Gürcan, Fabien Michel. A Taxonomy of Blockchain Incentive Vulnerabilities for Networked Intelligent Systems. <i>IEEE Communications Magazine</i>, 2023, 61 (8), pp.108-114. <a target="_blank" href="https://dx.doi.org/10.1109/MCOM.005.2200904">&#x27E8;10.1109/MCOM.005.2200904&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04198997v1">&#x27E8;lirmm-04198997&#x27E9;</a></li><li>Quang-Linh Nguyen, Sophie Dupuis, Marie-Lise Flottes, Bruno Rouzeyre. SKG-Lock+: A Provably Secure Logic Locking SchemeCreating Significant Output Corruption. <i>Electronics</i>, 2022, 11, pp.3906. <a target="_blank" href="https://dx.doi.org/10.3390/electronics11233906">&#x27E8;10.3390/electronics11233906&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03884259v1">&#x27E8;lirmm-03884259&#x27E9;</a></li><li>Kangwei Xu, Dongrong Zhang, Qiang Ren, Yuanqing Cheng, Patrick Girard. All-Spin PUF: An Area Efficient and reliable PUF Design with Signature Improvement for Spin-Transfer Torque Magnetic Cell-Based All-Spin Circuits. <i>ACM Journal on Emerging Technologies in Computing Systems</i>, 2022, 18 (4), pp.1-20/71. <a target="_blank" href="https://dx.doi.org/10.1145/3517811">&#x27E8;10.1145/3517811&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03768916v1">&#x27E8;lirmm-03768916&#x27E9;</a></li><li>Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca. Tight Bound on NewHope Failure Probability. <i>IEEE Transactions on Emerging Topics in Computing</i>, 2022, 10 (4), pp.1955-1965. <a target="_blank" href="https://dx.doi.org/10.1109/TETC.2021.3138951">&#x27E8;10.1109/TETC.2021.3138951&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04502206v1">&#x27E8;lirmm-04502206&#x27E9;</a></li><li>Sébastien Beugnon, Bianca Jansen van Rensburg, Naima Amalou, William Puech, Jean-Pierre Pedeboy. A 3D Visual Security (3DVS) score to measure the visual security level of selectively encrypted 3D objects. <i>Signal Processing: Image Communication</i>, 2022, 108, pp.116832. <a target="_blank" href="https://dx.doi.org/10.1016/j.image.2022.116832">&#x27E8;10.1016/j.image.2022.116832&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-04661265v1">&#x27E8;hal-04661265&#x27E9;</a></li><li>Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker. A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency. <i>Theoretical Computer Science</i>, 2022, 914, pp.84-113. <a target="_blank" href="https://dx.doi.org/10.1016/j.tcs.2022.02.014">&#x27E8;10.1016/j.tcs.2022.02.014&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-03780500v1">&#x27E8;hal-03780500&#x27E9;</a></li><li>Lucas Matana Luza, Annachiara Ruospo, Daniel Soderstrom, Carlo Cazzaniga, Maria Kastriotou, et al.. Emulating the Effects of Radiation-Induced Soft-Errors for the Reliability Assessment of Neural Networks. <i>IEEE Transactions on Emerging Topics in Computing</i>, 2022, 10 (4), pp.1867-1882. <a target="_blank" href="https://dx.doi.org/10.1109/TETC.2021.3116999">&#x27E8;10.1109/TETC.2021.3116999&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03382380v1">&#x27E8;lirmm-03382380&#x27E9;</a></li><li>Andrei Romashchenko, Alexander Shen, Marius Zimand. 27 Open Problems in Kolmogorov Complexity. <i>ACM SIGACT News</i>, 2021, 52 (4), pp.31-54. <a target="_blank" href="https://dx.doi.org/10.1145/3510382.3510389">&#x27E8;10.1145/3510382.3510389&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03631680v1">&#x27E8;lirmm-03631680&#x27E9;</a></li><li>Pauline Puteaux, William Puech. CFB-then-ECB Mode-Based Image Encryption for an Efficient Correction of Noisy Encrypted Images. <i>IEEE Transactions on Circuits and Systems for Video Technology</i>, 2021, 31 (9), pp.3338-3351. <a target="_blank" href="https://dx.doi.org/10.1109/TCSVT.2020.3039112">&#x27E8;10.1109/TCSVT.2020.3039112&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03161507v1">&#x27E8;hal-03161507&#x27E9;</a></li><li>Kangwei Xu, Dongrong Zhang, Patrick Girard, Qiang Ren, Yuanqing Cheng. DOVA PRO: A Dynamic Overwriting Voltage Adjustment Technique for STT-MRAM L1 Cache Considering Dielectric Breakdown Effect. <i>IEEE Transactions on Very Large Scale Integration (VLSI) Systems</i>, 2021, 29 (7), pp.1325-1334. <a target="_blank" href="https://dx.doi.org/10.1109/TVLSI.2021.3073415">&#x27E8;10.1109/TVLSI.2021.3073415&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03376949v1">&#x27E8;lirmm-03376949&#x27E9;</a></li><li>Mathieu Lisart, Philippe Maurine, Mathieu Dumont. Modeling and Simulating Electromagnetic Fault Injection. <i>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems</i>, 2021, 40 (4), pp.680-693. <a target="_blank" href="https://dx.doi.org/10.1109/TCAD.2020.3003287">&#x27E8;10.1109/TCAD.2020.3003287&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02938004v1">&#x27E8;lirmm-02938004&#x27E9;</a></li><li>Pauline Puteaux, William Puech. A Recursive Reversible Data Hiding in Encrypted Images Method With a Very High Payload. <i>IEEE Transactions on Multimedia</i>, 2021, 23, pp.636-650. <a target="_blank" href="https://dx.doi.org/10.1109/TMM.2020.2985537">&#x27E8;10.1109/TMM.2020.2985537&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03161504v1">&#x27E8;hal-03161504&#x27E9;</a></li><li>Ilia Iliashenko, Vincent Zucca. Faster homomorphic comparison operations for BGV and BFV. <i>Proceedings on Privacy Enhancing Technologies</i>, 2021, 2021 (3), pp.246-264. <a target="_blank" href="https://dx.doi.org/10.2478/popets-2021-0046">&#x27E8;10.2478/popets-2021-0046&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03506798v1">&#x27E8;hal-03506798&#x27E9;</a></li><li>Pauline Puteaux, William Puech. Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. <i>IEEE Transactions on Information Forensics and Security</i>, 2021, 16, pp.2445-2446. <a target="_blank" href="https://dx.doi.org/10.1109/TIFS.2021.3055630">&#x27E8;10.1109/TIFS.2021.3055630&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03161509v1">&#x27E8;hal-03161509&#x27E9;</a></li><li>Mehdi Yedroudj, Frédéric Comby, Marc Chaumont. Steganography using a 3-player game. <i>Journal of Visual Communication and Image Representation</i>, 2020, 72, pp.#102910. <a target="_blank" href="https://dx.doi.org/10.1016/j.jvcir.2020.102910">&#x27E8;10.1016/j.jvcir.2020.102910&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02937056v1">&#x27E8;lirmm-02937056&#x27E9;</a></li><li>Maria Mushtaq, Muhammad Asim Mukhtar, Vianney Lapotre, Muhammad Khurram Bhatti, Guy Gogniat. Winter is here! A decade of cache-based side-channel attacks, detection &amp; mitigation for RSA. <i>Information Systems</i>, 2020, 92, pp.#101524. <a target="_blank" href="https://dx.doi.org/10.1016/j.is.2020.101524">&#x27E8;10.1016/j.is.2020.101524&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02537540v1">&#x27E8;hal-02537540&#x27E9;</a></li><li>Maria Mushtaq, Jeremy Bricq, Muhammad Khurram Bhatti, Ayaz Akram, Vianney Lapotre, et al.. WHISPER A Tool for Run-time Detection of Side-Channel Attacks. <i>IEEE Access</i>, 2020, 8, pp.83871-83900. <a target="_blank" href="https://dx.doi.org/10.1109/ACCESS.2020.2988370">&#x27E8;10.1109/ACCESS.2020.2988370&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02546630v1">&#x27E8;hal-02546630&#x27E9;</a></li><li>Ayaz Akram, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat. Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques. <i>IEEE Access</i>, 2020, 8, pp.70836-70860. <a target="_blank" href="https://dx.doi.org/10.1109/ACCESS.2020.2980522">&#x27E8;10.1109/ACCESS.2020.2980522&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02508889v1">&#x27E8;hal-02508889&#x27E9;</a></li><li>Pauline Puteaux, Manon Vialle, William Puech. Homomorphic Encryption-Based LSB Substitution for High Capacity Data Hiding in the Encrypted Domain. <i>IEEE Access</i>, 2020, 8, pp.108655-108663. <a target="_blank" href="https://dx.doi.org/10.1109/access.2020.3001385">&#x27E8;10.1109/access.2020.3001385&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-04661274v1">&#x27E8;hal-04661274&#x27E9;</a></li><li>Raphael Andreoni Camponogara-Viera, Philippe Maurine, Jean-Max Dutertre, Rodrigo Possamai Bastos. Simulation and Experimental Demonstration of the Importance of IR-Drops During Laser Fault-Injection. <i>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems</i>, 2020, 39 (6), pp.1231-1244. <a target="_blank" href="https://dx.doi.org/10.1109/TCAD.2019.2928972">&#x27E8;10.1109/TCAD.2019.2928972&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02299068v1">&#x27E8;hal-02299068&#x27E9;</a></li><li>Sebastien Beugnon, William Puech, Jean-Pierre Pedeboy. Format-Compliant Selective Secret 3D Object Sharing Scheme. <i>IEEE Transactions on Multimedia</i>, 2019, 21 (9), pp.2171-2183. <a target="_blank" href="https://dx.doi.org/10.1109/TMM.2019.2900905">&#x27E8;10.1109/TMM.2019.2900905&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02066130v1">&#x27E8;hal-02066130&#x27E9;</a></li><li>Emanuele Valea, Mathieu da Silva, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. A Survey on Security Threats and Countermeasures in IEEE Test Standards. <i>IEEE Design &amp; Test</i>, 2019, 36 (3), pp.95-116. <a target="_blank" href="https://dx.doi.org/10.1109/MDAT.2019.2899064">&#x27E8;10.1109/MDAT.2019.2899064&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02166858v1">&#x27E8;hal-02166858&#x27E9;</a></li><li>Jean-Marc Robert, Christophe Negre, Thomas Plantard. Efficient Fixed Base Exponentiation and Scalar Multiplication based on a Multiplicative Splitting Exponent Recoding. <i>Journal of Cryptographic Engineering</i>, 2019, 9 (2), pp.115-136. <a target="_blank" href="https://dx.doi.org/10.1007/s13389-018-0196-7">&#x27E8;10.1007/s13389-018-0196-7&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01926767v1">&#x27E8;lirmm-01926767&#x27E9;</a></li><li>Emanuele Valea, Mathieu da Silva, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre. Stream vs Block ciphers for scan encryption. <i>Microelectronics Journal</i>, 2019, 86, pp.65-76. <a target="_blank" href="https://dx.doi.org/10.1016/j.mejo.2019.02.019">&#x27E8;10.1016/j.mejo.2019.02.019&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02306938v1">&#x27E8;lirmm-02306938&#x27E9;</a></li><li>Ibrahima Diop, Yanis Linge, Thomas Ordas, Pierre-Yvan Liardet, Philippe Maurine. From theory to practice: horizontal attacks on protected implementations of modular exponentiations. <i>Journal of Cryptographic Engineering</i>, 2019, 9 (1), pp.37-52. <a target="_blank" href="https://dx.doi.org/10.1007/s13389-018-0181-1">&#x27E8;10.1007/s13389-018-0181-1&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01713147v1">&#x27E8;lirmm-01713147&#x27E9;</a></li><li>Lina Shi, Zichi Wang, Zhenxing Qian, Nannan Huang, Pauline Puteaux, et al.. Distortion Function for Emoji Image Steganography. <i>CMC-Computers, Materials &amp; Continua</i>, 2019, 59 (3), pp.943-953. <a target="_blank" href="https://dx.doi.org/10.32604/cmc.2019.05768">&#x27E8;10.32604/cmc.2019.05768&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03160124v1">&#x27E8;hal-03160124&#x27E9;</a></li><li>Eleonora Guerrini, Laurent Imbert, Théo Winterhalter. Randomized Mixed-Radix Scalar Multiplication. <i>IEEE Transactions on Computers</i>, 2018, 67 (3), pp.418-431. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2017.2750677">&#x27E8;10.1109/TC.2017.2750677&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01587488v2">&#x27E8;lirmm-01587488v2&#x27E9;</a></li><li>Mario Barbareschi, Giorgio Di Natale, Lionel Torres, Antonino Mazzeo. A Ring Oscillator-Based Identification Mechanism Immune to Aging and External Working Conditions. <i>IEEE Transactions on Circuits and Systems I: Regular Papers</i>, 2018, 65 (2), pp.700-711. <a target="_blank" href="https://dx.doi.org/10.1109/TCSI.2017.2727546">&#x27E8;10.1109/TCSI.2017.2727546&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01692481v1">&#x27E8;lirmm-01692481&#x27E9;</a></li><li>Mehdi Yedroudj, Marc Chaumont, Frédéric Comby. How to augment a small learning set for improving the performances of a CNN-based steganalyzer?. <i>Electronic Imaging</i>, 2018, Media Watermarking, Security, and Forensics 2018, 317, pp.317-1-317-7. <a target="_blank" href="https://dx.doi.org/10.2352/ISSN.2470-1173.2018.07.MWSF-317">&#x27E8;10.2352/ISSN.2470-1173.2018.07.MWSF-317&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01681883v2">&#x27E8;lirmm-01681883v2&#x27E9;</a></li><li>Maxime Lecomte, Jacques Jean-Alain Fournier, Philippe Maurine. An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification. <i>IEEE Transactions on Very Large Scale Integration (VLSI) Systems</i>, 2017, 25 (12), pp.3317-3330. <a target="_blank" href="https://dx.doi.org/10.1109/TVLSI.2016.2627525">&#x27E8;10.1109/TVLSI.2016.2627525&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01430925v1">&#x27E8;lirmm-01430925&#x27E9;</a></li><li>Raphael Viera, Rodrigo Possamai Bastos, Jean-Max Dutertre, Philippe Maurine, Rodrigo Iga Jadue. Method for evaluation of transient-fault detection techniques. <i>Microelectronics Reliability</i>, 2017, 76-77, pp.68-74. <a target="_blank" href="https://dx.doi.org/10.1016/j.microrel.2017.07.007">&#x27E8;10.1016/j.microrel.2017.07.007&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01690185v1">&#x27E8;lirmm-01690185&#x27E9;</a></li><li>Maha Kooli, Firas Kaddachi, Giorgio Di Natale, Alberto Bosio, Pascal Benoit, et al.. Computing reliability: On the differences between software testing and software fault injection techniques. <i>Microprocessors and Microsystems: Embedded Hardware Design </i>, 2017, 50, pp.102-112. <a target="_blank" href="https://dx.doi.org/10.1016/j.micpro.2017.02.007">&#x27E8;10.1016/j.micpro.2017.02.007&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01693156v1">&#x27E8;lirmm-01693156&#x27E9;</a></li><li>Mathieu Carbone, Yannick Teglia, Gilles R. Ducharme, Philippe Maurine. Mutual information analysis: higher-order statistical moments, efficiency and efficacy. <i>Journal of Cryptographic Engineering</i>, 2017, 7 (1), pp.1-17. <a target="_blank" href="https://dx.doi.org/10.1007/s13389-016-0123-8">&#x27E8;10.1007/s13389-016-0123-8&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01285152v1">&#x27E8;lirmm-01285152&#x27E9;</a></li><li>Arnaud Virazel, Imran Wali, Bastien Deveautour, Alberto Bosio, Patrick Girard, et al.. A Low-Cost Reliability vs. Cost Trade-Off Methodology to Selectively Harden Logic Circuits. <i>Journal of Electronic Testing: : Theory and Applications</i>, 2017, 33 (1), pp.25-36. <a target="_blank" href="https://dx.doi.org/10.1007/s10836-017-5640-6">&#x27E8;10.1007/s10836-017-5640-6&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01718568v1">&#x27E8;lirmm-01718568&#x27E9;</a></li><li>Christophe Negre, Thomas Plantard. Efficient Regular Modular Exponentiation Using Multiplicative Half-Size Splitting. <i>Journal of Cryptographic Engineering</i>, 2017, 7 (3), pp.245-253. <a target="_blank" href="https://dx.doi.org/10.1007/s13389-016-0134-5">&#x27E8;10.1007/s13389-016-0134-5&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01185249v1">&#x27E8;hal-01185249&#x27E9;</a></li><li>Sébastien Ordas, Ludovic Guillaume-Sage, Philippe Maurine. Electromagnetic fault injection: the curse of flip-flops. <i>Journal of Cryptographic Engineering</i>, 2017, 7 (3), pp.183-197. <a target="_blank" href="https://dx.doi.org/10.1007/s13389-016-0128-3">&#x27E8;10.1007/s13389-016-0128-3&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01430913v1">&#x27E8;lirmm-01430913&#x27E9;</a></li><li>Stephan de Castro, Jean-Max Dutertre, Bruno Rouzeyre, Giorgio Di Natale, Marie-Lise Flottes. Frontside Versus Backside Laser Injection: A Comparative Study. <i>ACM Journal on Emerging Technologies in Computing Systems</i>, 2016, Special Issue on Secure and Trustworthy Computing, 13 (1), pp.7. <a target="_blank" href="https://dx.doi.org/10.1145/2845999">&#x27E8;10.1145/2845999&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01444121v1">&#x27E8;lirmm-01444121&#x27E9;</a></li><li>Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier. Color images steganalysis using rgb channel geometric transformation measures. <i>Security and communication networks</i>, 2016, 9 (15), pp.2945-2956. <a target="_blank" href="https://dx.doi.org/10.1002/sec.1427">&#x27E8;10.1002/sec.1427&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01347460v1">&#x27E8;lirmm-01347460&#x27E9;</a></li><li>Lilian Bossuet, Giorgio Di Natale, Paris Kitsos. Introduction to Special Issue on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE). <i>Microprocessors and Microsystems: Embedded Hardware Design </i>, 2016, 47 (A), pp.1-2. <a target="_blank" href="https://dx.doi.org/10.1016/j.micpro.2016.11.004">&#x27E8;10.1016/j.micpro.2016.11.004&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01499334v1">&#x27E8;lirmm-01499334&#x27E9;</a></li><li>Florent Bruguier, Pascal Benoit, Lionel Torres, Lyonel Barthe, Morgan Bourrée, et al.. Cost-Effective Design Strategies for Securing Embedded Processors. <i>IEEE Transactions on Emerging Topics in Computing</i>, 2016, 4 (1), pp.60-72. <a target="_blank" href="https://dx.doi.org/10.1109/TETC.2015.2407832">&#x27E8;10.1109/TETC.2015.2407832&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01150269v1">&#x27E8;lirmm-01150269&#x27E9;</a></li><li>Christophe Negre, Jean-Marc Robert. New Parallel Approaches for Scalar Multiplication in Elliptic Curve over Fields of Small Characteristic. <i>IEEE Transactions on Computers</i>, 2015, 64 (10), pp.2875-2890. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2015.2389817">&#x27E8;10.1109/TC.2015.2389817&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00908463v1">&#x27E8;hal-00908463&#x27E9;</a></li><li>Ali Galip Bayrak, Francesco Regazzoni, David Novo, Philip Brisk, François-Xavier Standaert, et al.. Automatic Application of Power Analysis Countermeasures. <i>IEEE Transactions on Computers</i>, 2015, 64 (2), pp.329-341. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2013.219">&#x27E8;10.1109/TC.2013.219&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01959272v1">&#x27E8;lirmm-01959272&#x27E9;</a></li><li>Murat Cenk, Anwar Hasan, Christophe Negre. Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination. <i>IEEE Transactions on Computers</i>, 2014, 63 (9), pp.2273-2287. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2013.105">&#x27E8;10.1109/TC.2013.105&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-00712090v2">&#x27E8;hal-00712090v2&#x27E9;</a></li><li>Christophe Negre. Efficient Binary Polynomial Multiplication Based on Optimized Karatsuba Reconstruction. <i>Journal of Cryptographic Engineering</i>, 2014, 4 (2), pp.91--106. <a target="_blank" href="https://dx.doi.org/10.1007/s13389-013-0066-2">&#x27E8;10.1007/s13389-013-0066-2&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-00724778v1">&#x27E8;hal-00724778&#x27E9;</a></li><li>Michael François, David Defour, Christophe Negre. A Fast Chaos-Based Pseudo-Random Bit Generator Using Binary64 Floating-Point Arithmetic. <i>Informatica</i>, 2014, 38 (3), pp.115-124. <a target="_blank" href="https://hal.science/hal-01024689v1">&#x27E8;hal-01024689&#x27E9;</a></li><li>Jean da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, et al.. Test versus Security: Past and Present. <i>IEEE Transactions on Emerging Topics in Computing</i>, 2014, 2 (1), pp.50-62. <a target="_blank" href="https://dx.doi.org/10.1109/TETC.2014.2304492">&#x27E8;10.1109/TETC.2014.2304492&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00989627v1">&#x27E8;lirmm-00989627&#x27E9;</a></li><li>Michael François, Thomas Grosges, Dominique Barchiesi, Robert Erra. Pseudo-random number generator based on mixing of three chaotic maps. <i>Communications in Nonlinear Science and Numerical Simulation</i>, 2014, 19 (4), pp.887--895. <a target="_blank" href="https://dx.doi.org/10.1016/j.cnsns.2013.08.032">&#x27E8;10.1016/j.cnsns.2013.08.032&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-00936657v1">&#x27E8;hal-00936657&#x27E9;</a></li><li>Jean-Max Dutertre, Rodrigo Possamai Bastos, Olivier Potin, Marie-Lise Flottes, Bruno Rouzeyre, et al.. Sensitivity tuning of a bulk built-in current sensor for optimal transient-fault detection. <i>Microelectronics Reliability</i>, 2013, European Symposium on Reliability of Electron Devices, Failure Physics and Analysis, 53 (9), pp.1320-1324. <a target="_blank" href="https://dx.doi.org/10.1016/j.microrel.2013.07.069">&#x27E8;10.1016/j.microrel.2013.07.069&#x27E9;</a>. <a target="_blank" href="https://hal-emse.ccsd.cnrs.fr/emse-01100723v1">&#x27E8;emse-01100723&#x27E9;</a></li><li>Murat Cenk, Christophe Negre, Anwar Hasan. Improved Three-Way Split Formulas for Binary Polynomial and Toeplitz Matrix Vector Products. <i>IEEE Transactions on Computers</i>, 2013, 62 (7), pp.1345-1361. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2012.96">&#x27E8;10.1109/TC.2012.96&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00839945v1">&#x27E8;hal-00839945&#x27E9;</a></li><li>Anwar Hasan, Christophe Negre. Multiway Splitting Method for Toeplitz Matrix Vector Product. <i>IEEE Transactions on Computers</i>, 2013, 62 (7), pp.1467-1471. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2012.95">&#x27E8;10.1109/TC.2012.95&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00839952v1">&#x27E8;hal-00839952&#x27E9;</a></li><li>Zafar Shahid, Marc Chaumont, William Puech. H.264/AVC video watermarking for active fingerprinting based on Tardos code. <i>Signal, Image and Video Processing</i>, 2013, 7 (4), pp.679-694. <a target="_blank" href="https://dx.doi.org/10.1007/s11760-013-0483-9">&#x27E8;10.1007/s11760-013-0483-9&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00807061v1">&#x27E8;lirmm-00807061&#x27E9;</a></li><li>Marc Chaumont, William Puech, Christian Lahanier. Securing Color Information of an Image by Concealing the Color Palette. <i>Journal of Systems and Software</i>, 2013, 86 (3), pp.809-825. <a target="_blank" href="https://dx.doi.org/10.1016/j.jss.2012.11.042">&#x27E8;10.1016/j.jss.2012.11.042&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00807065v1">&#x27E8;lirmm-00807065&#x27E9;</a></li><li>Laurent Imbert, Michael J. Jacobson Jr. Empirical optimization of divisor arithmetic on hyperelliptic curves over $\mathbf{F}_{2^m}$. <i>Advances in Mathematics of Communications</i>, 2013, 7 (4), pp.485-502. <a target="_blank" href="https://dx.doi.org/10.3934/amc.2013.7.485">&#x27E8;10.3934/amc.2013.7.485&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00870376v1">&#x27E8;lirmm-00870376&#x27E9;</a></li><li>Jithra Adikari, Ayad Barsoum, Anwar Hasan, Ashkan Hosseinzadeh Namin, Christophe Negre. Improved Area-Time Trade-offs for Field Multiplication using Optimal Normal Bases. <i>IEEE Transactions on Computers</i>, 2013, 62 (1), pp.193-199. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2011.198">&#x27E8;10.1109/TC.2011.198&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00813784v1">&#x27E8;hal-00813784&#x27E9;</a></li><li>Marc Chaumont. Rotation Based Acceleration of Informed Embedding in DPTC Watermarking Scheme. <i>International Journal of Image Processing and Visual Communication (IJIPVC)</i>, 2012, 1 (2), pp.19-28. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00807070v1">&#x27E8;lirmm-00807070&#x27E9;</a></li><li>Anwar Hasan, Christophe Negre. Sequential Multiplier with Sub-linear Gate Complexity. <i>Journal of Cryptographic Engineering</i>, 2012, 2 (2), pp.91-97. <a target="_blank" href="https://dx.doi.org/10.1007/s13389-012-0035-1">&#x27E8;10.1007/s13389-012-0035-1&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00813843v1">&#x27E8;hal-00813843&#x27E9;</a></li><li>Anwar Hasan, Ashkan Hosseinzadeh Namin, Christophe Negre. Toeplitz Matrix Approach for Binary Field Multiplication Using Quadrinomials. <i>IEEE Transactions on Very Large Scale Integration (VLSI) Systems</i>, 2012, 20 (3), pp.449-458. <a target="_blank" href="https://dx.doi.org/10.1109/TVLSI.2011.2106524">&#x27E8;10.1109/TVLSI.2011.2106524&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00813684v1">&#x27E8;hal-00813684&#x27E9;</a></li><li>Anwar Hasan, Nicolas Méloni, Ashkan Hosseinzadeh Namin, Christophe Negre. Block Recombination Approach for Subquadratic Space Complexity Binary Field Multiplication based on Toeplitz Matrix-Vector Product. <i>IEEE Transactions on Computers</i>, 2012, 61 (2), pp.151-163. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2010.276">&#x27E8;10.1109/TC.2010.276&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00813698v1">&#x27E8;hal-00813698&#x27E9;</a></li><li>Nicolas Méloni, Christophe Negre, Anwar Hasan. High performance GHASH and impacts of a class of unconventional bases. <i>Journal of Cryptographic Engineering</i>, 2011, 1 (3), pp.201-218. <a target="_blank" href="https://dx.doi.org/10.1007/s13389-011-0013-z">&#x27E8;10.1007/s13389-011-0013-z&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00813634v1">&#x27E8;hal-00813634&#x27E9;</a></li><li>Naveed Islam, William Puech, Khizar Hayat, Robert Brouzet. Application of Homomorphism to Secure Image Sharing. <i>Optics Communications</i>, 2011, 284 (19), pp.4412-4429. <a target="_blank" href="https://dx.doi.org/10.1016/j.optcom.2011.05.079">&#x27E8;10.1016/j.optcom.2011.05.079&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00818389v1">&#x27E8;lirmm-00818389&#x27E9;</a></li><li>Anwar Hasan, Christophe Negre. Low Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation. <i>IEEE Transactions on Computers</i>, 2011, 60 (4), pp.602-607. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2010.132">&#x27E8;10.1109/TC.2010.132&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00813621v1">&#x27E8;hal-00813621&#x27E9;</a></li><li>Jithra Adikari, Vassil Dimitrov, Laurent Imbert. Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems. <i>IEEE Transactions on Computers</i>, 2011, 60 (2), pp.254-265. <a target="_blank" href="https://dx.doi.org/10.1109/TC.2010.138">&#x27E8;10.1109/TC.2010.138&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00595207v1">&#x27E8;lirmm-00595207&#x27E9;</a></li><li>Rafael Iankowski Soares, Ney Laert Vilar Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine, et al.. A GALS Pipeline DES Architecture to Increase Robustness Against CPA and CEMA Attacks. <i>Journal of Integrated Circuits and Systems</i>, 2011, Special Section on Best SBCCI2010 Papers, 6 (1), pp.25-34. <a target="_blank" href="https://dx.doi.org/10.29292/jics.v6i1.335">&#x27E8;10.29292/jics.v6i1.335&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00607871v1">&#x27E8;lirmm-00607871&#x27E9;</a></li><li>Atef Masmoudi, William Puech, Mohamed Selim Bouhlel. An Efficient PRBG Based on Chaotic Map and Engel Continued Fractions. <i>Journal of Software Engineering and Applications</i>, 2010, 3 (12), pp.141-147. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00818403v1">&#x27E8;lirmm-00818403&#x27E9;</a></li><li>Amine Dehbaoui, Victor Lomné, Philippe Maurine, Lionel Torres. Magnitude Squared Incoherence EM Analysis for Integrated Cryptographic modules Localization. <i>Electronics Letters</i>, 2009, 45 (15), pp.778-780. <a target="_blank" href="https://dx.doi.org/10.1049/el.2009.0342">&#x27E8;10.1049/el.2009.0342&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00402776v1">&#x27E8;lirmm-00402776&#x27E9;</a></li><li>Victor Lomné, Amine Dehbaoui, Thomas Ordas, Philippe Maurine, Lionel Torres, et al.. Secure Triple Track Logic Robustness Against Differential Power and Electromagnetic Analyses. <i>Journal of Integrated Circuits and Systems</i>, 2009, 4 (1), pp.20-28. <a target="_blank" href="https://dx.doi.org/10.29292/jics.v4i1.293">&#x27E8;10.29292/jics.v4i1.293&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03613238v1">&#x27E8;lirmm-03613238&#x27E9;</a></li><li>Vassil Dimitrov, Laurent Imbert, Pradeep Mishra. The Double-Base Number System and its Application to Elliptic Curve Cryptography. <i>Mathematics of Computation</i>, 2008, 77 (262), pp.1075-1104. <a target="_blank" href="https://dx.doi.org/10.1090/S0025-5718-07-02048-0">&#x27E8;10.1090/S0025-5718-07-02048-0&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00341742v1">&#x27E8;lirmm-00341742&#x27E9;</a></li><li>Andrew Byrne, Nicolas Méloni, Arnaud Tisserand, Emanuel Popovici, William P. Marnane. Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem. <i>Journal of Computers (JCP)</i>, 2007, 2 (10), pp.52-62. <a target="_blank" href="https://dx.doi.org/10.4304/jcp.2.10.52-62">&#x27E8;10.4304/jcp.2.10.52-62&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00174648v1">&#x27E8;lirmm-00174648&#x27E9;</a></li><li>Andrew Byrne, Francis Crowe, William P. Marnane, Nicolas Méloni, Arnaud Tisserand, et al.. SPA Resistant Elliptic Curve Cryptosystem Using Addition Chains. <i>International Journal of High Performance Systems Architecture (IJHPSA)</i>, 2007, 1 (2), pp.133-142. <a target="_blank" href="https://dx.doi.org/10.1504/IJHPSA.2007.015399">&#x27E8;10.1504/IJHPSA.2007.015399&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00176433v1">&#x27E8;lirmm-00176433&#x27E9;</a></li><li>Ryan Glabb, Laurent Imbert, Graham A. Jullien, Arnaud Tisserand, Nicolas Veyrat-Charvillon. Multi-Mode Operator for SHA-2 Hash Functions. <i>Journal of Systems Architecture</i>, 2007, Special Issue on Embedded Hardware for Cryptosystems, 52 (2-3), pp.127-138. <a target="_blank" href="https://dx.doi.org/10.1016/j.sysarc.2006.09.006">&#x27E8;10.1016/j.sysarc.2006.09.006&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00126262v1">&#x27E8;lirmm-00126262&#x27E9;</a></li><li>Sylvain Duquesne. Improving the Arithmetic of Elliptic Curves in the Jacobi Model. <i>Information Processing Letters</i>, 2007, 104 (3), pp.101-105. <a target="_blank" href="https://dx.doi.org/10.1016/j.ipl.2007.05.012">&#x27E8;10.1016/j.ipl.2007.05.012&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00145805v1">&#x27E8;lirmm-00145805&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Communications dans un congrès<span class="wphal-nbmetadata" style="margin-left:10px">198 document</span></h3><div class="grp-content"><ul><li>Selena Lamari, Nadjia Benblidia, Chouki Tibermacine, Christelle Urtado, Sylvain Vauttier. Leveraging a Microservice Architecture, Access Control and Interoperability Patterns to Manage Privacy-related User Consents. <i>ICSOC 2024 - 22nd International Conference on Service-Oriented Computing</i>, Dec 2024, Tunis, Tunisia. <a target="_blank" href="https://imt-mines-ales.hal.science/hal-04737951v1">&#x27E8;hal-04737951&#x27E9;</a></li><li>Philippe Maurine, Jérémy Raoult, Anselme Mouette, Julien Toulemont. Butterfly probes: estimating the derivative of the magnetic field. <i>EMC COMPO 2024 - 14th International Workshop on the Electromagnetic Compatibility of Integrated Circuits</i>, Oct 2024, Turin, Italy. <a target="_blank" href="https://hal.science/hal-04699339v1">&#x27E8;hal-04699339&#x27E9;</a></li><li>Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud. Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations. <i>ITC 2024 - 5th Information-Theoretic Cryptography Conference</i>, Aug 2024, Stanford, CA, United States. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04593144v1">&#x27E8;lirmm-04593144&#x27E9;</a></li><li>Anaïs Barthoulot, Olivier Blazy, Sébastien Canard. Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs. <i>AFRICACRYPT 2024 - 15th International Conference on Cryptology</i>, Jul 2024, Douala, Cameroon. In press. <a target="_blank" href="https://hal.science/hal-04618343v1">&#x27E8;hal-04618343&#x27E9;</a></li><li>Diamante-Simone Crescenzo, Rafael Carrera Rodriguez, Riccardo Alidori, Florent Bruguier, Emanuele Valea, et al.. Hardware accelerator for FIPS 202 hash functions in post-quantum ready SoCs. <i>IOLTS 2024 - IEEE 30th International Symposium on On-Line Testing and Robust System Design</i>, Jul 2024, Rennes, France. <a target="_blank" href="https://dx.doi.org/10.1109/IOLTS60994.2024.10616067">&#x27E8;10.1109/IOLTS60994.2024.10616067&#x27E9;</a>. <a target="_blank" href="https://cea.hal.science/cea-04689662v1">&#x27E8;cea-04689662&#x27E9;</a></li><li>Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert. Generalized Feistel Ciphers for Efficient Prime Field Masking. <i>EUROCRYPT 2024 - 43rd International Conference on the Theory and Applications of Cryptographic Techniques</i>, International Association for Cryptographic Research, May 2024, Zürich, Switzerland. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04505584v1">&#x27E8;lirmm-04505584&#x27E9;</a></li><li>Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, François-Xavier Standaert. Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking. <i>EUROCRYPT 2024 - 43rd International Conference on the Theory and Applications of Cryptographic Techniques</i>, May 2024, Zürich, Switzerland. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04484194v1">&#x27E8;lirmm-04484194&#x27E9;</a></li><li>Nassim Riadi, Florent Bruguier, Pascal Benoit, Sophie Dupuis, Marie-Lise Flottes. Power Analysis Attack Against post-SAT Logic Locking schemes. <i>ETS 2024 - 29th IEEE European Test Symposium</i>, May 2024, The Hague, Netherlands. pp.1-6, <a target="_blank" href="https://dx.doi.org/10.1109/ETS61313.2024.10567311">&#x27E8;10.1109/ETS61313.2024.10567311&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04628663v1">&#x27E8;lirmm-04628663&#x27E9;</a></li><li>Nicolas Belleville, Loïc Masure. Combining loop shuffling and code polymorphism for enhanced AES side-channel security. <i>COSADE 2024 - 15th International Workshop on Constructive Side-Channel Analysis and Secure Design</i>, Apr 2024, Gardanne, France. pp.260-280, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-031-57543-3_14">&#x27E8;10.1007/978-3-031-57543-3_14&#x27E9;</a>. <a target="_blank" href="https://cea.hal.science/cea-04539481v1">&#x27E8;cea-04539481&#x27E9;</a></li><li>Erwan Reinders, Bianca Jansen van Rensburg, Pauline Puteaux, William Puech. MSB-Based Reversible Data-Hiding in Encrypted 3D Object Using a Hamiltonian Path. <i>MMSP 2023 - IEEE 25th International Workshop on Multimedia Signal Processing</i>, Sep 2023, Poitiers, France. pp.1-6, <a target="_blank" href="https://dx.doi.org/10.1109/MMSP59012.2023.10337697">&#x27E8;10.1109/MMSP59012.2023.10337697&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04439441v1">&#x27E8;lirmm-04439441&#x27E9;</a></li><li>Geoffrey Chancel, Jean-Marc J.-M. Galliere, Philippe Maurine. A better practice for Body Biasing Injection. <i>FDTC 2023 - Workshop on Fault Detection and Tolerance in Cryptography</i>, Sep 2023, Prague, Czech Republic. pp.48-59, <a target="_blank" href="https://dx.doi.org/10.1109/FDTC60478.2023.00014">&#x27E8;10.1109/FDTC60478.2023.00014&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04703372v1">&#x27E8;lirmm-04703372&#x27E9;</a></li><li>Loïc Masure, François-Xavier Standaert. Prouff and Rivain’s Formal Security Proof of Masking, Revisited. <i>CRYPTO 2023 - 43rd Annual International Cryptology Conference</i>, Aug 2023, Santa Barbara, CA, United States. pp.343-376, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-031-38548-3_12">&#x27E8;10.1007/978-3-031-38548-3_12&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04248805v2">&#x27E8;lirmm-04248805v2&#x27E9;</a></li><li>Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, Pascal Benoit. Correlation electromagnetic analysis on an FPGA implementation of CRYSTALS-Kyber. <i>PRIME 2023 - 18th International Conference on PhD Research in Microelectronics and Electronics</i>, Jun 2023, Valence, Spain. pp.217-220, <a target="_blank" href="https://dx.doi.org/10.1109/PRIME58259.2023.10161764">&#x27E8;10.1109/PRIME58259.2023.10161764&#x27E9;</a>. <a target="_blank" href="https://cea.hal.science/cea-04160004v1">&#x27E8;cea-04160004&#x27E9;</a></li><li>Rafael Carrera Rodriguez, Florent Bruguier, Emanuele Valea, Pascal Benoit. Secure hardware NTT implementation against SASCA and CPA attacks. <i>17e Colloque du GDR SoC²</i>, Jun 2023, Lyon, France. <a target="_blank" href="https://cea.hal.science/cea-04185950v1">&#x27E8;cea-04185950&#x27E9;</a></li><li>Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi. High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent. <i>AISTATS 2023 - International Conference on Artificial Intelligence and Statistics</i>, Apr 2023, Valencia, Spain. <a target="_blank" href="https://inria.hal.science/hal-03714465v3">&#x27E8;hal-03714465v3&#x27E9;</a></li><li>Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker. Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$. <i>ASIACRYPT 2022 - International Conference on the Theory and Application of Cryptology and Information Security</i>, Dec 2022, Taipei, Taiwan. pp.99-129, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-031-22966-4_4">&#x27E8;10.1007/978-3-031-22966-4_4&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03936038v1">&#x27E8;hal-03936038&#x27E9;</a></li><li>Ahmad Al Badawi, Jack Bates, Flavio Bergamaschi, David Bruce Cousins, Saroja Erabelli, et al.. OpenFHE: Open-Source Fully Homomorphic Encryption Library. <i>WAHC 2022 – 10th Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography</i>, Nov 2022, Los Angeles, CA, United States. pp.53-63, <a target="_blank" href="https://dx.doi.org/10.1145/3560827.3563379">&#x27E8;10.1145/3560827.3563379&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04703074v1">&#x27E8;lirmm-04703074&#x27E9;</a></li><li>Geoffrey Chancel, Jean-Marc J.-M. Galliere, Philippe Maurine. Body Biasing Injection: Impact of substrate types on the induced disturbancesƒ. <i>FDTC 2022 - Workshop on Fault Detection and Tolerance in Cryptography</i>, Sep 2022, Virtual, Italy. pp.50-60, <a target="_blank" href="https://dx.doi.org/10.1109/FDTC57191.2022.00015">&#x27E8;10.1109/FDTC57191.2022.00015&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04703375v1">&#x27E8;lirmm-04703375&#x27E9;</a></li><li>Loïc France, Florent Bruguier, David Novo, Maria Mushtaq, Pascal Benoit. Reducing the Silicon Area Overhead of Counter-Based Rowhammer Mitigations. <i>18th CryptArchi Workshop</i>, May 2022, Porquerolles, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03738883v1">&#x27E8;lirmm-03738883&#x27E9;</a></li><li>Sébastien Lapeyre, Nicolas Valette, Marc Merandat, Marie-Lise Flottes, Arnaud Virazel, et al.. A Lightweight, Plug-and-Play and Autonomous JTAG Authentication IP for Secure Device Testing. <i>ETS 2022 - 27th IEEE European Test Symposium</i>, May 2022, Barcelona, Spain. pp.1-4, <a target="_blank" href="https://dx.doi.org/10.1109/ETS54262.2022.9810364">&#x27E8;10.1109/ETS54262.2022.9810364&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03739783v1">&#x27E8;lirmm-03739783&#x27E9;</a></li><li>Quang-Linh Nguyen, Sophie Dupuis, Marie-Lise Flottes. A new key-gate insertion strategy for logic locking with high output corruption. <i>THCon 2022 - Toulouse Hacking Convention</i>, ENAC, Apr 2022, Toulouse, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04048983v1">&#x27E8;lirmm-04048983&#x27E9;</a></li><li>Andrey Kim, Yuriy Polyakov, Vincent Zucca. Revisiting Homomorphic Encryption Schemes for Finite Fields. <i>ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security</i>, Dec 2021, Singapore, Singapore. pp.608-639, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-92078-4_21">&#x27E8;10.1007/978-3-030-92078-4_21&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04497864v1">&#x27E8;lirmm-04497864&#x27E9;</a></li><li>Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine. Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures. <i>ASHES 2021 - 5th Workshop on Attacks and Solutions in Hardware Security @CCS 2021</i>, Nov 2021, Virtual Event, South Korea. pp.73-84, <a target="_blank" href="https://dx.doi.org/10.1145/3474376.3487280">&#x27E8;10.1145/3474376.3487280&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03476806v1">&#x27E8;lirmm-03476806&#x27E9;</a></li><li>Sri Aravinda Krishnan Thyagarajan, Guilhem Castagnos, Fabien Laguillaumie, Giulio Malavolta. Efficient CCA Timed Commitments in Class Groups. <i>CCS 2021 - ACM SIGSAC Conference on Computer and Communications Security</i>, Nov 2021, Seoul (online), South Korea. pp.2663-2684, <a target="_blank" href="https://dx.doi.org/10.1145/3460120.3484773">&#x27E8;10.1145/3460120.3484773&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-03466495v1">&#x27E8;hal-03466495&#x27E9;</a></li><li>Hugo Ruiz, Marc Chaumont, Mehdi Yedroudj, Frédéric Comby, Gérard Subsol. Analyse de l'évolutivité d'un réseau d'apprentissage profond pour la stéganalyse d'images. <i>CORESA 2021 - 21e colloque COmpression et REprésentation des Signaux Audiovisuels</i>, Nov 2021, Sophia Antipolis, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03819818v1">&#x27E8;lirmm-03819818&#x27E9;</a></li><li>Annachiara Ruospo, Lucas Matana Luza, Alberto Bosio, Marcello Traiola, Luigi Dilillo, et al.. Pros and Cons of Fault Injection Approaches for the Reliability Assessment of Deep Neural Networks. <i>LATS 2021 - IEEE 22nd Latin American Test Symposium</i>, Oct 2021, Punta del Este, Uruguay. pp.1-5, <a target="_blank" href="https://dx.doi.org/10.1109/LATS53581.2021.9651807">&#x27E8;10.1109/LATS53581.2021.9651807&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03435567v1">&#x27E8;lirmm-03435567&#x27E9;</a></li><li>Loïc France, Florent Bruguier, Maria Mushtaq, David Novo, Pascal Benoit. Implementing Rowhammer Memory Corruption in the gem5 Simulator. <i>RSP 2021 - 32nd International Workshop on Rapid System Prototyping</i>, Oct 2021, Virtual Event, France. pp.36-42, <a target="_blank" href="https://dx.doi.org/10.1109/RSP53691.2021.9806242">&#x27E8;10.1109/RSP53691.2021.9806242&#x27E9;</a>. <a target="_blank" href="https://hal.umontpellier.fr/hal-03418858v1">&#x27E8;hal-03418858&#x27E9;</a></li><li>Ameer Hamza, Maria Mushtaq, Muhammad Khurram Bhatti, David Novo, Florent Bruguier, et al.. Diminisher: A Linux Kernel based Countermeasure for TAA Vulnerability. <i>CPS4CIP 2021 - 2nd International Workshop on Cyber-Physical Security for Critical Infrastructures Protection</i>, Oct 2021, virtual event, Germany. pp.477-495, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-95484-0_28">&#x27E8;10.1007/978-3-030-95484-0_28&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03372868v1">&#x27E8;hal-03372868&#x27E9;</a></li><li>Bianca Jansen van Rensburg, William Puech, Pauline Puteaux, Jean-Pierre Pedeboy. Homomorphic Two Tier Reversible Data Hiding In Encrypted 3D Objects. <i>ICIP 2021 - 28th IEEE International Conference on Image Processing</i>, Sep 2021, Anchorage, AK, United States. pp.3068-3072, <a target="_blank" href="https://dx.doi.org/10.1109/ICIP42928.2021.9506320">&#x27E8;10.1109/ICIP42928.2021.9506320&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03520989v1">&#x27E8;lirmm-03520989&#x27E9;</a></li><li>Julien Toulemont, Geoffrey Chancel, Jean-Marc J.-M. Galliere, Frédérick Mailly, Pascal Nouet, et al.. On the scaling of EMFI probes. <i>FDTC 2021 - Workshop on Fault Detection and Tolerance in Cryptography</i>, Sep 2021, Milan, Italy. pp.67-73, <a target="_blank" href="https://dx.doi.org/10.1109/FDTC53659.2021.00019">&#x27E8;10.1109/FDTC53659.2021.00019&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03476820v1">&#x27E8;lirmm-03476820&#x27E9;</a></li><li>Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, et al.. Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. <i>EuroS&amp;PW 2021 - IEEE European Symposium on Security and Privacy Workshops</i>, Sep 2021, Vienne, Austria. pp.96-102, <a target="_blank" href="https://dx.doi.org/10.1109/EuroSPW54576.2021.00017">&#x27E8;10.1109/EuroSPW54576.2021.00017&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03353878v1">&#x27E8;hal-03353878&#x27E9;</a></li><li>Pauline Puteaux, Vincent Itier, Patrick Bas. Combining Forensics and Privacy Requirements for Digital Images. <i>EUSIPCO 2021 - 29th European Signal Processing Conference</i>, Aug 2021, Dublin (virtual), Ireland. pp.806-810, <a target="_blank" href="https://dx.doi.org/10.23919/EUSIPCO54536.2021.9616041">&#x27E8;10.23919/EUSIPCO54536.2021.9616041&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03160123v2">&#x27E8;hal-03160123v2&#x27E9;</a></li><li>Thomas Roche, Victor Lomné, Camille Mutschler, Laurent Imbert. A Side Journey To Titan. <i>USENIX Security 2021 - 30th USENIX Security Symposium</i>, Aug 2021, Virtual, Canada. pp.231-248. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03322561v1">&#x27E8;lirmm-03322561&#x27E9;</a></li><li>Quang-Linh Nguyen, Marie-Lise Flottes, Sophie Dupuis, Bruno Rouzeyre. On Preventing SAT Attack with Decoy Key-Inputs. <i>ISVLSI 2021 - IEEE Computer Society Annual Symposium on VLSI</i>, Jul 2021, Tampa, United States. pp.114-119, <a target="_blank" href="https://dx.doi.org/10.1109/ISVLSI51109.2021.00031">&#x27E8;10.1109/ISVLSI51109.2021.00031&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03359458v1">&#x27E8;lirmm-03359458&#x27E9;</a></li><li>Bastien Deveautour, Marcello Traiola, Arnaud Virazel, Patrick Girard. Reducing Overprovision of Triple Modular Reduncancy Owing to Approximate Computing. <i>IOLTS 2021 - 27th IEEE International Symposium on On-Line Testing and Robust System Design</i>, Jun 2021, Torino, Italy. pp.1-7, <a target="_blank" href="https://dx.doi.org/10.1109/IOLTS52814.2021.9486699">&#x27E8;10.1109/IOLTS52814.2021.9486699&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03380025v1">&#x27E8;lirmm-03380025&#x27E9;</a></li><li>Julien Toulemont, Frédérick Mailly, Philippe Maurine, Pascal Nouet. Exploring flexible and 3D printing technologies for the design of high spatial resolution EM probes. <i>NEWCAS 2021 - 19th IEEE International New Circuits and Systems Conference</i>, Jun 2021, Toulon, France. pp.1-4, <a target="_blank" href="https://dx.doi.org/10.1109/NEWCAS50681.2021.9462763">&#x27E8;10.1109/NEWCAS50681.2021.9462763&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03278789v1">&#x27E8;lirmm-03278789&#x27E9;</a></li><li>Maria Mushtaq, David Novo, Florent Bruguier, Pascal Benoit, Muhammad Khurram Bhatti. Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks. <i>ETS 2021 - 26th IEEE European Test Symposium</i>, May 2021, Bruges (virtual), Belgium. pp.1-2, <a target="_blank" href="https://dx.doi.org/10.1109/ETS50041.2021.9465429">&#x27E8;10.1109/ETS50041.2021.9465429&#x27E9;</a>. <a target="_blank" href="https://hal-emse.ccsd.cnrs.fr/emse-03195702v1">&#x27E8;emse-03195702&#x27E9;</a></li><li>Cyril Bouvier, Laurent Imbert. An Alternative Approach for SIDH Arithmetic. <i>PKC 2021 - IACR International Conference on Public-Key Cryptography</i>, May 2021, Virtual, United Kingdom. pp.27-44, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-75245-3_2">&#x27E8;10.1007/978-3-030-75245-3_2&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03219438v1">&#x27E8;lirmm-03219438&#x27E9;</a></li><li>Loïc France, Maria Mushtaq, Florent Bruguier, David Novo, Pascal Benoit. Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator -Work in Progress. <i>SaT-CPS 2021 - ACM Workshop on Secure and Trustworthy Cyber-Physical Systems</i>, Apr 2021, Virtually, United States. pp.104-109, <a target="_blank" href="https://dx.doi.org/10.1145/3445969.3450425">&#x27E8;10.1145/3445969.3450425&#x27E9;</a>. <a target="_blank" href="https://hal.umontpellier.fr/hal-03196090v1">&#x27E8;hal-03196090&#x27E9;</a></li><li>Pauline Puteaux, Zichi Wang, Xinpeng Zhang, William Puech. Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images. <i>EUSIPCO 2020 - 28th European Signal Processing Conference</i>, Jan 2021, Amsterdam (virtual), Netherlands. pp.725-729, <a target="_blank" href="https://dx.doi.org/10.23919/Eusipco47968.2020.9287376">&#x27E8;10.23919/Eusipco47968.2020.9287376&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03161511v1">&#x27E8;hal-03161511&#x27E9;</a></li><li>Hugo Ruiz, Marc Chaumont, Mehdi Yedroudj, Ahmed Oulad-Amara, Frédéric Comby, et al.. Analysis of the Scalability of a Deep-Learning Network for Steganography "Into the Wild". <i>MMForWILD 2021 - Workshop on MultiMedia FORensics in the WILD</i>, Jan 2021, Virtual (formerly Milan), Italy. pp.439-452, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-68780-9_36">&#x27E8;10.1007/978-3-030-68780-9_36&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03090482v1">&#x27E8;lirmm-03090482&#x27E9;</a></li><li>Hugo Ruiz, Mehdi Yedroudj, Marc Chaumont, Frédéric Comby, Gérard Subsol. LSSD: a Controlled Large JPEG Image Database for Deep-Learning-based Steganalysis "into the Wild". <i>MMForWILD 2020 - Workshop on MultiMedia FORensics in the WILD</i>, Jan 2021, Virtual (formerly Milan), Italy. pp.470-483, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-68780-9_38">&#x27E8;10.1007/978-3-030-68780-9_38&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03098196v1">&#x27E8;lirmm-03098196&#x27E9;</a></li><li>Pauline Puteaux, William Puech. Localization and Correction of Corrupted Pixel Blocks in Noisy Encrypted Images. <i>IPTA 2020 - 10th International Conference on Image Processing Theory, Tools and Applications</i>, Nov 2020, Paris, France. pp.1-6, <a target="_blank" href="https://dx.doi.org/10.1109/IPTA50016.2020.9286451">&#x27E8;10.1109/IPTA50016.2020.9286451&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03161514v1">&#x27E8;hal-03161514&#x27E9;</a></li><li>Maria Mushtaq, Pascal Benoit, Umer Farooq. Challenges of Using Performance Counters in Security Against Side-Channel Leakage. <i>CYBER 2020 - 5th International Conference on Cyber-Technologies and Cyber-Systems</i>, Oct 2020, Nice, France. <a target="_blank" href="https://hal.science/hal-02979362v1">&#x27E8;hal-02979362&#x27E9;</a></li><li>Umer Farooq, Maria Mushtaq, Muhammad Khurram Bhatti. Efficient AES Implementation for Better Resource Usage and Performance of IoTs. <i>CYBER 2020 - 5th International Conference on Cyber-Technologies and Cyber-Systems</i>, Oct 2020, Nice, France. <a target="_blank" href="https://hal.science/hal-02979423v1">&#x27E8;hal-02979423&#x27E9;</a></li><li>Valence Cristiani, Maxime Lecomte, Philippe Maurine. Leakage Assessment through Neural Estimation of the Mutual Information. <i>ACNS 2020 - International Conference on Applied Cryptography and Network Security</i>, Oct 2020, Rome, Italy. pp.144-162, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-61638-0_9">&#x27E8;10.1007/978-3-030-61638-0_9&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02980501v1">&#x27E8;hal-02980501&#x27E9;</a></li><li>Florence Azaïs, Serge Bernard, Mariane Comte, Bastien Deveautour, Sophie Dupuis, et al.. Development and Application of Embedded Test Instruments to Digital, Analog/RFs and Secure ICs. <i>IOLTS 2020 - 26th IEEE International Symposium on On-Line Testing and Robust System Design</i>, Jul 2020, Napoli, Italy. pp.1-4, <a target="_blank" href="https://dx.doi.org/10.1109/IOLTS50870.2020.9159723">&#x27E8;10.1109/IOLTS50870.2020.9159723&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02993384v1">&#x27E8;lirmm-02993384&#x27E9;</a></li><li>Mehdi Yedroudj, Marc Chaumont, Frédéric Comby, Ahmed Oulad-Amara, Patrick Bas. Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis. <i>IH&amp;MMSec 2020 - ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2020, Denver, United States. pp.39-48, <a target="_blank" href="https://dx.doi.org/10.1145/3369412.3395061">&#x27E8;10.1145/3369412.3395061&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02559838v1">&#x27E8;lirmm-02559838&#x27E9;</a></li><li>Loïc Dalmasso, Florent Bruguier, Achraf Lamlih, Pascal Benoit. Wallance, an Alternative to Blockchain for IoT. <i>WF-IoT 2020 - IEEE 6th World Forum on Internet of Things</i>, Jun 2020, New Orleans, LA, United States. <a target="_blank" href="https://dx.doi.org/10.1109/WF-IoT48130.2020.9221474">&#x27E8;10.1109/WF-IoT48130.2020.9221474&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02893953v2">&#x27E8;hal-02893953v2&#x27E9;</a></li><li>Cyril Bouvier, Laurent Imbert. Faster Cofactorization with ECM Using Mixed Representations. <i>PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography</i>, Jun 2020, Virtual, United Kingdom. pp.483-504, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-45388-6_17">&#x27E8;10.1007/978-3-030-45388-6_17&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02613652v1">&#x27E8;lirmm-02613652&#x27E9;</a></li><li>Florent Bruguier, Emmanuelle Lecointre, Béatrice Pradarelli, Loïc Dalmasso, Pascal Benoit, et al.. Teaching Hardware Security: Earnings of an Introduction proposed as an Escape Game. <i>REV 2020 - 17th International Conference on Remote Engineering and Virtual Instrumentation</i>, Feb 2020, Athens, GA, United States. pp.729-741, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-52575-0_60">&#x27E8;10.1007/978-3-030-52575-0_60&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02392461v1">&#x27E8;lirmm-02392461&#x27E9;</a></li><li>Ahmad Zakaria, Marc Chaumont, Gérard Subsol. Pooled Steganalysis in JPEG: how to deal with the spreading strategy?. <i>WIFS 2019 - 11th IEEE International Workshop on Information Forensics and Security</i>, Dec 2019, Delft, Netherlands. <a target="_blank" href="https://dx.doi.org/10.1109/WIFS47025.2019.9035096">&#x27E8;10.1109/WIFS47025.2019.9035096&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02301698v1">&#x27E8;hal-02301698&#x27E9;</a></li><li>Florent Bruguier, Loïc Dalmasso, Pascal Benoit, Béatrice Pradarelli. AMUSE : un escape game pour la sécurité numérique. <i>Les IDEFI : expérimenter, former, pour transformer.</i>, Dec 2019, Paris, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02444068v1">&#x27E8;lirmm-02444068&#x27E9;</a></li><li>Aurélien Vasselle, Philippe Maurine, Maxime Cozzi. Breaking Mobile Firmware Encryption through Near-Field Side-Channel Analysis. <i>ASHES 2019 - 3rd Attacks and Solutions in Hardware Security Workshop</i>, Nov 2019, London, United Kingdom. pp.23-32, <a target="_blank" href="https://dx.doi.org/10.1145/3338508.3359571">&#x27E8;10.1145/3338508.3359571&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03660638v1">&#x27E8;lirmm-03660638&#x27E9;</a></li><li>Thomas Roche, Laurent Imbert, Victor Lomné. Side-channel Attacks on Blinded Scalar Multiplications Revisited. <i>CARDIS 2019 - 18th Smart Card Research and Advanced Application Conference</i>, Nov 2019, Prague, Czech Republic. pp.95-108, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-42068-0_6">&#x27E8;10.1007/978-3-030-42068-0_6&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02311595v1">&#x27E8;lirmm-02311595&#x27E9;</a></li><li>Jérémie Detrey, Laurent Imbert. Breaking randomized mixed-radix scalar multiplication algorithms. <i>LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America</i>, Oct 2019, Santiago de Chile, Chile. pp.24-39, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-30530-7_2">&#x27E8;10.1007/978-3-030-30530-7_2&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02309203v1">&#x27E8;lirmm-02309203&#x27E9;</a></li><li>Sebastien Beugnon, Pauline Puteaux, William Puech. Privacy Protection for Social Media Based on A Hierarchical Secret Image Sharing Scheme. <i>ICIP 2019 - 26th IEEE International Conference on Image Processing</i>, Sep 2019, Taipei, Taiwan. pp.679-683, <a target="_blank" href="https://dx.doi.org/10.1109/ICIP.2019.8803836">&#x27E8;10.1109/ICIP.2019.8803836&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02123865v1">&#x27E8;hal-02123865&#x27E9;</a></li><li>Dario Asciolla, Luigi Dilillo, Douglas Almeida dos Santos, Douglas Melo, Alessandra Menicucci, et al.. Characterization of a RISC-V Microcontroller Through Fault Injection. <i>APPLEPIES 2019 - International Conference on Applications in Electronics Pervading Industry, Environment and Society</i>, Sep 2019, Pisa, Italy. pp.91-101, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-37277-4_11">&#x27E8;10.1007/978-3-030-37277-4_11&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03025657v1">&#x27E8;lirmm-03025657&#x27E9;</a></li><li>Mehdi Yedroudj, Frédéric Comby, Marc Chaumont. Stéganographie par CNN et approche jeu à 3 joueurs. <i>GRETSI 2019 - 27e Colloque francophone de Traitement du Signal et des Images</i>, Aug 2019, Lille, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03819897v1">&#x27E8;lirmm-03819897&#x27E9;</a></li><li>Ahmad Zakaria, Marc Chaumont, Gérard Subsol. Stéganalyse groupée en JPEG : comment gérer la stratégie d'étalement?. <i>GRETSI 2019 - 27e Colloque francophone de Traitement du Signal et des Images</i>, Aug 2019, Lille, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03819907v1">&#x27E8;lirmm-03819907&#x27E9;</a></li><li>Mathieu Dumont, Mathieu Lisart, Philippe Maurine. Electromagnetic Fault Injection : How Faults Occur. <i>FDTC 2019 - Workshop on Fault Diagnosis and Tolerance in Cryptography</i>, Aug 2019, Atlanta, GA, United States. pp.9-16, <a target="_blank" href="https://dx.doi.org/10.1109/FDTC.2019.00010">&#x27E8;10.1109/FDTC.2019.00010&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02328109v1">&#x27E8;lirmm-02328109&#x27E9;</a></li><li>Marc Merandat, Vincent Reynaud, Emanuele Valea, Jerome Quevremont, Nicolas Valette, et al.. A Comprehensive Approach to a Trusted Test Infrastructure. <i>IVSW 2019 - 4th IEEE International Verification and Security Workshop</i>, Jul 2019, Rhodes, Greece. pp.43-48, <a target="_blank" href="https://dx.doi.org/10.1109/IVSW.2019.8854428">&#x27E8;10.1109/IVSW.2019.8854428&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02306980v1">&#x27E8;lirmm-02306980&#x27E9;</a></li><li>Arnaud Castelltort, Antoine Chabert, Nicolas Hersog, Anne Laurent, Michel Sala. Fuzzy Rules Based Solution for System Administration Security Management via a Blockchain. <i>BLOCKCHAIN</i>, Jun 2019, Ávila, Spain. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02085775v1">&#x27E8;lirmm-02085775&#x27E9;</a></li><li>Sebastien Beugnon, William Puech, Jean-Pierre Pedeboy. A Format-compliant Selective Secret 3D Object Sharing Scheme Based on Shamir’s Scheme. <i>ICASSP 2019 - 44th IEEE International Conference on Acoustics, Speech and Signal Processing</i>, May 2019, Brighton, United Kingdom. pp.2657-2661, <a target="_blank" href="https://dx.doi.org/10.1109/ICASSP.2019.8683822">&#x27E8;10.1109/ICASSP.2019.8683822&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02121467v1">&#x27E8;hal-02121467&#x27E9;</a></li><li>Emanuele Valea, Mathieu da Silva, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre. Encryption-Based Secure JTAG. <i>DDECS 2019 - 22nd International Symposium on Design and Diagnostics of Electronic Circuits and Systems</i>, Apr 2019, Cluj-Napoca, Romania. pp.1-6, <a target="_blank" href="https://dx.doi.org/10.1109/DDECS.2019.8724654">&#x27E8;10.1109/DDECS.2019.8724654&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02149061v1">&#x27E8;hal-02149061&#x27E9;</a></li><li>Emanuele Valea, Mathieu da Silva, Marie-Lise Flottes, Giorgio Di Natale, Sophie Dupuis, et al.. Providing Confidentiality and Integrity in Ultra Low Power IoT Devices. <i>DTIS 2019 - 14th International Conference on Design &amp; Technology of Integrated Systems in Nanoscale Era</i>, Apr 2019, Mykonos, Greece. <a target="_blank" href="https://dx.doi.org/10.1109/DTIS.2019.8735090">&#x27E8;10.1109/DTIS.2019.8735090&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-02166920v1">&#x27E8;hal-02166920&#x27E9;</a></li><li>Cyril Bouvier, Laurent Imbert. Faster cofactorization with ECM using mixed representations. <i>WRAC'H 2019 - Workshop on Randomness and Arithmetics for Cryptography on Hardware</i>, Apr 2019, Roscoff, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02309390v1">&#x27E8;lirmm-02309390&#x27E9;</a></li><li>Samuel Masseport, Jorick Lartigau, Benoit Darties, Rodolphe Giroudeau. Proof of Usage: User-centric consensus for data provision and exchange. <i>BRAINS 2019 - 1st Blockchain, Robotics and AI for Networking Security Conference</i>, Mar 2019, Rio De Janerio, Brazil. <a target="_blank" href="https://hal.science/hal-02025384v1">&#x27E8;hal-02025384&#x27E9;</a></li><li>Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan de Castro, Louis-Barthelemy Faber, et al.. Laser fault injection at the CMOS 28 nm technology node: an analysis of the fault model. <i>FDTC: Fault Diagnosis and Tolerance in Cryptography</i>, Sep 2018, Amsterdam, Netherlands. pp.1-6, <a target="_blank" href="https://dx.doi.org/10.1109/FDTC.2018.00009">&#x27E8;10.1109/FDTC.2018.00009&#x27E9;</a>. <a target="_blank" href="https://hal-emse.ccsd.cnrs.fr/emse-01856008v1">&#x27E8;emse-01856008&#x27E9;</a></li><li>Maxime Madau, Michel Agoyan, Josep Balash, Milos Grujic, Patrick Haddad, et al.. The impact of pulsed electromagnetic fault injection on true random number generators. <i>FDTC 2018 - Workshop on Fault Diagnosis and Tolerance in Cryptography</i>, Sep 2018, Amsterdam, Netherlands. pp.43-48, <a target="_blank" href="https://dx.doi.org/10.1109/FDTC.2018.00015">&#x27E8;10.1109/FDTC.2018.00015&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01943112v1">&#x27E8;lirmm-01943112&#x27E9;</a></li><li>Sakina Mahboubi, Reza Akbarinia, Patrick Valduriez. Answering Top-k Queries over Outsourced Sensitive Data in the Cloud. <i>DEXA 2018 - 29th International Conference on Database and Expert Systems Applications</i>, Sep 2018, Regensburg, Germany. pp.218-231, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-98809-2_14">&#x27E8;10.1007/978-3-319-98809-2_14&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01886164v1">&#x27E8;lirmm-01886164&#x27E9;</a></li><li>Ahmad Zakaria, Marc Chaumont, Gérard Subsol. Quantitative and Binary Steganalysis in JPEG: A Comparative Study. <i>EUSIPCO: European Signal Processing Conference</i>, Sep 2018, Rome, Italy. pp.1422-1426. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01884006v1">&#x27E8;lirmm-01884006&#x27E9;</a></li><li>Maxime Cozzi, Jean-Marc J.-M. Galliere, Philippe Maurine. Exploiting Phase Information in Thermal Scans for Stealthy Trojan Detection. <i>DSD 2018 - 21st Euromicro Conference on Digital System Design</i>, Aug 2018, Prague, Slovakia. pp.573-576, <a target="_blank" href="https://dx.doi.org/10.1109/DSD.2018.00100">&#x27E8;10.1109/DSD.2018.00100&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01872499v1">&#x27E8;lirmm-01872499&#x27E9;</a></li><li>Sakina Mahboubi, Reza Akbarinia, Patrick Valduriez. Privacy-Preserving Top-k Query Processing in Distributed Systems. <i>Euro-Par: European Conference on Parallel and Distributed Computing</i>, Aug 2018, Turin, Italy. pp.281-292, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-96983-1_20">&#x27E8;10.1007/978-3-319-96983-1_20&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01886160v1">&#x27E8;lirmm-01886160&#x27E9;</a></li><li>Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Louis-Barthelemy Faber, Marie-Lise Flottes, et al.. The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks. <i>IOLTS: International On-Line Testing Symposium</i>, Jul 2018, Platja d’Aro, Spain. pp.214-219, <a target="_blank" href="https://dx.doi.org/10.1109/IOLTS.2018.8474230">&#x27E8;10.1109/IOLTS.2018.8474230&#x27E9;</a>. <a target="_blank" href="https://hal-emse.ccsd.cnrs.fr/emse-01856000v1">&#x27E8;emse-01856000&#x27E9;</a></li><li>Maxime Cozzi, Philippe Maurine, Jean-Marc J.-M. Galliere. Thermal Scans for Detecting Hardware Trojans. <i>COSADE 2018 - 9th International Workshop on Constructive Side-Channel Analysis and Secure Design</i>, Apr 2018, Singapour, Singapore. pp.117-132, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-89641-0_7">&#x27E8;10.1007/978-3-319-89641-0_7&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01823444v1">&#x27E8;lirmm-01823444&#x27E9;</a></li><li>Cetin Sahin, Tristan Allard, Reza Akbarinia, Amr El Abbadi, Esther Pacitti. A Differentially Private Index for Range Query Processing in Clouds. <i>34th IEEE International Conference on Data Engineering (ICDE)</i>, Apr 2018, Paris, France. pp.857-868, <a target="_blank" href="https://dx.doi.org/10.1109/ICDE.2018.00082">&#x27E8;10.1109/ICDE.2018.00082&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01886725v1">&#x27E8;lirmm-01886725&#x27E9;</a></li><li>Mehdi Yedroudj, Frédéric Comby, Marc Chaumont. Yedroudj-Net: An Efficient CNN for Spatial Steganalysis. <i>ICASSP: International Conference on Acoustics, Speech and Signal Processing</i>, Apr 2018, Calgary, Alberta, Canada. pp.2092-2096, <a target="_blank" href="https://dx.doi.org/10.1109/ICASSP.2018.8461438">&#x27E8;10.1109/ICASSP.2018.8461438&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01717550v1">&#x27E8;lirmm-01717550&#x27E9;</a></li><li>Emanuele Valea, Mathieu da Silva, Giorgio Di Natale, Marie-Lise Flottes, Sophie Dupuis, et al.. SI ECCS: SECure context saving for IoT devices. <i>DTIS 2018 - 13th International Conference on Design and Technology of Integrated Systems in Nanoscale Era</i>, Apr 2018, Taormina, Italy. <a target="_blank" href="https://dx.doi.org/10.1109/DTIS.2018.8368561">&#x27E8;10.1109/DTIS.2018.8368561&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01740173v1">&#x27E8;hal-01740173&#x27E9;</a></li><li>Raphael Andreoni Camponogara-Viera, Jean-Max Dutertre, Philippe Maurine, Rodrigo Possamai Bastos. Standard CAD Tool-Based Method for Simulation of Laser-Induced Faults in Large-Scale Circuits. <i>ISPD 2018 - International Symposium on Physical Design</i>, Mar 2018, Monterey, CA, United States. pp.160-167, <a target="_blank" href="https://dx.doi.org/10.1145/3177540.3178243">&#x27E8;10.1145/3177540.3178243&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01743368v1">&#x27E8;lirmm-01743368&#x27E9;</a></li><li>Marc Chaumont. The emergence of Deep Learning in steganography and steganalysis. <i>Journée " Stéganalyse : Enjeux et Méthodes", labelisée par le GDR ISIS et le pré-GDR sécurité</i>, Philippe Carré (XLIM, Poitiers); Marianne Clausel (IECL,Nancy); Farida Enikeeva (LMA, Poitiers); Laurent Navarro (CIS-EMSE, St Etienne), Jan 2018, Poitiers, France. <a target="_blank" href="https://dx.doi.org/10.13140/RG.2.2.35080.32005">&#x27E8;10.13140/RG.2.2.35080.32005&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01777391v1">&#x27E8;lirmm-01777391&#x27E9;</a></li><li>Mehdi Yedroudj, Marc Chaumont, Frédéric Comby. Yedroudj-Net : un réseaux de neurones efficace pour la stéganalyse spatiale. <i>CORESA: COmpression et REprésentation des Signaux Audiovisuels</i>, C. Charrier (GREYC, Université de Caen Normandie); C. Rosenberger (GREYC, ENSICAEN), Nov 2017, Caen, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01777361v1">&#x27E8;lirmm-01777361&#x27E9;</a></li><li>Papa Ndiaye, Marc Chaumont, Mehdi Yedroudj, Ahmad Zakaria. Stéganographie et Stéganalyse des images JPEG Couleur. <i>CORESA: COmpression et REprésentation des Signaux Audiovisuels</i>, C. Charrier (GREYC, Université de Caen Normandie); C. Rosenberger (GREYC, ENSICAEN), Nov 2017, Caen, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01777286v1">&#x27E8;lirmm-01777286&#x27E9;</a></li><li>Maxime Madau, Michel Agoyan, Philippe Maurine. An {EM} Fault Injection Susceptibility Criterion and Its Application to the Localization of Hotspots. <i>CARDIS 2017 - 16th International Conference on Smart Card Research and Advanced Applications</i>, Nov 2017, Lugano, Switzerland. pp.180-195, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-75208-2_11">&#x27E8;10.1007/978-3-319-75208-2_11&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02100194v1">&#x27E8;lirmm-02100194&#x27E9;</a></li><li>Raphael Andreoni Camponogara-Viera, Rodrigo Possamai Bastos, Jean-Max Dutertre, Philippe Maurine. Method for evaluation of transient-fault detection techniques. <i>ESREF: European Symposium on Reliability of Electron devices, Failure physics and analysis</i>, Sep 2017, Bordeaux, France. <a target="_blank" href="https://hal.science/hal-01721081v1">&#x27E8;hal-01721081&#x27E9;</a></li><li>Zhenyu Li, Sebastien Beugnon, William Puech, Adrian G. Bors. Rethinking the high capacity 3D steganography: Increasing its resistance to steganalysis. <i>ICIP: International Conference on Image Processing</i>, Sep 2017, Beijing, China. pp.414-510, <a target="_blank" href="https://dx.doi.org/10.1109/ICIP.2017.8296333">&#x27E8;10.1109/ICIP.2017.8296333&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02023267v1">&#x27E8;lirmm-02023267&#x27E9;</a></li><li>Raphael Andreoni Camponogara-Viera, Jean-Max Dutertre, Rodrigo Possamai Bastos, Philippe Maurine. Role of Laser-Induced IR Drops in the Occurrence of Faults: Assessment and Simulation. <i>DSD 2017 - Euromicro Symposium on Digital System Design</i>, Aug 2017, Vienna, Austria. pp.252-259, <a target="_blank" href="https://dx.doi.org/10.1109/DSD.2017.43">&#x27E8;10.1109/DSD.2017.43&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01699776v1">&#x27E8;lirmm-01699776&#x27E9;</a></li><li>Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie. Encryption Switching Protocols Revisited: Switching Modulo $p$. <i>CRYPTO 2017</i>, Aug 2017, Santa Barbara, United States. pp.255-287, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-63688-7_9">&#x27E8;10.1007/978-3-319-63688-7_9&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01587451v1">&#x27E8;lirmm-01587451&#x27E9;</a></li><li>Raphael Viera, Philippe Maurine, Jean-Max Dutertre, Rodrigo Possamai Bastos. Importance of IR Drops on the Modeling of Laser-Induced Transient Faults. <i>SMACD 2017 - 14th International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design</i>, Jun 2017, Giardini Naxos, Italy. <a target="_blank" href="https://dx.doi.org/10.1109/SMACD.2017.7981593">&#x27E8;10.1109/SMACD.2017.7981593&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01721087v1">&#x27E8;hal-01721087&#x27E9;</a></li><li>Mauro Contini, Giorgio Di Natale, Annelie Heuser, Thomas Poppelmann, Nele Mentens. Do we need a holistic approach for the design of secure IoT systems?. <i>CF: Computing Frontiers</i>, May 2017, Siena, Italy. pp.425-430, <a target="_blank" href="https://dx.doi.org/10.1145/3075564.3079070">&#x27E8;10.1145/3075564.3079070&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01628683v1">&#x27E8;hal-01628683&#x27E9;</a></li><li>Philippe Maurine, Sylvain Guilley. Impacts of Technology Trends on Physical Attacks?. <i>COSADE 2017 - 8th International Workshop on Constructive Side-Channel Analysis and Secure Design</i>, Apr 2017, Paris, France. pp.190-206, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-64647-3_12">&#x27E8;10.1007/978-3-319-64647-3_12&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01690188v1">&#x27E8;lirmm-01690188&#x27E9;</a></li><li>Pauline Puteaux, Dave Trinel, William Puech. High-Capacity Data Hiding in Encrypted Images using MSB Prediction. <i>IPTA: Image Processing Theory Tools and Applications</i>, Dec 2016, Oulu, Finland. <a target="_blank" href="https://dx.doi.org/10.1109/IPTA.2016.7820991">&#x27E8;10.1109/IPTA.2016.7820991&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01888475v1">&#x27E8;hal-01888475&#x27E9;</a></li><li>Amel Tuama, Frédéric Comby, Marc Chaumont. Camera Model Identification With The Use of Deep Convolutional Neural Networks. <i>WIFS: Workshop on Information Forensics and Security</i>, Dec 2016, Abu Dhabi, United Arab Emirates. <a target="_blank" href="https://dx.doi.org/10.1109/WIFS.2016.7823908">&#x27E8;10.1109/WIFS.2016.7823908&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01388975v1">&#x27E8;hal-01388975&#x27E9;</a></li><li>Amel Tuama, Frédéric Comby, Marc Chaumont. Camera model identification based machine learning approach with high order statistics features. <i>EUSIPCO: European Signal Processing Conference</i>, Aug 2016, Budapest, Hungary. pp.1183-1187, <a target="_blank" href="https://dx.doi.org/10.1109/EUSIPCO.2016.7760435">&#x27E8;10.1109/EUSIPCO.2016.7760435&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01374110v1">&#x27E8;hal-01374110&#x27E9;</a></li><li>Andrea Lesavourey, Christophe Negre, Thomas Plantard. Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications. <i>ICETE: International Joint Conference on e-Business and Telecommunications</i>, Jul 2016, Lisbon, Portugal. pp.368-375, <a target="_blank" href="https://dx.doi.org/10.5220/0005998503680375">&#x27E8;10.5220/0005998503680375&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01330898v1">&#x27E8;hal-01330898&#x27E9;</a></li><li>Thomas Plantard, Jean-Marc Robert. Enhanced Digital Signature using RNS Digit Exponent Representation. <i>WAIFI: Workshop on the Arithmetic of Finite Fields</i>, Department of Mathematics of Ghent University, Jul 2016, Gand, Belgium. pp.177-192, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-55227-9_13">&#x27E8;10.1007/978-3-319-55227-9_13&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01337561v1">&#x27E8;hal-01337561&#x27E9;</a></li><li>Papa-Sidy Ba, Sophie Dupuis, Manikandan Palanichamy, Marie-Lise Flottes, Giorgio Di Natale, et al.. Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique. <i>ISVLSI: International Symposium on Very Large Scale Integration</i>, Jul 2016, Pittsburgh, United States. pp.254-259, <a target="_blank" href="https://dx.doi.org/10.1109/ISVLSI.2016.22">&#x27E8;10.1109/ISVLSI.2016.22&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01346529v1">&#x27E8;lirmm-01346529&#x27E9;</a></li><li>Alexis Breust, Christophe Chabot, Jean-Guillaume Dumas, Laurent Fousse, Pascal Giorgi. Recursive double-size fixed precision arithmetic. <i>ICMS: International Congress of Mathematical Software</i>, Jul 2016, Berlin, Germany. pp.223--231, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-42432-3_28">&#x27E8;10.1007/978-3-319-42432-3_28&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00582593v2">&#x27E8;hal-00582593v2&#x27E9;</a></li><li>Alberto Carelli, Giorgio Di Natale, Pascal Trotta, Tiziana Margaria. Towards Model Driven Design of Crypto Primitives and Processes. <i>SAM: Sensor Array and Multichannel Signal Processing</i>, Jul 2016, Rio de Janeiro, Brazil. pp.152-158. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01444948v1">&#x27E8;lirmm-01444948&#x27E9;</a></li><li>Maha Kooli, Giorgio Di Natale, Alberto Bosio. Cache-aware reliability evaluation through LLVM-based analysis and fault injection. <i>IOLTS: International On-Line Testing Symposium</i>, Jul 2016, Sant Feliu de Guixols, Spain. pp.19-22, <a target="_blank" href="https://dx.doi.org/10.1109/IOLTS.2016.7604663">&#x27E8;10.1109/IOLTS.2016.7604663&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01444619v1">&#x27E8;lirmm-01444619&#x27E9;</a></li><li>Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier. Color Image Steganalysis Based On Steerable Gaussian Filters Bank. <i>IH&amp;MMSec: Information Hiding and Multimedia Security</i>, Jun 2016, Vigo, Galicia, Spain. pp.109-114, <a target="_blank" href="https://dx.doi.org/10.1145/2909827.2930799">&#x27E8;10.1145/2909827.2930799&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01374101v1">&#x27E8;hal-01374101&#x27E9;</a></li><li>Imran Wali, Bastien Deveautour, Arnaud Virazel, Alberto Bosio, Patrick Girard, et al.. A Low-Cost Reliability vs. Cost Trade-Off Methodology to Selectively Harden Logic Circuits. <i>ETS: European Test Symposium</i>, May 2016, Amsterdam, Netherlands. <a target="_blank" href="https://dx.doi.org/10.1109/ETS.2016.7519296">&#x27E8;10.1109/ETS.2016.7519296&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01444734v1">&#x27E8;hal-01444734&#x27E9;</a></li><li>Lionel Pibre, Marc Chaumont, Dino Ienco, Jérôme Pasquet. Étude des réseaux de neurones sur la stéganalyse. <i>CORESA: COmpression et REprésentation des Signaux Audiovisuels</i>, May 2016, Nancy, France. <a target="_blank" href="https://hal.science/hal-01374095v1">&#x27E8;hal-01374095&#x27E9;</a></li><li>Tristan Allard, Georges Hébrail, Florent Masseglia, Esther Pacitti. A New Privacy-Preserving Solution for Clustering Massively Distributed Personal Times-Series. <i>ICDE: International Conference on Data Engineering</i>, May 2016, Helsinki, Finland. pp.1370-1373, <a target="_blank" href="https://dx.doi.org/10.1109/ICDE.2016.7498347">&#x27E8;10.1109/ICDE.2016.7498347&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01270268v1">&#x27E8;lirmm-01270268&#x27E9;</a></li><li>Florent Bruguier, Pascal Benoit, Lionel Torres, Lilian Bossuet. Hardware security: From concept to application. <i>EWME: European Workshop on Microelectronics Education</i>, May 2016, Southampton, United Kingdom. <a target="_blank" href="https://dx.doi.org/10.1109/EWME.2016.7496483">&#x27E8;10.1109/EWME.2016.7496483&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01345970v1">&#x27E8;lirmm-01345970&#x27E9;</a></li><li>Maxime Lecomte, Jacques Jean-Alain Fournier, Philippe Maurine. On-Chip Fingerprinting of IC Topology for Integrity Verification. <i>DATE 2016 - 19th Design, Automation and Test in Europe Conference and Exhibition</i>, Mar 2016, Dresden, Germany. pp.133-138, <a target="_blank" href="https://dx.doi.org/10.3850/9783981537079_0169">&#x27E8;10.3850/9783981537079_0169&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01269856v1">&#x27E8;lirmm-01269856&#x27E9;</a></li><li>Lionel Pibre, Jérôme Pasquet, Dino Ienco, Marc Chaumont. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch. <i>EI: Electronic Imaging</i>, Feb 2016, San Fransisco, United States. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01227950v2">&#x27E8;lirmm-01227950v2&#x27E9;</a></li><li>Noemie Beringuier-Boher, Marc Lacruche, David El-Baze, Jean-Max Dutertre, Jean-Baptiste Rigaud, et al.. Body Biasing Injection Attacks in Practice . <i>CS2: Cryptography and Security in Computing Systems</i>, Jan 2016, Prague, Czech Republic. pp.49-54, <a target="_blank" href="https://dx.doi.org/10.1145/2858930.2858940">&#x27E8;10.1145/2858930.2858940&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01434143v1">&#x27E8;lirmm-01434143&#x27E9;</a></li><li>Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier. Color Image Stegananalysis Using Correlations between RGB Channels. <i>IWCC: International Workshop on Cyber Crime</i>, Aug 2015, Toulouse, France. <a target="_blank" href="https://dx.doi.org/10.1109/ARES.2015.44">&#x27E8;10.1109/ARES.2015.44&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01234229v1">&#x27E8;lirmm-01234229&#x27E9;</a></li><li>Marie Paindavoine, Bastien Vialla. Minimizing the number of bootstrappings in fully homomorphic encryption. <i>SAC: Selected Areas in Cryptography</i>, Aug 2015, Sackville, NB, Canada. pp.25-43, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-31301-6_2">&#x27E8;10.1007/978-3-319-31301-6_2&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01371764v1">&#x27E8;lirmm-01371764&#x27E9;</a></li><li>Christophe Negre, Jean-Marc Robert. Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve. <i>SECRYPT 2015 - 12th International Conference on Security and Cryptography</i>, Jul 2015, Colmar, France. pp.202-209, <a target="_blank" href="https://dx.doi.org/10.5220/0005512502020209">&#x27E8;10.5220/0005512502020209&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01206530v1">&#x27E8;hal-01206530&#x27E9;</a></li><li>Jérémie Clément, Bruno Mussard, David Naccache, Lionel Torres. Implementation of AES Using NVM Memories Based on Comparison Function. <i>ISVLSI: International Symposium on Very Large Scale Integration</i>, Jul 2015, Montpellier, France. pp.356-361, <a target="_blank" href="https://dx.doi.org/10.1109/ISVLSI.2015.37">&#x27E8;10.1109/ISVLSI.2015.37&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01421143v1">&#x27E8;lirmm-01421143&#x27E9;</a></li><li>Stephan de Castro, Jean-Max Dutertre, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. Figure of merits of 28nm Si technologies for implementing laser attack resistant security dedicated circuits. <i>ISVLSI: International Symposium on Very Large Scale Integration</i>, Jul 2015, Montpellier, France. pp.362-367, <a target="_blank" href="https://dx.doi.org/10.1109/ISVLSI.2015.76">&#x27E8;10.1109/ISVLSI.2015.76&#x27E9;</a>. <a target="_blank" href="https://hal-emse.ccsd.cnrs.fr/emse-01227138v1">&#x27E8;emse-01227138&#x27E9;</a></li><li>Rémy Druyer, Lionel Torres, Pascal Benoit. A survey on security features in modern FPGAs. <i>ReCoSoC: Reconfigurable Communication-centric Systems-on-Chip</i>, Jun 2015, Brême, Germany. <a target="_blank" href="https://dx.doi.org/10.1109/ReCoSoC.2015.7238102">&#x27E8;10.1109/ReCoSoC.2015.7238102&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01250850v1">&#x27E8;lirmm-01250850&#x27E9;</a></li><li>Christophe Negre, Guilherme Perin. Trade-off Approaches for Leak Resistant Modular Arithmetic in RNS. <i>ACISP: Australasian Conference on Information Security and Privacy</i>, Jun 2015, Brisbane, Australia. pp.107-124, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-19962-7_7">&#x27E8;10.1007/978-3-319-19962-7_7&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01143367v1">&#x27E8;hal-01143367&#x27E9;</a></li><li>Christophe Negre, Thomas Plantard, Jean-Marc Robert. Efficient Modular Exponentiation Based on Multiple Multiplications by a Common Operand. <i>ARITH: Computer Arithmetic</i>, INRIA, Jun 2015, Lyon, France. pp.144-151, <a target="_blank" href="https://dx.doi.org/10.1109/ARITH.2015.24">&#x27E8;10.1109/ARITH.2015.24&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01142327v1">&#x27E8;lirmm-01142327&#x27E9;</a></li><li>Tristan Allard, Georges Hébrail, Florent Masseglia, Esther Pacitti. Chiaroscuro: Transparency and Privacy for Massive Personal Time-Series Clustering. <i>SIGMOD: International Conference on Management of Data</i>, May 2015, Melbourne, Australia. pp.779-794, <a target="_blank" href="https://dx.doi.org/10.1145/2723372.2749453">&#x27E8;10.1145/2723372.2749453&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-01136686v1">&#x27E8;hal-01136686&#x27E9;</a></li><li>Laurent Imbert. Randomizing Scalar Multiplication using Exact Covering Systems of Congruences. <i>Explicit Methods for Abelian Varieties: Kick-off Workshop</i>, May 2015, Calgary, Canada. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01340683v2">&#x27E8;lirmm-01340683v2&#x27E9;</a></li><li>Maha Kooli, Alberto Bosio, Pascal Benoit, Lionel Torres. Software testing and software fault injection. <i>DTIS: Design and Technology of Integrated Systems in Nanoscale Era</i>, Apr 2015, Naples, Italy. <a target="_blank" href="https://dx.doi.org/10.1109/DTIS.2015.7127370">&#x27E8;10.1109/DTIS.2015.7127370&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01297579v1">&#x27E8;lirmm-01297579&#x27E9;</a></li><li>Christophe Negre, Jean-Marc Robert. Recent Advances in Parallel Implementations of Scalar Multiplication over Binary Elliptic Curves. <i>RAIM: Rencontres Arithmétiques de l’Informatique Mathématique</i>, A.Tisserand; D. Menard; S. Duquesne; S. Collange; N. SaintPierre, Apr 2015, Rennes, France. <a target="_blank" href="https://hal.science/hal-01141628v1">&#x27E8;hal-01141628&#x27E9;</a></li><li>Jean-Marc Robert. Software Implementation of Parallelized ECSM over Binary and Prime Fields. <i>Inscrypt: Information Security and Cryptology</i>, Dec 2014, Beijing, China. pp.445-462, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-16745-9_24">&#x27E8;10.1007/978-3-319-16745-9_24&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00998277v2">&#x27E8;hal-00998277v2&#x27E9;</a></li><li>Sébastien Ordas, Ludovic Guillaume-Sage, Karim Tobich, Jean-Max Dutertre, Philippe Maurine. Evidence of a larger EM-induced fault model. <i>CARDIS: Smart Card Research and Advanced Applications</i>, Nov 2014, Paris, France. pp.245-259, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-16763-3_15">&#x27E8;10.1007/978-3-319-16763-3_15&#x27E9;</a>. <a target="_blank" href="https://hal-emse.ccsd.cnrs.fr/emse-01099037v1">&#x27E8;emse-01099037&#x27E9;</a></li><li>Vincent Beroulle, Philippe Candelier, Stephan de Castro, Giorgio Di Natale, Jean-Max Dutertre, et al.. Laser-Induced Fault Effects in Security-Dedicated Circuits. <i>VLSI-SoC: Very Large Scale Integration and System-on-Chip</i>, Oct 2014, Playa del Carmen, Mexico. pp.220-240, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-25279-7_12">&#x27E8;10.1007/978-3-319-25279-7_12&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-01383737v1">&#x27E8;hal-01383737&#x27E9;</a></li><li>Paolo Maistri, Régis Leveugle, Lilian Bossuet, Alain Aubert, Viktor Fischer, et al.. ElectroMagnetic Analysis and Fault Injection onto Secure Circuits. <i>VLSI-SoC: Very Large Scale Integration - System-on-Chip</i>, Oct 2014, Mexico, Mexico. <a target="_blank" href="https://dx.doi.org/10.1109/VLSI-SoC.2014.7004182">&#x27E8;10.1109/VLSI-SoC.2014.7004182&#x27E9;</a>. <a target="_blank" href="https://hal-emse.ccsd.cnrs.fr/emse-01099025v1">&#x27E8;emse-01099025&#x27E9;</a></li><li>Jérôme Pasquet, Sandra Bringay, Marc Chaumont. Steganalysis with cover-source mismatch and a small learning database. <i>EUSIPCO: European Signal Processing Conference</i>, Sep 2014, Lisbon, Portugal. pp.2425-2429. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01234249v1">&#x27E8;lirmm-01234249&#x27E9;</a></li><li>Julien Devigne, Eleonora Guerrini, Fabien Laguillaumie. Proxy Re-Encryption Scheme Supporting a Selection of Delegatees. <i>AFRICACRYPT: Cryptology in Africa</i>, May 2014, Marrakech, Morocco. pp.13-30, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-06734-6_2">&#x27E8;10.1007/978-3-319-06734-6_2&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-00982549v1">&#x27E8;hal-00982549&#x27E9;</a></li><li>Maha Kooli, Giorgio Di Natale. A survey on simulation-based fault injection tools for complex systems. <i>DTIS: Design and Technology of Integrated Systems in Nanoscale Era</i>, May 2014, Santorini, Greece. <a target="_blank" href="https://dx.doi.org/10.1109/DTIS.2014.6850649">&#x27E8;10.1109/DTIS.2014.6850649&#x27E9;</a>. <a target="_blank" href="https://auf.hal.science/hal-01075473v1">&#x27E8;hal-01075473&#x27E9;</a></li><li>Mathieu Carbone, Sébastien Tiran, Sébastien Ordas, Michel Agoyan, Yannick Teglia, et al.. On Adaptive Bandwidth Selection for Efficient MIA. <i>COSADE: Constructive Side-Channel Analysis and Secure Design</i>, Apr 2014, Paris, France. pp.82-97, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-319-10175-0_7">&#x27E8;10.1007/978-3-319-10175-0_7&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01096033v1">&#x27E8;lirmm-01096033&#x27E9;</a></li><li>Jean-Marc Robert. Algorithmes Parallèles de Multiplication Scalaire Optimisée sur Courbes Elliptiques Binaires. <i>C2: Journées Codage et Cryptographie</i>, GT-C2, Mar 2014, Les Sept-Laux, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01121960v1">&#x27E8;lirmm-01121960&#x27E9;</a></li><li>Said Hamdioui, Jean-Luc Danger, Giorgio Di Natale, Fethulah Smailbegovic, Gerard van Battum, et al.. Hacking and Protecting IC Hardware. <i>DATE 2014 - 17th Design, Automation and Test in Europe Conference and Exhibition</i>, Mar 2014, Dresden, Germany. <a target="_blank" href="https://dx.doi.org/10.7873/DATE.2014.112">&#x27E8;10.7873/DATE.2014.112&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01234147v1">&#x27E8;lirmm-01234147&#x27E9;</a></li><li>Jérôme Pasquet, Sandra Bringay, Marc Chaumont. Des millions d'images pour la stéganalyse : inutile !. <i>CORESA: COmpression et REprésentation des Signaux Audiovisuels</i>, Nov 2013, Le Creusot, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01234253v1">&#x27E8;lirmm-01234253&#x27E9;</a></li><li>Rodrigo Possamai Bastos, Frank Sill Torres, Jean-Max Dutertre, Marie-Lise Flottes, Giorgio Di Natale, et al.. A single built-in sensor to check pull-up and pull-down CMOS networks against transient faults. <i>PATMOS: Power and Timing Modeling, Optimization and Simulation</i>, Sep 2013, Karlsruhe, Germany. pp.157-163, <a target="_blank" href="https://dx.doi.org/10.1109/PATMOS.2013.6662169">&#x27E8;10.1109/PATMOS.2013.6662169&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00968621v1">&#x27E8;lirmm-00968621&#x27E9;</a></li><li>Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine. Electromagnetic Analysis on RSA Algorithm Based on RNS. <i>DSD: Digital System Design</i>, Sep 2013, Santander, Spain. pp.345-352, <a target="_blank" href="https://dx.doi.org/10.1109/DSD.2013.44">&#x27E8;10.1109/DSD.2013.44&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00861215v1">&#x27E8;lirmm-00861215&#x27E9;</a></li><li>Nadia El Mrabet. Side Channel Attacks against Pairing over Theta Functions. <i>CAI: Conference on Algebraic Informatics</i>, Sep 2013, Porquerolles, France. pp.132-146, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-642-40663-8_14">&#x27E8;10.1007/978-3-642-40663-8_14&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01197175v1">&#x27E8;hal-01197175&#x27E9;</a></li><li>Sarra Kouider, Marc Chaumont, William Puech. Adaptive Steganography by Oracle (ASO). <i>ICME: International Conference on Multimedia and Expo</i>, Jul 2013, San Jose, United States. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00838993v1">&#x27E8;lirmm-00838993&#x27E9;</a></li><li>Christophe Negre, Jean-Marc Robert. Impact of Optimized Operations AB,AC and AB+CD in Scalar Multiplication over Binary Elliptic Curve. <i>AFRICACRYPT: Cryptology in Africa</i>, Jun 2013, Cairo, Egypt. pp.13-30, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-642-38553-7_16">&#x27E8;10.1007/978-3-642-38553-7_16&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-00724785v2">&#x27E8;hal-00724785v2&#x27E9;</a></li><li>Rodrigo Possamai Bastos, Frank Sill Torres, Jean Max Dutertre, Marie-Lise Flottes, Giorgio Di Natale, et al.. A Bulk Built-in Sensor for Detection of Fault Attacks. <i>HOST: Hardware-Oriented Security and Trust</i>, Jun 2013, Austin, TX, United States. pp.51-54, <a target="_blank" href="https://dx.doi.org/10.1109/HST.2013.6581565">&#x27E8;10.1109/HST.2013.6581565&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01430800v1">&#x27E8;lirmm-01430800&#x27E9;</a></li><li>Pascal Giorgi, Laurent Imbert, Thomas Izard. Parallel modular multiplication on multi-core processors. <i>IEEE Symposium on Computer Arithmetic</i>, Apr 2013, Austin, TX, United States. pp.135-142, <a target="_blank" href="https://dx.doi.org/10.1109/ARITH.2013.20">&#x27E8;10.1109/ARITH.2013.20&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00805242v1">&#x27E8;hal-00805242&#x27E9;</a></li><li>Jean-Marc Robert. Algorithmes et Implémentations Optimisées de Calculs Cryptographiques sur les Courbes Elliptiques Binaires. <i>C2: Journées Codage et Cryptographie</i>, GT-C2, Oct 2012, Dinard, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01121958v1">&#x27E8;lirmm-01121958&#x27E9;</a></li><li>Marc Chaumont, Sarra Kouider. Steganalysis by Ensemble Classifiers with Boosting by Regression, and Post-Selection of Features. <i>ICIP: International Conference on Image Processing</i>, Sep 2012, Orlando, FL, United States. pp.1133-1136, <a target="_blank" href="https://dx.doi.org/10.1109/ICIP.2012.6467064">&#x27E8;10.1109/ICIP.2012.6467064&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00838995v1">&#x27E8;lirmm-00838995&#x27E9;</a></li><li>Pascal Cotret, Guy Gogniat, Jean-Philippe Diguet, Jérémie Crenne. Lightweight reconfiguration security services for AXI-based MPSoCs. <i>FPL 2012 (22nd International Conference on Field Programmable Logic and Applications)</i>, Aug 2012, Oslo, Norway. pp.655-658, <a target="_blank" href="https://dx.doi.org/10.1109/FPL.2012.6339233">&#x27E8;10.1109/FPL.2012.6339233&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00750332v1">&#x27E8;hal-00750332&#x27E9;</a></li><li>Sarra Kouider, Marc Chaumont, William Puech. Technical Points About Adaptive Steganography by Oracle (ASO). <i>EUSIPCO: EUropean SIgnal Processing COnference</i>, Aug 2012, Bucharest, Romania. pp.1703-1707. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00838996v1">&#x27E8;lirmm-00838996&#x27E9;</a></li><li>Adikari Jithra, Anwar Hasan, Christophe Negre. Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F_{2^{1223}}. <i>Selected Areas in Cryptography</i>, Aug 2012, Windsor, Canada. pp.166-183, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-642-35999-6_12">&#x27E8;10.1007/978-3-642-35999-6_12&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00813681v1">&#x27E8;hal-00813681&#x27E9;</a></li><li>Pascal Cotret, Florian Devic, Guy Gogniat, Benoit Badrignans, Lionel Torres. Security enhancements for FPGA-based MPSoCs: a boot-to-runtime protection flow for an embedded Linux-based system. <i>ReCoSoC: Reconfigurable Communication-centric Systems-on-Chip</i>, Jul 2012, York, United Kingdom. pp.1-8. <a target="_blank" href="https://hal.science/hal-00750339v1">&#x27E8;hal-00750339&#x27E9;</a></li><li>Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer, François Poucheret, et al.. Electromagnetic Attacks on Ring Oscillator-Based True Random Number Generator. <i>CryptArchi: Cryptographic Architectures</i>, Jun 2012, Saint-Etienne, France. <a target="_blank" href="https://ujm.hal.science/ujm-00712545v1">&#x27E8;ujm-00712545&#x27E9;</a></li><li>Philippe Maurine, Amine Dehbaoui, François Poucheret, Jean-Max Dutertre, Bruno Robisson, et al.. On the use of the EM medium as a fault injection means. <i>CryptArchi: Cryptographic Architectures</i>, Jun 2012, St-Etienne, France. <a target="_blank" href="https://hal-emse.ccsd.cnrs.fr/emse-00742707v1">&#x27E8;emse-00742707&#x27E9;</a></li><li>Idy Diop, Sidi Mohamed Farsi, Marc Chaumont, Ousmane Khouma, Heulieu Bamar Diouf. Utilisation des codes LDPC en stéganographie. <i>CORESA: COmpression et REprésentation des Signaux Audiovisuels</i>, May 2012, Lille, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00838999v1">&#x27E8;lirmm-00838999&#x27E9;</a></li><li>Sarra Kouider, Marc Chaumont, William Puech. Stéganographie Adaptative par Oracle (ASO). <i>CORESA: COmpression et REprésentation des Signaux Audiovisuels</i>, May 2012, Lille, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00838997v1">&#x27E8;lirmm-00838997&#x27E9;</a></li><li>Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer, François Poucheret, et al.. Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator. <i>COSADE: Constructive Side-Channel Analysis and Secure Design</i>, May 2012, Darmstadt, Germany. pp.151-166, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-642-29912-4_12">&#x27E8;10.1007/978-3-642-29912-4_12&#x27E9;</a>. <a target="_blank" href="https://ujm.hal.science/ujm-00699618v1">&#x27E8;ujm-00699618&#x27E9;</a></li><li>Pascal Cotret, Jérémie Crenne, Guy Gogniat, Jean-Philippe Diguet. Bus-based MPSoC security through communication protection: A latency-efficient alternative. <i>FCCM 2012 (20th Annual IEEE International Symposium on Field-Programmable Custom Computing Machines)</i>, Apr 2012, Toronto, Canada. pp.200-207. <a target="_blank" href="https://hal.science/hal-00750343v1">&#x27E8;hal-00750343&#x27E9;</a></li><li>Dalila Goudia, Marc Chaumont, William Puech, Naima Hadj Said. Un Schéma Conjoint de Dissimulation de Données (Data Hiding) dans JPEG2000 basé sur la Quantification Codée par Treillis (TCQ). <i>GRETSI: Groupe d'Etude du Traitement du Signal et des Images</i>, Sep 2011, Bordeaux, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839003v1">&#x27E8;lirmm-00839003&#x27E9;</a></li><li>Dalila Goudia, Marc Chaumont, William Puech, Naima Nadj Said. A Joint Trellis Coded Quantization (TCQ) Data Hiding Scheme in the JPEG2000 Part 2 Coding Framework. <i>EUSIPCO: EUropean SIgnal Processing COnference</i>, Aug 2011, Barcelona, Spain. pp.1110-1114. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839004v1">&#x27E8;lirmm-00839004&#x27E9;</a></li><li>Murat Cenk, Christophe Negre, Anwar Hasan. Improved Three-Way Split Formulas for Binary Polynomial Multiplication. <i>SAC: Selected Areas in Cryptography</i>, Aug 2011, Toronto, Canada. pp.384-398, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-642-28496-0_23">&#x27E8;10.1007/978-3-642-28496-0_23&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-00813666v1">&#x27E8;hal-00813666&#x27E9;</a></li><li>Marc Chaumont, Dalila Goudia. TCQ Practical Evaluation in the Hyper-Cube Watermarking Framework. <i>ICME: International Conference on Multimedia and Expo</i>, Jul 2011, Barcelona, Spain. <a target="_blank" href="https://dx.doi.org/10.1109/ICME.2011.6012007">&#x27E8;10.1109/ICME.2011.6012007&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839005v1">&#x27E8;lirmm-00839005&#x27E9;</a></li><li>Marc Chaumont. Ensuring security of H.264 videos by using watermarking. <i>SPIE Defense, Security, and Sensing 2011</i>, May 2011, Orlando, Florida, United States. pp.10. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839006v1">&#x27E8;lirmm-00839006&#x27E9;</a></li><li>Florian Devic, Lionel Torres, Benoit Badrignans. Securing Boot of an Embedded Linux on FPGA. <i>IPDPS: International Parallel and Distributed Processing Symposium</i>, May 2011, Anchorage, Antarctica. pp.189-195, <a target="_blank" href="https://dx.doi.org/10.1109/IPDPS.2011.141">&#x27E8;10.1109/IPDPS.2011.141&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00818742v1">&#x27E8;lirmm-00818742&#x27E9;</a></li><li>Dalila Goudia, Marc Chaumont, William Puech, Naima Hadj Said. A Joint JPEG2000 Compression and Watermarking System Using a TCQ-Based Quantization Scheme. <i>Electronic Imaging</i>, Jan 2011, San Fransisco, CA, United States. pp.78820C, <a target="_blank" href="https://dx.doi.org/10.1117/12.872122">&#x27E8;10.1117/12.872122&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839373v1">&#x27E8;lirmm-00839373&#x27E9;</a></li><li>Marc Chaumont, Dalila Goudia, William Puech. Hyper-Cube Watermarking Scheme. <i>Electronic Imaging</i>, Jan 2011, San Fransisco, CA, United States. pp.78820B, <a target="_blank" href="https://dx.doi.org/10.1117/12.872107">&#x27E8;10.1117/12.872107&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839371v1">&#x27E8;lirmm-00839371&#x27E9;</a></li><li>Dalila Goudia, Marc Chaumont, William Puech, Naima Hadj Said. Tatouage et Compression Conjoint dans JPEG2000 avec un Algorithme de Quantification Codée par Treillis (TCQ). <i>CORESA: COmpression et REprésentation des Signaux Audiovisuels</i>, Oct 2010, Lyon, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839378v1">&#x27E8;lirmm-00839378&#x27E9;</a></li><li>Zafar Shahid, Marc Chaumont, William Puech. Spread Spectrum-Based Watermarking for Tardos Code-Based Fingerprinting for H.264/AVC Video. <i>ICIP: International Conference on Image Processing</i>, Sep 2010, Hong Kong, China. pp.2105-2108, <a target="_blank" href="https://dx.doi.org/10.1109/ICIP.2010.5652607">&#x27E8;10.1109/ICIP.2010.5652607&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839379v1">&#x27E8;lirmm-00839379&#x27E9;</a></li><li>Florian Devic, Lionel Torres, Benoit Badrignans. Secure Protocol Implementation for Remote Bitstream Update Preventing Replay Attacks on FPGA. <i>FPL'10: 20th International Conference on Field Programmable Logic and Applications</i>, Aug 2010, Milano, Italy. pp.179-182, <a target="_blank" href="https://dx.doi.org/10.1109/FPL.2010.44">&#x27E8;10.1109/FPL.2010.44&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00818744v1">&#x27E8;lirmm-00818744&#x27E9;</a></li><li>Zafar Shahid, Marc Chaumont, William Puech. Over the Real-Time Selective Encryption of AVS Video Coding Standard. <i>EUSIPCO: EUropean SIgnal Processing COnference</i>, Aug 2010, Aalborg, Denmark. pp.2116-2120. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00840354v1">&#x27E8;lirmm-00840354&#x27E9;</a></li><li>Zafar Shahid, Marc Chaumont, William Puech. Selective Encryption of C2DVLC of AVS Video Coding Standard for I &amp; P Frames. <i>ICME: International Conference on Multimedia and Expo</i>, Jul 2010, Suntec City, Singapore. pp.1655-1660, <a target="_blank" href="https://dx.doi.org/10.1109/ICME.2010.5582960">&#x27E8;10.1109/ICME.2010.5582960&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839384v1">&#x27E8;lirmm-00839384&#x27E9;</a></li><li>Marc Chaumont. H.264 Video Watermarking: Applications, Principles, Deadlocks, and Future. <i>IPTA: Image Processing Theory, Tools and Applications</i>, Jul 2010, Paris, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00577950v1">&#x27E8;lirmm-00577950&#x27E9;</a></li><li>Marc Chaumont. A Novel Embedding Technique For Dirty Paper Trellis Codes Watermarking. <i>Electronic Imaging</i>, Jan 2010, San Jose, CA, United States. pp.754311, <a target="_blank" href="https://dx.doi.org/10.1117/12.839853">&#x27E8;10.1117/12.839853&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00464203v1">&#x27E8;lirmm-00464203&#x27E9;</a></li><li>Nicolas Méloni, Christophe Negre, M. Anwar Hasan. High Performance GHASH Function for Long Messages. <i>ACNS: Applied Cryptography and Network Security</i>, 2010, Beijing, China. pp.154-167, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-642-13708-2_10">&#x27E8;10.1007/978-3-642-13708-2_10&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01279437v1">&#x27E8;hal-01279437&#x27E9;</a></li><li>Lionel Torres, Victor Lomné, Philippe Maurine, Amine Dehbaoui. Fingerprinting Hardware Security Module Using ICs Radiations. <i>EMC Compo 2009 - 7th International Workshop on Electromagnetic Compatibility of Integrated Circuits</i>, Nov 2009, Toulouse, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00433331v1">&#x27E8;lirmm-00433331&#x27E9;</a></li><li>Omar Berrezoug, Marc Chaumont. Tatouage robuste aux attaques de désynchronisations. <i>MajecSTIC : MAnifestation des JEunes Chercheurs en Sciences et Technologies de l'Information et de la Communication</i>, Nov 2009, Avignon, France. pp.8. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00464243v1">&#x27E8;lirmm-00464243&#x27E9;</a></li><li>Pascal Giorgi, Thomas Izard, Arnaud Tisserand. Comparison of Modular Arithmetic Algorithms on GPUs. <i>ParCo'09: International Conference on Parallel Computing</i>, France. pp.N/A. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00424288v2">&#x27E8;lirmm-00424288v2&#x27E9;</a></li><li>François Trousset, Pascal Poncelet, Florent Masseglia. SAX: A Privacy Preserving General Purpose Method applied to Detection of Intrusions. <i>ACM First International Workshop on Privacy and Anonymity for Very Large Datasets, join with CIKM 09</i>, Nov 2009, Hong Kong, China. pp.17-24. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00430646v1">&#x27E8;lirmm-00430646&#x27E9;</a></li><li>Marc Chaumont. Une nouvelle technique pour le tatouage par Dirty Paper Trellis Code (DPTC). <i>GRETSI'09 : 22ème Colloque GRETSI sur le traitement du signal et des images</i>, Oct 2009, Dijon, France, pp.4. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00415891v1">&#x27E8;lirmm-00415891&#x27E9;</a></li><li>Marc Chaumont. Psychovisual Rotation-Based DPTC Watermarking Scheme. <i>EUSIPCO: European Signal Processing Conference</i>, Aug 2009, Glasgow, United Kingdom. pp.2107-2111. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00412951v1">&#x27E8;lirmm-00412951&#x27E9;</a></li><li>Nadia El Mrabet. What about Vulnerability to a Fault Attack of the Miller Algorithm during an Identity Based Protocol?. <i>ISA'09: The 3rd International Conference on Information and Assurance</i>, Jun 2009, Séoul, South Korea. pp.122-134. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00387057v1">&#x27E8;lirmm-00387057&#x27E9;</a></li><li>Thomas Ordas, Ali Alaeldine, Philippe Maurine, Richard Perdriau, Lionel Torres, et al.. Evaluation of Countermeasures against Electromagnetic Analysis. <i>EMC Europe: Electromagnetic Compatibility</i>, Jun 2009, Athens, Greece. <a target="_blank" href="https://dx.doi.org/10.1109/EMCEUROPE.2009.5189724">&#x27E8;10.1109/EMCEUROPE.2009.5189724&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-01271857v1">&#x27E8;hal-01271857&#x27E9;</a></li><li>Jithra Adikari, Vassil Dimitrov, Laurent Imbert. Hybrid binary-ternary joint sparse form and its application in elliptic curve cryptography. <i>ARITH'2009: 19th Symposium on Computer Arithmetic</i>, 2009, Portland, Oregon, United States. pp.076-082. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00430693v1">&#x27E8;lirmm-00430693&#x27E9;</a></li><li>Pascal Giorgi, Laurent Imbert, Thomas Izard. Optimizing Elliptic Curve Scalar Multiplication for Small Scalars. <i>Mathematics for Signal and Information Processing</i>, 2009, San Diego, CA, United States. pp.74440N, <a target="_blank" href="https://dx.doi.org/10.1117/12.827689">&#x27E8;10.1117/12.827689&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00424282v1">&#x27E8;lirmm-00424282&#x27E9;</a></li><li>Laurent Imbert, Michael J. Jacobson Jr, Arthur Schmidt. Fast ideal cubing in quadratic number and function fields. <i>CHiLE: Conference on Hyperelliptic curves, discrete Logarithms, Encryption, etc.</i>, 2009, Frutillar, Chile. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00430686v1">&#x27E8;lirmm-00430686&#x27E9;</a></li><li>Christophe Doche, Laurent Imbert. The Double-Base Number System in Elliptic Curve Cryptography. <i>42nd Asilomar Conference on Signals, Systems and Computers</i>, Oct 2008, Pacific Grove, CA, United States. pp.777-780. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00374045v1">&#x27E8;lirmm-00374045&#x27E9;</a></li><li>Patrice Séébold. Mots-Binaires sans k-Chevauchement. <i>JORCAD'08: Actes des JOurnées Rouennaises de Combinatoire et Algorithmique en l'Honneur de Jean-Pierre Duval, Professeur Emerite</i>, France. pp.47-49. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00333387v1">&#x27E8;lirmm-00333387&#x27E9;</a></li><li>Rafael A. Soares, Ney Calazans, Victor Lomné, Philippe Maurine, Lionel Torres, et al.. Evaluating the Robustness of Secure Triple Track Logic Through Prototyping. <i>SBCCI'08: Symposium on Integrated Circuits and Systems Design</i>, Sep 2008, Gramado, Brazil, France. pp.193-198, <a target="_blank" href="https://dx.doi.org/10.1145/1404371.1404425">&#x27E8;10.1145/1404371.1404425&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00373516v1">&#x27E8;lirmm-00373516&#x27E9;</a></li><li>Julien Francq, Jean-Baptiste Rigaud, Pascal Manet, Assia Tria, Arnaud Tisserand. Error Detection for Borrow-Save Adders Dedicated to ECC Unit. <i>FDTC 2008 - 5th Workshop on Fault Diagnosis and Tolerance in Cryptography</i>, Aug 2008, Washington, DC, United States. pp.77-86, <a target="_blank" href="https://dx.doi.org/10.1109/FDTC.2008.17">&#x27E8;10.1109/FDTC.2008.17&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00316796v1">&#x27E8;lirmm-00316796&#x27E9;</a></li><li>Victor Lomné, Rafael A. Soares, Thomas Ordas, Philippe Maurine, Lionel Torres, et al.. Prototyping Secure Triple Track Logic (STTL) Robustness Against DPA &amp; DEMA on FPGA. <i>CryptArchi: Cryptographic Architectures</i>, Jun 2008, Tregastel, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00373539v1">&#x27E8;lirmm-00373539&#x27E9;</a></li><li>Taha Beyrouthy, Alin Razafindraibe, Laurent Fesquet, Marc Renaudin, Sumanta Chaudhuri, et al.. A Novel Asynchronous e-FPGA Architecture for Security Applications. <i>ICFPT 2007 - IEEE International Conference on Field-Programmable Technology</i>, Dec 2007, Kitakyusyu, Japan. pp.369-372, <a target="_blank" href="https://dx.doi.org/10.1109/FPT.2007.4439288">&#x27E8;10.1109/FPT.2007.4439288&#x27E9;</a>. <a target="_blank" href="https://telecom-paris.hal.science/hal-04510604v1">&#x27E8;hal-04510604&#x27E9;</a></li><li>Julien Francq, Jean-Baptiste Rigaud, Pascal Manet, Jean-Claude Bajard, Arnaud Tisserand. Amélioration de la sécurité des circuits intégrés par codage de l'information. <i>JNRDM'07: 10ème Journées Nationales du Réseau Doctoral en Microélectronique</i>, Lille, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00182636v1">&#x27E8;lirmm-00182636&#x27E9;</a></li><li>Jean-Claude Bajard, Nadia El Mrabet. Pairing in Cryptography: an Arithmetic Point of View. <i>Advanced Signal Processing Algorithms, Architectures, and Implementations XVII</i>, Aug 2007, San Diego, California, United States. <a target="_blank" href="https://dx.doi.org/10.1117/12.733789">&#x27E8;10.1117/12.733789&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00181362v1">&#x27E8;lirmm-00181362&#x27E9;</a></li><li>Laurent Imbert, Agostinho Peirera, Arnaud Tisserand. A Library for Prototyping the Computer Arithmetic Level in Elliptic Curve Cryptography. <i>Advanced Signal Processing Algorithms, Architectures and Implementations XVII</i>, Aug 2007, San Diego, California, United States. pp.1-9 (66970N), <a target="_blank" href="https://dx.doi.org/10.1117/12.733652">&#x27E8;10.1117/12.733652&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00153369v1">&#x27E8;lirmm-00153369&#x27E9;</a></li><li>Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. An On-Line Fault Detection Scheme for SBoxes in Secure Circuits. <i>IOLTS 2007 - 13th IEEE International On-Line Testing and Robust System Design Symposium</i>, Jul 2007, Heraklion, Crete, Greece. pp.57-62, <a target="_blank" href="https://dx.doi.org/10.1109/IOLTS.2007.16">&#x27E8;10.1109/IOLTS.2007.16&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00163244v1">&#x27E8;lirmm-00163244&#x27E9;</a></li><li>Nicolas Méloni. New Point Addition Formulae for ECC Applications. <i>WAIFI: Workshop on the Arithmetic of Finite Fields</i>, Jun 2007, Madrid, Spain. pp.189-201, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-540-73074-3_15">&#x27E8;10.1007/978-3-540-73074-3_15&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00188957v1">&#x27E8;lirmm-00188957&#x27E9;</a></li><li>Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre, Marion Doulcier. Test and Security. <i>CryptArchi: Cryptographic Architectures</i>, Jun 2007, Montpellier, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00163017v1">&#x27E8;lirmm-00163017&#x27E9;</a></li><li>Andrew Byrne, Nicolas Méloni, Francis Crowe, William P. Marnane, Arnaud Tisserand, et al.. SPA Resistant Elliptic Curve Cryptosystem using Addition Chains. <i>ITNG'07: 4th International Conference on Information Technology</i>, Apr 2007, Las Vegas, Nevada, U.S.A., pp.995-1000, <a target="_blank" href="https://dx.doi.org/10.1109/ITNG.2007.185">&#x27E8;10.1109/ITNG.2007.185&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00153368v1">&#x27E8;lirmm-00153368&#x27E9;</a></li><li>Marc Chaumont, William Puech. A Fast And Efficient Method To Protect Color Images. <i>Electronic Imaging</i>, Jan 2007, San Jose, CA, United States. pp.65081T, <a target="_blank" href="https://dx.doi.org/10.1117/12.702741">&#x27E8;10.1117/12.702741&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00130160v1">&#x27E8;lirmm-00130160&#x27E9;</a></li><li>Christophe Doche, Laurent Imbert. Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. <i>INDOCRYPT</i>, Dec 2006, Kolkata, India. pp.335-348, <a target="_blank" href="https://dx.doi.org/10.1007/11941378_24">&#x27E8;10.1007/11941378_24&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00125442v1">&#x27E8;lirmm-00125442&#x27E9;</a></li><li>Marc Chaumont, William Puech. A DCT-Based Data-Hiding Method to Embed the Color Information in a JPEG Grey Level Image. <i>EUSIPCO: European Signal Processing Conference</i>, Nov 2006, Pise, Italy. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00125715v1">&#x27E8;lirmm-00125715&#x27E9;</a></li><li>Benoit Badrignans, Daniel Mesquita, Jean-Claude Bajard, Lionel Torres, Gilles Sassatelli, et al.. Implémentation Matérielle d'une Arithmétique Résistante aux Fuites. <i>RenPar/ SympAAA/ CFSE - Rencontres Francophones en Parallélisme, Architecture, Adéquation Algorithmes Architecture et Système</i>, Oct 2006, Canet en Roussillon, France. pp.57-74. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00107317v1">&#x27E8;lirmm-00107317&#x27E9;</a></li><li>Jean-Claude Bajard, Sylvain Duquesne, Milos Ercegovac, Nicolas Méloni. Residue systems efficiency for modular products summation: Application to Elliptic Curves Cryptography. <i>Proceedings of SPIE : Advanced Signal Processing Algorithms, Architectures, and Implementations XVI</i>, Aug 2006, pp.0. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00146450v1">&#x27E8;lirmm-00146450&#x27E9;</a></li><li>Ryan Glabb, Laurent Imbert, Graham A. Jullien, Arnaud Tisserand, Nicolas Veyrat-Charvillon. Multi-mode Operator for SHA-2 Hash Functions. <i>ERSA: Engineering of Reconfigurable Systems and Algorithms</i>, Jun 2006, Las Vegas, NV, United States. pp.207-210. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00125521v1">&#x27E8;lirmm-00125521&#x27E9;</a></li><li>Philippe Poignet, Gérard Poisson. Session robotique médicale La conception de robots pour l'assistance aux gestes médicaux et chirurgicaux. <i>JNRR 2005 - 5e Journées Nationales de la Recherche en Robotique</i>, Oct 2005, Guidel, France. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04005224v1">&#x27E8;lirmm-04005224&#x27E9;</a></li><li>Daniel Gomes Mesquita, Jean-Denis Techer, Lionel Torres, Gilles Sassatelli, Gaston Cambon, et al.. Current Mask Generation: A Transistor Level Security Against DPA Attacks. <i>SBCCI 2005 - 18th annual symposium on Integrated circuits and system design</i>, Sep 2005, Florianolpolis, Brazil. pp.115-120, <a target="_blank" href="https://dx.doi.org/10.1145/1081081.1081114">&#x27E8;10.1145/1081081.1081114&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03704230v1">&#x27E8;lirmm-03704230&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Poster de conférence<span class="wphal-nbmetadata" style="margin-left:10px">9 document</span></h3><div class="grp-content"><ul><li>Loïc France, Florent Bruguier, David Novo, Pascal Benoit. Forgetful Counters for Rowhammer Detection. <i>CHES 2024 - Conference on Cryptographic Hardware and Embedded Systems</i>, Sep 2024, Hallifax, Canada. <a target="_blank" href="https://ches.iacr.org/2024/"></a>, 2024. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04711807v1">&#x27E8;lirmm-04711807&#x27E9;</a></li><li>Nassim Riadi, Florent Bruguier, Marie-Lise Flottes, Sophie Dupuis, Pascal Benoit. Full key recovery for advanced Logic Locking Schemes. <i>CHES 2024 - Conference on Cryptographic Hardware and Embedded Systems</i>, Sep 2024, Halifax, Canada. <a target="_blank" href="https://ches.iacr.org"></a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04689311v1">&#x27E8;lirmm-04689311&#x27E9;</a></li><li>Selena Lamari, Nadjia Benblidia, Chouki Tibermacine, Christelle Urtado, Sylvain Vauttier. Assistance à l’ingénierie de logiciels pour mieux protéger la vie privée des utilisateurs. <i>Journées nationales du GdR Génie de la Programmation et du Logiciel (GdR GPL)</i>, Jun 2024, Strasbourg, France. 2024. <a target="_blank" href="https://imt-mines-ales.hal.science/hal-04689927v1">&#x27E8;hal-04689927&#x27E9;</a></li><li>Loïc France, Florent Bruguier, Maria Mushtaq, David Novo, Pascal Benoit. Implementation of Rowhammer Effect in gem5. <i>15e Colloque National du GDR SoC²</i>, Jun 2021, Rennes, France. <a target="_blank" href="https://www.gdr-soc.cnrs.fr/6148-2/"></a>, 2021. <a target="_blank" href="https://hal.umontpellier.fr/hal-03284443v1">&#x27E8;hal-03284443&#x27E9;</a></li><li>Emanuele Valea, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre. Encryption Techniques for Test Infrastructures. <i>13e Colloque National Du GDR SoC²</i>, Jun 2019, Montpellier, France. <a target="_blank" href="http://www.gdr-soc.cnrs.fr/colloque-2019/"></a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02306922v1">&#x27E8;lirmm-02306922&#x27E9;</a></li><li>Emanuele Valea, Mathieu da Silva, Giorgio Di Natale, Marie-Lise Flottes, Sophie Dupuis, et al.. SECCS: SECure Context Saving for IoT Devices. <i>12e Colloque National du GDR SoC/SiP</i>, Jun 2018, Paris, France. 2018. <a target="_blank" href="https://hal.science/hal-02042659v1">&#x27E8;hal-02042659&#x27E9;</a></li><li>Jean-Marc Robert. État Des Lieux Attaques Passives Courbes Elliptiques. <i>EJCIM: École Jeunes Chercheurs en Informatique Mathématique</i>, Apr 2013, Perpignan, France. <a target="_blank" href="http://ejcim2013.univ-perp.fr/index.php?page=accueil"></a>, 2013. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00862374v1">&#x27E8;lirmm-00862374&#x27E9;</a></li><li>Marc Chaumont. A Fast Embedding Technique For Dirty Paper Trellis Watermarking. Anthony T.S. Ho; Yun Q. Shi; H.J Kim; Mauro Barni. <i>IWDW: International Workshop on Digital Watermarking</i>, Aug 2009, Guildford, United Kingdom. <a target="_blank" href="http://www.iwdw.org.uk/">Springer</a>, 8th International Workshop on Digital Watermarking, LNCS (5703), pp.110-120, 2009, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-642-03688-0_12">&#x27E8;10.1007/978-3-642-03688-0_12&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00411704v1">&#x27E8;lirmm-00411704&#x27E9;</a></li><li>Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. A Dependable Parallel Architecture for SBoxes. <i>ReCoSoc'07: International Workshop on Reconfigurable Communication Centric System-On-Chips</i>, Jun 2007, Montpellier, France. pp.CD-ROM, 2007. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00163414v1">&#x27E8;lirmm-00163414&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">N°spécial de revue/special issue<span class="wphal-nbmetadata" style="margin-left:10px">1 document</span></h3><div class="grp-content"><ul><li>Safwan El Assad, René Lozi, William Puech. Special Issue on Cryptography and Its Applications in Information Security. <i>Applied Sciences</i>, 12 (5), pp.2588-2590, 2022, <a target="_blank" href="https://dx.doi.org/10.3390/app12052588">&#x27E8;10.3390/app12052588&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03594168v1">&#x27E8;hal-03594168&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Ouvrages (y compris édition critique et traduction)<span class="wphal-nbmetadata" style="margin-left:10px">2 document</span></h3><div class="grp-content"><ul><li>William Puech. Multimedia Security 2<br> Biometrics, Video Surveillance and Multimedia Encryption. Wiley, 1, 2022, Print ISBN:9781789450279 |Online ISBN:9781119987390. <a target="_blank" href="https://dx.doi.org/10.1002/9781119987390">&#x27E8;10.1002/9781119987390&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03833697v1">&#x27E8;lirmm-03833697&#x27E9;</a></li><li>William Puech. Multimedia Security 1<br> Authentication and Data Hiding. Wiley, 1, 2022, <a target="_blank" href="https://dx.doi.org/10.1002/9781119901808">&#x27E8;10.1002/9781119901808&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03833713v1">&#x27E8;lirmm-03833713&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Chapitres d'ouvrage<span class="wphal-nbmetadata" style="margin-left:10px">19 document</span></h3><div class="grp-content"><ul><li>Pauline Puteaux, William Puech. Data Hiding in the Encrypted Domain. <i>Multimedia Security 2</i>, John Wiley &amp; Sons, Ltd, pp.215-257, 2022, Online ISBN: 9781119987390 Print ISBN: 9781789450279. <a target="_blank" href="https://dx.doi.org/10.1002/9781119987390.ch7">&#x27E8;10.1002/9781119987390.ch7&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03778591v1">&#x27E8;hal-03778591&#x27E9;</a></li><li>Sebastien Beugnon, Pauline Puteaux, William Puech. Sharing Secret Images and 3D Objects. <i>Multimedia Security 2</i>, John Wiley &amp; Sons, Ltd, pp.259-292, 2022, Online ISBN: 9781119987390 Print ISBN: 9781789450279. <a target="_blank" href="https://dx.doi.org/10.1002/9781119987390.ch8">&#x27E8;10.1002/9781119987390.ch8&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03778592v1">&#x27E8;hal-03778592&#x27E9;</a></li><li>Vincent Itier, Pauline Puteaux, William Puech. Image Crypto-Compression. <i>Multimedia Security 2</i>, John Wiley &amp; Sons, Ltd, pp.91-128, 2022, Online ISBN: 9781119987390 Print ISBN: 9781789450279. <a target="_blank" href="https://dx.doi.org/10.1002/9781119987390.ch4">&#x27E8;10.1002/9781119987390.ch4&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03778589v1">&#x27E8;hal-03778589&#x27E9;</a></li><li>Patrick Bas, Rémi Cogranne, Marc Chaumont. Steganography: Embedding Data Into Multimedia Content. <i>Multimedia Security 1</i>, Chapter 5, Wiley, pp.161-188, 2022, Online: 9781119901808 Print: 9781789450262. <a target="_blank" href="https://dx.doi.org/10.1002/9781119901808">&#x27E8;10.1002/9781119901808&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03601267v1">&#x27E8;hal-03601267&#x27E9;</a></li><li>Rémi Cogranne, Marc Chaumont, Patrick Bas. Steganalysis: Detection of Hidden Data in Multimedia Content. <i>Multimedia Security 1: Authentication and Data Hiding</i>, 1, Wiley, Chapter 8, 2022, Online ISBN: 9781119901808 Print ISBN: 9781789450262. <a target="_blank" href="https://dx.doi.org/10.1002/9781119901808.ch8">&#x27E8;10.1002/9781119901808.ch8&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03815641v1">&#x27E8;lirmm-03815641&#x27E9;</a></li><li>Marcello Traiola, Bastien Deveautour, Alberto Bosio, Patrick Girard, Arnaud Virazel. Test and Reliability of Approximate Hardware. <i>Approximate Computing</i>, Springer International Publishing, pp.233-266, 2022, <a target="_blank" href="https://dx.doi.org/10.1007/978-3-030-98347-5_10">&#x27E8;10.1007/978-3-030-98347-5_10&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-03888016v1">&#x27E8;hal-03888016&#x27E9;</a></li><li>Pauline Puteaux, William Puech. Insertion de données cachées dans le domaine chiffré. <i>Sécurité multimédia 2 - Biométrie, protection et chiffrement multimédia</i>, ISTE Group, pp.233-277, 2021, 9781789480276. <a target="_blank" href="https://dx.doi.org/10.51926/ISTE.9027.ch7">&#x27E8;10.51926/ISTE.9027.ch7&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03778587v1">&#x27E8;hal-03778587&#x27E9;</a></li><li>Vincent Itier, Pauline Puteaux, William Puech. Crypto-compression d’images. <i>Sécurité multimédia 2 - Biométrie, protection et chiffrement multimédia</i>, ISTE Group, pp.105-144, 2021, 9781789480276. <a target="_blank" href="https://dx.doi.org/10.51926/ISTE.9027.ch4">&#x27E8;10.51926/ISTE.9027.ch4&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03778586v1">&#x27E8;hal-03778586&#x27E9;</a></li><li>Patrick Bas, Rémi Cogranne, Marc Chaumont. Stéganographie : insertion d’informations dans des contenus multimédias. <i>Sécurité Multimédia - Partie 1 : Authentification et Insertion de Données Cachées</i>, Chapitre 5, ISTE Group, pp.171-200, 2021, 9781789480269. <a target="_blank" href="https://dx.doi.org/10.51926/ISTE.9026.ch5">&#x27E8;10.51926/ISTE.9026.ch5&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03819891v1">&#x27E8;lirmm-03819891&#x27E9;</a></li><li>Rémi Cogranne, Patrick Bas, Marc Chaumont. Stéganalyse : détection d'information cachée dans des contenus multimédias. <i>Sécurité Multimédia - Partie 1 : Authentification et Insertion de Données Cachées</i>, Chapitre 8, pp.261-303, 2021, 9781789480269. <a target="_blank" href="https://dx.doi.org/10.51926/ISTE.9026.ch8">&#x27E8;10.51926/ISTE.9026.ch8&#x27E9;</a>. <a target="_blank" href="https://utt.hal.science/hal-02470070v1">&#x27E8;hal-02470070&#x27E9;</a></li><li>Sébastien Beugnon, Pauline Puteaux, William Puech. Partage d’images et d’objets 3D secrets. <i>Sécurité multimédia 2 - Biométrie, protection et chiffrement multimédia</i>, ISTE Group, pp.279-312, 2021, 9781789480276. <a target="_blank" href="https://dx.doi.org/10.51926/ISTE.9027.ch8">&#x27E8;10.51926/ISTE.9027.ch8&#x27E9;</a>. <a target="_blank" href="https://hal.science/hal-03778588v1">&#x27E8;hal-03778588&#x27E9;</a></li><li>Marc Chaumont. Deep Learning in steganography and steganalysis. M. Hassaballah. <i>Digital Media Steganography: Principles, Algorithms, Advances</i>, Elsevier, pp.321-349, 2020, Chapter 14 Deep Learning in steganography and steganalysis, 978-0-12-819439-3. <a target="_blank" href="https://dx.doi.org/10.1016/B978-0-12-819438-6.00022-0">&#x27E8;10.1016/B978-0-12-819438-6.00022-0&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02087729v2">&#x27E8;lirmm-02087729v2&#x27E9;</a></li><li>Mohamed Jawad, Patricia Serrano-Alvarado, Patrick Valduriez. Supporting Data Privacy in P2P Systems. Richard Chbeir and Bechara Al Bouna. <i>Security and Privacy Preserving in Social Networks</i>, Springer, 50 p., 2013. <a target="_blank" href="https://hal.science/hal-00807625v1">&#x27E8;hal-00807625&#x27E9;</a></li><li>Zafar Shahid, Marc Chaumont, William Puech. Joint Entropy Coding and Encryption in AVS Video Codec. Zafar Shahid. <i>Recent Trends in Image and Video Processin</i>, <a target="_blank" href="http://www.iconceptpress.com/www/site/publication.papers.php?publicationID=BK021A">iConcept Press</a>, pp.19, 2013, 978-14775548-3-8. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00807064v1">&#x27E8;lirmm-00807064&#x27E9;</a></li><li>Kaouthar Bousselam, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. Chapitre 6 : On Countermeasures Against Fault Attacks on the Advanced Encryption Standard. Marc Joye and Michael Tunstall. <i>Fault Analysis in Cryptography</i>, <a target="_blank" href="http://www.springer.com/computer/security+and+cryptology/book/978-3-642-29655-0">Springer</a>, pp.89-109, 2012, Information Security and Cryptography, 978-3-642-29656-0 (-7 for eBook). <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00744671v1">&#x27E8;lirmm-00744671&#x27E9;</a></li><li>Dalila Goudia, Marc Chaumont, William Puech, Naima Hadj Said. Quantization Watermarking for Joint Compression and Data Hiding Schemes. Dr. Mithun Das Gupta. <i>Watermarking - Volume 1</i>, <a target="_blank" href="http://www.intechopen.com">InTech</a>, Chapter 1, 2012, 978-953-51-0618-0. <a target="_blank" href="https://dx.doi.org/10.5772/2342">&#x27E8;10.5772/2342&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00839002v1">&#x27E8;lirmm-00839002&#x27E9;</a></li><li>Eduardo Wanderley, Romain Vaslin, Jérémie Crenne, Pascal Cotret, Jean-Philippe Diguet, et al.. Security FPGA Analysis. <i>Security Trends for FPGAS<br> From Secured to Secure Reconfigurable Systems</i>, pp.7-46, 2011, <a target="_blank" href="https://dx.doi.org/10.1007/978-94-007-1338-3_2">&#x27E8;10.1007/978-94-007-1338-3_2&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00809327v1">&#x27E8;lirmm-00809327&#x27E9;</a></li><li>Benoit Badrignans, Florian Devic, Lionel Torres, Gilles Sassatelli, Pascal Benoit. Countermeasures Against Physical Attacks in FPGAs. <i>Security Trends for FPGAS <br> From Secured to Secure Reconfigurable Systems</i>, Springer, pp.73-100, 2011, 978-94-007-1337-6. <a target="_blank" href="https://dx.doi.org/10.1007/978-94-007-1338-3_4">&#x27E8;10.1007/978-94-007-1338-3_4&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00809330v1">&#x27E8;lirmm-00809330&#x27E9;</a></li><li>Victor Lomné, Amine Dehbaoui, Philippe Maurine, Michel Robert, Lionel Torres. Side Channel Attacks. <i>Security Trends for FPGAS <br> From Secured to Secure Reconfigurable Systems</i>, Springer, pp.47-72, 2011, 978-94-007-1337-6. <a target="_blank" href="https://dx.doi.org/10.1007/978-94-007-1338-3_3">&#x27E8;10.1007/978-94-007-1338-3_3&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00809329v1">&#x27E8;lirmm-00809329&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Brevets<span class="wphal-nbmetadata" style="margin-left:10px">1 document</span></h3><div class="grp-content"><ul><li>Tristan Allard, Georges Hébrail, Florent Masseglia, Esther Pacitti. Procédé et installation de comparaison de consommation d'effluents sans divulgation de données de consommations mesurées . France, N° de brevet: EP 2930471 A1. 2015. <a target="_blank" href="https://inria.hal.science/hal-01274207v1">&#x27E8;hal-01274207&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Autres publications<span class="wphal-nbmetadata" style="margin-left:10px">2 document</span></h3><div class="grp-content"><ul><li>Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, P. Orsatelli, Philippe Maurine, et al.. Injection of transient faults using electromagnetic pulses Practical results on a cryptographic system. <i>ACR Cryptology ePrint Archive (2012)</i>, 2012. <a target="_blank" href="https://hal-emse.ccsd.cnrs.fr/emse-00742850v1">&#x27E8;emse-00742850&#x27E9;</a></li><li>Marion Doulcier, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. Test and Harware Security. 2008. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00365276v1">&#x27E8;lirmm-00365276&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Pré-publications, Documents de travail<span class="wphal-nbmetadata" style="margin-left:10px">12 document</span></h3><div class="grp-content"><ul><li>Pascal Nouet, Frédérick Mailly, Julien Toulemont, Geoffrey Chancel, Philippe Maurine. Towards package opening detection at power-up by monitoring thermal dissipation. 2024. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04703369v1">&#x27E8;lirmm-04703369&#x27E9;</a></li><li>Kévin Planolles, Marc Chaumont, Frédéric Comby. A study on the invariance in security whatever the dimension of images for the steganalysis by deep-learning. 2023. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04001355v1">&#x27E8;lirmm-04001355&#x27E9;</a></li><li>Cyril Bouvier, Laurent Imbert. An Alternative Approach for SIDH Arithmetic. 2021. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-02990006v4">&#x27E8;lirmm-02990006v4&#x27E9;</a></li><li>Davide Poggi, Philippe Maurine, Thomas Ordas, Alexandre Sarafianos, Jérémy Raoult. Finding EM leakages at design stage: a simulation methodology. 2020. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03626774v1">&#x27E8;lirmm-03626774&#x27E9;</a></li><li>Julien Toulemont, Nasr-Eddine Ouldei-Tebina, Jean-Marc J.-M. Galliere, Pascal Nouet, Eric Bourbao, et al.. A Simple Protocol to Compare EMFI platforms. 2020. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03626807v1">&#x27E8;lirmm-03626807&#x27E9;</a></li><li>Cyril Bouvier, Laurent Imbert. Faster cofactorization with ECM using mixed representations. 2019. <a target="_blank" href="https://hal.science/hal-01951942v1">&#x27E8;hal-01951942&#x27E9;</a></li><li>Christophe Negre, Thomas Plantard. Efficient Regular Scalar Multiplication on the Jacobian of Hyperelliptic Curve over Prime Field Based on Divisor Splitting. 2018. <a target="_blank" href="https://hal.science/hal-01852041v1">&#x27E8;hal-01852041&#x27E9;</a></li><li>Marie Paindavoine, Bastien Vialla. Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption. 2015. <a target="_blank" href="https://inria.hal.science/hal-01181319v1">&#x27E8;hal-01181319&#x27E9;</a></li><li>Eleonora Guerrini, Laurent Imbert, Théo Winterhalter. Randomizing scalar multiplication using exact covering systems of congruences. 2015. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01340672v1">&#x27E8;lirmm-01340672&#x27E9;</a></li><li>Anwar Hasan, Christophe Negre. The mini-square propagation over block cipher and its application to AES and Camellia. 2011. <a target="_blank" href="https://hal.science/hal-00556843v1">&#x27E8;hal-00556843&#x27E9;</a></li><li>Nadia El Mrabet, Christophe Negre. Finite field multiplication combining AMNS and DFT approach for pairing cryptography. 2009. <a target="_blank" href="https://hal.science/hal-00360280v1">&#x27E8;hal-00360280&#x27E9;</a></li><li>Christophe Negre, Thomas Plantard. Prime Field Multiplication in Adapated Modular Number System using Lagrange Representation. 2007. <a target="_blank" href="https://hal.science/hal-00079454v4">&#x27E8;hal-00079454v4&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Rapports<span class="wphal-nbmetadata" style="margin-left:10px">9 document</span></h3><div class="grp-content"><ul><li>Sakina Mahboubi, Reza Akbarinia, Patrick Valduriez. Top-k Query Processing Over Outsourced Encrypted Data. [Research Report] RR-9053, INRIA Sophia Antipolis - Méditerranée. 2017, pp.24. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-01502142v2">&#x27E8;lirmm-01502142v2&#x27E9;</a></li><li>Andrea Lesavourey, Christophe Negre, Thomas Plantard. Lazy Leak Resistant Exponentiation in RNS. [Research Report] DALI (UPVD); LIRMM (UM, CNRS). 2016, pp.156-163. <a target="_blank" href="https://hal.science/hal-01330927v1">&#x27E8;hal-01330927&#x27E9;</a></li><li>Christophe Negre. Improved Three-Way Split Approach for Binary Polynomial Multiplication Based on Optimized Reconstruction. [Research Report] RR-1300x, Lirmm. 2013. <a target="_blank" href="https://hal.science/hal-00788646v1">&#x27E8;hal-00788646&#x27E9;</a></li><li>Laurent Imbert, Michael Jacobson. Empirical optimization of divisor arithmetic on hyperelliptic curves over $\mathbb{F}_{2m}$. RR-13008, 2012, pp.18. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00815484v1">&#x27E8;lirmm-00815484&#x27E9;</a></li><li>Anwar Hasan, Christophe Negre. Sequential Multiplier with Sub-linear Gate Complexity. [Research Report] 2012, pp.12. <a target="_blank" href="https://inria.hal.science/hal-00712085v1">&#x27E8;hal-00712085&#x27E9;</a></li><li>Pascal Giorgi, Laurent Imbert, Thomas Izard. Multipartite Modular Multiplication. RR-11024, 2011, pp.25. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00618437v1">&#x27E8;lirmm-00618437&#x27E9;</a></li><li>Nadia El Mrabet, Sorina Ionica. Pairing Computation for Elliptic Curves with Embedding Degree 15. RR-09012, 2009, pp.14. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00380549v1">&#x27E8;lirmm-00380549&#x27E9;</a></li><li>Nadia El Mrabet. What about vulnerability to a fault attack of the Miller algorithm during an Identity Based Protocol ?. RR-08022, 2008. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00323685v1">&#x27E8;lirmm-00323685&#x27E9;</a></li><li>Nadia El Mrabet, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Jean-Claude Bajard. Differential Power Analysis against the Miller Algorithm. RR-08021, 2008. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-00323684v1">&#x27E8;lirmm-00323684&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Thèses<span class="wphal-nbmetadata" style="margin-left:10px">37 document</span></h3><div class="grp-content"><ul><li>Gauthier Cler. Horizontal Side Channel Attacks on Noisy Traces. Cryptography and Security [cs.CR]. Université de Montpellier, 2024. English. <a target="_blank" href="https://www.theses.fr/2024UMONS010">&#x27E8;NNT : 2024UMONS010&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-04730413v1">&#x27E8;tel-04730413&#x27E9;</a></li><li>Geoffrey Chancel. Body biasing fault injection : enhancements, analysis modeling, and simulation. Micro and nanotechnologies/Microelectronics. Université de Montpellier, 2024. English. <a target="_blank" href="https://www.theses.fr/2024UMONS030">&#x27E8;NNT : 2024UMONS030&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-04812042v1">&#x27E8;tel-04812042&#x27E9;</a></li><li>Bianca Jansen van Rensburg. 3D Data Security by Means of Data Hiding and Encryption for the Fashion Industry. Cryptography and Security [cs.CR]. Université de Montpellier, 2023. English. <a target="_blank" href="https://www.theses.fr/2023UMONS044">&#x27E8;NNT : 2023UMONS044&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-04539402v2">&#x27E8;tel-04539402v2&#x27E9;</a></li><li>Loïc France. Development and evaluation of solutions for the protection of DRAM and MRAM memories against Rowhammer attacks. Cryptography and Security [cs.CR]. Université de Montpellier, 2022. English. <a target="_blank" href="https://www.theses.fr/2022UMONS086">&#x27E8;NNT : 2022UMONS086&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-04117848v1">&#x27E8;tel-04117848&#x27E9;</a></li><li>Valence Cristiani. Unsupervised Side-Channel Analysis Based on Mutual Information and its Neural Estimation. Cryptography and Security [cs.CR]. Université de Montpellier, 2022. English. <a target="_blank" href="https://www.theses.fr/2022UMONS061">&#x27E8;NNT : 2022UMONS061&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-04056881v1">&#x27E8;tel-04056881&#x27E9;</a></li><li>Quang-Linh Nguyen. Confiance matérielle : solutions de conception de verrouillage numérique. Cryptographie et sécurité [cs.CR]. Université de Montpellier, 2022. Français. <a target="_blank" href="https://www.theses.fr/2022UMONS105">&#x27E8;NNT : 2022UMONS105&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-04336960v1">&#x27E8;tel-04336960&#x27E9;</a></li><li>Lucas Matana Luza. Analysis of space and atmospheric radiation-induced effects on memory devices. Electronics. Université Montpellier, 2021. English. <a target="_blank" href="https://www.theses.fr/2021MONTS100">&#x27E8;NNT : 2021MONTS100&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-03641803v1">&#x27E8;tel-03641803&#x27E9;</a></li><li>Julien Toulemont. Amélioration des résolutions spatiale et temporelle des plateformes d'analyse et d'injection électromagnétiques. Electromagnétisme. Université Montpellier, 2021. Français. <a target="_blank" href="https://www.theses.fr/2021MONTS060">&#x27E8;NNT : 2021MONTS060&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-03589323v1">&#x27E8;tel-03589323&#x27E9;</a></li><li>Yohan Boyer. Étude et conception de méthodes de protection face aux attaques par corruption de mémoire pour systèmes embarqués dans le contexte de l'Internet des Objets.. Informatique et langage [cs.CL]. Université Montpellier, 2020. Français. <a target="_blank" href="https://www.theses.fr/2020MONTS077">&#x27E8;NNT : 2020MONTS077&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-03378800v1">&#x27E8;tel-03378800&#x27E9;</a></li><li>Aurélien Vasselle. Évaluation de la Menace d’Attaques par Canaux Auxiliaires sur Appareils Mobiles. Cryptographie et sécurité [cs.CR]. Université Montpellier, 2020. Français. <a target="_blank" href="https://www.theses.fr/2020MONTS131">&#x27E8;NNT : 2020MONTS131&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-04735386v1">&#x27E8;tel-04735386&#x27E9;</a></li><li>Loïc Dalmasso. De la vulnérabilité des nœuds capteurs à la certification des transactions sur le réseau, une approche de la sécurisation de l’Internet des Objets. Cryptographie et sécurité [cs.CR]. Université Montpellier, 2020. Français. <a target="_blank" href="https://www.theses.fr/2020MONTS069">&#x27E8;NNT : 2020MONTS069&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-03223205v1">&#x27E8;tel-03223205&#x27E9;</a></li><li>Ahmad Zakaria. Batch steganography and pooled steganalysis in JPEG images. Cryptography and Security [cs.CR]. Université Montpellier, 2020. English. <a target="_blank" href="https://www.theses.fr/2020MONTS079">&#x27E8;NNT : 2020MONTS079&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-03208185v1">&#x27E8;tel-03208185&#x27E9;</a></li><li>Frédéric Martial Ouattara. Primitives de sécurité à base de mémoires magnétiques. Micro et nanotechnologies/Microélectronique. Université Montpellier, 2020. Français. <a target="_blank" href="https://www.theses.fr/2020MONTS072">&#x27E8;NNT : 2020MONTS072&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-03348805v1">&#x27E8;tel-03348805&#x27E9;</a></li><li>Pauline Puteaux. Analyse et traitement des images dans le domaine chiffré. Cryptographie et sécurité [cs.CR]. Université Montpellier, 2020. Français. <a target="_blank" href="https://www.theses.fr/2020MONTS119">&#x27E8;NNT : 2020MONTS119&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-03117770v1">&#x27E8;tel-03117770&#x27E9;</a></li><li>Mathieu Dumont. Modélisation de l’injection de faute électromagnétique sur circuits intégrés sécurisés et contre-mesures. Autre. Université Montpellier, 2020. Français. <a target="_blank" href="https://www.theses.fr/2020MONTS031">&#x27E8;NNT : 2020MONTS031&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-03160444v1">&#x27E8;tel-03160444&#x27E9;</a></li><li>Anthony Ferrand. Contribution to the multi-variant flow analysis : application to JavaScript. Computer Science [cs]. Université de Montpellier, 2020. English. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://hal.science/tel-04692214v1">&#x27E8;tel-04692214&#x27E9;</a></li><li>Emanuele Valea. Security Techniques for Test Infrastructures. Micro and nanotechnologies/Microelectronics. Université Montpellier, 2020. English. <a target="_blank" href="https://www.theses.fr/2020MONTS042">&#x27E8;NNT : 2020MONTS042&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-03161953v1">&#x27E8;tel-03161953&#x27E9;</a></li><li>Mehdi Yedroudj. Steganalysis and steganography by deep learning. Autre [cs.OH]. Université Montpellier, 2019. Français. <a target="_blank" href="https://www.theses.fr/2019MONTS095">&#x27E8;NNT : 2019MONTS095&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-02881987v1">&#x27E8;tel-02881987&#x27E9;</a></li><li>Maxime Cozzi. Infrared Imaging for Integrated Circuit Trust and Hardware Security. Micro and nanotechnologies/Microelectronics. Université Montpellier, 2019. English. <a target="_blank" href="https://www.theses.fr/2019MONTS046">&#x27E8;NNT : 2019MONTS046&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-02478875v1">&#x27E8;tel-02478875&#x27E9;</a></li><li>Mathieu da Silva. Securing a trusted hardware environment (Trusted Execution Environment). Micro and nanotechnologies/Microelectronics. Université Montpellier, 2018. English. <a target="_blank" href="https://www.theses.fr/2018MONTS053">&#x27E8;NNT : 2018MONTS053&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-02122896v1">&#x27E8;tel-02122896&#x27E9;</a></li><li>Sakina Mahboubi. Privacy preserving top-k query processing over outsourced data. Cryptography and Security [cs.CR]. Université Montpellier, 2018. English. <a target="_blank" href="https://www.theses.fr/2018MONTS026">&#x27E8;NNT : 2018MONTS026&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-01946258v2">&#x27E8;tel-01946258v2&#x27E9;</a></li><li>Benjamin Navarro. Solutions for safe human-robot collaboration. Robotics [cs.RO]. Université d'Orléans, 2017. English. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://hal.science/tel-02120668v1">&#x27E8;tel-02120668&#x27E9;</a></li><li>Rémy Druyer. Réseau sur puce sécurisé pour applications cryptographiques sur FPGA. Micro et nanotechnologies/Microélectronique. Université Montpellier, 2017. Français. <a target="_blank" href="https://www.theses.fr/2017MONTS023">&#x27E8;NNT : 2017MONTS023&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-01914935v1">&#x27E8;tel-01914935&#x27E9;</a></li><li>Papa-Sidy Ba. Détection et prévention de Cheval de Troie Matériel (CTM) par des méthodes Orientées Test Logique. Cryptographie et sécurité [cs.CR]. Université Montpellier, 2016. Français. <a target="_blank" href="https://www.theses.fr/2016MONTT271">&#x27E8;NNT : 2016MONTT271&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-01816951v1">&#x27E8;tel-01816951&#x27E9;</a></li><li>Stephan de Castro. Modélisation et simulation d'attaque laser sur des circuits sécuritaires. Electronique. Université Montpellier, 2016. Français. <a target="_blank" href="https://www.theses.fr/2016MONTT317">&#x27E8;NNT : 2016MONTT317&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-01816984v1">&#x27E8;tel-01816984&#x27E9;</a></li><li>Jean-Marc Robert. Contrer l'attaque Simple Power Analysis efficacement dans les applications de la cryptographie asymétrique, algorithmes et implantations. Cryptographie et sécurité [cs.CR]. Université de Perpignan, 2015. Français. <a target="_blank" href="https://www.theses.fr/2015PERP0039">&#x27E8;NNT : 2015PERP0039&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-01269753v1">&#x27E8;tel-01269753&#x27E9;</a></li><li>Vincent Itier. Nouvelles méthodes de synchronisation de nuages de points 3D pour l'insertion de données cachées. Cryptographie et sécurité [cs.CR]. Université Montpellier, 2015. Français. <a target="_blank" href="https://www.theses.fr/2015MONTS017">&#x27E8;NNT : 2015MONTS017&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-01333048v1">&#x27E8;tel-01333048&#x27E9;</a></li><li>Sébastien Ordas. Évaluation de méthodes faible consommation contre les attaques matérielles. Micro et nanotechnologies/Microélectronique. Université Montpellier, 2015. Français. <a target="_blank" href="https://www.theses.fr/2015MONTS023">&#x27E8;NNT : 2015MONTS023&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-01396679v1">&#x27E8;tel-01396679&#x27E9;</a></li><li>Sarra Kouider. Insertion adaptative en stéganographie : application aux images numériques dans le domaine spatial. Cryptographie et sécurité [cs.CR]. Université Montpellier II - Sciences et Techniques du Languedoc, 2013. Français. <a target="_blank" href="https://www.theses.fr/2013MON20107">&#x27E8;NNT : 2013MON20107&#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-01020745v1">&#x27E8;tel-01020745&#x27E9;</a></li><li>Tarik Kaced. Secret Sharing and Algorithmic Information Theory. Information Theory [cs.IT]. Université Montpellier II - Sciences et Techniques du Languedoc, 2012. English. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-00763117v1">&#x27E8;tel-00763117&#x27E9;</a></li><li>Kaouthar Bousselam. Résistance des circuits cryptographiques aux attaques en faute. Micro et nanotechnologies/Microélectronique. Université Montpellier II - Sciences et Techniques du Languedoc, 2012. Français. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-00771357v1">&#x27E8;tel-00771357&#x27E9;</a></li><li>Thomas Izard. Opérateurs Arithmétiques Parallèles pour la Cryptographie Asymétrique. Cryptographie et sécurité [cs.CR]. Université Montpellier II - Sciences et Techniques du Languedoc, 2011. Français. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-00685654v1">&#x27E8;tel-00685654&#x27E9;</a></li><li>Julien Francq. Conception et sécurisation d'unités arithmétiques hautes performances pour courbes elliptiques. Modélisation et simulation. Université Montpellier II - Sciences et Techniques du Languedoc, 2009. Français. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-00483568v1">&#x27E8;tel-00483568&#x27E9;</a></li><li>Nicolas Méloni. Arithmetic for Cryptography based on Elliptic Curves. Cryptographie et sécurité [cs.CR]. Université de Montpellier 2, 2007. Français. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://hal.science/tel-03340148v1">&#x27E8;tel-03340148&#x27E9;</a></li><li>Alin Razafindraibe. Analyse et amélioration de la logique double rail pour la conception de circuits sécurisés. Micro et nanotechnologies/Microélectronique. Université Montpellier II - Sciences et Techniques du Languedoc, 2006. Français. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-00282762v1">&#x27E8;tel-00282762&#x27E9;</a></li><li>Daniel Gomes Mesquita. Architectures Reconfigurables et Cryptographie: Une Analyse de Robustesse et Contremesures Face aux Attaques par Canaux Cachés. Micro et nanotechnologies/Microélectronique. Université Montpellier II - Sciences et Techniques du Languedoc, 2006. Français. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-00115736v1">&#x27E8;tel-00115736&#x27E9;</a></li><li>José Marconi Rodrigues. Transfert sécurisé d'Images par combinaison de techniques de compression, cryptage et de marquage. Interface homme-machine [cs.HC]. Université Montpellier II - Sciences et Techniques du Languedoc, 2006. Français. <a target="_blank" href="https://www.theses.fr/">&#x27E8;NNT : &#x27E9;</a>. <a target="_blank" href="https://theses.hal.science/tel-00115845v1">&#x27E8;tel-00115845&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Habilitations à diriger des recherches<span class="wphal-nbmetadata" style="margin-left:10px">3 document</span></h3><div class="grp-content"><ul><li>Christophe Negre. Multiplication in Finite Fields and Elliptic Curves. Cryptographie et sécurité [cs.CR]. Université de Montpellier, 2016. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/tel-01385034v1">&#x27E8;tel-01385034&#x27E9;</a></li><li>Giorgio Di Natale. Conception et test des circuits et systèmes numériques à haute fiabilité et sécurité. Micro and nanotechnologies/Microelectronics. Université de Montpellier II, 2014. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/tel-01276281v1">&#x27E8;tel-01276281&#x27E9;</a></li><li>Marc Chaumont. Schémas de tatouage d'images, schémas de tatouage conjoint à la compression, et schémas de dissimulation de données. Traitement des images [eess.IV]. Université Montpellier II, 2013. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/tel-01234273v1">&#x27E8;tel-01234273&#x27E9;</a></li></ul></div></div><br><div class="grp-div"><h3 class="wphal-titre-groupe">Logiciel<span class="wphal-nbmetadata" style="margin-left:10px">4 document</span></h3><div class="grp-content"><ul><li>Camille Mutschler, Laurent Imbert, Thomas Roche. Inspector Gadget. 2024, <a target="_blank" href="https://archive.softwareheritage.org/browse/swh:1:dir:969eec9673de75f58cf690948038b170dca3d4cd;origin=https://hal.archives-ouvertes.fr/lirmm-04638235;visit=swh:1:snp:5a57de5c527182dda4fef81ac598381870359d4a;anchor=swh:1:rel:4f8191053b85b5a259a0e193f1ccb3222ecb9417;path=/">&#x27E8;swh:1:dir:969eec9673de75f58cf690948038b170dca3d4cd;origin=https://hal.archives-ouvertes.fr/lirmm-04638235;visit=swh:1:snp:5a57de5c527182dda4fef81ac598381870359d4a;anchor=swh:1:rel:4f8191053b85b5a259a0e193f1ccb3222ecb9417;path=/&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-04638235v1">&#x27E8;lirmm-04638235&#x27E9;</a></li><li>Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie. BICYCL. 2022, <a target="_blank" href="https://archive.softwareheritage.org/browse/swh:1:dir:b0fc22af0acbb995711313e71dda1a9b907e9e72;origin=https://hal.archives-ouvertes.fr/lirmm-03827193;visit=swh:1:snp:32a44231094baaaf2db6f7303a5712c6bc7c78d4;anchor=swh:1:rel:7ed7e725bcc693394b27e20adf146aad5bbd41c8;path=/">&#x27E8;swh:1:dir:b0fc22af0acbb995711313e71dda1a9b907e9e72;origin=https://hal.archives-ouvertes.fr/lirmm-03827193;visit=swh:1:snp:32a44231094baaaf2db6f7303a5712c6bc7c78d4;anchor=swh:1:rel:7ed7e725bcc693394b27e20adf146aad5bbd41c8;path=/&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03827193v1">&#x27E8;lirmm-03827193&#x27E9;</a></li><li>Cyril Bouvier, Laurent Imbert. PMNS4SIDH. 2020, <a target="_blank" href="https://archive.softwareheritage.org/browse/swh:1:dir:43a33b67eeccffacd4f465c7a701e3c16c0a7a88;origin=https://gitlab.inria.fr/ciao/pmns-for-sidh;visit=swh:1:snp:5392c190ea3bd75f6df87fe3d382717eb52e030f;anchor=swh:1:rev:fc666429fa96e570fbcca250f27c25514f4ba638">&#x27E8;swh:1:dir:43a33b67eeccffacd4f465c7a701e3c16c0a7a88;origin=https://gitlab.inria.fr/ciao/pmns-for-sidh;visit=swh:1:snp:5392c190ea3bd75f6df87fe3d382717eb52e030f;anchor=swh:1:rev:fc666429fa96e570fbcca250f27c25514f4ba638&#x27E9;</a>. <a target="_blank" href="https://hal-lirmm.ccsd.cnrs.fr/lirmm-03827282v1">&#x27E8;lirmm-03827282&#x27E9;</a></li><li>The Cado-Nfs Development Team. CADO-NFS, An Implementation of the Number Field Sieve Algorithm. 2019, <a target="_blank" href="https://archive.softwareheritage.org/browse/swh:1:dir:dfde55e0c6947d18b3ec4382bd11f86c6186a174;origin=https://gitlab.inria.fr/cado-nfs/cado-nfs;visit=swh:1:snp:b1ba8f6f5efb4e5d70d9d1ba42ebb31dc5cc2876;anchor=swh:1:rev:c5b20eac12ea225a325d582923ef058832cda28e">&#x27E8;swh:1:dir:dfde55e0c6947d18b3ec4382bd11f86c6186a174;origin=https://gitlab.inria.fr/cado-nfs/cado-nfs;visit=swh:1:snp:b1ba8f6f5efb4e5d70d9d1ba42ebb31dc5cc2876;anchor=swh:1:rev:c5b20eac12ea225a325d582923ef058832cda28e&#x27E9;</a>. <a target="_blank" href="https://inria.hal.science/hal-02099620v1">&#x27E8;hal-02099620&#x27E9;</a></li></ul></div></div><br></div> </div> </div><div class="wphal-footer"><p style="color:#B3B2B0">Documents récupérés de l'archive ouverte HAL&nbsp;<a href="https://hal.science/" target="_blank"><img decoding="async" alt="logo" src="https://www.lirmm.fr/wp-content/plugins/hal/img/logo-hal.png" style="width:90px"></a></p></div></div> </div> </div> </div> </div> </div> </section> </div> </main><!-- #main --> </div><!-- #.customify-grid --> </div><!-- #.customify-container --> </div><!-- #content --> <footer class="site-footer" id="site-footer"> <div class="footer-main footer--row layout-full-contained" id="cb-row--footer-main" data-row-id="main" data-show-on="desktop"> <div class="footer--row-inner footer-main-inner dark-mode"> <div class="customify-container"> <div class="customify-grid customify-grid-top"><div class="customify-col-3_md-3_sm-6_xs-12 builder-item builder-first--footer-3" data-push-left="off-3 _sm-0"><div class="item--inner builder-item--footer-3" data-section="sidebar-widgets-footer-3" data-item-id="footer-3" ><div class="widget-area"><section id="text-11" class="widget widget_text"> <div class="textwidget"><p><a href="/wp-admin" target="_blank" rel="noopener">Accès rédacteur </a><br /> <a href="https://intranet.lirmm.fr" target="_blank" rel="noopener">Intranet</a><br /> <a href=" https://grr.ies.umontpellier.fr/grr/" target="_blank" rel="noopener">Réservation de salle</a></p> </div> </section></div></div></div><div class="customify-col-6_md-6_sm-6_xs-12 builder-item builder-first--footer-4" data-push-left="_sm-0"><div class="item--inner builder-item--footer-4" data-section="sidebar-widgets-footer-4" data-item-id="footer-4" ><div class="widget-area"><section id="text-12" class="widget widget_text"> <div class="textwidget"><p><a href="/informations-legales/">Informations légales</a></p> <p><a href="https://webmail.lirmm.fr/" target="_blank">Webmail</a></p> </div> </section></div></div></div></div> </div> </div> </div> <div class="footer-bottom footer--row layout-full-contained" id="cb-row--footer-bottom" data-row-id="bottom" data-show-on="desktop"> <div class="footer--row-inner footer-bottom-inner dark-mode"> <div class="customify-container"> <div class="customify-grid customify-grid-top"><div class="customify-col-6_md-6_sm-6_xs-12 builder-item builder-first--footer_copyright" data-push-left="_sm-0"><div class="item--inner builder-item--footer_copyright" data-section="footer_copyright" data-item-id="footer_copyright" ><div class="builder-footer-copyright-item footer-copyright"><p>Copyright &copy; 2024 LIRMM</p> </div></div></div></div> </div> </div> </div> </footer></div><!-- #page --> <div id="scrolltop" class="scrolltop right"><i class="fa fa-angle-double-up"></i></div> <div id="customify_cookie_notice" class="customify_cookie_notice cn-position-bottom"> <span class="notice-content">We use cookies to ensure that we give you the best experience on our website. We also call on third party commercial services that may use publicity cookies<br> Nous utilisons des traceurs nécessaires au bon fonctionnement du site. Nous référençons également à des sites extérieurs qui peuvent utiliser des traceurs publicitaires.</span> <a href="#" id="customify-accept-cookie" data-cookie-set="accept" class="customify-set-cookie button">Ok</a> </div> <!-- Matomo --> <script> var _paq = window._paq = window._paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="https://webstat.lirmm.fr/"; _paq.push(['setTrackerUrl', u+'piwik.php']); _paq.push(['setSiteId', '66']); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.async=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s); })(); </script> <!-- End Matomo Code --> <script type='text/javascript'> const lazyloadRunObserver = () => { const lazyloadBackgrounds = document.querySelectorAll( `.e-con.e-parent:not(.e-lazyloaded)` ); const lazyloadBackgroundObserver = new IntersectionObserver( ( entries ) => { entries.forEach( ( entry ) => { if ( entry.isIntersecting ) { let lazyloadBackground = entry.target; if( lazyloadBackground ) { lazyloadBackground.classList.add( 'e-lazyloaded' ); } lazyloadBackgroundObserver.unobserve( entry.target ); } }); }, { rootMargin: '200px 0px 200px 0px' } ); lazyloadBackgrounds.forEach( ( lazyloadBackground ) => { lazyloadBackgroundObserver.observe( lazyloadBackground ); } ); }; const events = [ 'DOMContentLoaded', 'elementor/lazyload/observe', ]; events.forEach( ( event ) => { document.addEventListener( event, lazyloadRunObserver ); } ); </script> <script type="text/javascript" id="wp-hal-script4-js-extra"> /* <![CDATA[ */ var translate = {"liste":"Liste","compl":"Liste compl\u00e8te","princ":"Liste principale","graph":"Graphique","nuage":"Nuage de mots"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/hal/js/cv-hal.js?ver=6.7.1" id="wp-hal-script4-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/ics-calendar/assets/script.min.js?ver=11.3.7" id="ics-calendar-js"></script> <script type="text/javascript" id="ics-calendar-js-after"> /* <![CDATA[ */ var r34ics_ajax_obj = {"ajaxurl":"https:\/\/www.lirmm.fr\/wp-admin\/admin-ajax.php","r34ics_nonce":"8f8bd87442"}; var ics_calendar_i18n = {"hide_past_events":"Masquer les \u00e9v\u00e9nements pass\u00e9s","show_past_events":"Afficher les \u00e9v\u00e8nements pass\u00e9s"}; var r34ics_days_of_week_map = {"dimanche":"dim","lundi":"lun","mardi":"mar","mercredi":"mer","jeudi":"jeu","vendredi":"ven","samedi":"sam"}; var r34ics_transients_expiration_ms = 3600000; var r34ics_ajax_interval; /* ]]> */ </script> <script type="text/javascript" id="customify-themejs-js-extra"> /* <![CDATA[ */ var Customify_JS = {"is_rtl":"","css_media_queries":{"all":"%s","desktop":"%s","tablet":"@media screen and (max-width: 1024px) { %s }","mobile":"@media screen and (max-width: 568px) { %s }"},"sidebar_menu_no_duplicator":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/themes/customify/assets/js/theme.min.js?ver=0.4.8" id="customify-themejs-js"></script> <script type="text/javascript" src="http://www.lirmm.fr/wp-content/uploads/sites/3/customify-pro/customify-pro-0bc9d9078bd54317852b713e7f420580.js?ver=20241130014602" id="customify-pro-0bc9d9078bd54317852b713e7f420580-js"></script> <script type="text/javascript" id="eael-general-js-extra"> /* <![CDATA[ */ var localize = {"ajaxurl":"https:\/\/www.lirmm.fr\/wp-admin\/admin-ajax.php","nonce":"f0aa2b84e6","i18n":{"added":"Added ","compare":"Compare","loading":"Loading..."},"eael_translate_text":{"required_text":"is a required field","invalid_text":"Invalid","billing_text":"Billing","shipping_text":"Shipping","fg_mfp_counter_text":"of"},"page_permalink":"https:\/\/www.lirmm.fr\/securite\/","cart_redirectition":"","cart_page_url":"","el_breakpoints":{"mobile":{"label":"Portrait mobile","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Paysage","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablette en mode portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablette en mode paysage","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Portable","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"\u00c9cran large","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}}; /* ]]> */ </script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/js/view/general.min.js?ver=6.0.10" id="eael-general-js"></script> <script type="text/javascript" id="ivory-search-scripts-js-extra"> /* <![CDATA[ */ var IvorySearchVars = {"is_analytics_enabled":"1"}; /* ]]> */ </script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/add-search-to-menu/public/js/ivory-search.min.js?ver=5.5.8" id="ivory-search-scripts-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/elementor-pro/assets/js/webpack-pro.runtime.min.js?ver=3.25.4" id="elementor-pro-webpack-runtime-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/elementor/assets/js/webpack.runtime.min.js?ver=3.25.10" id="elementor-webpack-runtime-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=3.25.10" id="elementor-frontend-modules-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-includes/js/dist/hooks.min.js?ver=4d63a3d491d11ffd8ac6" id="wp-hooks-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-includes/js/dist/i18n.min.js?ver=5e580eb46a90c2b997e6" id="wp-i18n-js"></script> <script type="text/javascript" id="wp-i18n-js-after"> /* <![CDATA[ */ wp.i18n.setLocaleData( { 'text direction\u0004ltr': [ 'ltr' ] } ); /* ]]> */ </script> <script type="text/javascript" id="elementor-pro-frontend-js-before"> /* <![CDATA[ */ var ElementorProFrontendConfig = {"ajaxurl":"https:\/\/www.lirmm.fr\/wp-admin\/admin-ajax.php","nonce":"856aa11682","urls":{"assets":"https:\/\/www.lirmm.fr\/wp-content\/plugins\/elementor-pro\/assets\/","rest":"https:\/\/www.lirmm.fr\/wp-json\/"},"settings":{"lazy_load_background_images":true},"popup":{"hasPopUps":false},"shareButtonsNetworks":{"facebook":{"title":"Facebook","has_counter":true},"twitter":{"title":"Twitter"},"linkedin":{"title":"LinkedIn","has_counter":true},"pinterest":{"title":"Pinterest","has_counter":true},"reddit":{"title":"Reddit","has_counter":true},"vk":{"title":"VK","has_counter":true},"odnoklassniki":{"title":"OK","has_counter":true},"tumblr":{"title":"Tumblr"},"digg":{"title":"Digg"},"skype":{"title":"Skype"},"stumbleupon":{"title":"StumbleUpon","has_counter":true},"mix":{"title":"Mix"},"telegram":{"title":"Telegram"},"pocket":{"title":"Pocket","has_counter":true},"xing":{"title":"XING","has_counter":true},"whatsapp":{"title":"WhatsApp"},"email":{"title":"Email"},"print":{"title":"Print"},"x-twitter":{"title":"X"},"threads":{"title":"Threads"}}, "facebook_sdk":{"lang":"fr_FR","app_id":""},"lottie":{"defaultAnimationUrl":"https:\/\/www.lirmm.fr\/wp-content\/plugins\/elementor-pro\/modules\/lottie\/assets\/animations\/default.json"}}; /* ]]> */ </script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/elementor-pro/assets/js/frontend.min.js?ver=3.25.4" id="elementor-pro-frontend-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3" id="jquery-ui-core-js"></script> <script type="text/javascript" id="elementor-frontend-js-before"> /* <![CDATA[ */ var elementorFrontendConfig = {"environmentMode":{"edit":false,"wpPreview":false,"isScriptDebug":false},"i18n":{"shareOnFacebook":"Partager sur Facebook","shareOnTwitter":"Partager sur Twitter","pinIt":"L\u2019\u00e9pingler","download":"T\u00e9l\u00e9charger","downloadImage":"T\u00e9l\u00e9charger une image","fullscreen":"Plein \u00e9cran","zoom":"Zoom","share":"Partager","playVideo":"Lire la vid\u00e9o","previous":"Pr\u00e9c\u00e9dent","next":"Suivant","close":"Fermer","a11yCarouselWrapperAriaLabel":"Carousel | Scroll horizontal: Fl\u00e8che gauche & droite","a11yCarouselPrevSlideMessage":"Diapositive pr\u00e9c\u00e9dente","a11yCarouselNextSlideMessage":"Diapositive suivante","a11yCarouselFirstSlideMessage":"Ceci est la premi\u00e8re diapositive","a11yCarouselLastSlideMessage":"Ceci est la derni\u00e8re diapositive","a11yCarouselPaginationBulletMessage":"Aller \u00e0 la diapositive"},"is_rtl":false,"breakpoints":{"xs":0,"sm":480,"md":768,"lg":1025,"xl":1440,"xxl":1600},"responsive":{"breakpoints":{"mobile":{"label":"Portrait mobile","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Paysage","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablette en mode portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablette en mode paysage","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Portable","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"\u00c9cran large","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}, "hasCustomBreakpoints":false},"version":"3.25.10","is_static":false,"experimentalFeatures":{"additional_custom_breakpoints":true,"e_swiper_latest":true,"e_nested_atomic_repeaters":true,"e_optimized_control_loading":true,"e_onboarding":true,"e_css_smooth_scroll":true,"theme_builder_v2":true,"home_screen":true,"landing-pages":true,"nested-elements":true,"editor_v2":true,"link-in-bio":true,"floating-buttons":true},"urls":{"assets":"https:\/\/www.lirmm.fr\/wp-content\/plugins\/elementor\/assets\/","ajaxurl":"https:\/\/www.lirmm.fr\/wp-admin\/admin-ajax.php","uploadUrl":"http:\/\/www.lirmm.fr\/wp-content\/uploads\/sites\/3"},"nonces":{"floatingButtonsClickTracking":"c9dfff43b7"},"swiperClass":"swiper","settings":{"page":[],"editorPreferences":[]},"kit":{"active_breakpoints":["viewport_mobile","viewport_tablet"],"global_image_lightbox":"yes","lightbox_enable_counter":"yes","lightbox_enable_fullscreen":"yes","lightbox_enable_zoom":"yes","lightbox_enable_share":"yes","lightbox_title_src":"title","lightbox_description_src":"description"},"post":{"id":19076,"title":"S%C3%A9curit%C3%A9%20%26%20suret%C3%A9%20%E2%80%93%20LIRMM","excerpt":"","featuredImage":false}}; /* ]]> */ </script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=3.25.10" id="elementor-frontend-js"></script> <script type="text/javascript" src="https://www.lirmm.fr/wp-content/plugins/elementor-pro/assets/js/elements-handlers.min.js?ver=3.25.4" id="pro-elements-handlers-js"></script> </body> </html> <!-- Page supported by LiteSpeed Cache 6.5.2 on 2024-12-01 00:05:25 -->

Pages: 1 2 3 4 5 6 7 8 9 10