BibTeX records: Sylvain Guilley

download as .bib file

@article{DBLP:journals/comcom/GarciaRTOGNM24,
  author       = {Carlos Rubio Garcia and
                  Simon Rommel and
                  Sofiane Takarabt and
                  Juan Jose Vegas Olmos and
                  Sylvain Guilley and
                  Philippe Nguyen and
                  Idelfonso Tafur Monroy},
  title        = {Quantum-resistant Transport Layer Security},
  journal      = {Comput. Commun.},
  volume       = {213},
  pages        = {345--358},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2023.11.010},
  doi          = {10.1016/J.COMCOM.2023.11.010},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/GarciaRTOGNM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/EbrahimabadiMVGDDK24,
  author       = {Mohammad Ebrahimabadi and
                  Suhee Sanjana Mehjabin and
                  Raphael Viera and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Jean{-}Max Dutertre and
                  Naghmeh Karimi},
  title        = {{DELFINES:} Detecting Laser Fault Injection Attacks via Digital Sensors},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {43},
  number       = {3},
  pages        = {774--787},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCAD.2023.3322623},
  doi          = {10.1109/TCAD.2023.3322623},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/EbrahimabadiMVGDDK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarletDGT24,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Quasi-linear masking against {SCA} and FIA, with cost amortization},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {398--432},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.398-432},
  doi          = {10.46586/TCHES.V2024.I1.398-432},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CarletDGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BahramiEGDK24,
  author       = {Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  editor       = {Romain Wacquez and
                  Naofumi Homma},
  title        = {Impact of Process Mismatch and Device Aging on SR-Latch Based True
                  Random Number Generators},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 15th International
                  Workshop, {COSADE} 2024, Gardanne, France, April 9-10, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14595},
  pages        = {177--196},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57543-3\_10},
  doi          = {10.1007/978-3-031-57543-3\_10},
  timestamp    = {Mon, 15 Apr 2024 21:35:29 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BahramiEGDK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeguinotCGR24,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel
                  Factorization from Noisy Leakage to Random Probing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/199},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BeguinotCGR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/Xiao0G23,
  author       = {Chong Xiao and
                  Ming Tang and
                  Sylvain Guilley},
  title        = {Exploiting the microarchitectural leakage of prefetching activities
                  for side-channel attacks},
  journal      = {J. Syst. Archit.},
  volume       = {139},
  pages        = {102877},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.102877},
  doi          = {10.1016/J.SYSARC.2023.102877},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/Xiao0G23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/XuTWG23,
  author       = {Ke Xu and
                  Ming Tang and
                  Han Wang and
                  Sylvain Guilley},
  title        = {Reverse-Engineering and Exploiting the Frontend Bus of Intel Processor},
  journal      = {{IEEE} Trans. Computers},
  volume       = {72},
  number       = {2},
  pages        = {360--373},
  year         = {2023},
  url          = {https://doi.org/10.1109/TC.2022.3222083},
  doi          = {10.1109/TC.2022.3222083},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/XuTWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BeckersGMOP23,
  author       = {Arthur Beckers and
                  Sylvain Guilley and
                  Philippe Maurine and
                  Colin O'Flynn and
                  Stjepan Picek},
  title        = {(Adversarial) Electromagnetic Disturbance in the Industry},
  journal      = {{IEEE} Trans. Computers},
  volume       = {72},
  number       = {2},
  pages        = {414--422},
  year         = {2023},
  url          = {https://doi.org/10.1109/TC.2022.3224373},
  doi          = {10.1109/TC.2022.3224373},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/BeckersGMOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BeguinotCGLMRS23,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Yi Liu and
                  Lo{\"{\i}}c Masure and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Elif Bilge Kavun and
                  Michael Pehl},
  title        = {Removing the Field Size Loss from Duc et al.'s Conjectured Bound for
                  Masked Encodings},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 14th International
                  Workshop, {COSADE} 2023, Munich, Germany, April 3-4, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13979},
  pages        = {86--104},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-29497-6\_5},
  doi          = {10.1007/978-3-031-29497-6\_5},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BeguinotCGLMRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/WeberGRSLMGRPSHSH23,
  author       = {Arnd Weber and
                  Sylvain Guilley and
                  Ren{\'{e}} Rathfelder and
                  Marc St{\"{o}}ttinger and
                  Christoph L{\"{u}}th and
                  Maja Malenko and
                  Torsten Grawunder and
                  Steffen Reith and
                  Armand Puccetti and
                  Jean{-}Pierre Seifert and
                  Norbert Herfurth and
                  Hagen Sankowski and
                  Gernot Heiser},
  title        = {Verified Value Chains, Innovation and Competition},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023},
  pages        = {470--476},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSR57506.2023.10224911},
  doi          = {10.1109/CSR57506.2023.10224911},
  timestamp    = {Wed, 06 Sep 2023 08:09:39 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/WeberGRSLMGRPSHSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/AnikRDGK23,
  author       = {Md Toufiq Hasan Anik and
                  Hasin Ishraq Reefat and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  editor       = {Himanshu Thapliyal and
                  Ronald F. DeMara and
                  Inna Partin{-}Vaisband and
                  Srinivas Katkoori},
  title        = {Aging-Induced Failure Prognosis via Digital Sensors},
  booktitle    = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI}
                  2023, Knoxville, TN, USA, June 5-7, 2023},
  pages        = {703--708},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3583781.3590204},
  doi          = {10.1145/3583781.3590204},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/AnikRDGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/TakarabtBEGK23,
  author       = {Sofiane Takarabt and
                  Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Security Order of Gate-Level Masking Schemes},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2023, San Jose, CA, USA, May 1-4, 2023},
  pages        = {57--67},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/HOST55118.2023.10133208},
  doi          = {10.1109/HOST55118.2023.10133208},
  timestamp    = {Mon, 11 Sep 2023 17:53:23 +0200},
  biburl       = {https://dblp.org/rec/conf/host/TakarabtBEGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icicdt/BahramiDEGK23,
  author       = {Javad Bahrami and
                  Jean{-}Luc Danger and
                  Mohammad Ebrahimabadi and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Challenges in Generating True Random Numbers Considering the Variety
                  of Corners, Aging, and Intentional Attacks},
  booktitle    = {International Conference on {IC} Design and Technology, {ICICDT} 2023,
                  Tokyo, Japan, September 25-28, 2023},
  pages        = {10--15},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICICDT59917.2023.10332319},
  doi          = {10.1109/ICICDT59917.2023.10332319},
  timestamp    = {Thu, 04 Jan 2024 08:13:40 +0100},
  biburl       = {https://dblp.org/rec/conf/icicdt/BahramiDEGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icicdt/Guilley23,
  author       = {Sylvain Guilley},
  title        = {Challenges in generating true random numbers considering the variety
                  of corners, aging, and attacks},
  booktitle    = {International Conference on {IC} Design and Technology, {ICICDT} 2023,
                  Tokyo, Japan, September 25-28, 2023},
  pages        = {xix},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICICDT59917.2023.10332396},
  doi          = {10.1109/ICICDT59917.2023.10332396},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icicdt/Guilley23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BaksiGST23,
  author       = {Anubhab Baksi and
                  Sylvain Guilley and
                  Ritu Ranjan Shrivastwa and
                  Sofiane Takarabt},
  editor       = {Anupam Chattopadhyay and
                  Shivam Bhasin and
                  Stjepan Picek and
                  Chester Rebeiro},
  title        = {From Substitution Box to Threshold},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference
                  on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14459},
  pages        = {48--67},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56232-7\_3},
  doi          = {10.1007/978-3-031-56232-7\_3},
  timestamp    = {Mon, 08 Apr 2024 18:06:13 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BaksiGST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/VlasakBG23,
  author       = {Lukas Vlasak and
                  Antoine Bouvet and
                  Sylvain Guilley},
  editor       = {Anupam Chattopadhyay and
                  Shivam Bhasin and
                  Stjepan Picek and
                  Chester Rebeiro},
  title        = {Practical Aspects of Vertical Side-Channel Analyses on {HMAC-SHA-2}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference
                  on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14459},
  pages        = {329--349},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56232-7\_16},
  doi          = {10.1007/978-3-031-56232-7\_16},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/VlasakBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BeguinotLRCG23,
  author       = {Julien B{\'{e}}guinot and
                  Yi Liu and
                  Olivier Rioul and
                  Wei Cheng and
                  Sylvain Guilley},
  title        = {Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma
                  for Min-Entropy},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2023,
                  Taipei, Taiwan, June 25-30, 2023},
  pages        = {654--659},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISIT54713.2023.10206606},
  doi          = {10.1109/ISIT54713.2023.10206606},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/BeguinotLRCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/LiuBCGMRS23,
  author       = {Yi Liu and
                  Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Lo{\"{\i}}c Masure and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic
                  Implementations},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2023, Saint-Malo, France,
                  April 23-28, 2023},
  pages        = {81--86},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ITW55543.2023.10161608},
  doi          = {10.1109/ITW55543.2023.10161608},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/LiuBCGMRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BeguinotCDGRY23,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Ville Yli{-}M{\"{a}}yry},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Reliability of Ring Oscillator PUFs with Reduced Helper Data},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {36--56},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_3},
  doi          = {10.1007/978-3-031-41326-1\_3},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BeguinotCDGRY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vts/BahramiEDGK23,
  author       = {Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Special Session: Security Verification {\&} Testing for SR-Latch
                  TRNGs},
  booktitle    = {41st {IEEE} {VLSI} Test Symposium, {VTS} 2023, San Diego, CA, USA,
                  April 24-26, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTS56346.2023.10140057},
  doi          = {10.1109/VTS56346.2023.10140057},
  timestamp    = {Fri, 09 Jun 2023 15:18:15 +0200},
  biburl       = {https://dblp.org/rec/conf/vts/BahramiEDGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-06276,
  author       = {Julien B{\'{e}}guinot and
                  Yi Liu and
                  Olivier Rioul and
                  Wei Cheng and
                  Sylvain Guilley},
  title        = {Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma
                  for Min-Entropy},
  journal      = {CoRR},
  volume       = {abs/2305.06276},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.06276},
  doi          = {10.48550/ARXIV.2305.06276},
  eprinttype    = {arXiv},
  eprint       = {2305.06276},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-06276.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGT23,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Quasi-linear masking to protect against both {SCA} and {FIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/406},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaksiGST23,
  author       = {Anubhab Baksi and
                  Sylvain Guilley and
                  Ritu Ranjan Shrivastwa and
                  Sofiane Takarabt},
  title        = {From Substitution Box To Threshold},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/633},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaksiGST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaksiBCGGGHIJJKLMSSSS23,
  author       = {Anubhab Baksi and
                  Jakub Breier and
                  Anupam Chattopadhyay and
                  Tomas Gerlich and
                  Sylvain Guilley and
                  Naina Gupta and
                  Kai Hu and
                  Takanori Isobe and
                  Arpan Jati and
                  Petr Jedlicka and
                  Hyunjun Kim and
                  Fukang Liu and
                  Zdenek Martinasek and
                  Kosei Sakamoto and
                  Hwajeong Seo and
                  Rentaro Shiba and
                  Ritu Ranjan Shrivastwa},
  title        = {{BAKSHEESH:} Similar Yet Different From {GIFT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {750},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/750},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaksiBCGGGHIJJKLMSSSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGT23a,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {A masking method based on orthonormal spaces, protecting several bytes
                  against both {SCA} and {FIA} with a reduced cost},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1746},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1746},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGT23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/KroegerCDGK22,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Cross-PUF Attacks: Targeting {FPGA} Implementation of Arbiter-PUFs},
  journal      = {J. Electron. Test.},
  volume       = {38},
  number       = {3},
  pages        = {261--277},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10836-022-06012-z},
  doi          = {10.1007/S10836-022-06012-Z},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/et/KroegerCDGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/TakahashiOINGSA22,
  author       = {Junko Takahashi and
                  Keiichi Okabe and
                  Hiroki Itoh and
                  Xuan Thuy Ngo and
                  Sylvain Guilley and
                  Ritu Ranjan Shrivastwa and
                  Mushir Ahmed and
                  Patrick Lejoly},
  title        = {Machine Learning Based Hardware Trojan Detection Using Electromagnetic
                  Emanation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {3},
  pages        = {311--325},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021cip0011},
  doi          = {10.1587/TRANSFUN.2021CIP0011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/TakahashiOINGSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OuladjGGM22,
  author       = {Maamar Ouladj and
                  Sylvain Guilley and
                  Philippe Guillot and
                  Farid Mokrane},
  title        = {Spectral approach to process the (multivariate) high-order template
                  attack against any masking scheme},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {75--93},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-020-00253-4},
  doi          = {10.1007/S13389-020-00253-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OuladjGGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/NikniaDGK22,
  author       = {Farzad Niknia and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Aging Effects on Template Attacks Launched on Dual-Rail Protected
                  Chips},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {41},
  number       = {5},
  pages        = {1276--1289},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCAD.2021.3088803},
  doi          = {10.1109/TCAD.2021.3088803},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/NikniaDGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WuCGZF22,
  author       = {Qianmei Wu and
                  Wei Cheng and
                  Sylvain Guilley and
                  Fan Zhang and
                  Wei Fu},
  title        = {On Efficient and Secure Code-based Masking: {A} Pragmatic Evaluation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {192--222},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.192-222},
  doi          = {10.46586/TCHES.V2022.I3.192-222},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WuCGZF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeguinotCGR22,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Side-Channel Expectation-Maximization Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {774--799},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.774-799},
  doi          = {10.46586/TCHES.V2022.I4.774-799},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeguinotCGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengGD22,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Information Leakage in Code-Based Masking: {A} Systematic Evaluation
                  by Higher-Order Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1624--1638},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3167914},
  doi          = {10.1109/TIFS.2022.3167914},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/KroegerCGDK22,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks
                  on Arbiter-PUFs and Their Derivatives},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {187--200},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVLSI.2021.3129141},
  doi          = {10.1109/TVLSI.2021.3129141},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/KroegerCGDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoudhariGK22,
  author       = {Amit Choudhari and
                  Sylvain Guilley and
                  Khaled Karray},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Debdeep Mukhopadhyay and
                  Domenic Forte},
  title        = {SpecDefender: Transient Execution Attack Defender using Performance
                  Counters},
  booktitle    = {Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware
                  Security, {ASHES} 2022, Los Angeles, CA, USA, 11 November 2022},
  pages        = {15--24},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560834.3563830},
  doi          = {10.1145/3560834.3563830},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoudhariGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cwit/ChengRLBG22,
  author       = {Wei Cheng and
                  Olivier Rioul and
                  Yi Liu and
                  Julien B{\'{e}}guinot and
                  Sylvain Guilley},
  title        = {Side-Channel Information Leakage of Code-Based Masked Implementations},
  booktitle    = {17th Canadian Workshop on Information Theory, {CWIT} 2022, Ottawa,
                  ON, Canada, June 5-8, 2022},
  pages        = {51--56},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CWIT55308.2022.9817673},
  doi          = {10.1109/CWIT55308.2022.9817673},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cwit/ChengRLBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BahramiEDGK22,
  author       = {Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  editor       = {Cristiana Bolchini and
                  Ingrid Verbauwhede and
                  Ioana Vatajelu},
  title        = {Leakage Power Analysis in Different S-Box Masking Protection Schemes},
  booktitle    = {2022 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2022, Antwerp, Belgium, March 14-23, 2022},
  pages        = {1263--1268},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/DATE54114.2022.9774763},
  doi          = {10.23919/DATE54114.2022.9774763},
  timestamp    = {Wed, 25 May 2022 22:56:19 +0200},
  biburl       = {https://dblp.org/rec/conf/date/BahramiEDGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/BeguinotCGR22,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel
                  Attacks of Secure Chips},
  booktitle    = {25th Euromicro Conference on Digital System Design, {DSD} 2022, Maspalomas,
                  Spain, August 31 - Sept. 2, 2022},
  pages        = {496--503},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSD57027.2022.00072},
  doi          = {10.1109/DSD57027.2022.00072},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/BeguinotCGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/Rais-AliBG22,
  author       = {Idris Rais{-}Ali and
                  Antoine Bouvet and
                  Sylvain Guilley},
  title        = {Quantifying the Speed-Up Offered by Genetic Algorithms during Fault
                  Injection Cartographies},
  booktitle    = {Workshop on Fault Detection and Tolerance in Cryptography, {FDTC}
                  2022, Virtual Event / Italy, September 16, 2022},
  pages        = {61--72},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/FDTC57191.2022.00016},
  doi          = {10.1109/FDTC57191.2022.00016},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/Rais-AliBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/EbrahimabadiMVG22,
  author       = {Mohammad Ebrahimabadi and
                  Suhee Sanjana Mehjabin and
                  Raphael Viera and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Jean{-}Max Dutertre and
                  Naghmeh Karimi},
  title        = {Detecting Laser Fault Injection Attacks via Time-to-Digital Converter
                  Sensors},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2022, McLean, VA, USA, June 27-30, 2022},
  pages        = {97--100},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HOST54066.2022.9840318},
  doi          = {10.1109/HOST54066.2022.9840318},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/EbrahimabadiMVG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/ChengLGR22,
  author       = {Wei Cheng and
                  Yi Liu and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Attacking Masked Cryptographic Implementations: Information-Theoretic
                  Bounds},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2022,
                  Espoo, Finland, June 26 - July 1, 2022},
  pages        = {654--659},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISIT50566.2022.9834556},
  doi          = {10.1109/ISIT50566.2022.9834556},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/ChengLGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BahramiETDGK22,
  author       = {Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Sofiane Takarabt and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On the Practicality of Relying on Simulations in Different Abstraction
                  Levels for Pre-silicon Side-Channel Analysis},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {661--668},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011307600003283},
  doi          = {10.5220/0011307600003283},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BahramiETDGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaOTKHKS22,
  author       = {Kazuhide Fukushima and
                  Hiroki Okada and
                  Sofiane Takarabt and
                  Amina Korchi and
                  Meziane Hamoud and
                  Khaled Karray and
                  Youssef Souissy and
                  Sylvain Guilley},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Side-channel Analysis and Countermeasure for Implementation of Lattice-based
                  Signature},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {701--706},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328400003283},
  doi          = {10.5220/0011328400003283},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FukushimaOTKHKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhariGK22,
  author       = {Amit Choudhari and
                  Sylvain Guilley and
                  Khaled Karray},
  title        = {CRYScanner: Finding cryptographic libraries misuse},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/029},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhariGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengGD22,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Information Leakage in Code-based Masking: {A} Systematic Evaluation
                  by Higher-Order Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/461},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeguinotCGLMRS22,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Yi Liu and
                  Lo{\"{\i}}c Masure and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Removing the Field Size Loss from Duc et al.'s Conjectured Bound for
                  Masked Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1738},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1738},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeguinotCGLMRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/OuladjG21,
  author       = {Maamar Ouladj and
                  Sylvain Guilley},
  title        = {Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic
                  Approach},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77222-2},
  doi          = {10.1007/978-3-030-77222-2},
  isbn         = {978-3-030-77221-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/OuladjG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/ChengGD21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Categorizing all linear codes of {IPM} over {\textdollar}\{{\textbackslash}mathbb
                  \{F\}\}{\_}\{2{\^{}}\{8\}\}{\textdollar}},
  journal      = {Cryptogr. Commun.},
  volume       = {13},
  number       = {4},
  pages        = {527--542},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12095-021-00483-1},
  doi          = {10.1007/S12095-021-00483-1},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/ChengGD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/AnikEDGK21,
  author       = {Md Toufiq Hasan Anik and
                  Mohammad Ebrahimabadi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Reducing Aging Impacts in Digital Sensors via Run-Time Calibration},
  journal      = {J. Electron. Test.},
  volume       = {37},
  number       = {5},
  pages        = {653--673},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10836-021-05976-8},
  doi          = {10.1007/S10836-021-05976-8},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/et/AnikEDGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChengCGDG21,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Detecting faults in inner product masking scheme},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {119--133},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00227-6},
  doi          = {10.1007/S13389-020-00227-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChengCGDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PerianinCDFG21,
  author       = {Thomas Perianin and
                  S{\'{e}}bastien Carr{\'{e}} and
                  Victor Dyseryn and
                  Adrien Facon and
                  Sylvain Guilley},
  title        = {End-to-end automated cache-timing attack driven by machine learning},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {135--146},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00228-5},
  doi          = {10.1007/S13389-020-00228-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PerianinCDFG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DugardinSG21,
  author       = {Margaux Dugardin and
                  Werner Schindler and
                  Sylvain Guilley},
  title        = {Stochastic methods defeat regular {RSA} exponentiation algorithms
                  with combined blinding methods},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {408--433},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0010},
  doi          = {10.1515/JMC-2020-0010},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DugardinSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/AnikDGK21,
  author       = {Md Toufiq Hasan Anik and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Detecting Failures and Attacks via Digital Sensors},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {40},
  number       = {7},
  pages        = {1315--1326},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCAD.2020.3020921},
  doi          = {10.1109/TCAD.2020.3020921},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/AnikDGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengGCDM21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger and
                  Sihem Mesnager},
  title        = {Information Leakages in Code-based Masking: {A} Unified Quantification
                  Approach},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {465--495},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.465-495},
  doi          = {10.46586/TCHES.V2021.I3.465-495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengGCDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarletGM21,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Sihem Mesnager},
  title        = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box
                  Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {57--87},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.57-87},
  doi          = {10.46586/TCHES.V2021.I4.57-87},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CarletGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CarletCGKT21,
  author       = {Claude Carlet and
                  {\'{E}}loi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Sel{\c{c}}uk Kavut and
                  Deng Tang},
  title        = {Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best
                  and Worst Scenarios},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {203--218},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3006399},
  doi          = {10.1109/TIFS.2020.3006399},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CarletCGKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengGCMD21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Sihem Mesnager and
                  Jean{-}Luc Danger},
  title        = {Optimizing Inner Product Masking Scheme by a Coding Theory Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {220--235},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3009609},
  doi          = {10.1109/TIFS.2020.3009609},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengGCMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLGT21,
  author       = {Yanbin Li and
                  Zhe Liu and
                  Sylvain Guilley and
                  Ming Tang},
  title        = {Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation
                  Power Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4466--4481},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3096130},
  doi          = {10.1109/TIFS.2021.3096130},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PicekHPG21,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Guilherme Perin and
                  Sylvain Guilley},
  editor       = {Vincent Grosso and
                  Thomas P{\"{o}}ppelmann},
  title        = {Profiled Side-Channel Analysis in the Efficient Attacker Framework},
  booktitle    = {Smart Card Research and Advanced Applications - 20th International
                  Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12,
                  2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13173},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97348-3\_3},
  doi          = {10.1007/978-3-030-97348-3\_3},
  timestamp    = {Thu, 10 Mar 2022 15:30:57 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/PicekHPG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/KroegerCGDK21,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  editor       = {Shivam Bhasin and
                  Fabrizio De Santis},
  title        = {Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its
                  Derivatives Against Power Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 12th International
                  Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12910},
  pages        = {303--321},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89915-8\_14},
  doi          = {10.1007/978-3-030-89915-8\_14},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/KroegerCGDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KroegerCGDK21,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling
                  Attacks},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2021, Grenoble, France, February 1-5, 2021},
  pages        = {1000--1005},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/DATE51398.2021.9474137},
  doi          = {10.23919/DATE51398.2021.9474137},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/KroegerCGDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/AnikDDEFGKPT21,
  author       = {Md Toufiq Hasan Anik and
                  Jean{-}Luc Danger and
                  Omar Diankha and
                  Mohammad Ebrahimabadi and
                  Christoph Frisch and
                  Sylvain Guilley and
                  Naghmeh Karimi and
                  Michael Pehl and
                  Sofiane Takarabt},
  editor       = {Luigi Dilillo and
                  Luca Cassano and
                  Athanasios Papadimitriou},
  title        = {Testing and Reliability Enhancement of Security Primitives},
  booktitle    = {36th {IEEE} International Symposium on Defect and Fault Tolerance
                  in {VLSI} and Nanotechnology Systems, {DFT} 2021, Athens, Greece,
                  October 6-8, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DFT52944.2021.9568297},
  doi          = {10.1109/DFT52944.2021.9568297},
  timestamp    = {Fri, 22 Oct 2021 15:23:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dft/AnikDDEFGKPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ForcioliDMBBMNF21,
  author       = {Quentin Forcioli and
                  Jean{-}Luc Danger and
                  Cl{\'{e}}mentine Maurice and
                  Lilian Bossuet and
                  Florent Bruguier and
                  Maria Mushtaq and
                  David Novo and
                  Lo{\"{\i}}c France and
                  Pascal Benoit and
                  Sylvain Guilley and
                  Thomas Perianin},
  title        = {Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural
                  Level},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {96--102},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSPW54576.2021.00017},
  doi          = {10.1109/EUROSPW54576.2021.00017},
  timestamp    = {Mon, 08 Nov 2021 16:43:34 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/ForcioliDMBBMNF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/TakarabtGSKSM21,
  author       = {Sofiane Takarabt and
                  Sylvain Guilley and
                  Youssef Souissi and
                  Khaled Karray and
                  Laurent Sauvage and
                  Yves Mathieu},
  title        = {Formal Evaluation and Construction of Glitch-resistant Masked Functions},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2021, Tysons Corner, VA, USA, December 12-15, 2021},
  pages        = {304--313},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HOST49136.2021.9702272},
  doi          = {10.1109/HOST49136.2021.9702272},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/TakarabtGSKSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GuilleyRQ21,
  author       = {Sylvain Guilley and
                  Michel Le Rolland and
                  Damien Quenson},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Implementing Secure Applications Thanks to an Integrated Secure Element},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {566--571},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010298205660571},
  doi          = {10.5220/0010298205660571},
  timestamp    = {Tue, 02 Mar 2021 22:35:43 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/GuilleyRQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/SoleCGR21,
  author       = {Patrick Sol{\'{e}} and
                  Wei Cheng and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Bent Sequences over Hadamard Codes for Physically Unclonable Functions},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2021,
                  Melbourne, Australia, July 12-20, 2021},
  pages        = {801--806},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISIT45174.2021.9517752},
  doi          = {10.1109/ISIT45174.2021.9517752},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/SoleCGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/RioulCG21,
  author       = {Olivier Rioul and
                  Wei Cheng and
                  Sylvain Guilley},
  title        = {Cumulant Expansion of Mutual Information for Quantifying Leakage of
                  a Protected Secret},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2021,
                  Melbourne, Australia, July 12-20, 2021},
  pages        = {2596--2601},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISIT45174.2021.9517886},
  doi          = {10.1109/ISIT45174.2021.9517886},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/RioulCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/LiuCGR21,
  author       = {Yi Liu and
                  Wei Cheng and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {On Conditional Alpha-Information and its Application to Side-Channel
                  Analysis},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2021, Kanazawa, Japan, October
                  17-21, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ITW48936.2021.9611409},
  doi          = {10.1109/ITW48936.2021.9611409},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/LiuCGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/SoleLCGR21,
  author       = {Patrick Sol{\'{e}} and
                  Yi Liu and
                  Wei Cheng and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Linear Programming Bounds on the Kissing Number of q-ary Codes},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2021, Kanazawa, Japan, October
                  17-21, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ITW48936.2021.9611478},
  doi          = {10.1109/ITW48936.2021.9611478},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/SoleLCGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-02468,
  author       = {Olivier Rioul and
                  Wei Cheng and
                  Sylvain Guilley},
  title        = {Cumulant Expansion of Mutual Information for Quantifying Leakage of
                  a Protected Secret},
  journal      = {CoRR},
  volume       = {abs/2102.02468},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.02468},
  eprinttype    = {arXiv},
  eprint       = {2102.02468},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-02468.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-07167,
  author       = {Yi Liu and
                  Wei Cheng and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {On Conditional {\(\alpha\)}-Information and its Application to Side-Channel
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/2105.07167},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.07167},
  eprinttype    = {arXiv},
  eprint       = {2105.07167},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-07167.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-07436,
  author       = {Wei Cheng and
                  Yi Liu and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Attacking Masked Cryptographic Implementations: Information-Theoretic
                  Bounds},
  journal      = {CoRR},
  volume       = {abs/2105.07436},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.07436},
  eprinttype    = {arXiv},
  eprint       = {2105.07436},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-07436.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengGCDM21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger and
                  Sihem Mesnager},
  title        = {Information Leakages in Code-based Masking: {A} Unified Quantification
                  Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/363},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengGCDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OuladjGGM21,
  author       = {Maamar Ouladj and
                  Sylvain Guilley and
                  Philippe Guillot and
                  Farid Mokrane},
  title        = {Spectral Approach to Process the (Multivariate) High-Order Template
                  Attack against Any Masking Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {941},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/941},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OuladjGGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletGM21,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Sihem Mesnager},
  title        = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1028},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1028},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauCDFG21,
  author       = {Nicolas Bruneau and
                  Charles Christen and
                  Jean{-}Luc Danger and
                  Adrien Facon and
                  Sylvain Guilley},
  title        = {Security evaluation against side-channel analysis at compilation time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1521},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1521},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauCDFG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/SchaubRDGB20,
  author       = {Alexander Schaub and
                  Olivier Rioul and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Joseph Boutros},
  title        = {Challenge codes for physically unclonable functions with Gaussian
                  delays: {A} maximum entropy problem},
  journal      = {Adv. Math. Commun.},
  volume       = {14},
  number       = {3},
  pages        = {491--505},
  year         = {2020},
  url          = {https://doi.org/10.3934/amc.2020060},
  doi          = {10.3934/AMC.2020060},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/SchaubRDGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GuilleyKPSST20,
  author       = {Sylvain Guilley and
                  Khaled Karray and
                  Thomas Perianin and
                  Ritu Ranjan Shrivastwa and
                  Youssef Souissi and
                  Sofiane Takarabt},
  title        = {Side-Channel Evaluation Methodology on Software},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {27},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040027},
  doi          = {10.3390/CRYPTOGRAPHY4040027},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GuilleyKPSST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OuladjMGGM20,
  author       = {Maamar Ouladj and
                  Nadia El Mrabet and
                  Sylvain Guilley and
                  Philippe Guillot and
                  Gilles Mill{\'{e}}rioux},
  title        = {On the power of template attacks in highly multivariate context},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {337--354},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00239-2},
  doi          = {10.1007/S13389-020-00239-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OuladjMGGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FerradiGGNT20,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Sylvain Guilley and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Recovering Secrets From Prefix-Dependent Leakage},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {15--24},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0048},
  doi          = {10.1515/JMC-2015-0048},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FerradiGGNT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HeuserPGM20,
  author       = {Annelie Heuser and
                  Stjepan Picek and
                  Sylvain Guilley and
                  Nele Mentens},
  title        = {Lightweight Ciphers and Their Side-Channel Resilience},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {10},
  pages        = {1434--1448},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2017.2757921},
  doi          = {10.1109/TC.2017.2757921},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/HeuserPGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/0010YDG00Z020,
  author       = {Fan Zhang and
                  Bolin Yang and
                  Xiaofei Dong and
                  Sylvain Guilley and
                  Zhe Liu and
                  Wei He and
                  Fangguo Zhang and
                  Kui Ren},
  title        = {Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant
                  {SIKE}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {11},
  pages        = {1681--1693},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2020.3020407},
  doi          = {10.1109/TC.2020.3020407},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/0010YDG00Z020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FukushimaPDKGF20,
  author       = {Kazuhide Fukushima and
                  Thomas Perianin and
                  Victor Dyseryn and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley and
                  Adrien Facon},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Feasibility study of a camera-based {PUF} in a realistic scenario},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {31:1--31:6},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3407047},
  doi          = {10.1145/3407023.3407047},
  timestamp    = {Mon, 03 Aug 2020 16:17:13 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FukushimaPDKGF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CarreGR20,
  author       = {S{\'{e}}bastien Carr{\'{e}} and
                  Sylvain Guilley and
                  Olivier Rioul},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Persistent Fault Analysis with Few Encryptions},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_1},
  doi          = {10.1007/978-3-030-68773-1\_1},
  timestamp    = {Fri, 05 Feb 2021 12:30:03 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/CarreGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/OuladjGP20,
  author       = {Maamar Ouladj and
                  Sylvain Guilley and
                  Emmanuel Prouff},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {On the Implementation Efficiency of Linear Regression-Based Side-Channel
                  Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {147--172},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_8},
  doi          = {10.1007/978-3-030-68773-1\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/OuladjGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DangerFGHKSTP20,
  author       = {Jean{-}Luc Danger and
                  Adrien Facon and
                  Sylvain Guilley and
                  Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Abdelmalek Si{-}Merabet and
                  Micha{\"{e}}l Timbert and
                  Baptiste Pecatte},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Processor Anchor to Increase the Robustness Against Fault Injection
                  and Cyber Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {254--274},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_12},
  doi          = {10.1007/978-3-030-68773-1\_12},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/DangerFGHKSTP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KroegerCGDK20,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {Effect of Aging on {PUF} Modeling Attacks based on Power Side-Channel
                  Observations},
  booktitle    = {2020 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020},
  pages        = {454--459},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/DATE48585.2020.9116428},
  doi          = {10.23919/DATE48585.2020.9116428},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/KroegerCGDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/0001DRG20,
  author       = {Alexander Schaub and
                  Jean{-}Luc Danger and
                  Olivier Rioul and
                  Sylvain Guilley},
  title        = {The Big Picture of Delay-PUF Dependability},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2020, Sofia,
                  Bulgaria, September 7-10, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ECCTD49232.2020.9218396},
  doi          = {10.1109/ECCTD49232.2020.9218396},
  timestamp    = {Wed, 14 Oct 2020 15:01:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/0001DRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/AlipourBCDNHGK20,
  author       = {Amir Alipour and
                  Vincent Beroulle and
                  Bertrand Cambou and
                  Jean{-}Luc Danger and
                  Giorgio Di Natale and
                  David H{\'{e}}ly and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {{PUF} Enrollment and Life Cycle Management: Solutions and Perspectives
                  for the Test Community},
  booktitle    = {{IEEE} European Test Symposium, {ETS} 2020, Tallinn, Estonia, May
                  25-29, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ETS48528.2020.9131578},
  doi          = {10.1109/ETS48528.2020.9131578},
  timestamp    = {Wed, 15 Jul 2020 13:23:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/AlipourBCDNHGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/AnikSDGK20,
  author       = {Md Toufiq Hasan Anik and
                  Rachit Saini and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Failure and Attack Detection by Digital Sensors},
  booktitle    = {{IEEE} European Test Symposium, {ETS} 2020, Tallinn, Estonia, May
                  25-29, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ETS48528.2020.9131580},
  doi          = {10.1109/ETS48528.2020.9131580},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/AnikSDGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/AnikEPDGK20,
  author       = {Md Toufiq Hasan Anik and
                  Mohammad Ebrahimabadi and
                  Hamed Pirsiavash and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {On-Chip Voltage and Temperature Digital Sensor for Security, Reliability,
                  and Portability},
  booktitle    = {38th {IEEE} International Conference on Computer Design, {ICCD} 2020,
                  Hartford, CT, USA, October 18-21, 2020},
  pages        = {506--509},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCD50377.2020.00091},
  doi          = {10.1109/ICCD50377.2020.00091},
  timestamp    = {Mon, 11 Jan 2021 13:35:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/AnikEPDGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TakahashiOINGSA20,
  author       = {Junko Takahashi and
                  Keiichi Okabe and
                  Hiroki Itoh and
                  Xuan Thuy Ngo and
                  Sylvain Guilley and
                  Ritu Ranjan Shrivastwa and
                  Mushir Ahmed and
                  Patrick Lejoly},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Machine Learning Based Hardware Trojan Detection Using Electromagnetic
                  Emanation},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_1},
  doi          = {10.1007/978-3-030-61078-4\_1},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TakahashiOINGSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/KroegerCGDK20,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel},
  booktitle    = {{IEEE} International Test Conference, {ITC} 2020, Washington, DC,
                  USA, November 1-6, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ITC44778.2020.9325241},
  doi          = {10.1109/ITC44778.2020.9325241},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itc/KroegerCGDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/AnikGDK20,
  author       = {Md Toufiq Hasan Anik and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {On the Effect of Aging on Digital Sensors},
  booktitle    = {33rd International Conference on {VLSI} Design and 19th International
                  Conference on Embedded Systems, {VLSID} 2020, Bangalore, India, January
                  4-8, 2020},
  pages        = {189--194},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VLSID49098.2020.00050},
  doi          = {10.1109/VLSID49098.2020.00050},
  timestamp    = {Mon, 14 Nov 2022 15:28:08 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsid/AnikGDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarreGR20,
  author       = {S{\'{e}}bastien Carr{\'{e}} and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Persistent Fault Analysis With Few Encryptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/671},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarreGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengGCMD20,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Sihem Mesnager and
                  Jean{-}Luc Danger},
  title        = {Optimizing Inner Product Masking Scheme by {A} Coding Theory Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/692},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengGCMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletGM20,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Sihem Mesnager},
  title        = {Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {876},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/876},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGT19,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Polynomial direct sum masking to protect against both {SCA} and {FIA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {303--312},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0194-9},
  doi          = {10.1007/S13389-018-0194-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/CarreDFG19,
  author       = {S{\'{e}}bastien Carr{\'{e}} and
                  Matthieu Desjardins and
                  Adrien Facon and
                  Sylvain Guilley},
  title        = {Exhaustive single bit fault analysis. {A} use case against Mbedtls
                  and OpenSSL's protection on {ARM} and Intel {CPU}},
  journal      = {Microprocess. Microsystems},
  volume       = {71},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.micpro.2019.102860},
  doi          = {10.1016/J.MICPRO.2019.102860},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/CarreDFG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/RoyBGHPM19,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  title        = {{CC} Meets {FIPS:} {A} Hybrid Test Methodology for First Order Side
                  Channel Analysis},
  journal      = {{IEEE} Trans. Computers},
  volume       = {68},
  number       = {3},
  pages        = {347--361},
  year         = {2019},
  url          = {https://doi.org/10.1109/TC.2018.2875746},
  doi          = {10.1109/TC.2018.2875746},
  timestamp    = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/RoyBGHPM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CheriseyGRP19,
  author       = {Eloi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Pablo Piantanida},
  title        = {Best Information is Most Successful Mutual Information and Success
                  Rate in Side-Channel Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {49--79},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.49-79},
  doi          = {10.13154/TCHES.V2019.I2.49-79},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CheriseyGRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/SouissiFG19,
  author       = {Youssef Souissi and
                  Adrien Facon and
                  Sylvain Guilley},
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Virtual Security Evaluation - An Operational Methodology for Side-Channel
                  Leakage Detection at Source-Code Level},
  booktitle    = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4\_1},
  doi          = {10.1007/978-3-030-16458-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/SouissiFG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/Takarabt0FGSSM19,
  author       = {Sofiane Takarabt and
                  Alexander Schaub and
                  Adrien Facon and
                  Sylvain Guilley and
                  Laurent Sauvage and
                  Youssef Souissi and
                  Yves Mathieu},
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Cache-Timing Attacks Still Threaten IoT Devices},
  booktitle    = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  pages        = {13--30},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4\_2},
  doi          = {10.1007/978-3-030-16458-4\_2},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/c2si/Takarabt0FGSSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/NguyenFGGA19,
  author       = {Robert Nguyen and
                  Adrien Facon and
                  Sylvain Guilley and
                  Guillaume Gautier and
                  Safwan El Assad},
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Speed-up of {SCA} Attacks on 32-bit Multiplications},
  booktitle    = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  pages        = {31--39},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4\_3},
  doi          = {10.1007/978-3-030-16458-4\_3},
  timestamp    = {Thu, 18 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/NguyenFGGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CarreFGT0S19,
  author       = {S{\'{e}}bastien Carr{\'{e}} and
                  Adrien Facon and
                  Sylvain Guilley and
                  Sofiane Takarabt and
                  Alexander Schaub and
                  Youssef Souissi},
  editor       = {Ilia Polian and
                  Marc St{\"{o}}ttinger},
  title        = {Cache-Timing Attack Detection and Prevention - Application to Crypto
                  Libs and {PQC}},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 10th International
                  Workshop, {COSADE} 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11421},
  pages        = {13--21},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16350-1\_2},
  doi          = {10.1007/978-3-030-16350-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/CarreFGT0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/TehraniGSGD19,
  author       = {Etienne Tehrani and
                  Tarik Graba and
                  Abdelmalek Si{-}Merabet and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Classification of Lightweight Block Ciphers for Specific Processor
                  Accelerated Implementations},
  booktitle    = {26th {IEEE} International Conference on Electronics, Circuits and
                  Systems, {ICECS} 2019, Genoa, Italy, November 27-29, 2019},
  pages        = {747--750},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICECS46596.2019.8965156},
  doi          = {10.1109/ICECS46596.2019.8965156},
  timestamp    = {Mon, 03 Feb 2020 12:19:05 +0100},
  biburl       = {https://dblp.org/rec/conf/icecsys/TehraniGSGD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {67--74},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007259500670074},
  doi          = {10.5220/0007259500670074},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_4},
  doi          = {10.1007/978-3-030-49443-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CheriseyGRP19,
  author       = {{\'{E}}loi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Pablo Piantanida},
  title        = {An Information-Theoretic Model for Side-Channel Attacks in Embedded
                  Hardware},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2019,
                  Paris, France, July 7-12, 2019},
  pages        = {310--315},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISIT.2019.8849763},
  doi          = {10.1109/ISIT.2019.8849763},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/CheriseyGRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwasi/DangerG019,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Alexander Schaub},
  title        = {Two-Metric Helper Data for Highly Robust and Secure Delay PUFs},
  booktitle    = {{IEEE} 8th International Workshop on Advances in Sensors and Interfaces,
                  {IWASI} 2019, Otranto, Italy, June 13-14, 2019},
  pages        = {184--188},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IWASI.2019.8791249},
  doi          = {10.1109/IWASI.2019.8791249},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwasi/DangerG019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/proofs/CarreDFGP19,
  author       = {S{\'{e}}bastien Carr{\'{e}} and
                  Victor Dyseryn and
                  Adrien Facon and
                  Sylvain Guilley and
                  Thomas Perianin},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {End-to-end automated cache-timing attack driven by Machine Learning},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {1--16},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/nwj8},
  doi          = {10.29007/NWJ8},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/CarreDFGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/proofs/ChengCGDG19,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {Detecting Faults in Inner-Product Masking Scheme - {IPM-FD:} {IPM}
                  with Fault Detection},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {17--32},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/fv2n},
  doi          = {10.29007/FV2N},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/ChengCGDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/aise/CarletGGMO19,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Cem G{\"{u}}neri and
                  Sihem Mesnager and
                  Ferruh {\"{O}}zbudak},
  editor       = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Antonio F. Skarmeta},
  title        = {Construction of Efficient Codes for High-Order Direct Sum Masking},
  booktitle    = {Security and Privacy in the Internet of Things: Challenges and Solutions},
  series       = {Ambient Intelligence and Smart Environments},
  volume       = {27},
  pages        = {108--128},
  publisher    = {{IOS} Press},
  year         = {2019},
  url          = {https://doi.org/10.3233/AISE200008},
  doi          = {10.3233/AISE200008},
  timestamp    = {Wed, 13 May 2020 14:43:58 +0200},
  biburl       = {https://dblp.org/rec/series/aise/CarletGGMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/aise/CarletGM19,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Sihem Mesnager},
  editor       = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Antonio F. Skarmeta},
  title        = {Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection
                  Attacks},
  booktitle    = {Security and Privacy in the Internet of Things: Challenges and Solutions},
  series       = {Ambient Intelligence and Smart Environments},
  volume       = {27},
  pages        = {148--166},
  publisher    = {{IOS} Press},
  year         = {2019},
  url          = {https://doi.org/10.3233/AISE200010},
  doi          = {10.3233/AISE200010},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/aise/CarletGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/c2si/2019,
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4},
  doi          = {10.1007/978-3-030-16458-4},
  isbn         = {978-3-030-16457-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHG19,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Sylvain Guilley},
  title        = {Profiling Side-channel Analysis in the Restricted Attacker Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheriseyGRP19,
  author       = {Eloi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Pablo Piantanida},
  title        = {Best Information is Most Successful},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheriseyGRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenFGGA19,
  author       = {Robert Nguyen and
                  Adrien Facon and
                  Sylvain Guilley and
                  Guillaume Gautier and
                  Safwan El Assad},
  title        = {Speed-up of {SCA} attacks on 32-bit multiplications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenFGGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengCGGD19,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Detecting Faults in Inner Product Masking Scheme - {IPM-FD:} {IPM}
                  with Fault Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {919},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/919},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengCGGD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CheriseyGHR18,
  author       = {Eloi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  title        = {On the optimality and practicability of mutual information analysis
                  in some scenarios},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {1},
  pages        = {101--121},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0241-x},
  doi          = {10.1007/S12095-017-0241-X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CheriseyGHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CarletG18,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  title        = {Statistical properties of side-channel and fault injection attacks
                  using coding theory},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {5},
  pages        = {909--933},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0271-4},
  doi          = {10.1007/S12095-017-0271-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CarletG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DangerHFGGHNPS18,
  author       = {Jean{-}Luc Danger and
                  Youssef El Housni and
                  Adrien Facon and
                  Cheikh Thiecoumba Gueye and
                  Sylvain Guilley and
                  Sylvie Herbel and
                  Ousmane Ndiaye and
                  Edoardo Persichetti and
                  Alexander Schaub},
  title        = {On the Performance and Security of Multiplication in \emph{GF}(2\({}^{\mbox{\emph{N}}}\))},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {25},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030025},
  doi          = {10.3390/CRYPTOGRAPHY2030025},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/DangerHFGGHNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/KarimiDG18,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Impact of Aging on the Reliability of Delay PUFs},
  journal      = {J. Electron. Test.},
  volume       = {34},
  number       = {5},
  pages        = {571--586},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10836-018-5745-6},
  doi          = {10.1007/S10836-018-5745-6},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/et/KarimiDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/RoyBDGHMNN18,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Wei He and
                  Debdeep Mukhopadhyay and
                  Zakaria Najm and
                  Xuan Thuy Ngo},
  title        = {The Conflicted Usage of RLUTs for Security-Critical Applications on
                  {FPGA}},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {162--178},
  year         = {2018},
  url          = {https://doi.org/10.1007/s41635-018-0035-4},
  doi          = {10.1007/S41635-018-0035-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/RoyBDGHMNN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BruneauGNT18,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Yannick Teglia},
  title        = {Multivariate High-Order Attacks of Shuffled Tables Recomputation},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {2},
  pages        = {351--393},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9259-7},
  doi          = {10.1007/S00145-017-9259-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BruneauGNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CheriseyGR18,
  author       = {Eloi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Olivier Rioul},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Confused yet Successful: - Theoretical Comparison of Distinguishers
                  for Monobit Leakages in Terms of Confusion Coefficient and {SNR}},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {533--553},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_28},
  doi          = {10.1007/978-3-030-14234-6\_28},
  timestamp    = {Thu, 14 Jul 2022 16:21:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CheriseyGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/CarreDFG18,
  author       = {S{\'{e}}bastien Carr{\'{e}} and
                  Matthieu Desjardins and
                  Adrien Facon and
                  Sylvain Guilley},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {OpenSSL Bellcore's Protection Helps Fault Attack},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {500--507},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00089},
  doi          = {10.1109/DSD.2018.00089},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/CarreDFG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/DangerFGHKMT18,
  author       = {Jean{-}Luc Danger and
                  Adrien Facon and
                  Sylvain Guilley and
                  Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Abdelmalek Si{-}Merabet and
                  Micha{\"{e}}l Timbert},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {CCFI-Cache: {A} Transparent and Flexible Hardware Protection for Code
                  and Control-Flow Integrity},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {529--536},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00093},
  doi          = {10.1109/DSD.2018.00093},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/DangerFGHKMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/SchaubDGR18,
  author       = {Alexander Schaub and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Olivier Rioul},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {An Improved Analysis of Reliability and Entropy for Delay PUFs},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {553--560},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00096},
  doi          = {10.1109/DSD.2018.00096},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/SchaubDGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dtis/BouvetBFGM18,
  author       = {Antoine Bouvet and
                  Nicolas Bruneau and
                  Adrien Facon and
                  Sylvain Guilley and
                  Damien Marion},
  title        = {Give me your binary, I'll tell you if it leaks},
  booktitle    = {13th International Conference on Design {\&} Technology of Integrated
                  Systems In Nanoscale Era, {DTIS} 2018, Taormina, Italy, April 9-12,
                  2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DTIS.2018.8368582},
  doi          = {10.1109/DTIS.2018.8368582},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dtis/BouvetBFGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/GuilleyH18,
  author       = {Sylvain Guilley and
                  Youssef El Housni},
  title        = {Random Numbers Generation: Tests and Attacks},
  booktitle    = {2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2018, Amsterdam, The Netherlands, September 13, 2018},
  pages        = {49--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/FDTC.2018.00016},
  doi          = {10.1109/FDTC.2018.00016},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/GuilleyH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/KarimiGD18,
  author       = {Naghmeh Karimi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Deming Chen and
                  Houman Homayoun and
                  Baris Taskin},
  title        = {Impact of Aging on Template Attacks},
  booktitle    = {Proceedings of the 2018 on Great Lakes Symposium on VLSI, {GLSVLSI}
                  2018, Chicago, IL, USA, May 23-25, 2018},
  pages        = {455--458},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3194554.3194638},
  doi          = {10.1145/3194554.3194638},
  timestamp    = {Wed, 10 Mar 2021 14:55:38 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/KarimiGD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/ChibaniFGS18,
  author       = {Kais Chibani and
                  Adrien Facon and
                  Sylvain Guilley and
                  Youssef Souissi},
  title        = {Technology-agnostic power optimization for {AES} block cipher},
  booktitle    = {25th {IEEE} International Conference on Electronics, Circuits and
                  Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018},
  pages        = {397--400},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICECS.2018.8617921},
  doi          = {10.1109/ICECS.2018.8617921},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/ChibaniFGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/KarimiDG18,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Dimitris Gizopoulos and
                  Dan Alexandrescu and
                  Mihalis Maniatakos and
                  Panagiota Papavramidou},
  title        = {On the Effect of Aging in Detecting Hardware Trojan Horses with Template
                  Analysis},
  booktitle    = {24th {IEEE} International Symposium on On-Line Testing And Robust
                  System Design, {IOLTS} 2018, Platja D'Aro, Spain, July 2-4, 2018},
  pages        = {281--286},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IOLTS.2018.8474089},
  doi          = {10.1109/IOLTS.2018.8474089},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iolts/KarimiDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/FaconGLSS18,
  author       = {Adrien Facon and
                  Sylvain Guilley and
                  Matthieu Lec'Hvien and
                  Alexander Schaub and
                  Youssef Souissi},
  title        = {Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography
                  Algorithms},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494855},
  doi          = {10.1109/IVSW.2018.8494855},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/FaconGLSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/TakarabtCFGMSS18,
  author       = {Sofiane Takarabt and
                  Kais Chibani and
                  Adrien Facon and
                  Sylvain Guilley and
                  Yves Mathieu and
                  Laurent Sauvage and
                  Youssef Souissi},
  title        = {Pre-silicon Embedded System Evaluation as New {EDA} Tool for Security
                  Verification},
  booktitle    = {3rd {IEEE} International Verification and Security Workshop, {IVSW}
                  2018, Costa Brava, Spain, July 2-4, 2018},
  pages        = {74--79},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVSW.2018.8494881},
  doi          = {10.1109/IVSW.2018.8494881},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/TakarabtCFGMSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BruneauDFGHHK018,
  author       = {Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Adrien Facon and
                  Sylvain Guilley and
                  Soshi Hamaguchi and
                  Yohei Hori and
                  Yousung Kang and
                  Alexander Schaub},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Development of the Unified Security Requirements of PUFs During the
                  Standardization Process},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {314--330},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_24},
  doi          = {10.1007/978-3-030-12942-2\_24},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BruneauDFGHHK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/FaconGLMP18,
  author       = {Adrien Facon and
                  Sylvain Guilley and
                  Matthieu Lec'Hvien and
                  Damien Marion and
                  Thomas Perianin},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Binary Data Analysis for Source Code Leakage Assessment},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {391--409},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_30},
  doi          = {10.1007/978-3-030-12942-2\_30},
  timestamp    = {Tue, 19 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/FaconGLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KarrayDGE18,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Moulay Abdelaziz Elaabid},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Prediction-Based Intrusion Detection System for In-Vehicle Networks
                  Using Supervised Learning and Outlier-Detection},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_9},
  doi          = {10.1007/978-3-030-20074-9\_9},
  timestamp    = {Tue, 14 May 2019 14:17:01 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KarrayDGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/KarrayDGE18,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  M. Abdelaziz Elaabid},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Attack Tree Construction and Its Application to the Connected Vehicle},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_9},
  doi          = {10.1007/978-3-319-98935-8\_9},
  timestamp    = {Fri, 08 Mar 2019 12:57:04 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/KarrayDGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/KarrayDGE18a,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  M. Abdelaziz Elaabid},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Identifier Randomization: An Efficient Protection Against CAN-Bus
                  Attacks},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {219--254},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_11},
  doi          = {10.1007/978-3-319-98935-8\_11},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/KarrayDGE18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/DangerGHLT18,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Axel Legay and
                  Ming Tang},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Physical Security Versus Masking Schemes},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {269--284},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_13},
  doi          = {10.1007/978-3-319-98935-8\_13},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/DangerGHLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGT18,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Polynomial direct sum masking to protect against both {SCA} and {FIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGGNT18,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Sylvain Guilley and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Recovering Secrets From Prefix-Dependent Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {798},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/798},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGGNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/VeshchikovG17,
  author       = {Nikita Veshchikov and
                  Sylvain Guilley},
  title        = {Implementation flaws in the masking scheme of {DPA} Contest v4},
  journal      = {{IET} Inf. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {356--362},
  year         = {2017},
  url          = {https://doi.org/10.1049/iet-ifs.2016.0475},
  doi          = {10.1049/IET-IFS.2016.0475},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/VeshchikovG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Guilley17,
  author       = {Sylvain Guilley},
  title        = {Editorial about {PROOFS} 2015},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {19--20},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0140-7},
  doi          = {10.1007/S13389-016-0140-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Guilley17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DugardinGMNR17,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Martin Moreau and
                  Zakaria Najm and
                  Pablo Rauzy},
  title        = {Using modular extension to provably protect Edwards curves against
                  fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {321--330},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0167-4},
  doi          = {10.1007/S13389-017-0167-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/DugardinGMNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BruneauGHMR17,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  title        = {Optimal side-channel attacks for multivariate leakages and multiple
                  models},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {331--341},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0170-9},
  doi          = {10.1007/S13389-017-0170-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BruneauGHMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PicekHG17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Sylvain Guilley},
  title        = {Template attack versus Bayes classifier},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {343--351},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0172-7},
  doi          = {10.1007/S13389-017-0172-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PicekHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/NgoDGGMNB17,
  author       = {Xuan Thuy Ngo and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Tarik Graba and
                  Yves Mathieu and
                  Zakaria Najm and
                  Shivam Bhasin},
  title        = {Cryptographically Secure Shield for Security IPs Protection},
  journal      = {{IEEE} Trans. Computers},
  volume       = {66},
  number       = {2},
  pages        = {354--360},
  year         = {2017},
  url          = {https://doi.org/10.1109/TC.2016.2584041},
  doi          = {10.1109/TC.2016.2584041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/NgoDGGMNB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BruneauCGHPR17,
  author       = {Nicolas Bruneau and
                  Claude Carlet and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Emmanuel Prouff and
                  Olivier Rioul},
  title        = {Stochastic Collision Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2090--2104},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2697401},
  doi          = {10.1109/TIFS.2017.2697401},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/GuilleyHR17,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Codes for Side-Channel Attacks and Protections},
  booktitle    = {Codes, Cryptology and Information Security - Second International
                  Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings
                  - In Honor of Claude Carlet},
  series       = {Lecture Notes in Computer Science},
  volume       = {10194},
  pages        = {35--55},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-55589-8\_3},
  doi          = {10.1007/978-3-319-55589-8\_3},
  timestamp    = {Tue, 27 Aug 2019 17:49:45 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/GuilleyHR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PoussierGSCG17,
  author       = {Romain Poussier and
                  Qian Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Claude Carlet and
                  Sylvain Guilley},
  editor       = {Thomas Eisenbarth and
                  Yannick Teglia},
  title        = {Connecting and Improving Direct Sum Masking and Inner Product Masking},
  booktitle    = {Smart Card Research and Advanced Applications - 16th International
                  Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10728},
  pages        = {123--141},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75208-2\_8},
  doi          = {10.1007/978-3-319-75208-2\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/PoussierGSCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MaurineG17,
  author       = {Philippe Maurine and
                  Sylvain Guilley},
  editor       = {Sylvain Guilley},
  title        = {Impacts of Technology Trends on Physical Attacks?},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {190--206},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_12},
  doi          = {10.1007/978-3-319-64647-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MaurineG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/DangerGNNS17,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Nguyen and
                  Robert Nguyen and
                  Youssef Souissi},
  editor       = {David Atienza and
                  Giorgio Di Natale},
  title        = {Analyzing security breaches of countermeasures throughout the refinement
                  process in hardware design flow},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2017, Lausanne, Switzerland, March 27-31, 2017},
  pages        = {1129--1134},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/DATE.2017.7927159},
  doi          = {10.23919/DATE.2017.7927159},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/DangerGNNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/KarimiDSG17,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Mariem Slimani and
                  Sylvain Guilley},
  title        = {Impact of the switching activity on the aging of delay-PUFs},
  booktitle    = {22nd {IEEE} European Test Symposium, {ETS} 2017, Limassol, Cyprus,
                  May 22-26, 2017},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ETS.2017.7968223},
  doi          = {10.1109/ETS.2017.7968223},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/KarimiDSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/VeshchikovG17,
  author       = {Nikita Veshchikov and
                  Sylvain Guilley},
  title        = {Use of Simulators for Side-Channel Analysis},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {51--59},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.31},
  doi          = {10.1109/EUROSP.2017.31},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/VeshchikovG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/VeshchikovG17a,
  author       = {Nikita Veshchikov and
                  Sylvain Guilley},
  title        = {Use of Simulators for Side-Channel Analysis},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017},
  pages        = {104--112},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSPW.2017.59},
  doi          = {10.1109/EUROSPW.2017.59},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/VeshchikovG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/PicekHJLGJM17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Simone A. Ludwig and
                  Sylvain Guilley and
                  Domagoj Jakobovic and
                  Nele Mentens},
  title        = {Side-channel analysis and machine learning: {A} practical perspective},
  booktitle    = {2017 International Joint Conference on Neural Networks, {IJCNN} 2017,
                  Anchorage, AK, USA, May 14-19, 2017},
  pages        = {4095--4102},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IJCNN.2017.7966373},
  doi          = {10.1109/IJCNN.2017.7966373},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/PicekHJLGJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GuilleyHTR17,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Ming Tang and
                  Olivier Rioul},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {12--27},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_2},
  doi          = {10.1007/978-3-319-69284-5\_2},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/GuilleyHTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2017proofs,
  editor       = {Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded
                  Systems, Taipei, Taiwan, September 29th, 2017},
  series       = {EPiC Series in Computing},
  volume       = {49},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://easychair.org/publications/volume/PROOFS\_2017},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/2017proofs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2017,
  editor       = {Sylvain Guilley},
  title        = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3},
  doi          = {10.1007/978-3-319-64647-3},
  isbn         = {978-3-319-64646-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2016,
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56549-1},
  doi          = {10.1007/978-3-319-56549-1},
  isbn         = {978-3-319-56548-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuserPGM17,
  author       = {Annelie Heuser and
                  Stjepan Picek and
                  Sylvain Guilley and
                  Nele Mentens},
  title        = {Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal
                  Easy?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuserPGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilleyL17,
  author       = {Sylvain Guilley and
                  Liran Lerman},
  title        = {Bivariate attacks and confusion coefficients},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilleyL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarimiDLG17,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Florent Lozach and
                  Sylvain Guilley},
  title        = {Predictive Aging of Reliability of two Delay PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarimiDLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHG17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Sylvain Guilley},
  title        = {Template Attack vs Bayes Classifier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengZCZ0GS17,
  author       = {Wei Cheng and
                  Chao Zheng and
                  Yuchen Cao and
                  Yongbin Zhou and
                  Hailong Zhang and
                  Sylvain Guilley and
                  Laurent Sauvage},
  title        = {How Far Can We Reach? Breaking RSM-Masked {AES-128} Implementation
                  Using Only One Trace},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1144},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1144},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengZCZ0GS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/CarletG16,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  title        = {Complementary dual codes for counter-measures to side-channel attacks},
  journal      = {Adv. Math. Commun.},
  volume       = {10},
  number       = {1},
  pages        = {131--150},
  year         = {2016},
  url          = {https://doi.org/10.3934/amc.2016.10.131},
  doi          = {10.3934/AMC.2016.10.131},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/CarletG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ec/PicekCGMJ16,
  author       = {Stjepan Picek and
                  Claude Carlet and
                  Sylvain Guilley and
                  Julian F. Miller and
                  Domagoj Jakobovic},
  title        = {Evolutionary Algorithms for Boolean Functions in Diverse Domains of
                  Cryptography},
  journal      = {Evol. Comput.},
  volume       = {24},
  number       = {4},
  pages        = {667--694},
  year         = {2016},
  url          = {https://doi.org/10.1162/EVCO\_a\_00190},
  doi          = {10.1162/EVCO\_A\_00190},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ec/PicekCGMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RauzyGN16,
  author       = {Pablo Rauzy and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Formally proved security of assembly code against power analysis -
                  {A} case study on balanced logic},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {201--216},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0105-2},
  doi          = {10.1007/S13389-015-0105-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RauzyGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NgoNBGD16,
  author       = {Xuan Thuy Ngo and
                  Zakaria Najm and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Method taking into account process dispersion to detect hardware Trojan
                  Horse by side-channel analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {239--247},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0129-2},
  doi          = {10.1007/S13389-016-0129-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NgoNBGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BruneauGHRST16,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yannick Teglia},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled
                  Implementations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {573--601},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_21},
  doi          = {10.1007/978-3-662-53887-6\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BruneauGHRST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/DangerGHMN16,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Improving the Big Mac Attack on Elliptic Curve Cryptography},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {374--386},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_23},
  doi          = {10.1007/978-3-662-49301-4\_23},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/DangerGHMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/DangerGPPT16,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Thibault Porteboeuf and
                  Florian Praden and
                  Micha{\"{e}}l Timbert},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Hardware-Enforced Protection Against Buffer Overflow Using Masked
                  Program Counter},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {439--454},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_27},
  doi          = {10.1007/978-3-662-49301-4\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/DangerGPPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/FouqueGMN16,
  author       = {Pierre{-}Alain Fouque and
                  Sylvain Guilley and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Safe-Errors on {SPA} Protected Implementations with the Atomicity
                  Technique},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {479--493},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_30},
  doi          = {10.1007/978-3-662-49301-4\_30},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/FouqueGMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DugardinGDNR16,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Zakaria Najm and
                  Olivier Rioul},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_1},
  doi          = {10.1007/978-3-662-53140-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DugardinGDNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DugardinPNBDG16,
  author       = {Margaux Dugardin and
                  Louiza Papachristodoulou and
                  Zakaria Najm and
                  Lejla Batina and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Dismantling Real-World {ECC} with Horizontal and Vertical Template
                  Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  pages        = {88--108},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0\_6},
  doi          = {10.1007/978-3-319-43283-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/DugardinPNBDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CheriseyGRJ16,
  author       = {Eloi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Darshana Jayasinghe},
  title        = {Template Attacks with Partial Profiles and Dirichlet Priors: Application
                  to Timing Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18,
                  2016},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2948618.2948625},
  doi          = {10.1145/2948618.2948625},
  timestamp    = {Tue, 06 Nov 2018 11:07:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/CheriseyGRJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/RioulHGD16,
  author       = {Olivier Rioul and
                  Annelie Heuser and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Inter-class vs. mutual information as side-channel distinguishers},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {805--809},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541410},
  doi          = {10.1109/ISIT.2016.7541410},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/RioulHGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/RioulSGD16,
  author       = {Olivier Rioul and
                  Patrick Sol{\'{e}} and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {On the entropy of Physically Unclonable Functions},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {2928--2932},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541835},
  doi          = {10.1109/ISIT.2016.7541835},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/RioulSGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/HeuserPGM16,
  author       = {Annelie Heuser and
                  Stjepan Picek and
                  Sylvain Guilley and
                  Nele Mentens},
  editor       = {Gerhard P. Hancke and
                  Konstantinos Markantonakis},
  title        = {Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal
                  Easy?},
  booktitle    = {Radio Frequency Identification and IoT Security - 12th International
                  Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2,
                  2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10155},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62024-4\_7},
  doi          = {10.1007/978-3-319-62024-4\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/HeuserPGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/KarimiDLG16,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Florent Lozach and
                  Sylvain Guilley},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Predictive Aging of Reliability of Two Delay PUFs},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_12},
  doi          = {10.1007/978-3-319-49445-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/KarimiDLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16,
  author       = {Kazuhide Fukushima and
                  Youssef Souissi and
                  Seira Hidano and
                  Robert Nguyen and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Laurent Sauvage},
  title        = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes:
                  The Final Piece of All-in-One Assessment Methodology},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {201--207},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0064},
  doi          = {10.1109/TRUSTCOM.2016.0064},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauGHMR16,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  title        = {Less is More - Dimensionality Reduction from a Theoretical Perspective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauGHMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DugardinGDNR16,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Zakaria Najm and
                  Olivier Rioul},
  title        = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
                  - Extended Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/597},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DugardinGDNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelgarricBBDDGH16,
  author       = {Pierre Belgarric and
                  Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Zakaria Najm and
                  Olivier Rioul},
  title        = {Time-Frequency Analysis for Second-Order Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilleyHR16,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  title        = {A Key to Success - Success Exponents for Side-Channel Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {987},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/987},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilleyHR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyBPMG16,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sikhar Patranabis and
                  Debdeep Mukhopadhyay and
                  Sylvain Guilley},
  title        = {What Lies Ahead: Extending {TVLA} Testing Methodology Towards Success
                  Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1152},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyBPMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/BhasinDGH15,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Wei He},
  title        = {Exploiting {FPGA} Block Memories for Protected Cryptographic Implementations},
  journal      = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume       = {8},
  number       = {3},
  pages        = {16:1--16:16},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629552},
  doi          = {10.1145/2629552},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trets/BhasinDGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BruneauGHMR15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Less is More - Dimensionality Reduction from a Theoretical Perspective},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {22--41},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_2},
  doi          = {10.1007/978-3-662-48324-4\_2},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BruneauGHMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BruneauGNT15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Yannick Teglia},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Multi-variate High-Order Attacks of Shuffled Tables Recomputation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {475--494},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_24},
  doi          = {10.1007/978-3-662-48324-4\_24},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BruneauGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NgoEBDGNRR15,
  author       = {Xuan Thuy Ngo and
                  Ingrid Exurville and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Jean{-}Baptiste Rigaud and
                  Bruno Robisson},
  editor       = {Wolfgang Nebel and
                  David Atienza},
  title        = {Hardware trojan detection by delay and electromagnetic measurements},
  booktitle    = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
                  Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
                  9-13, 2015},
  pages        = {782--787},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2755931},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/NgoEBDGNRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/NgoNBRDG15,
  author       = {Xuan Thuy Ngo and
                  Zakaria Najm and
                  Shivam Bhasin and
                  Debapriya Basu Roy and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Integrated Sensor: {A} Backdoor for Hardware Trojan Insertions?},
  booktitle    = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira,
                  Portugal, August 26-28, 2015},
  pages        = {415--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSD.2015.119},
  doi          = {10.1109/DSD.2015.119},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/NgoNBRDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/CarletDDGNNPT15,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Xuan Thuy Ngo and
                  Thibault Porteboeuf and
                  C{\'{e}}dric Tavernier},
  title        = {Optimized linear complementary codes implementation for hardware trojan
                  prevention},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim,
                  Norway, August 24-26, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECCTD.2015.7300075},
  doi          = {10.1109/ECCTD.2015.7300075},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/CarletDDGNNPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/NgoDGNE15,
  author       = {Xuan Thuy Ngo and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Olivier Emery},
  title        = {Hardware property checker for run-time Hardware Trojan detection},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim,
                  Norway, August 24-26, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECCTD.2015.7300085},
  doi          = {10.1109/ECCTD.2015.7300085},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/NgoDGNE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/NgoBDGN15,
  author       = {Xuan Thuy Ngo and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Linear complementary dual code improvement to strengthen encoded circuit
                  against hardware Trojan horses},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {82--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140242},
  doi          = {10.1109/HST.2015.7140242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/NgoBDGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/RoyBGDM15,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Debdeep Mukhopadhyay},
  title        = {From theory to practice of private circuit: {A} cautionary note},
  booktitle    = {33rd {IEEE} International Conference on Computer Design, {ICCD} 2015,
                  New York City, NY, USA, October 18-21, 2015},
  pages        = {296--303},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCD.2015.7357117},
  doi          = {10.1109/ICCD.2015.7357117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/RoyBGDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GuilleyHR15,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  editor       = {Alex Biryukov and
                  Vipul Goyal},
  title        = {A Key to Success - Success Exponents for Side-Channel Distinguishers},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
                  on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9462},
  pages        = {270--290},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26617-6\_15},
  doi          = {10.1007/978-3-319-26617-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GuilleyHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/DeTranoGGKK15,
  author       = {Alexander DeTrano and
                  Sylvain Guilley and
                  Xiaofei Guo and
                  Naghmeh Karimi and
                  Ramesh Karri},
  editor       = {Ruby B. Lee and
                  Weidong Shi and
                  Jakub Szefer},
  title        = {Exploiting small leakages in masks to turn a second-order attack into
                  a first-order attack},
  booktitle    = {Proceedings of the Fourth Workshop on Hardware and Architectural Support
                  for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June
                  14, 2015},
  pages        = {7:1--7:5},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768566.2768573},
  doi          = {10.1145/2768566.2768573},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/DeTranoGGKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/RakotomalalaNND15,
  author       = {Henitsoa Rakotomalala and
                  Xuan Thuy Ngo and
                  Zakaria Najm and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Michael H{\"{u}}bner and
                  Maya B. Gokhale and
                  Ren{\'{e}} Cumplido},
  title        = {Private circuits {II} versus fault injection attacks},
  booktitle    = {International Conference on ReConFigurable Computing and FPGAs, ReConFig
                  2015, Riviera Maya, Mexico, December 7-9, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ReConFig.2015.7393338},
  doi          = {10.1109/RECONFIG.2015.7393338},
  timestamp    = {Wed, 28 Apr 2021 16:06:54 +0200},
  biburl       = {https://dblp.org/rec/conf/reconfig/RakotomalalaNND15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/RoyBGDMNN15,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Debdeep Mukhopadhyay and
                  Xuan Thuy Ngo and
                  Zakaria Najm},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Reconfigurable {LUT:} {A} Double Edged Sword for Security-Critical
                  Applications},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {248--268},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_15},
  doi          = {10.1007/978-3-319-24126-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/RoyBGDMNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpnc/PicekGCJM15,
  author       = {Stjepan Picek and
                  Sylvain Guilley and
                  Claude Carlet and
                  Domagoj Jakobovic and
                  Julian F. Miller},
  editor       = {Adrian{-}Horia Dediu and
                  Luis Magdalena and
                  Carlos Mart{\'{\i}}n{-}Vide},
  title        = {Evolutionary Approach for Finding Correlation Immune Boolean Functions
                  of Order t with Minimal Hamming Weight},
  booktitle    = {Theory and Practice of Natural Computing - Fourth International Conference,
                  {TPNC} 2015, Mieres, Spain, December 15-16, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9477},
  pages        = {71--82},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26841-5\_6},
  doi          = {10.1007/978-3-319-26841-5\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpnc/PicekGCJM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RauzyGN15,
  author       = {Pablo Rauzy and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Formally Proved Security of Assembly Code Against Power Analysis:
                  {A} Case Study on Balanced Logic},
  journal      = {CoRR},
  volume       = {abs/1506.05285},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.05285},
  eprinttype    = {arXiv},
  eprint       = {1506.05285},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RauzyGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyBGDM15,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Debdeep Mukhopadhyay},
  title        = {Reconfigurable {LUT:} Boon or Bane for Secure Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyBGDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauGHR15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  title        = {Masks will Fall Off - Higher-Order Optimal Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauGHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletG15,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  title        = {Complementary Dual Codes for Counter-measures to Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueGMN15,
  author       = {Pierre{-}Alain Fouque and
                  Sylvain Guilley and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Safe-Errors on {SPA} Protected implementations with the Atomicity
                  Technique},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueGMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DangerGHMN15,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Improving the Big Mac Attack on Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/819},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DangerGHMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauGNT15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Yannick Teglia},
  title        = {Multi-Variate High-Order Attacks of Shuffled Tables Recomputation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {837},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/837},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RauzyMGN15,
  author       = {Pablo Rauzy and
                  Martin Moreau and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {A Generic Countermeasure Against Fault Injection Attacks on Asymmetric
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {882},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/882},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RauzyMGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DugardinPNBDGCT15,
  author       = {Margaux Dugardin and
                  Louiza Papachristodoulou and
                  Zakaria Najm and
                  Lejla Batina and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jean{-}Christophe Courr{\`{e}}ge and
                  Carine Therond},
  title        = {Dismantling real-world {ECC} with Horizontal and Vertical Template
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1001},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGMP14,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {Achieving side-channel high-order correlation immunity with leakage
                  squeezing},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {107--121},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0067-1},
  doi          = {10.1007/S13389-013-0067-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RauzyG14,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  title        = {A formal proof of countermeasures against fault injection attacks
                  on {CRT-RSA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {173--185},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0065-3},
  doi          = {10.1007/S13389-013-0065-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RauzyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14,
  author       = {Christophe Clavier and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  M. Abdelaziz Elaabid and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Michael Kasper and
                  Yang Li and
                  Victor Lomn{\'{e}} and
                  Daisuke Nakatsu and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Laurent Sauvage and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger and
                  Nicolas Veyrat{-}Charvillon and
                  Matthieu Walle and
                  Antoine Wurcker},
  title        = {Practical improvements of side-channel attacks on {AES:} feedback
                  from the 2nd {DPA} contest},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {259--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0075-9},
  doi          = {10.1007/S13389-014-0075-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CarletDGM14,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Leakage squeezing: Optimal implementation and security evaluation},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {249--295},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0018},
  doi          = {10.1515/JMC-2012-0018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/CarletDGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CarletFGKKS14,
  author       = {Claude Carlet and
                  Finley Freibert and
                  Sylvain Guilley and
                  Michael Kiermaier and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Higher-Order {CIS} Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {60},
  number       = {9},
  pages        = {5283--5295},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIT.2014.2332468},
  doi          = {10.1109/TIT.2014.2332468},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CarletFGKKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CheeCDGKKSZ14,
  author       = {Yeow Meng Chee and
                  Zouha Cherif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Han Mao Kiah and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}} and
                  Xiande Zhang},
  title        = {Multiply Constant-Weight Codes and the Reliability of Loop Physically
                  Unclonable Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {60},
  number       = {11},
  pages        = {7026--7034},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIT.2014.2359207},
  doi          = {10.1109/TIT.2014.2359207},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CheeCDGKKSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MoradiGH14,
  author       = {Amir Moradi and
                  Sylvain Guilley and
                  Annelie Heuser},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Detecting Hidden Leakages},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {324--342},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_20},
  doi          = {10.1007/978-3-319-07536-5\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MoradiGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DangerGPPT14,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Thibault Porteboeuf and
                  Florian Praden and
                  Micha{\"{e}}l Timbert},
  editor       = {Mila Dalla Preda and
                  Jeffrey Todd McDonald},
  title        = {{HCODE:} Hardware-Enhanced Real-Time {CFI}},
  booktitle    = {Proceedings of the 4th Program Protection and Reverse Engineering
                  Workshop, PPREW@ACSAC 2014, New Orleans, LA, USA, December 9, 2014},
  pages        = {6:1--6:11},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2689702.2689708},
  doi          = {10.1145/2689702.2689708},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DangerGPPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/HajraRBBSGM14,
  author       = {Suvadeep Hajra and
                  Chester Rebeiro and
                  Shivam Bhasin and
                  Gaurav Bajaj and
                  Sahil Sharma and
                  Sylvain Guilley and
                  Debdeep Mukhopadhyay},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {{DRECON:} {DPA} Resistant Encryption by Construction},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {420--439},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_25},
  doi          = {10.1007/978-3-319-06734-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/HajraRBBSGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BruneauGHR14,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Masks Will Fall Off - Higher-Order Optimal Distinguishers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {344--365},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_19},
  doi          = {10.1007/978-3-662-45608-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BruneauGHR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/NgoGBDN14,
  author       = {Xuan Thuy Ngo and
                  Sylvain Guilley and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Zakaria Najm},
  editor       = {Ting Yu and
                  Shengqi Yang},
  title        = {Encoding the state of integrated circuits: a proactive and reactive
                  protection against hardware Trojans horses},
  booktitle    = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS}
                  '14, New Delhi, India, October 17, 2014},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2668322.2668329},
  doi          = {10.1145/2668322.2668329},
  timestamp    = {Tue, 06 Nov 2018 11:07:42 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/NgoGBDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HeuserRG14,
  author       = {Annelie Heuser and
                  Olivier Rioul and
                  Sylvain Guilley},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication
                  Theory},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {55--74},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_4},
  doi          = {10.1007/978-3-662-44709-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HeuserRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HeuserRG14,
  author       = {Annelie Heuser and
                  Olivier Rioul and
                  Sylvain Guilley},
  editor       = {Emmanuel Prouff},
  title        = {A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel
                  Analysis vs. Differential Cryptanalysis},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {9--28},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_2},
  doi          = {10.1007/978-3-319-10175-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/HeuserRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/SchaubSHCJTHGR14,
  author       = {Alexander Schaub and
                  Emmanuel Schneider and
                  Alexandros Hollender and
                  Vinicius Calasans and
                  Laurent Jolie and
                  Robin Touillon and
                  Annelie Heuser and
                  Sylvain Guilley and
                  Olivier Rioul},
  editor       = {Javier L{\'{o}}pez and
                  Indrajit Ray and
                  Bruno Crispo},
  title        = {Attacking Suggest Boxes in Web Applications Over {HTTPS} Using Side-Channel
                  Stochastic Algorithms},
  booktitle    = {Risks and Security of Internet and Systems - 9th International Conference,
                  CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8924},
  pages        = {116--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17127-2\_8},
  doi          = {10.1007/978-3-319-17127-2\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/SchaubSHCJTHGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/RauzyG14,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  editor       = {Assia Tria and
                  Dooho Choi},
  title        = {Countermeasures against High-Order Fault-Injection Attacks on {CRT-RSA}},
  booktitle    = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2014, Busan, South Korea, September 23, 2014},
  pages        = {68--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FDTC.2014.17},
  doi          = {10.1109/FDTC.2014.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/RauzyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/DangerDGS14,
  author       = {Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Youssef Souissi},
  editor       = {Jens Knoop and
                  Valentina Salapura and
                  Israel Koren and
                  Gerardo Pelosi},
  title        = {High-order timing attacks},
  booktitle    = {Proceedings of the First Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556315.2556316},
  doi          = {10.1145/2556315.2556316},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/DangerDGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CioranescoDGGMNN14,
  author       = {Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Tarik Graba and
                  Sylvain Guilley and
                  Yves Mathieu and
                  David Naccache and
                  Xuan Thuy Ngo},
  title        = {Cryptographically secure shields},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {25--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855563},
  doi          = {10.1109/HST.2014.6855563},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CioranescoDGGMNN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcta/CarletG14,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  editor       = {Raquel Pinto and
                  Paula Rocha Malonek and
                  Paolo Vettori},
  title        = {Complementary Dual Codes for Counter-Measures to Side-Channel Attacks},
  booktitle    = {Coding Theory and Applications, 4th International Castle Meeting,
                  {ICMCTA} 2014, Palmela Castle, Portugal, September 15-18, 2014},
  series       = {{CIM} Series in Mathematical Sciences},
  volume       = {3},
  pages        = {97--105},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17296-5\_9},
  doi          = {10.1007/978-3-319-17296-5\_9},
  timestamp    = {Wed, 23 Aug 2017 10:30:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcta/CarletG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhasinDGN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel leakage and trace compression using normalized inter-class
                  variance},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {7:1--7:9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611772},
  doi          = {10.1145/2611765.2611772},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/RauzyG14,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {Formal Analysis of {CRT-RSA} Vigilant's Countermeasure Against the
                  BellCoRe Attack: {A} Pledge for Formal Methods in the Field of Implementation
                  Security},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {2:1--2:10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2556466},
  doi          = {10.1145/2556464.2556466},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/RauzyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/DangerGP14,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Florian Praden},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {Hardware-enforced Protection against Software Reverse-Engineering
                  based on an Instruction Set Encoding},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {5:1--5:11},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2556469},
  doi          = {10.1145/2556464.2556469},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/DangerGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BruneauDGHT14,
  author       = {Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Yannick Teglia},
  editor       = {Rajat Subhra Chakraborty and
                  Vashek Matyas and
                  Patrick Schaumont},
  title        = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                  Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8804},
  pages        = {183--200},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12060-7\_13},
  doi          = {10.1007/978-3-319-12060-7\_13},
  timestamp    = {Mon, 15 Jun 2020 17:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/space/BruneauDGHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BhasinBDGN14,
  author       = {Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  editor       = {Rajat Subhra Chakraborty and
                  Vashek Matyas and
                  Patrick Schaumont},
  title        = {Analysis and Improvements of the {DPA} Contest v4 Implementation},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                  Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8804},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12060-7\_14},
  doi          = {10.1007/978-3-319-12060-7\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/BhasinBDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BringerCCGM14,
  author       = {Julien Bringer and
                  Claude Carlet and
                  Herv{\'{e}} Chabanne and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation
                  Paradigm in a Code, with Builtin Protection against Side-Channel and
                  Fault Attacks},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_4},
  doi          = {10.1007/978-3-662-43826-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14,
  author       = {Yuto Nakano and
                  Youssef Souissi and
                  Robert Nguyen and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_6},
  doi          = {10.1007/978-3-662-43826-8\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CheeCDGKKSZ14,
  author       = {Yeow Meng Chee and
                  Zouha Cherif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Han Mao Kiah and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}} and
                  Xiande Zhang},
  title        = {Multiply Constant-Weight Codes and the Reliability of Loop Physically
                  Unclonable Functions},
  journal      = {CoRR},
  volume       = {abs/1401.3928},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.3928},
  eprinttype    = {arXiv},
  eprint       = {1401.3928},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CheeCDGKKSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RauzyG14,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  title        = {A Formal Proof of Countermeasures against Fault Injection Attacks
                  on {CRT-RSA}},
  journal      = {CoRR},
  volume       = {abs/1401.8170},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.8170},
  eprinttype    = {arXiv},
  eprint       = {1401.8170},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RauzyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RauzyG14a,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  title        = {Formal Analysis of {CRT-RSA} Vigilant's Countermeasure Against the
                  BellCoRe Attack: {A} Pledge for Formal Methods in the Field of Implementation
                  Security},
  journal      = {CoRR},
  volume       = {abs/1401.8172},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.8172},
  eprinttype    = {arXiv},
  eprint       = {1401.8172},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RauzyG14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarletFGKKS14,
  author       = {Claude Carlet and
                  Finley Freibert and
                  Sylvain Guilley and
                  Michael Kiermaier and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Higher-order {CIS} codes},
  journal      = {CoRR},
  volume       = {abs/1406.4547},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.4547},
  eprinttype    = {arXiv},
  eprint       = {1406.4547},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CarletFGKKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RauzyG14b,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  title        = {Countermeasures Against High-Order Fault-Injection Attacks on {CRT-RSA}},
  journal      = {CoRR},
  volume       = {abs/1412.0600},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.0600},
  eprinttype    = {arXiv},
  eprint       = {1412.0600},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RauzyG14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuserGR14,
  author       = {Annelie Heuser and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel
                  Analysis vs. Differential Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuserGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuserRG14,
  author       = {Annelie Heuser and
                  Olivier Rioul and
                  Sylvain Guilley},
  title        = {Good is Not Good Enough: Deriving Optimal Distinguishers from Communication
                  Theory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuserRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RauzyG14,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  title        = {Countermeasures Against High-Order Fault-Injection Attacks on {CRT-RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RauzyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCCGM14a,
  author       = {Julien Bringer and
                  Claude Carlet and
                  Herv{\'{e}} Chabanne and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Orthogonal Direct Sum Masking: {A} Smartcard Friendly Computation
                  Paradigm in a Code, with Builtin Protection against Side-Channel and
                  Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCCGM14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinDGNS14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Xuan Thuy Ngo and
                  Laurent Sauvage},
  title        = {Hardware Trojan Horses in Cryptographic {IP} Cores},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {750},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/750},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinDGNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauDGHT14,
  author       = {Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Yannick Teglia},
  title        = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {935},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/935},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauDGHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchaubSHCJTHGR14,
  author       = {Alexander Schaub and
                  Emmanuel Schneider and
                  Alexandros Hollender and
                  Vinicius Calasans and
                  Laurent Jolie and
                  Robin Touillon and
                  Annelie Heuser and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Attacking Suggest Boxes in Web Applications Over {HTTPS} Using Side-Channel
                  Stochastic Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/959},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchaubSHCJTHGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinDGN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Side-Channel Leakage and Trace Compression using Normalized Inter-Class
                  Variance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1020},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/1020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BriaisDG13,
  author       = {S{\'{e}}bastien Briais and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {A formal study of two physical countermeasures against side channel
                  attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {169--180},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0054-6},
  doi          = {10.1007/S13389-013-0054-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BriaisDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BhasinGHD13,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Jean{-}Luc Danger},
  title        = {From cryptography to hardware: analyzing and protecting embedded Xilinx
                  {BRAM} for cryptographic applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {213--225},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0048-4},
  doi          = {10.1007/S13389-013-0048-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BhasinGHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {A synthesis of side-channel attacks on elliptic curve cryptography
                  in smart-cards},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {241--265},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0062-6},
  doi          = {10.1007/S13389-013-0062-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BelgarricBBDDGHNR13,
  author       = {Pierre Belgarric and
                  Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Zakaria Najm and
                  Olivier Rioul},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Time-Frequency Analysis for Second-Order Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {108--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_8},
  doi          = {10.1007/978-3-319-08302-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BelgarricBBDDGHNR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/BhasinDGN13,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {A low-entropy first-degree secure provable masking scheme for resource-constrained
                  devices},
  booktitle    = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013,
                  Montreal, Quebec, Canada, September 29 - October 4, 2013},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2527317.2527324},
  doi          = {10.1145/2527317.2527324},
  timestamp    = {Tue, 06 Nov 2018 11:07:42 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/BhasinDGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BhasinDGNS13,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Xuan Thuy Ngo and
                  Laurent Sauvage},
  editor       = {Wieland Fischer and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Hardware Trojan Horses in Cryptographic {IP} Cores},
  booktitle    = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los
                  Alamitos, CA, USA, August 20, 2013},
  pages        = {15--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FDTC.2013.15},
  doi          = {10.1109/FDTC.2013.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/BhasinDGNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/BouderGRT13,
  author       = {H{\'{e}}l{\`{e}}ne Le Bouder and
                  Sylvain Guilley and
                  Bruno Robisson and
                  Assia Tria},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Fault Injection to Reverse Engineer DES-Like Cryptosystems},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {105--121},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_7},
  doi          = {10.1007/978-3-319-05302-8\_7},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/BouderGRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/GuilleyMNSW13,
  author       = {Sylvain Guilley and
                  Damien Marion and
                  Zakaria Najm and
                  Youssef Souissi and
                  Antoine Wurcker},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Software Camouflage},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {122--139},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_8},
  doi          = {10.1007/978-3-319-05302-8\_8},
  timestamp    = {Tue, 19 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/GuilleyMNSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CarletG13,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel indistinguishability},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487735},
  doi          = {10.1145/2487726.2487735},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/CarletG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CherifDGKS13,
  author       = {Zouha Cherif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Multiply constant weight codes},
  booktitle    = {Proceedings of the 2013 {IEEE} International Symposium on Information
                  Theory, Istanbul, Turkey, July 7-12, 2013},
  pages        = {306--310},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISIT.2013.6620237},
  doi          = {10.1109/ISIT.2013.6620237},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/CherifDGKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Dynamic countermeasure against the Zero Power Analysis},
  booktitle    = {{IEEE} International Symposium on Signal Processing and Information
                  Technology, Athens, Greece, December 12-15, 2013},
  pages        = {140--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSPIT.2013.6781869},
  doi          = {10.1109/ISSPIT.2013.6781869},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recosoc/BhasinHGD13,
  author       = {Shivam Bhasin and
                  Wei He and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Exploiting {FPGA} block memories for protected cryptographic implementations},
  booktitle    = {2013 8th International Workshop on Reconfigurable and Communication-Centric
                  Systems-on-Chip (ReCoSoC), Darmstadt, Germany, July 10-12, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ReCoSoC.2013.6581529},
  doi          = {10.1109/RECOSOC.2013.6581529},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/recosoc/BhasinHGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/space/2013,
  editor       = {Benedikt Gierlichs and
                  Sylvain Guilley and
                  Debdeep Mukhopadhyay},
  title        = {Security, Privacy, and Applied Cryptography Engineering - Third International
                  Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8204},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41224-0},
  doi          = {10.1007/978-3-642-41224-0},
  isbn         = {978-3-642-41223-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinCG13,
  author       = {Shivam Bhasin and
                  Claude Carlet and
                  Sylvain Guilley},
  title        = {Theory of masking with codewords in hardware: low-weight \emph{d}th-order
                  correlation-immune Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RauzyG13,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  title        = {A Formal Proof of Countermeasures against Fault Injection Attacks
                  on {CRT-RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RauzyG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RauzyGN13,
  author       = {Pablo Rauzy and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Formally Proved Security of Assembly Code Against Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RauzyGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinDGN13,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {{NICV:} Normalized Inter-Class Variance for Detection of Side-Channel
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {717},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/717},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinDGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Dynamic Countermeasure Against the Zero Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {764},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/764},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RauzyG13a,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  title        = {Formal Analysis of {CRT-RSA} Vigilant's Countermeasure Against the
                  BellCoRe Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {810},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/810},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RauzyG13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiGH13,
  author       = {Amir Moradi and
                  Sylvain Guilley and
                  Annelie Heuser},
  title        = {Detecting Hidden Leakages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {842},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/842},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Guilley12,
  author       = {Sylvain Guilley},
  title        = {Protection des Acc{\'{e}}l{\'{e}}rateurs Mat{\'{e}}riels
                  de Cryptographie Sym{\'{e}}trique. (Protection of Symmetric Cryptography
                  Hardware Accelerators)},
  year         = {2012},
  url          = {https://tel.archives-ouvertes.fr/tel-00815544},
  timestamp    = {Sat, 30 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Guilley12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijrc/SauvageGFDM12,
  author       = {Laurent Sauvage and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Yves Mathieu},
  title        = {Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography},
  journal      = {Int. J. Reconfigurable Comput.},
  volume       = {2012},
  pages        = {360242:1--360242:9},
  year         = {2012},
  url          = {https://doi.org/10.1155/2012/360242},
  doi          = {10.1155/2012/360242},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijrc/SauvageGFDM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ElaabidG12,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley},
  title        = {Portability of templates},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {63--74},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0030-6},
  doi          = {10.1007/S13389-012-0030-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ElaabidG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MaghrebiCGD12,
  author       = {Houssem Maghrebi and
                  Claude Carlet and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Optimal First-Order Masking with Linear and Non-linear Bijections},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {360--377},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_22},
  doi          = {10.1007/978-3-642-31410-0\_22},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/MaghrebiCGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DangerGHMN12,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  editor       = {Stefan Mangard},
  title        = {Low-Cost Countermeasure against {RPA}},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {106--122},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_8},
  doi          = {10.1007/978-3-642-37288-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DangerGHMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BriaisCCDGJMNP12,
  author       = {S{\'{e}}bastien Briais and
                  St{\'{e}}phane Caron and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jacques{-}Henri Jourdan and
                  Arthur Milchior and
                  David Naccache and
                  Thibault Porteboeuf},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {3D Hardware Canaries},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_1},
  doi          = {10.1007/978-3-642-33027-8\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BriaisCCDGJMNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MurdicaGDHN12,
  author       = {C{\'{e}}dric Murdica and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Philippe Hoogvorst and
                  David Naccache},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Same Values Power Analysis Using Special Points on Elliptic Curves},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_14},
  doi          = {10.1007/978-3-642-29912-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MurdicaGDHN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MaghrebiPGD12,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Orr Dunkelman},
  title        = {A First-Order Leak-Free Masking Countermeasure},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_10},
  doi          = {10.1007/978-3-642-27954-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MaghrebiPGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SouissiBGND12,
  author       = {Youssef Souissi and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Maxime Nassar and
                  Jean{-}Luc Danger},
  editor       = {Orr Dunkelman},
  title        = {Towards Different Flavors of Combined Side Channel Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_16},
  doi          = {10.1007/978-3-642-27954-6\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SouissiBGND12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NassarSGD12,
  author       = {Maxime Nassar and
                  Youssef Souissi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Wolfgang Rosenstiel and
                  Lothar Thiele},
  title        = {{RSM:} {A} small and fast countermeasure for AES, secure against 1st
                  and 2nd-order zero-offset SCAs},
  booktitle    = {2012 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012},
  pages        = {1173--1178},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/DATE.2012.6176671},
  doi          = {10.1109/DATE.2012.6176671},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/NassarSGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/CherifDGB12,
  author       = {Zouha Cherif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Lilian Bossuet},
  title        = {An Easy-to-Design {PUF} Based on a Single Oscillator: The Loop {PUF}},
  booktitle    = {15th Euromicro Conference on Digital System Design, {DSD} 2012, Cesme,
                  Izmir, Turkey, September 5-8, 2012},
  pages        = {156--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSD.2012.22},
  doi          = {10.1109/DSD.2012.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/CherifDGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BriaisCDGNP12,
  author       = {S{\'{e}}bastien Briais and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  David Naccache and
                  Thibault Porteboeuf},
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {Random Active Shield},
  booktitle    = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  pages        = {103--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FDTC.2012.11},
  doi          = {10.1109/FDTC.2012.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/BriaisCDGNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaghrebiGPD12,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Emmanuel Prouff and
                  Jean{-}Luc Danger},
  title        = {Register leakage masking using Gray code},
  booktitle    = {2012 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012},
  pages        = {37--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HST.2012.6224316},
  doi          = {10.1109/HST.2012.6224316},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaghrebiGPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaghrebiRGD12,
  author       = {Houssem Maghrebi and
                  Olivier Rioul and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Comparison between Side-Channel Analysis Distinguishers},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {331--340},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_30},
  doi          = {10.1007/978-3-642-34129-8\_30},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaghrebiRGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icistm/GuilleyDNN12,
  author       = {Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Robert Nguyen and
                  Philippe Nguyen},
  editor       = {Sumeet Dua and
                  Aryya Gangopadhyay and
                  Parimala Thulasiraman and
                  Umberto Straccia and
                  Michael A. Shepherd and
                  Benno Stein},
  title        = {System-Level Methods to Prevent Reverse-Engineering, Cloning, and
                  Trojan Insertion},
  booktitle    = {Information Systems, Technology and Management - 6th International
                  Conference, {ICISTM} 2012, Grenoble, France, March 28-30, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {285},
  pages        = {433--438},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29166-1\_41},
  doi          = {10.1007/978-3-642-29166-1\_41},
  timestamp    = {Wed, 30 Oct 2019 15:50:13 +0100},
  biburl       = {https://dblp.org/rec/conf/icistm/GuilleyDNN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/CarletDGM12,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Leakage Squeezing of Order Two},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {120--139},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_8},
  doi          = {10.1007/978-3-642-34931-7\_8},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/CarletDGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/BhasinGD12,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {From Cryptography to Hardware: Analyzing Embedded Xilinx {BRAM} for
                  Cryptographic Applications},
  booktitle    = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
                  {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
                  1-5, 2012},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MICROW.2012.11},
  doi          = {10.1109/MICROW.2012.11},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/BhasinGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/DebandeSEGD12,
  author       = {Nicolas Debande and
                  Youssef Souissi and
                  M. Abdelaziz Elaabid and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Wavelet transform based pre-processing for side channel analysis},
  booktitle    = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
                  {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
                  1-5, 2012},
  pages        = {32--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MICROW.2012.15},
  doi          = {10.1109/MICROW.2012.15},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/DebandeSEGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SouissiDMGMD12,
  author       = {Youssef Souissi and
                  Nicolas Debande and
                  Sami Mekki and
                  Sylvain Guilley and
                  Ali Maalaoui and
                  Jean{-}Luc Danger},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {On the Optimality of Correlation Power Attack on Embedded Cryptographic
                  Systems},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {169--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_15},
  doi          = {10.1007/978-3-642-30955-7\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SouissiDMGMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/GuilleyD12,
  author       = {Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Global Faults on Cryptographic Circuits},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {295--311},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_17},
  doi          = {10.1007/978-3-642-29656-7\_17},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/GuilleyD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiPGD12,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {A First-Order Leak-Free Masking Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiPGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiCGD12,
  author       = {Houssem Maghrebi and
                  Claude Carlet and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Optimal First-Order Masking with Linear and Non-Linear Bijections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiCGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BriaisCCDGJMNP12,
  author       = {S{\'{e}}bastien Briais and
                  St{\'{e}}phane Caron and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jacques{-}Henri Jourdan and
                  Arthur Milchior and
                  David Naccache and
                  Thibault Porteboeuf},
  title        = {3D Hardware Canaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BriaisCCDGJMNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BriaisGD12,
  author       = {S{\'{e}}bastien Briais and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {A formal study of two physical countermeasures against side channel
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BriaisGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGM12,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Leakage Squeezing of Order Two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SelmaneBGD11,
  author       = {Nidhal Selmane and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Security evaluation of application-specific integrated circuits and
                  field programmable gate arrays against setup time violation attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {181--190},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0238},
  doi          = {10.1049/IET-IFS.2010.0238},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SelmaneBGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasip/SouissiDGBN11,
  author       = {Youssef Souissi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Shivam Bhasin and
                  Maxime Nassar},
  editor       = {Jari Nurmi and
                  Tapani Ahonen},
  title        = {Embedded systems security: An evaluation methodology against Side
                  Channel Attacks},
  booktitle    = {2011 Conference on Design and Architectures for Signal and Image Processing,
                  {DASIP} 2011, Tampere, Finland, November 2-4, 2011},
  pages        = {230--237},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/DASIP.2011.6136885},
  doi          = {10.1109/DASIP.2011.6136885},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dasip/SouissiDGBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/MeynardRFGHD11,
  author       = {Olivier Meynard and
                  Denis R{\'{e}}al and
                  Florent Flament and
                  Sylvain Guilley and
                  Naofumi Homma and
                  Jean{-}Luc Danger},
  title        = {Enhancement of simple electro-magnetic attacks by pre-characterization
                  in frequency domain and demodulation techniques},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2011, Grenoble, France,
                  March 14-18, 2011},
  pages        = {1004--1009},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/5763163/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/MeynardRFGHD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaghrebiGD11,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Formal security evaluation of hardware Boolean masking against second-order
                  attacks},
  booktitle    = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
                  Diego, California, {USA}},
  pages        = {40--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HST.2011.5954993},
  doi          = {10.1109/HST.2011.5954993},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaghrebiGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuilleySDSR11,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Nidhal Selmane and
                  Denis R{\'{e}}al},
  title        = {Performance evaluation of protocols resilient to physical attacks},
  booktitle    = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
                  Diego, California, {USA}},
  pages        = {51--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HST.2011.5954995},
  doi          = {10.1109/HST.2011.5954995},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GuilleySDSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NassarGD11,
  author       = {Maxime Nassar and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Formal Analysis of the Entropy / Security Trade-off in First-Order
                  Masking Countermeasures against Side-Channel Attacks},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {22--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_4},
  doi          = {10.1007/978-3-642-25578-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NassarGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosechicomnet/NassarSGD11,
  author       = {Maxime Nassar and
                  Youssef Souissi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Marc Joye and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {"Rank Correction": {A} New Side-Channel Approach for Secret
                  Key Recovery},
  booktitle    = {Security Aspects in Information Technology - First International Conference,
                  InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7011},
  pages        = {128--143},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24586-2\_12},
  doi          = {10.1007/978-3-642-24586-2\_12},
  timestamp    = {Fri, 27 Mar 2020 08:56:51 +0100},
  biburl       = {https://dblp.org/rec/conf/infosechicomnet/NassarSGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/BhasinGSGD11,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Youssef Souissi and
                  Tarik Graba and
                  Jean{-}Luc Danger},
  editor       = {Peter M. Athanas and
                  J{\"{u}}rgen Becker and
                  Ren{\'{e}} Cumplido},
  title        = {Efficient Dual-Rail Implementations in {FPGA} Using Block RAMs},
  booktitle    = {2011 International Conference on Reconfigurable Computing and FPGAs,
                  ReConFig 2011, Cancun, Mexico, November 30 - December 2, 2011},
  pages        = {261--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ReConFig.2011.32},
  doi          = {10.1109/RECONFIG.2011.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/BhasinGSGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DebandeSNGLD11,
  author       = {Nicolas Debande and
                  Youssef Souissi and
                  Maxime Nassar and
                  Sylvain Guilley and
                  Thanh{-}Ha Le and
                  Jean{-}Luc Danger},
  title        = {"Re-synchronization by moments": An efficient solution to
                  align Side-Channel traces},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123143},
  doi          = {10.1109/WIFS.2011.6123143},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DebandeSNGLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GuilleyKLD11,
  author       = {Sylvain Guilley and
                  Karim Khalfallah and
                  Victor Lomn{\'{e}} and
                  Jean{-}Luc Danger},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Formal Framework for the Evaluation of Waveform Resynchronization
                  Algorithms},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_7},
  doi          = {10.1007/978-3-642-21040-2\_7},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/GuilleyKLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MaghrebiGD11,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Leakage Squeezing Countermeasure against High-Order Attacks},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_14},
  doi          = {10.1007/978-3-642-21040-2\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MaghrebiGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PedroSG11,
  author       = {Manuel San Pedro and
                  Mate Soos and
                  Sylvain Guilley},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {{FIRE:} Fault Injection for Reverse Engineering},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {280--293},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_20},
  doi          = {10.1007/978-3-642-21040-2\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PedroSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2011,
  editor       = {Luca Breveglieri and
                  Sylvain Guilley and
                  Israel Koren and
                  David Naccache and
                  Junko Takahashi},
  title        = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2011, Tokyo, Japan, September 29, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6075045/proceeding},
  isbn         = {978-1-4577-1463-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-1360,
  author       = {Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  Jean{-}Luc Danger and
                  Taha Beyrouthy and
                  Alin Razafindraibe and
                  Laurent Fesquet and
                  Marc Renaudin},
  title        = {A Secure Asynchronous {FPGA} Architecture, Experimental Results and
                  Some Debug Feedback},
  journal      = {CoRR},
  volume       = {abs/1103.1360},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.1360},
  eprinttype    = {arXiv},
  eprint       = {1103.1360},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-1360.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-1824,
  author       = {Sumanta Chaudhuri and
                  Sylvain Guilley},
  title        = {Side-Channel Oscilloscope},
  journal      = {CoRR},
  volume       = {abs/1103.1824},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.1824},
  eprinttype    = {arXiv},
  eprint       = {1103.1824},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-1824.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghebiGCD11,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger},
  title        = {Classification of High-Order Boolean Masking Schemes and Improvements
                  of their Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghebiGCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NassarGD11,
  author       = {Maxime Nassar and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Formal Analysis of the Entropy / Security Trade-off in First-Order
                  Masking Countermeasures against Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NassarGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijrc/SauvageNGFDM10,
  author       = {Laurent Sauvage and
                  Maxime Nassar and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Yves Mathieu},
  title        = {Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail
                  Logics},
  journal      = {Int. J. Reconfigurable Comput.},
  volume       = {2010},
  pages        = {375245:1--375245:12},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/375245},
  doi          = {10.1155/2010/375245},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijrc/SauvageNGFDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/GuilleySFVHP10,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Florent Flament and
                  Vinh{-}Nga Vong and
                  Philippe Hoogvorst and
                  Renaud Pacalet},
  title        = {Evaluation of Power Constant Dual-Rail Logics Countermeasures against
                  {DPA} with Design Time Security Metrics},
  journal      = {{IEEE} Trans. Computers},
  volume       = {59},
  number       = {9},
  pages        = {1250--1263},
  year         = {2010},
  url          = {https://doi.org/10.1109/TC.2010.104},
  doi          = {10.1109/TC.2010.104},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/GuilleySFVHP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ElaabidG10,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware
                  Crypto-Accelerator},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {243--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_15},
  doi          = {10.1007/978-3-642-12678-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ElaabidG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/BhasinGFSD10,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Florent Flament and
                  Nidhal Selmane and
                  Jean{-}Luc Danger},
  title        = {Countering early evaluation: an approach towards robust dual-rail
                  precharge logic},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873554},
  doi          = {10.1145/1873548.1873554},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/BhasinGFSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MeynardRGFDV10,
  author       = {Olivier Meynard and
                  Denis R{\'{e}}al and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Characterization of the Electromagnetic Side Channel in Frequency
                  Domain},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {471--486},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_33},
  doi          = {10.1007/978-3-642-21518-6\_33},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MeynardRGFDV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BhasinGSD10,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger},
  editor       = {Josef Pieprzyk},
  title        = {Unrolling Cryptographic Circuits: {A} Simple Countermeasure Against
                  Side-Channel Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {195--207},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_14},
  doi          = {10.1007/978-3-642-11925-5\_14},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BhasinGSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NassarBDDG10,
  author       = {Maxime Nassar and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  Sylvain Guilley},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {{BCDL:} {A} high speed balanced {DPL} for {FPGA} with global precharge
                  and no early evaluation},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {849--854},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456932},
  doi          = {10.1109/DATE.2010.5456932},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/NassarBDDG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/MeynardGDS10,
  author       = {Olivier Meynard and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Laurent Sauvage},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {Far Correlation-based {EMA} with a precharacterized leakage model},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {977--980},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456906},
  doi          = {10.1109/DATE.2010.5456906},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/MeynardGDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/GuilleySDS10,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Nidhal Selmane},
  editor       = {Luca Breveglieri and
                  Marc Joye and
                  Israel Koren and
                  David Naccache and
                  Ingrid Verbauwhede},
  title        = {Fault Injection Resilience},
  booktitle    = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2010, Santa Barbara, California, USA, 21 August 2010},
  pages        = {51--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FDTC.2010.15},
  doi          = {10.1109/FDTC.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/GuilleySDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaghrebiGDF10,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Florent Flament},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Entropy-based Power Attack},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513124},
  doi          = {10.1109/HST.2010.5513124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaghrebiGDF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/SouissiGDMD10,
  author       = {Youssef Souissi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Sami Mekki and
                  Guillaume Duc},
  title        = {Improvement of power analysis attacks using Kalman filter},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2010, 14-19 March 2010, Sheraton Dallas
                  Hotel, Dallas, Texas, {USA}},
  pages        = {1778--1781},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICASSP.2010.5495428},
  doi          = {10.1109/ICASSP.2010.5495428},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/SouissiGDMD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SouissiNGDF10,
  author       = {Youssef Souissi and
                  Maxime Nassar and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Florent Flament},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {First Principal Components Analysis: {A} New Side Channel Distinguisher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {407--419},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_27},
  doi          = {10.1007/978-3-642-24209-0\_27},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SouissiNGDF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/GuilleySMRV10,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Julien Micolod and
                  Denis R{\'{e}}al and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {Defeating Any Secret Cryptography with {SCARE} Attacks},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {273--293},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_17},
  doi          = {10.1007/978-3-642-14712-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/GuilleySMRV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/SauvageGFDM10,
  author       = {Laurent Sauvage and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Yves Mathieu},
  editor       = {Viktor K. Prasanna and
                  J{\"{u}}rgen Becker and
                  Ren{\'{e}} Cumplido},
  title        = {Cross-Correlation Cartography},
  booktitle    = {ReConFig'10: 2010 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings},
  pages        = {268--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ReConFig.2010.75},
  doi          = {10.1109/RECONFIG.2010.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/SauvageGFDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/CherifFDBGC10,
  author       = {Zouha Cherif and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Herv{\'{e}} Chabanne},
  editor       = {Viktor K. Prasanna and
                  J{\"{u}}rgen Becker and
                  Ren{\'{e}} Cumplido},
  title        = {Evaluation of White-Box and Grey-Box Noekeon Implementations in {FPGA}},
  booktitle    = {ReConFig'10: 2010 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings},
  pages        = {310--315},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ReConFig.2010.36},
  doi          = {10.1109/RECONFIG.2010.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/CherifFDBGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ElaabidMGD10,
  author       = {M. Abdelaziz Elaabid and
                  Olivier Meynard and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Combined Side-Channel Attacks},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_13},
  doi          = {10.1007/978-3-642-17955-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElaabidG10,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley},
  title        = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware
                  Crypto-Accelerator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElaabidG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mj/DangerGH09,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst},
  title        = {High speed true random number generator based on open loop structures
                  in FPGAs},
  journal      = {Microelectron. J.},
  volume       = {40},
  number       = {11},
  pages        = {1650--1656},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.mejo.2009.02.004},
  doi          = {10.1016/J.MEJO.2009.02.004},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mj/DangerGH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/SauvageGM09,
  author       = {Laurent Sauvage and
                  Sylvain Guilley and
                  Yves Mathieu},
  title        = {Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography
                  and Attack on a Cryptographic Module},
  journal      = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {4:1--4:24},
  year         = {2009},
  url          = {https://doi.org/10.1145/1502781.1502785},
  doi          = {10.1145/1502781.1502785},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trets/SauvageGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KafiGMN09,
  author       = {Mohaned Kafi and
                  Sylvain Guilley and
                  Sandra Marcello and
                  David Naccache},
  title        = {Deconvolving Protected Signals},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {687--694},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.197},
  doi          = {10.1109/ARES.2009.197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KafiGMN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/SauvageGDMN09,
  author       = {Laurent Sauvage and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Yves Mathieu and
                  Maxime Nassar},
  editor       = {Luca Benini and
                  Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller},
  title        = {Successful attack on an FPGA-based {WDDL} {DES} cryptoprocessor without
                  place and route constraints},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2009, Nice, France,
                  April 20-24, 2009},
  pages        = {640--645},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/DATE.2009.5090745},
  doi          = {10.1109/DATE.2009.5090745},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/SauvageGDMN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/SelmaneBGGD09,
  author       = {Nidhal Selmane and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Tarik Graba and
                  Jean{-}Luc Danger},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {{WDDL} is Protected against Setup Time Violation Attacks},
  booktitle    = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  pages        = {73--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FDTC.2009.40},
  doi          = {10.1109/FDTC.2009.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/SelmaneBGGD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BhasinDGS09,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Nidhal Selmane},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Security Evaluation of Different {AES} Implementations Against Practical
                  Setup Time Violation Attacks in FPGAs},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings},
  pages        = {15--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HST.2009.5225057},
  doi          = {10.1109/HST.2009.5225057},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BhasinDGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/GuilleyCSDBF09,
  author       = {Sylvain Guilley and
                  Sumanta Chaudhuri and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Taha Beyrouthy and
                  Laurent Fesquet},
  title        = {Updates on the potential of clock-less logics to strengthen cryptographic
                  circuits against side-channel attacks},
  booktitle    = {16th {IEEE} International Conference on Electronics, Circuits, and
                  Systems, {ICECS} 2009, Yasmine Hammamet, Tunisia, 13-19 December,
                  2009},
  pages        = {351--354},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICECS.2009.5411008},
  doi          = {10.1109/ICECS.2009.5411008},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/GuilleyCSDBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/BhasinDFGGMNSS09,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Florent Flament and
                  Tarik Graba and
                  Sylvain Guilley and
                  Yves Mathieu and
                  Maxime Nassar and
                  Laurent Sauvage and
                  Nidhal Selmane},
  editor       = {Viktor K. Prasanna and
                  Lionel Torres and
                  Ren{\'{e}} Cumplido},
  title        = {Combined {SCA} and {DFA} Countermeasures Integrable in a {FPGA} Design
                  Flow},
  booktitle    = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  pages        = {213--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ReConFig.2009.50},
  doi          = {10.1109/RECONFIG.2009.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/BhasinDFGGMNSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/SauvageNGFDM09,
  author       = {Laurent Sauvage and
                  Maxime Nassar and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Yves Mathieu},
  editor       = {Viktor K. Prasanna and
                  Lionel Torres and
                  Ren{\'{e}} Cumplido},
  title        = {{DPL} on Stratix {II} {FPGA:} What to Expect?},
  booktitle    = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  pages        = {243--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ReConFig.2009.58},
  doi          = {10.1109/RECONFIG.2009.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/SauvageNGFDM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/GuilleySHPBC08,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Philippe Hoogvorst and
                  Renaud Pacalet and
                  Guido Marco Bertoni and
                  Sumanta Chaudhuri},
  title        = {Security Evaluation of {WDDL} and SecLib Countermeasures against Power
                  Attacks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {11},
  pages        = {1482--1497},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2008.109},
  doi          = {10.1109/TC.2008.109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/GuilleySHPBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/ChaudhuriGHDBRFR08,
  author       = {Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  Jean{-}Luc Danger and
                  Taha Beyrouthy and
                  Alin Razafindraibe and
                  Laurent Fesquet and
                  Marc Renaudin},
  editor       = {Roger F. Woods and
                  Katherine Compton and
                  Christos{-}Savvas Bouganis and
                  Pedro C. Diniz},
  title        = {Physical Design of {FPGA} Interconnect to Prevent Information Leakage},
  booktitle    = {Reconfigurable Computing: Architectures, Tools and Applications, 4th
                  International Workshop, {ARC} 2008, London, UK, March 26-28, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4943},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78610-8\_11},
  doi          = {10.1007/978-3-540-78610-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/ChaudhuriGHDBRFR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/ChaudhuriGFHD08,
  author       = {Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Florent Flament and
                  Philippe Hoogvorst and
                  Jean{-}Luc Danger},
  editor       = {Limor Fix},
  title        = {An 8x8 run-time reconfigurable {FPGA} embedded in a SoC},
  booktitle    = {Proceedings of the 45th Design Automation Conference, {DAC} 2008,
                  Anaheim, CA, USA, June 8-13, 2008},
  pages        = {120--125},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1391469.1391500},
  doi          = {10.1145/1391469.1391500},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/ChaudhuriGFHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/SelmaneGD08,
  author       = {Nidhal Selmane and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Practical Setup Time Violation Attacks on {AES}},
  booktitle    = {Seventh European Dependable Computing Conference, {EDCC-7} 2008, Kaunas,
                  Lithuania, 7-9 May 2008},
  pages        = {91--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EDCC-7.2008.11},
  doi          = {10.1109/EDCC-7.2008.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/SelmaneGD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/GuilleySDSP08,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Nidhal Selmane and
                  Renaud Pacalet},
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Silicon-level Solutions to Counteract Passive and Active Attacks},
  booktitle    = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FDTC.2008.18},
  doi          = {10.1109/FDTC.2008.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/GuilleySDSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/ChaudhuriDHG08,
  author       = {Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Philippe Hoogvorst and
                  Sylvain Guilley},
  editor       = {Mike Hutton and
                  Paul Chow},
  title        = {Efficient tiling patterns for reconfigurable gate arrays},
  booktitle    = {Proceedings of the {ACM/SIGDA} 16th International Symposium on Field
                  Programmable Gate Arrays, {FPGA} 2008, Monterey, California, USA,
                  February 24-26, 2008},
  pages        = {257},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1344671.1344709},
  doi          = {10.1145/1344671.1344709},
  timestamp    = {Tue, 06 Nov 2018 16:58:23 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/ChaudhuriDHG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/GuilleySDH08,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Philippe Hoogvorst},
  title        = {Area optimization of cryptographic co-processors implemented in dual-rail
                  with precharge positive logic},
  booktitle    = {{FPL} 2008, International Conference on Field Programmable Logic and
                  Applications, Heidelberg, Germany, 8-10 September 2008},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/FPL.2008.4629925},
  doi          = {10.1109/FPL.2008.4629925},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/GuilleySDH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuilleyCDSHNGV08,
  author       = {Sylvain Guilley and
                  Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Laurent Sauvage and
                  Philippe Hoogvorst and
                  Maxime Nassar and
                  Tarik Graba and
                  Vinh{-}Nga Vong},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Place-and-Route Impact on the Security of {DPL} Designs in FPGAs},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {26--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559042},
  doi          = {10.1109/HST.2008.4559042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GuilleyCDSHNGV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/KhelilHGDS08,
  author       = {Farouk Khelil and
                  Mohamed Hamdi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Nidhal Selmane},
  editor       = {Akshai Aggarwal and
                  Mohamad Badra and
                  Fabio Massacci},
  title        = {Fault Analysis Attack on an {FPGA} {AES} Implementation},
  booktitle    = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility
                  and Security, November 5-7, 2008, Tangier, Morocco},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NTMS.2008.ECP.45},
  doi          = {10.1109/NTMS.2008.ECP.45},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/KhelilHGDS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/slip/ChaudhuriGHD08,
  author       = {Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  Jean{-}Luc Danger},
  editor       = {Ion I. Mandoiu and
                  Andrew A. Kennings},
  title        = {Efficient tiling patterns for reconfigurable gate arrays},
  booktitle    = {The Tenth International Workshop on System-Level Interconnect Prediction
                  {(SLIP} 2008), Newcastle, UK, April 5-8, 2008, Proceedings},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1353610.1353613},
  doi          = {10.1145/1353610.1353613},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/slip/ChaudhuriGHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GuilleySDGM08,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Tarik Graba and
                  Yves Mathieu},
  title        = {Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic
                  Applications in FPGAs},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {16--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.31},
  doi          = {10.1109/SSIRI.2008.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/GuilleySDGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0809-3942,
  author       = {Philippe Hoogvorst and
                  Sylvain Guilley and
                  Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Taha Beyrouthy and
                  Laurent Fesquet},
  title        = {A Reconfigurable Programmable Logic Block for a Multi-Style Asynchronous
                  {FPGA} resistant to Side-Channel Attacks},
  journal      = {CoRR},
  volume       = {abs/0809.3942},
  year         = {2008},
  url          = {http://arxiv.org/abs/0809.3942},
  eprinttype    = {arXiv},
  eprint       = {0809.3942},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0809-3942.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/GuilleyFHPM07,
  author       = {Sylvain Guilley and
                  Florent Flament and
                  Philippe Hoogvorst and
                  Renaud Pacalet and
                  Yves Mathieu},
  title        = {Secured {CAD} Back-End Flow for Power-Analysis-Resistant Cryptoprocessors},
  journal      = {{IEEE} Des. Test Comput.},
  volume       = {24},
  number       = {6},
  pages        = {546--555},
  year         = {2007},
  url          = {https://doi.org/10.1109/MDT.2007.202},
  doi          = {10.1109/MDT.2007.202},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/GuilleyFHPM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/GuilleyHP07,
  author       = {Sylvain Guilley and
                  Philippe Hoogvorst and
                  Renaud Pacalet},
  title        = {A fast pipelined multi-mode {DES} architecture operating in {IP} representation},
  journal      = {Integr.},
  volume       = {40},
  number       = {4},
  pages        = {479--489},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.vlsi.2006.06.004},
  doi          = {10.1016/J.VLSI.2006.06.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/GuilleyHP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/ChaudhuriDG07,
  author       = {Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Koen Bertels and
                  Walid A. Najjar and
                  Arjan J. van Genderen and
                  Stamatis Vassiliadis},
  title        = {Efficient Modeling and Floorplanning of Embedded-FPGA Fabric},
  booktitle    = {{FPL} 2007, International Conference on Field Programmable Logic and
                  Applications, Amsterdam, The Netherlands, 27-29 August 2007},
  pages        = {665--669},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/FPL.2007.4380741},
  doi          = {10.1109/FPL.2007.4380741},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/ChaudhuriDG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/BeyrouthyRFRCGDH07,
  author       = {Taha Beyrouthy and
                  Alin Razafindraibe and
                  Laurent Fesquet and
                  Marc Renaudin and
                  Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Philippe Hoogvorst},
  editor       = {Hideharu Amano and
                  Andy Ye and
                  Takeshi Ikenaga},
  title        = {A Novel Asynchronous e-FPGA Architecture for Security Applications},
  booktitle    = {2007 International Conference on Field-Programmable Technology, {ICFPT}
                  2007, Kitakyushu, Japan, December 12-14, 2007},
  pages        = {369--372},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/FPT.2007.4439288},
  doi          = {10.1109/FPT.2007.4439288},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fpt/BeyrouthyRFRCGDH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recosoc/HoogvorstGCRBF07,
  author       = {Philippe Hoogvorst and
                  Sylvain Guilley and
                  Sumanta Chaudhuri and
                  Alin Razafindraibe and
                  Taha Beyrouthy and
                  Laurent Fesquet},
  editor       = {Gilles Sassatelli and
                  Manfred Glesner and
                  Christophe Bobda and
                  Pascal Benoit},
  title        = {A Reconfigurable Cell for a Multi-Style Asynchronous {FPGA}},
  booktitle    = {Proceedings of the 3rd International Workshop on Reconfigurable Communication-centric
                  Systems-on-Chip, ReCoSoC 2007, Montpellier, France, June 2007},
  pages        = {15--22},
  publisher    = {Univ. Montpellier {II}},
  year         = {2007},
  timestamp    = {Fri, 03 Oct 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/recosoc/HoogvorstGCRBF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rivf/XuSDGBGM07,
  author       = {Qing Xu and
                  M. B. C. Silva and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Patrick Bellot and
                  Philippe Gallion and
                  Francisco Mendieta},
  title        = {Towards Quantum Key Distribution System using Homodyne Detection with
                  Differential Time-Multiplexed Reference},
  booktitle    = {2007 {IEEE} International Conference on Research, Innovation and Vision
                  for the Future in Computing {\&} Communication Technologies, {RIVF}
                  2007, Hanoi, Vietnam, 5-9 March 2007},
  pages        = {158--165},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/RIVF.2007.369151},
  doi          = {10.1109/RIVF.2007.369151},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rivf/XuSDGBGM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AabidGH07,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley and
                  Philippe Hoogvorst},
  title        = {Template Attacks with a Power Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AabidGH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/ChaudhuriDGH06,
  author       = {Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst},
  editor       = {Ren{\'{e}} Cumplido{-}Parra and
                  C{\'{e}}sar Torres{-}Huitzil and
                  Andr{\'{e}}s D. Garc{\'{\i}}a},
  title        = {{FASE:} An Open Run-Time Reconfigurable {FPGA} Architecture for Tamper-Resistant
                  and Secure Embedded Systems},
  booktitle    = {2006 {IEEE} International Conference on Reconfigurable Computing and
                  FPGA's, ReConFig 2006, San Luis Potosi, Mexico, September 20-22, 2006},
  pages        = {47--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/RECONF.2006.307752},
  doi          = {10.1109/RECONF.2006.307752},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/ChaudhuriDGH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuilleyHMP05,
  author       = {Sylvain Guilley and
                  Philippe Hoogvorst and
                  Yves Mathieu and
                  Renaud Pacalet},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {The "Backend Duplication" Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {383--397},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_28},
  doi          = {10.1007/11545262\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GuilleyHMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/GuilleyH05,
  author       = {Sylvain Guilley and
                  Philippe Hoogvorst},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {589--600},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/GuilleyH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/GuilleyP04,
  author       = {Sylvain Guilley and
                  Renaud Pacalet},
  title        = {SoCs security: a war against side-channels},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {59},
  number       = {7-8},
  pages        = {998--1009},
  year         = {2004},
  url          = {https://doi.org/10.1007/BF03180031},
  doi          = {10.1007/BF03180031},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/GuilleyP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GuilleyHP04,
  author       = {Sylvain Guilley and
                  Philippe Hoogvorst and
                  Renaud Pacalet},
  editor       = {Jean{-}Jacques Quisquater and
                  Pierre Paradinas and
                  Yves Deswarte and
                  Anas Abou El Kalam},
  title        = {Differential Power Analysis Model and Some Results},
  booktitle    = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World
                  Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International
                  Conference on Smart Card Research and Advanced Applications (CARDIS),
                  22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {153},
  pages        = {127--142},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8147-2\_9},
  doi          = {10.1007/1-4020-8147-2\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/GuilleyHP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/GuilleyHMPP04,
  author       = {Sylvain Guilley and
                  Philippe Hoogvorst and
                  Yves Mathieu and
                  Renaud Pacalet and
                  Jean Provost},
  title        = {{CMOS} Structures Suitable for Secured Hardware},
  booktitle    = {2004 Design, Automation and Test in Europe Conference and Exposition
                  {(DATE} 2004), 16-20 February 2004, Paris, France},
  pages        = {1414--1415},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/DATE.2004.1269113},
  doi          = {10.1109/DATE.2004.1269113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/GuilleyHMPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics