Morgan Bourree

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Nowadays, digital systems are becoming the main information support. This evolution implies a growing interest for the domain of cryptology regarding the conception of these systems. The hardware/software implementation has become one of the main weaknesses of security applications and hardware attacks, or "side channel attacks", such as DPA (Differential(More)
Side-channel attacks (SCAs), such as differential power analysis or differential electromagnetic analysis, pose a serious threat to the security of embedded systems. In the literature, few articles address the problem of securing general purpose processors (GPPs) with resourceful countermeasures. However, in many low-cost applications, where security is not(More)
Since the introduction of vacuum assisted closure therapy (V.A.C.) at the Department of Surgery/St. Anna-Hospital Herne has taken place in 2000 there was a rapid increase of indications to use this therapy. We present data from 128 patients who were treated with this method from 2000-2005 for different kinds of diseases. We report the management of a(More)
An ElectroMagnetic analysis (EMA) technique is applied to Flash-based FPGA (Field Programmable Gate Arrays) ProASIC3E to measure the delay variability. Measurements show that delay variations can reach 40% according to the mapping, placement and routing used in the FPGA array, while the synthesis tool analysis show differences lower than 7%. Comparisons(More)
  • 1