Damien Couroussé
Damien Couroussé
CEA LIST
Verified email at cea.fr - Homepage
Title
Cited by
Cited by
Year
Micro-architectural simulation of in-order and out-of-order arm microprocessors with gem5
FA Endo, D Couroussé, HP Charles
2014 international conference on embedded computer systems: Architectures …, 2014
612014
Micro-architectural simulation of embedded core heterogeneity with gem5 and mcpat
FA Endo, D Couroussé, HP Charles
Proceedings of the 2015 Workshop on Rapid Simulation and Performance …, 2015
562015
A basic gesture and motion format for virtual reality multisensory applications
A Luciani, M Evrard, D Couroussé, N Castagné, C Cadoz, JL Florens
arXiv preprint arXiv:1005.4564, 2010
422010
Compilation of a countermeasure against instruction-skip fault attacks
T Barry, D Couroussé, B Robisson
Proceedings of the Third Workshop on Cryptography and Security in Computing …, 2016
342016
Ergotic sounds: A new way to improve playability, believability and presence of virtual musical instruments
A Luciani, JL Florens, D Couroussé, J Castet
Journal of New Music Research 38 (3), 309-323, 2009
282009
deGoal a Tool to Embed Dynamic Code Generators into Applications
HP Charles, D Couroussé, V Lomüller, FA Endo, R Gauguey
International Conference on Compiler Construction, 107-112, 2014
242014
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
D Couroussé, T Barry, B Robisson, P Jaillon, O Potin, JL Lanet
10th WISTP International Conference on Information Security Theory and …, 2016
212016
Ergotic sounds: A new way to improve playability, believability and presence of digital musical instruments
A Luciani, JL Florens, D Couroussé, C Cadoz
Proceedings of the 4th International Conference on Enactive Interfaces, 373-376, 2007
192007
Automated software protection for the masses against side-channel attacks
N Belleville, D Couroussé, K Heydemann, HP Charles
ACM Transactions on Architecture and Code Optimization (TACO) 15 (4), 1-27, 2018
132018
A template attack against VERIFY PIN algorithms
H Le Bouder, T Barry, D Couroussé, JL Lanet, R Lashermes
SECRYPT 2016, 231-238, 2016
82016
Software acceleration of floating-point multiplication using runtime code generation—Student paper
C Aracil, D Couroussé
2013 4th Annual International Conference on Energy Aware Computing Systems …, 2013
82013
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures
KM Abdellatif, D Couroussé, O Potin, P Jaillon
Proceedings of the Fourth Workshop on Cryptography and Security in Computing …, 2017
62017
Preliminary test in a complex virtual dynamic haptic audio environment
C Magnusson, A Luciani, D Couroussé, R Davies, JL Florens
2nd Enactive Workshop, McGill University, Canada, 2006
62006
Method of executing, by a microprocessor, a polymorphic binary code of a predetermined function
D Courousse
US Patent 9,489,315, 2016
52016
HLDCA-WSN: homomorphic lightweight data confidentiality algorithm for wireless sensor network
H Noura, D Couroussé
Cryptology ePrint Archive, 2015
52015
Introduction to Dynamic Code Generation: An Experiment with Matrix Multiplication for the STHORM Platform
D Couroussé, V Lomüller, HP Charles
Smart Multicore Embedded Systems, 103-122, 2014
52014
Perception of virtual multisensory mobile objects: wandering around the enactive assumption
A Luciani, S O'Modhrain, C Magnusson, JL Florens, D Couroussé
Proceedings of the 4th International Conference on Enactive Interfaces, 153-156, 2007
52007
Effects of stiffness on tapping performance
D Couroussé, JL Florens, A Luciani
Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2006 …, 2006
52006
L-IOT: a Flexible Energy Efficient Platform Targeting Wide Range IoT Applications
E Beigné, I Miro-Panades, A Valentian, JF Christmann, S Bacles-Min, ...
DAC Conference, 2017
42017
Lightweight, dynamic, and flexible cipher scheme for wireless and mobile networks
H Noura, D Couroussé
International Conference on Ad Hoc Networks, 225-236, 2015
42015
The system can't perform the operation now. Try again later.
Articles 1–20