Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sylvain Guilley
@article{DBLP:journals/comcom/GarciaRTOGNM24, author = {Carlos Rubio Garcia and Simon Rommel and Sofiane Takarabt and Juan Jose Vegas Olmos and Sylvain Guilley and Philippe Nguyen and Idelfonso Tafur Monroy}, title = {Quantum-resistant Transport Layer Security}, journal = {Comput. Commun.}, volume = {213}, pages = {345--358}, year = {2024}, url = {https://doi.org/10.1016/j.comcom.2023.11.010}, doi = {10.1016/J.COMCOM.2023.11.010}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/GarciaRTOGNM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/EbrahimabadiMVGDDK24, author = {Mohammad Ebrahimabadi and Suhee Sanjana Mehjabin and Raphael Viera and Sylvain Guilley and Jean{-}Luc Danger and Jean{-}Max Dutertre and Naghmeh Karimi}, title = {{DELFINES:} Detecting Laser Fault Injection Attacks via Digital Sensors}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {43}, number = {3}, pages = {774--787}, year = {2024}, url = {https://doi.org/10.1109/TCAD.2023.3322623}, doi = {10.1109/TCAD.2023.3322623}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/EbrahimabadiMVGDDK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CarletDGT24, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Quasi-linear masking against {SCA} and FIA, with cost amortization}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {398--432}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.398-432}, doi = {10.46586/TCHES.V2024.I1.398-432}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CarletDGT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BahramiEGDK24, author = {Javad Bahrami and Mohammad Ebrahimabadi and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, editor = {Romain Wacquez and Naofumi Homma}, title = {Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, {COSADE} 2024, Gardanne, France, April 9-10, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14595}, pages = {177--196}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57543-3\_10}, doi = {10.1007/978-3-031-57543-3\_10}, timestamp = {Mon, 15 Apr 2024 21:35:29 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BahramiEGDK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeguinotCGR24, author = {Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Olivier Rioul}, title = {Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2024}, url = {https://eprint.iacr.org/2024/199}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BeguinotCGR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/Xiao0G23, author = {Chong Xiao and Ming Tang and Sylvain Guilley}, title = {Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks}, journal = {J. Syst. Archit.}, volume = {139}, pages = {102877}, year = {2023}, url = {https://doi.org/10.1016/j.sysarc.2023.102877}, doi = {10.1016/J.SYSARC.2023.102877}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/Xiao0G23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/XuTWG23, author = {Ke Xu and Ming Tang and Han Wang and Sylvain Guilley}, title = {Reverse-Engineering and Exploiting the Frontend Bus of Intel Processor}, journal = {{IEEE} Trans. Computers}, volume = {72}, number = {2}, pages = {360--373}, year = {2023}, url = {https://doi.org/10.1109/TC.2022.3222083}, doi = {10.1109/TC.2022.3222083}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/XuTWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BeckersGMOP23, author = {Arthur Beckers and Sylvain Guilley and Philippe Maurine and Colin O'Flynn and Stjepan Picek}, title = {(Adversarial) Electromagnetic Disturbance in the Industry}, journal = {{IEEE} Trans. Computers}, volume = {72}, number = {2}, pages = {414--422}, year = {2023}, url = {https://doi.org/10.1109/TC.2022.3224373}, doi = {10.1109/TC.2022.3224373}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/BeckersGMOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BeguinotCGLMRS23, author = {Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Yi Liu and Lo{\"{\i}}c Masure and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Elif Bilge Kavun and Michael Pehl}, title = {Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 14th International Workshop, {COSADE} 2023, Munich, Germany, April 3-4, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13979}, pages = {86--104}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-29497-6\_5}, doi = {10.1007/978-3-031-29497-6\_5}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BeguinotCGLMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/WeberGRSLMGRPSHSH23, author = {Arnd Weber and Sylvain Guilley and Ren{\'{e}} Rathfelder and Marc St{\"{o}}ttinger and Christoph L{\"{u}}th and Maja Malenko and Torsten Grawunder and Steffen Reith and Armand Puccetti and Jean{-}Pierre Seifert and Norbert Herfurth and Hagen Sankowski and Gernot Heiser}, title = {Verified Value Chains, Innovation and Competition}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023}, pages = {470--476}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSR57506.2023.10224911}, doi = {10.1109/CSR57506.2023.10224911}, timestamp = {Wed, 06 Sep 2023 08:09:39 +0200}, biburl = {https://dblp.org/rec/conf/csr2/WeberGRSLMGRPSHSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/AnikRDGK23, author = {Md Toufiq Hasan Anik and Hasin Ishraq Reefat and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, editor = {Himanshu Thapliyal and Ronald F. DeMara and Inna Partin{-}Vaisband and Srinivas Katkoori}, title = {Aging-Induced Failure Prognosis via Digital Sensors}, booktitle = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI} 2023, Knoxville, TN, USA, June 5-7, 2023}, pages = {703--708}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3583781.3590204}, doi = {10.1145/3583781.3590204}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/AnikRDGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/TakarabtBEGK23, author = {Sofiane Takarabt and Javad Bahrami and Mohammad Ebrahimabadi and Sylvain Guilley and Naghmeh Karimi}, title = {Security Order of Gate-Level Masking Schemes}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2023, San Jose, CA, USA, May 1-4, 2023}, pages = {57--67}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/HOST55118.2023.10133208}, doi = {10.1109/HOST55118.2023.10133208}, timestamp = {Mon, 11 Sep 2023 17:53:23 +0200}, biburl = {https://dblp.org/rec/conf/host/TakarabtBEGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icicdt/BahramiDEGK23, author = {Javad Bahrami and Jean{-}Luc Danger and Mohammad Ebrahimabadi and Sylvain Guilley and Naghmeh Karimi}, title = {Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks}, booktitle = {International Conference on {IC} Design and Technology, {ICICDT} 2023, Tokyo, Japan, September 25-28, 2023}, pages = {10--15}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICICDT59917.2023.10332319}, doi = {10.1109/ICICDT59917.2023.10332319}, timestamp = {Thu, 04 Jan 2024 08:13:40 +0100}, biburl = {https://dblp.org/rec/conf/icicdt/BahramiDEGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icicdt/Guilley23, author = {Sylvain Guilley}, title = {Challenges in generating true random numbers considering the variety of corners, aging, and attacks}, booktitle = {International Conference on {IC} Design and Technology, {ICICDT} 2023, Tokyo, Japan, September 25-28, 2023}, pages = {xix}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICICDT59917.2023.10332396}, doi = {10.1109/ICICDT59917.2023.10332396}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icicdt/Guilley23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BaksiGST23, author = {Anubhab Baksi and Sylvain Guilley and Ritu Ranjan Shrivastwa and Sofiane Takarabt}, editor = {Anupam Chattopadhyay and Shivam Bhasin and Stjepan Picek and Chester Rebeiro}, title = {From Substitution Box to Threshold}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14459}, pages = {48--67}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56232-7\_3}, doi = {10.1007/978-3-031-56232-7\_3}, timestamp = {Mon, 08 Apr 2024 18:06:13 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BaksiGST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/VlasakBG23, author = {Lukas Vlasak and Antoine Bouvet and Sylvain Guilley}, editor = {Anupam Chattopadhyay and Shivam Bhasin and Stjepan Picek and Chester Rebeiro}, title = {Practical Aspects of Vertical Side-Channel Analyses on {HMAC-SHA-2}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14459}, pages = {329--349}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56232-7\_16}, doi = {10.1007/978-3-031-56232-7\_16}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/VlasakBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/BeguinotLRCG23, author = {Julien B{\'{e}}guinot and Yi Liu and Olivier Rioul and Wei Cheng and Sylvain Guilley}, title = {Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {654--659}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206606}, doi = {10.1109/ISIT54713.2023.10206606}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/BeguinotLRCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/LiuBCGMRS23, author = {Yi Liu and Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Lo{\"{\i}}c Masure and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2023, Saint-Malo, France, April 23-28, 2023}, pages = {81--86}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ITW55543.2023.10161608}, doi = {10.1109/ITW55543.2023.10161608}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/LiuBCGMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BeguinotCDGRY23, author = {Julien B{\'{e}}guinot and Wei Cheng and Jean{-}Luc Danger and Sylvain Guilley and Olivier Rioul and Ville Yli{-}M{\"{a}}yry}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Reliability of Ring Oscillator PUFs with Reduced Helper Data}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {36--56}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_3}, doi = {10.1007/978-3-031-41326-1\_3}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BeguinotCDGRY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vts/BahramiEDGK23, author = {Javad Bahrami and Mohammad Ebrahimabadi and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Special Session: Security Verification {\&} Testing for SR-Latch TRNGs}, booktitle = {41st {IEEE} {VLSI} Test Symposium, {VTS} 2023, San Diego, CA, USA, April 24-26, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTS56346.2023.10140057}, doi = {10.1109/VTS56346.2023.10140057}, timestamp = {Fri, 09 Jun 2023 15:18:15 +0200}, biburl = {https://dblp.org/rec/conf/vts/BahramiEDGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-06276, author = {Julien B{\'{e}}guinot and Yi Liu and Olivier Rioul and Wei Cheng and Sylvain Guilley}, title = {Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy}, journal = {CoRR}, volume = {abs/2305.06276}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.06276}, doi = {10.48550/ARXIV.2305.06276}, eprinttype = {arXiv}, eprint = {2305.06276}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-06276.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGT23, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Quasi-linear masking to protect against both {SCA} and {FIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2023}, url = {https://eprint.iacr.org/2023/406}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaksiGST23, author = {Anubhab Baksi and Sylvain Guilley and Ritu Ranjan Shrivastwa and Sofiane Takarabt}, title = {From Substitution Box To Threshold}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2023}, url = {https://eprint.iacr.org/2023/633}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaksiGST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaksiBCGGGHIJJKLMSSSS23, author = {Anubhab Baksi and Jakub Breier and Anupam Chattopadhyay and Tomas Gerlich and Sylvain Guilley and Naina Gupta and Kai Hu and Takanori Isobe and Arpan Jati and Petr Jedlicka and Hyunjun Kim and Fukang Liu and Zdenek Martinasek and Kosei Sakamoto and Hwajeong Seo and Rentaro Shiba and Ritu Ranjan Shrivastwa}, title = {{BAKSHEESH:} Similar Yet Different From {GIFT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {750}, year = {2023}, url = {https://eprint.iacr.org/2023/750}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaksiBCGGGHIJJKLMSSSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGT23a, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {A masking method based on orthonormal spaces, protecting several bytes against both {SCA} and {FIA} with a reduced cost}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1746}, year = {2023}, url = {https://eprint.iacr.org/2023/1746}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGT23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/KroegerCDGK22, author = {Trevor Kroeger and Wei Cheng and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Cross-PUF Attacks: Targeting {FPGA} Implementation of Arbiter-PUFs}, journal = {J. Electron. Test.}, volume = {38}, number = {3}, pages = {261--277}, year = {2022}, url = {https://doi.org/10.1007/s10836-022-06012-z}, doi = {10.1007/S10836-022-06012-Z}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/et/KroegerCDGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/TakahashiOINGSA22, author = {Junko Takahashi and Keiichi Okabe and Hiroki Itoh and Xuan Thuy Ngo and Sylvain Guilley and Ritu Ranjan Shrivastwa and Mushir Ahmed and Patrick Lejoly}, title = {Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {3}, pages = {311--325}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021cip0011}, doi = {10.1587/TRANSFUN.2021CIP0011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/TakahashiOINGSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OuladjGGM22, author = {Maamar Ouladj and Sylvain Guilley and Philippe Guillot and Farid Mokrane}, title = {Spectral approach to process the (multivariate) high-order template attack against any masking scheme}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {1}, pages = {75--93}, year = {2022}, url = {https://doi.org/10.1007/s13389-020-00253-4}, doi = {10.1007/S13389-020-00253-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OuladjGGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/NikniaDGK22, author = {Farzad Niknia and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {41}, number = {5}, pages = {1276--1289}, year = {2022}, url = {https://doi.org/10.1109/TCAD.2021.3088803}, doi = {10.1109/TCAD.2021.3088803}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/NikniaDGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WuCGZF22, author = {Qianmei Wu and Wei Cheng and Sylvain Guilley and Fan Zhang and Wei Fu}, title = {On Efficient and Secure Code-based Masking: {A} Pragmatic Evaluation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {192--222}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.192-222}, doi = {10.46586/TCHES.V2022.I3.192-222}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WuCGZF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeguinotCGR22, author = {Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Olivier Rioul}, title = {Side-Channel Expectation-Maximization Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {774--799}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.774-799}, doi = {10.46586/TCHES.V2022.I4.774-799}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeguinotCGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengGD22, author = {Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger}, title = {Information Leakage in Code-Based Masking: {A} Systematic Evaluation by Higher-Order Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1624--1638}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3167914}, doi = {10.1109/TIFS.2022.3167914}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChengGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/KroegerCGDK22, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {30}, number = {2}, pages = {187--200}, year = {2022}, url = {https://doi.org/10.1109/TVLSI.2021.3129141}, doi = {10.1109/TVLSI.2021.3129141}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/KroegerCGDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoudhariGK22, author = {Amit Choudhari and Sylvain Guilley and Khaled Karray}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Debdeep Mukhopadhyay and Domenic Forte}, title = {SpecDefender: Transient Execution Attack Defender using Performance Counters}, booktitle = {Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, {ASHES} 2022, Los Angeles, CA, USA, 11 November 2022}, pages = {15--24}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560834.3563830}, doi = {10.1145/3560834.3563830}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChoudhariGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cwit/ChengRLBG22, author = {Wei Cheng and Olivier Rioul and Yi Liu and Julien B{\'{e}}guinot and Sylvain Guilley}, title = {Side-Channel Information Leakage of Code-Based Masked Implementations}, booktitle = {17th Canadian Workshop on Information Theory, {CWIT} 2022, Ottawa, ON, Canada, June 5-8, 2022}, pages = {51--56}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CWIT55308.2022.9817673}, doi = {10.1109/CWIT55308.2022.9817673}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cwit/ChengRLBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BahramiEDGK22, author = {Javad Bahrami and Mohammad Ebrahimabadi and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, editor = {Cristiana Bolchini and Ingrid Verbauwhede and Ioana Vatajelu}, title = {Leakage Power Analysis in Different S-Box Masking Protection Schemes}, booktitle = {2022 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2022, Antwerp, Belgium, March 14-23, 2022}, pages = {1263--1268}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/DATE54114.2022.9774763}, doi = {10.23919/DATE54114.2022.9774763}, timestamp = {Wed, 25 May 2022 22:56:19 +0200}, biburl = {https://dblp.org/rec/conf/date/BahramiEDGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/BeguinotCGR22, author = {Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Olivier Rioul}, title = {Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel Attacks of Secure Chips}, booktitle = {25th Euromicro Conference on Digital System Design, {DSD} 2022, Maspalomas, Spain, August 31 - Sept. 2, 2022}, pages = {496--503}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSD57027.2022.00072}, doi = {10.1109/DSD57027.2022.00072}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/BeguinotCGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/Rais-AliBG22, author = {Idris Rais{-}Ali and Antoine Bouvet and Sylvain Guilley}, title = {Quantifying the Speed-Up Offered by Genetic Algorithms during Fault Injection Cartographies}, booktitle = {Workshop on Fault Detection and Tolerance in Cryptography, {FDTC} 2022, Virtual Event / Italy, September 16, 2022}, pages = {61--72}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/FDTC57191.2022.00016}, doi = {10.1109/FDTC57191.2022.00016}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/Rais-AliBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/EbrahimabadiMVG22, author = {Mohammad Ebrahimabadi and Suhee Sanjana Mehjabin and Raphael Viera and Sylvain Guilley and Jean{-}Luc Danger and Jean{-}Max Dutertre and Naghmeh Karimi}, title = {Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2022, McLean, VA, USA, June 27-30, 2022}, pages = {97--100}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HOST54066.2022.9840318}, doi = {10.1109/HOST54066.2022.9840318}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/EbrahimabadiMVG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/ChengLGR22, author = {Wei Cheng and Yi Liu and Sylvain Guilley and Olivier Rioul}, title = {Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2022, Espoo, Finland, June 26 - July 1, 2022}, pages = {654--659}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISIT50566.2022.9834556}, doi = {10.1109/ISIT50566.2022.9834556}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/ChengLGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BahramiETDGK22, author = {Javad Bahrami and Mohammad Ebrahimabadi and Sofiane Takarabt and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {661--668}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011307600003283}, doi = {10.5220/0011307600003283}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BahramiETDGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FukushimaOTKHKS22, author = {Kazuhide Fukushima and Hiroki Okada and Sofiane Takarabt and Amina Korchi and Meziane Hamoud and Khaled Karray and Youssef Souissy and Sylvain Guilley}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {701--706}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328400003283}, doi = {10.5220/0011328400003283}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaOTKHKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhariGK22, author = {Amit Choudhari and Sylvain Guilley and Khaled Karray}, title = {CRYScanner: Finding cryptographic libraries misuse}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2022}, url = {https://eprint.iacr.org/2022/029}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhariGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengGD22, author = {Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger}, title = {Information Leakage in Code-based Masking: {A} Systematic Evaluation by Higher-Order Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2022}, url = {https://eprint.iacr.org/2022/461}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeguinotCGLMRS22, author = {Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Yi Liu and Lo{\"{\i}}c Masure and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1738}, year = {2022}, url = {https://eprint.iacr.org/2022/1738}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeguinotCGLMRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/OuladjG21, author = {Maamar Ouladj and Sylvain Guilley}, title = {Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77222-2}, doi = {10.1007/978-3-030-77222-2}, isbn = {978-3-030-77221-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/OuladjG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChengGD21, author = {Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger}, title = {Categorizing all linear codes of {IPM} over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}\{2{\^{}}\{8\}\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {527--542}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00483-1}, doi = {10.1007/S12095-021-00483-1}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ChengGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/AnikEDGK21, author = {Md Toufiq Hasan Anik and Mohammad Ebrahimabadi and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Reducing Aging Impacts in Digital Sensors via Run-Time Calibration}, journal = {J. Electron. Test.}, volume = {37}, number = {5}, pages = {653--673}, year = {2021}, url = {https://doi.org/10.1007/s10836-021-05976-8}, doi = {10.1007/S10836-021-05976-8}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/et/AnikEDGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChengCGDG21, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Jean{-}Luc Danger and Sylvain Guilley}, title = {Detecting faults in inner product masking scheme}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {119--133}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00227-6}, doi = {10.1007/S13389-020-00227-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChengCGDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PerianinCDFG21, author = {Thomas Perianin and S{\'{e}}bastien Carr{\'{e}} and Victor Dyseryn and Adrien Facon and Sylvain Guilley}, title = {End-to-end automated cache-timing attack driven by machine learning}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {135--146}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00228-5}, doi = {10.1007/S13389-020-00228-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PerianinCDFG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DugardinSG21, author = {Margaux Dugardin and Werner Schindler and Sylvain Guilley}, title = {Stochastic methods defeat regular {RSA} exponentiation algorithms with combined blinding methods}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {408--433}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0010}, doi = {10.1515/JMC-2020-0010}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DugardinSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/AnikDGK21, author = {Md Toufiq Hasan Anik and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Detecting Failures and Attacks via Digital Sensors}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {40}, number = {7}, pages = {1315--1326}, year = {2021}, url = {https://doi.org/10.1109/TCAD.2020.3020921}, doi = {10.1109/TCAD.2020.3020921}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/AnikDGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengGCDM21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger and Sihem Mesnager}, title = {Information Leakages in Code-based Masking: {A} Unified Quantification Approach}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {465--495}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.465-495}, doi = {10.46586/TCHES.V2021.I3.465-495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengGCDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CarletGM21, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, title = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {57--87}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.57-87}, doi = {10.46586/TCHES.V2021.I4.57-87}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CarletGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CarletCGKT21, author = {Claude Carlet and {\'{E}}loi de Ch{\'{e}}risey and Sylvain Guilley and Sel{\c{c}}uk Kavut and Deng Tang}, title = {Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {203--218}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3006399}, doi = {10.1109/TIFS.2020.3006399}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CarletCGKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengGCMD21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean{-}Luc Danger}, title = {Optimizing Inner Product Masking Scheme by a Coding Theory Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {220--235}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3009609}, doi = {10.1109/TIFS.2020.3009609}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChengGCMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLGT21, author = {Yanbin Li and Zhe Liu and Sylvain Guilley and Ming Tang}, title = {Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4466--4481}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3096130}, doi = {10.1109/TIFS.2021.3096130}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PicekHPG21, author = {Stjepan Picek and Annelie Heuser and Guilherme Perin and Sylvain Guilley}, editor = {Vincent Grosso and Thomas P{\"{o}}ppelmann}, title = {Profiled Side-Channel Analysis in the Efficient Attacker Framework}, booktitle = {Smart Card Research and Advanced Applications - 20th International Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13173}, pages = {44--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97348-3\_3}, doi = {10.1007/978-3-030-97348-3\_3}, timestamp = {Thu, 10 Mar 2022 15:30:57 +0100}, biburl = {https://dblp.org/rec/conf/cardis/PicekHPG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/KroegerCGDK21, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, editor = {Shivam Bhasin and Fabrizio De Santis}, title = {Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12910}, pages = {303--321}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89915-8\_14}, doi = {10.1007/978-3-030-89915-8\_14}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/KroegerCGDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/KroegerCGDK21, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2021, Grenoble, France, February 1-5, 2021}, pages = {1000--1005}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/DATE51398.2021.9474137}, doi = {10.23919/DATE51398.2021.9474137}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/KroegerCGDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/AnikDDEFGKPT21, author = {Md Toufiq Hasan Anik and Jean{-}Luc Danger and Omar Diankha and Mohammad Ebrahimabadi and Christoph Frisch and Sylvain Guilley and Naghmeh Karimi and Michael Pehl and Sofiane Takarabt}, editor = {Luigi Dilillo and Luca Cassano and Athanasios Papadimitriou}, title = {Testing and Reliability Enhancement of Security Primitives}, booktitle = {36th {IEEE} International Symposium on Defect and Fault Tolerance in {VLSI} and Nanotechnology Systems, {DFT} 2021, Athens, Greece, October 6-8, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DFT52944.2021.9568297}, doi = {10.1109/DFT52944.2021.9568297}, timestamp = {Fri, 22 Oct 2021 15:23:35 +0200}, biburl = {https://dblp.org/rec/conf/dft/AnikDDEFGKPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ForcioliDMBBMNF21, author = {Quentin Forcioli and Jean{-}Luc Danger and Cl{\'{e}}mentine Maurice and Lilian Bossuet and Florent Bruguier and Maria Mushtaq and David Novo and Lo{\"{\i}}c France and Pascal Benoit and Sylvain Guilley and Thomas Perianin}, title = {Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {96--102}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSPW54576.2021.00017}, doi = {10.1109/EUROSPW54576.2021.00017}, timestamp = {Mon, 08 Nov 2021 16:43:34 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/ForcioliDMBBMNF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/TakarabtGSKSM21, author = {Sofiane Takarabt and Sylvain Guilley and Youssef Souissi and Khaled Karray and Laurent Sauvage and Yves Mathieu}, title = {Formal Evaluation and Construction of Glitch-resistant Masked Functions}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2021, Tysons Corner, VA, USA, December 12-15, 2021}, pages = {304--313}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HOST49136.2021.9702272}, doi = {10.1109/HOST49136.2021.9702272}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/TakarabtGSKSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GuilleyRQ21, author = {Sylvain Guilley and Michel Le Rolland and Damien Quenson}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Implementing Secure Applications Thanks to an Integrated Secure Element}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {566--571}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010298205660571}, doi = {10.5220/0010298205660571}, timestamp = {Tue, 02 Mar 2021 22:35:43 +0100}, biburl = {https://dblp.org/rec/conf/icissp/GuilleyRQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/SoleCGR21, author = {Patrick Sol{\'{e}} and Wei Cheng and Sylvain Guilley and Olivier Rioul}, title = {Bent Sequences over Hadamard Codes for Physically Unclonable Functions}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2021, Melbourne, Australia, July 12-20, 2021}, pages = {801--806}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIT45174.2021.9517752}, doi = {10.1109/ISIT45174.2021.9517752}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/SoleCGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/RioulCG21, author = {Olivier Rioul and Wei Cheng and Sylvain Guilley}, title = {Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2021, Melbourne, Australia, July 12-20, 2021}, pages = {2596--2601}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIT45174.2021.9517886}, doi = {10.1109/ISIT45174.2021.9517886}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/RioulCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/LiuCGR21, author = {Yi Liu and Wei Cheng and Sylvain Guilley and Olivier Rioul}, title = {On Conditional Alpha-Information and its Application to Side-Channel Analysis}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2021, Kanazawa, Japan, October 17-21, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ITW48936.2021.9611409}, doi = {10.1109/ITW48936.2021.9611409}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/LiuCGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/SoleLCGR21, author = {Patrick Sol{\'{e}} and Yi Liu and Wei Cheng and Sylvain Guilley and Olivier Rioul}, title = {Linear Programming Bounds on the Kissing Number of q-ary Codes}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2021, Kanazawa, Japan, October 17-21, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ITW48936.2021.9611478}, doi = {10.1109/ITW48936.2021.9611478}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/SoleLCGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-02468, author = {Olivier Rioul and Wei Cheng and Sylvain Guilley}, title = {Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret}, journal = {CoRR}, volume = {abs/2102.02468}, year = {2021}, url = {https://arxiv.org/abs/2102.02468}, eprinttype = {arXiv}, eprint = {2102.02468}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-02468.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-07167, author = {Yi Liu and Wei Cheng and Sylvain Guilley and Olivier Rioul}, title = {On Conditional {\(\alpha\)}-Information and its Application to Side-Channel Analysis}, journal = {CoRR}, volume = {abs/2105.07167}, year = {2021}, url = {https://arxiv.org/abs/2105.07167}, eprinttype = {arXiv}, eprint = {2105.07167}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-07167.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-07436, author = {Wei Cheng and Yi Liu and Sylvain Guilley and Olivier Rioul}, title = {Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds}, journal = {CoRR}, volume = {abs/2105.07436}, year = {2021}, url = {https://arxiv.org/abs/2105.07436}, eprinttype = {arXiv}, eprint = {2105.07436}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-07436.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengGCDM21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger and Sihem Mesnager}, title = {Information Leakages in Code-based Masking: {A} Unified Quantification Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2021}, url = {https://eprint.iacr.org/2021/363}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengGCDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OuladjGGM21, author = {Maamar Ouladj and Sylvain Guilley and Philippe Guillot and Farid Mokrane}, title = {Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {941}, year = {2021}, url = {https://eprint.iacr.org/2021/941}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OuladjGGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletGM21, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, title = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1028}, year = {2021}, url = {https://eprint.iacr.org/2021/1028}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauCDFG21, author = {Nicolas Bruneau and Charles Christen and Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley}, title = {Security evaluation against side-channel analysis at compilation time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1521}, year = {2021}, url = {https://eprint.iacr.org/2021/1521}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BruneauCDFG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/SchaubRDGB20, author = {Alexander Schaub and Olivier Rioul and Jean{-}Luc Danger and Sylvain Guilley and Joseph Boutros}, title = {Challenge codes for physically unclonable functions with Gaussian delays: {A} maximum entropy problem}, journal = {Adv. Math. Commun.}, volume = {14}, number = {3}, pages = {491--505}, year = {2020}, url = {https://doi.org/10.3934/amc.2020060}, doi = {10.3934/AMC.2020060}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/SchaubRDGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GuilleyKPSST20, author = {Sylvain Guilley and Khaled Karray and Thomas Perianin and Ritu Ranjan Shrivastwa and Youssef Souissi and Sofiane Takarabt}, title = {Side-Channel Evaluation Methodology on Software}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {27}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040027}, doi = {10.3390/CRYPTOGRAPHY4040027}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GuilleyKPSST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OuladjMGGM20, author = {Maamar Ouladj and Nadia El Mrabet and Sylvain Guilley and Philippe Guillot and Gilles Mill{\'{e}}rioux}, title = {On the power of template attacks in highly multivariate context}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {337--354}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00239-2}, doi = {10.1007/S13389-020-00239-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OuladjMGGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FerradiGGNT20, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Sylvain Guilley and David Naccache and Mehdi Tibouchi}, title = {Recovering Secrets From Prefix-Dependent Leakage}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {15--24}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0048}, doi = {10.1515/JMC-2015-0048}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FerradiGGNT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HeuserPGM20, author = {Annelie Heuser and Stjepan Picek and Sylvain Guilley and Nele Mentens}, title = {Lightweight Ciphers and Their Side-Channel Resilience}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {10}, pages = {1434--1448}, year = {2020}, url = {https://doi.org/10.1109/TC.2017.2757921}, doi = {10.1109/TC.2017.2757921}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/HeuserPGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/0010YDG00Z020, author = {Fan Zhang and Bolin Yang and Xiaofei Dong and Sylvain Guilley and Zhe Liu and Wei He and Fangguo Zhang and Kui Ren}, title = {Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant {SIKE}}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {11}, pages = {1681--1693}, year = {2020}, url = {https://doi.org/10.1109/TC.2020.3020407}, doi = {10.1109/TC.2020.3020407}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/0010YDG00Z020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FukushimaPDKGF20, author = {Kazuhide Fukushima and Thomas Perianin and Victor Dyseryn and Shinsaku Kiyomoto and Sylvain Guilley and Adrien Facon}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Feasibility study of a camera-based {PUF} in a realistic scenario}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {31:1--31:6}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407047}, doi = {10.1145/3407023.3407047}, timestamp = {Mon, 03 Aug 2020 16:17:13 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/FukushimaPDKGF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/CarreGR20, author = {S{\'{e}}bastien Carr{\'{e}} and Sylvain Guilley and Olivier Rioul}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Persistent Fault Analysis with Few Encryptions}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {3--24}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_1}, doi = {10.1007/978-3-030-68773-1\_1}, timestamp = {Fri, 05 Feb 2021 12:30:03 +0100}, biburl = {https://dblp.org/rec/conf/cosade/CarreGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/OuladjGP20, author = {Maamar Ouladj and Sylvain Guilley and Emmanuel Prouff}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {147--172}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_8}, doi = {10.1007/978-3-030-68773-1\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/OuladjGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DangerFGHKSTP20, author = {Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley and Karine Heydemann and Ulrich K{\"{u}}hne and Abdelmalek Si{-}Merabet and Micha{\"{e}}l Timbert and Baptiste Pecatte}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {254--274}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_12}, doi = {10.1007/978-3-030-68773-1\_12}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/DangerFGHKSTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/KroegerCGDK20, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {Effect of Aging on {PUF} Modeling Attacks based on Power Side-Channel Observations}, booktitle = {2020 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020}, pages = {454--459}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/DATE48585.2020.9116428}, doi = {10.23919/DATE48585.2020.9116428}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/KroegerCGDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/0001DRG20, author = {Alexander Schaub and Jean{-}Luc Danger and Olivier Rioul and Sylvain Guilley}, title = {The Big Picture of Delay-PUF Dependability}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2020, Sofia, Bulgaria, September 7-10, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ECCTD49232.2020.9218396}, doi = {10.1109/ECCTD49232.2020.9218396}, timestamp = {Wed, 14 Oct 2020 15:01:07 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/0001DRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/AlipourBCDNHGK20, author = {Amir Alipour and Vincent Beroulle and Bertrand Cambou and Jean{-}Luc Danger and Giorgio Di Natale and David H{\'{e}}ly and Sylvain Guilley and Naghmeh Karimi}, title = {{PUF} Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community}, booktitle = {{IEEE} European Test Symposium, {ETS} 2020, Tallinn, Estonia, May 25-29, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ETS48528.2020.9131578}, doi = {10.1109/ETS48528.2020.9131578}, timestamp = {Wed, 15 Jul 2020 13:23:41 +0200}, biburl = {https://dblp.org/rec/conf/ets/AlipourBCDNHGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/AnikSDGK20, author = {Md Toufiq Hasan Anik and Rachit Saini and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Failure and Attack Detection by Digital Sensors}, booktitle = {{IEEE} European Test Symposium, {ETS} 2020, Tallinn, Estonia, May 25-29, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ETS48528.2020.9131580}, doi = {10.1109/ETS48528.2020.9131580}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ets/AnikSDGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/AnikEPDGK20, author = {Md Toufiq Hasan Anik and Mohammad Ebrahimabadi and Hamed Pirsiavash and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability}, booktitle = {38th {IEEE} International Conference on Computer Design, {ICCD} 2020, Hartford, CT, USA, October 18-21, 2020}, pages = {506--509}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCD50377.2020.00091}, doi = {10.1109/ICCD50377.2020.00091}, timestamp = {Mon, 11 Jan 2021 13:35:27 +0100}, biburl = {https://dblp.org/rec/conf/iccd/AnikEPDGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TakahashiOINGSA20, author = {Junko Takahashi and Keiichi Okabe and Hiroki Itoh and Xuan Thuy Ngo and Sylvain Guilley and Ritu Ranjan Shrivastwa and Mushir Ahmed and Patrick Lejoly}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {3--19}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_1}, doi = {10.1007/978-3-030-61078-4\_1}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/icics/TakahashiOINGSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itc/KroegerCGDK20, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel}, booktitle = {{IEEE} International Test Conference, {ITC} 2020, Washington, DC, USA, November 1-6, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ITC44778.2020.9325241}, doi = {10.1109/ITC44778.2020.9325241}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itc/KroegerCGDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/AnikGDK20, author = {Md Toufiq Hasan Anik and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {On the Effect of Aging on Digital Sensors}, booktitle = {33rd International Conference on {VLSI} Design and 19th International Conference on Embedded Systems, {VLSID} 2020, Bangalore, India, January 4-8, 2020}, pages = {189--194}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VLSID49098.2020.00050}, doi = {10.1109/VLSID49098.2020.00050}, timestamp = {Mon, 14 Nov 2022 15:28:08 +0100}, biburl = {https://dblp.org/rec/conf/vlsid/AnikGDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarreGR20, author = {S{\'{e}}bastien Carr{\'{e}} and Sylvain Guilley and Olivier Rioul}, title = {Persistent Fault Analysis With Few Encryptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2020}, url = {https://eprint.iacr.org/2020/671}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarreGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengGCMD20, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean{-}Luc Danger}, title = {Optimizing Inner Product Masking Scheme by {A} Coding Theory Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2020}, url = {https://eprint.iacr.org/2020/692}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengGCMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletGM20, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, title = {Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {876}, year = {2020}, url = {https://eprint.iacr.org/2020/876}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletDGT19, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Polynomial direct sum masking to protect against both {SCA} and {FIA}}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {303--312}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0194-9}, doi = {10.1007/S13389-018-0194-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletDGT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/CarreDFG19, author = {S{\'{e}}bastien Carr{\'{e}} and Matthieu Desjardins and Adrien Facon and Sylvain Guilley}, title = {Exhaustive single bit fault analysis. {A} use case against Mbedtls and OpenSSL's protection on {ARM} and Intel {CPU}}, journal = {Microprocess. Microsystems}, volume = {71}, year = {2019}, url = {https://doi.org/10.1016/j.micpro.2019.102860}, doi = {10.1016/J.MICPRO.2019.102860}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/CarreDFG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/RoyBGHPM19, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {{CC} Meets {FIPS:} {A} Hybrid Test Methodology for First Order Side Channel Analysis}, journal = {{IEEE} Trans. Computers}, volume = {68}, number = {3}, pages = {347--361}, year = {2019}, url = {https://doi.org/10.1109/TC.2018.2875746}, doi = {10.1109/TC.2018.2875746}, timestamp = {Wed, 27 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/RoyBGHPM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CheriseyGRP19, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Olivier Rioul and Pablo Piantanida}, title = {Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {49--79}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.49-79}, doi = {10.13154/TCHES.V2019.I2.49-79}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CheriseyGRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/SouissiFG19, author = {Youssef Souissi and Adrien Facon and Sylvain Guilley}, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level}, booktitle = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, pages = {3--12}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4\_1}, doi = {10.1007/978-3-030-16458-4\_1}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/c2si/SouissiFG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/Takarabt0FGSSM19, author = {Sofiane Takarabt and Alexander Schaub and Adrien Facon and Sylvain Guilley and Laurent Sauvage and Youssef Souissi and Yves Mathieu}, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Cache-Timing Attacks Still Threaten IoT Devices}, booktitle = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, pages = {13--30}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4\_2}, doi = {10.1007/978-3-030-16458-4\_2}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/c2si/Takarabt0FGSSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/NguyenFGGA19, author = {Robert Nguyen and Adrien Facon and Sylvain Guilley and Guillaume Gautier and Safwan El Assad}, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Speed-up of {SCA} Attacks on 32-bit Multiplications}, booktitle = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, pages = {31--39}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4\_3}, doi = {10.1007/978-3-030-16458-4\_3}, timestamp = {Thu, 18 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c2si/NguyenFGGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/CarreFGT0S19, author = {S{\'{e}}bastien Carr{\'{e}} and Adrien Facon and Sylvain Guilley and Sofiane Takarabt and Alexander Schaub and Youssef Souissi}, editor = {Ilia Polian and Marc St{\"{o}}ttinger}, title = {Cache-Timing Attack Detection and Prevention - Application to Crypto Libs and {PQC}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, {COSADE} 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11421}, pages = {13--21}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16350-1\_2}, doi = {10.1007/978-3-030-16350-1\_2}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/CarreFGT0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/TehraniGSGD19, author = {Etienne Tehrani and Tarik Graba and Abdelmalek Si{-}Merabet and Sylvain Guilley and Jean{-}Luc Danger}, title = {Classification of Lightweight Block Ciphers for Specific Processor Accelerated Implementations}, booktitle = {26th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2019, Genoa, Italy, November 27-29, 2019}, pages = {747--750}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICECS46596.2019.8965156}, doi = {10.1109/ICECS46596.2019.8965156}, timestamp = {Mon, 03 Feb 2020 12:19:05 +0100}, biburl = {https://dblp.org/rec/conf/icecsys/TehraniGSGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {67--74}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007259500670074}, doi = {10.5220/0007259500670074}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {74--92}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_4}, doi = {10.1007/978-3-030-49443-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CheriseyGRP19, author = {{\'{E}}loi de Ch{\'{e}}risey and Sylvain Guilley and Olivier Rioul and Pablo Piantanida}, title = {An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2019, Paris, France, July 7-12, 2019}, pages = {310--315}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISIT.2019.8849763}, doi = {10.1109/ISIT.2019.8849763}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/CheriseyGRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwasi/DangerG019, author = {Jean{-}Luc Danger and Sylvain Guilley and Alexander Schaub}, title = {Two-Metric Helper Data for Highly Robust and Secure Delay PUFs}, booktitle = {{IEEE} 8th International Workshop on Advances in Sensors and Interfaces, {IWASI} 2019, Otranto, Italy, June 13-14, 2019}, pages = {184--188}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IWASI.2019.8791249}, doi = {10.1109/IWASI.2019.8791249}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwasi/DangerG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/proofs/CarreDFGP19, author = {S{\'{e}}bastien Carr{\'{e}} and Victor Dyseryn and Adrien Facon and Sylvain Guilley and Thomas Perianin}, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {End-to-end automated cache-timing attack driven by Machine Learning}, booktitle = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, pages = {1--16}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/nwj8}, doi = {10.29007/NWJ8}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/CarreDFGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/proofs/ChengCGDG19, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {Detecting Faults in Inner-Product Masking Scheme - {IPM-FD:} {IPM} with Fault Detection}, booktitle = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, pages = {17--32}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/fv2n}, doi = {10.29007/FV2N}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/ChengCGDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/aise/CarletGGMO19, author = {Claude Carlet and Sylvain Guilley and Cem G{\"{u}}neri and Sihem Mesnager and Ferruh {\"{O}}zbudak}, editor = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Antonio F. Skarmeta}, title = {Construction of Efficient Codes for High-Order Direct Sum Masking}, booktitle = {Security and Privacy in the Internet of Things: Challenges and Solutions}, series = {Ambient Intelligence and Smart Environments}, volume = {27}, pages = {108--128}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/AISE200008}, doi = {10.3233/AISE200008}, timestamp = {Wed, 13 May 2020 14:43:58 +0200}, biburl = {https://dblp.org/rec/series/aise/CarletGGMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/aise/CarletGM19, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, editor = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Antonio F. Skarmeta}, title = {Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks}, booktitle = {Security and Privacy in the Internet of Things: Challenges and Solutions}, series = {Ambient Intelligence and Smart Environments}, volume = {27}, pages = {148--166}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/AISE200010}, doi = {10.3233/AISE200010}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/aise/CarletGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/c2si/2019, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4}, doi = {10.1007/978-3-030-16458-4}, isbn = {978-3-030-16457-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c2si/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHG19, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Profiling Side-channel Analysis in the Restricted Attacker Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2019}, url = {https://eprint.iacr.org/2019/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheriseyGRP19, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Olivier Rioul and Pablo Piantanida}, title = {Best Information is Most Successful}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2019}, url = {https://eprint.iacr.org/2019/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheriseyGRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenFGGA19, author = {Robert Nguyen and Adrien Facon and Sylvain Guilley and Guillaume Gautier and Safwan El Assad}, title = {Speed-up of {SCA} attacks on 32-bit multiplications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2019}, url = {https://eprint.iacr.org/2019/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenFGGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengCGGD19, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Sylvain Guilley and Jean{-}Luc Danger}, title = {Detecting Faults in Inner Product Masking Scheme - {IPM-FD:} {IPM} with Fault Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {919}, year = {2019}, url = {https://eprint.iacr.org/2019/919}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengCGGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CheriseyGHR18, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {On the optimality and practicability of mutual information analysis in some scenarios}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {101--121}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0241-x}, doi = {10.1007/S12095-017-0241-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CheriseyGHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CarletG18, author = {Claude Carlet and Sylvain Guilley}, title = {Statistical properties of side-channel and fault injection attacks using coding theory}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {909--933}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0271-4}, doi = {10.1007/S12095-017-0271-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CarletG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DangerHFGGHNPS18, author = {Jean{-}Luc Danger and Youssef El Housni and Adrien Facon and Cheikh Thiecoumba Gueye and Sylvain Guilley and Sylvie Herbel and Ousmane Ndiaye and Edoardo Persichetti and Alexander Schaub}, title = {On the Performance and Security of Multiplication in \emph{GF}(2\({}^{\mbox{\emph{N}}}\))}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {25}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030025}, doi = {10.3390/CRYPTOGRAPHY2030025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DangerHFGGHNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/KarimiDG18, author = {Naghmeh Karimi and Jean{-}Luc Danger and Sylvain Guilley}, title = {Impact of Aging on the Reliability of Delay PUFs}, journal = {J. Electron. Test.}, volume = {34}, number = {5}, pages = {571--586}, year = {2018}, url = {https://doi.org/10.1007/s10836-018-5745-6}, doi = {10.1007/S10836-018-5745-6}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/et/KarimiDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/RoyBDGHMNN18, author = {Debapriya Basu Roy and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Wei He and Debdeep Mukhopadhyay and Zakaria Najm and Xuan Thuy Ngo}, title = {The Conflicted Usage of RLUTs for Security-Critical Applications on {FPGA}}, journal = {J. Hardw. Syst. Secur.}, volume = {2}, number = {2}, pages = {162--178}, year = {2018}, url = {https://doi.org/10.1007/s41635-018-0035-4}, doi = {10.1007/S41635-018-0035-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/RoyBDGHMNN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BruneauGNT18, author = {Nicolas Bruneau and Sylvain Guilley and Zakaria Najm and Yannick Teglia}, title = {Multivariate High-Order Attacks of Shuffled Tables Recomputation}, journal = {J. Cryptol.}, volume = {31}, number = {2}, pages = {351--393}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9259-7}, doi = {10.1007/S00145-017-9259-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BruneauGNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CheriseyGR18, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Olivier Rioul}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {Confused yet Successful: - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and {SNR}}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {533--553}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_28}, doi = {10.1007/978-3-030-14234-6\_28}, timestamp = {Thu, 14 Jul 2022 16:21:07 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CheriseyGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/CarreDFG18, author = {S{\'{e}}bastien Carr{\'{e}} and Matthieu Desjardins and Adrien Facon and Sylvain Guilley}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {OpenSSL Bellcore's Protection Helps Fault Attack}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {500--507}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00089}, doi = {10.1109/DSD.2018.00089}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/CarreDFG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/DangerFGHKMT18, author = {Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley and Karine Heydemann and Ulrich K{\"{u}}hne and Abdelmalek Si{-}Merabet and Micha{\"{e}}l Timbert}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {CCFI-Cache: {A} Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {529--536}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00093}, doi = {10.1109/DSD.2018.00093}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/DangerFGHKMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/SchaubDGR18, author = {Alexander Schaub and Jean{-}Luc Danger and Sylvain Guilley and Olivier Rioul}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {An Improved Analysis of Reliability and Entropy for Delay PUFs}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {553--560}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00096}, doi = {10.1109/DSD.2018.00096}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/SchaubDGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dtis/BouvetBFGM18, author = {Antoine Bouvet and Nicolas Bruneau and Adrien Facon and Sylvain Guilley and Damien Marion}, title = {Give me your binary, I'll tell you if it leaks}, booktitle = {13th International Conference on Design {\&} Technology of Integrated Systems In Nanoscale Era, {DTIS} 2018, Taormina, Italy, April 9-12, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DTIS.2018.8368582}, doi = {10.1109/DTIS.2018.8368582}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dtis/BouvetBFGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/GuilleyH18, author = {Sylvain Guilley and Youssef El Housni}, title = {Random Numbers Generation: Tests and Attacks}, booktitle = {2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2018, Amsterdam, The Netherlands, September 13, 2018}, pages = {49--54}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/FDTC.2018.00016}, doi = {10.1109/FDTC.2018.00016}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/GuilleyH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/KarimiGD18, author = {Naghmeh Karimi and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Deming Chen and Houman Homayoun and Baris Taskin}, title = {Impact of Aging on Template Attacks}, booktitle = {Proceedings of the 2018 on Great Lakes Symposium on VLSI, {GLSVLSI} 2018, Chicago, IL, USA, May 23-25, 2018}, pages = {455--458}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194554.3194638}, doi = {10.1145/3194554.3194638}, timestamp = {Wed, 10 Mar 2021 14:55:38 +0100}, biburl = {https://dblp.org/rec/conf/glvlsi/KarimiGD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/ChibaniFGS18, author = {Kais Chibani and Adrien Facon and Sylvain Guilley and Youssef Souissi}, title = {Technology-agnostic power optimization for {AES} block cipher}, booktitle = {25th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018}, pages = {397--400}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICECS.2018.8617921}, doi = {10.1109/ICECS.2018.8617921}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/ChibaniFGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/KarimiDG18, author = {Naghmeh Karimi and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Dimitris Gizopoulos and Dan Alexandrescu and Mihalis Maniatakos and Panagiota Papavramidou}, title = {On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis}, booktitle = {24th {IEEE} International Symposium on On-Line Testing And Robust System Design, {IOLTS} 2018, Platja D'Aro, Spain, July 2-4, 2018}, pages = {281--286}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IOLTS.2018.8474089}, doi = {10.1109/IOLTS.2018.8474089}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/iolts/KarimiDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/FaconGLSS18, author = {Adrien Facon and Sylvain Guilley and Matthieu Lec'Hvien and Alexander Schaub and Youssef Souissi}, title = {Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {7--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494855}, doi = {10.1109/IVSW.2018.8494855}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/FaconGLSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/TakarabtCFGMSS18, author = {Sofiane Takarabt and Kais Chibani and Adrien Facon and Sylvain Guilley and Yves Mathieu and Laurent Sauvage and Youssef Souissi}, title = {Pre-silicon Embedded System Evaluation as New {EDA} Tool for Security Verification}, booktitle = {3rd {IEEE} International Verification and Security Workshop, {IVSW} 2018, Costa Brava, Spain, July 2-4, 2018}, pages = {74--79}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVSW.2018.8494881}, doi = {10.1109/IVSW.2018.8494881}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/TakarabtCFGMSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BruneauDFGHHK018, author = {Nicolas Bruneau and Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley and Soshi Hamaguchi and Yohei Hori and Yousung Kang and Alexander Schaub}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Development of the Unified Security Requirements of PUFs During the Standardization Process}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {314--330}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_24}, doi = {10.1007/978-3-030-12942-2\_24}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BruneauDFGHHK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/FaconGLMP18, author = {Adrien Facon and Sylvain Guilley and Matthieu Lec'Hvien and Damien Marion and Thomas Perianin}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Binary Data Analysis for Source Code Leakage Assessment}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {391--409}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_30}, doi = {10.1007/978-3-030-12942-2\_30}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/FaconGLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KarrayDGE18, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and Moulay Abdelaziz Elaabid}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {109--128}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_9}, doi = {10.1007/978-3-030-20074-9\_9}, timestamp = {Tue, 14 May 2019 14:17:01 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KarrayDGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/KarrayDGE18, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and M. Abdelaziz Elaabid}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Attack Tree Construction and Its Application to the Connected Vehicle}, booktitle = {Cyber-Physical Systems Security}, pages = {175--190}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_9}, doi = {10.1007/978-3-319-98935-8\_9}, timestamp = {Fri, 08 Mar 2019 12:57:04 +0100}, biburl = {https://dblp.org/rec/books/sp/18/KarrayDGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/KarrayDGE18a, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and M. Abdelaziz Elaabid}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks}, booktitle = {Cyber-Physical Systems Security}, pages = {219--254}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_11}, doi = {10.1007/978-3-319-98935-8\_11}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/KarrayDGE18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/DangerGHLT18, author = {Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Axel Legay and Ming Tang}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Physical Security Versus Masking Schemes}, booktitle = {Cyber-Physical Systems Security}, pages = {269--284}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_13}, doi = {10.1007/978-3-319-98935-8\_13}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/DangerGHLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGT18, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Polynomial direct sum masking to protect against both {SCA} and {FIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2018}, url = {https://eprint.iacr.org/2018/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGGNT18, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Sylvain Guilley and David Naccache and Mehdi Tibouchi}, title = {Recovering Secrets From Prefix-Dependent Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {798}, year = {2018}, url = {https://eprint.iacr.org/2018/798}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGGNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/VeshchikovG17, author = {Nikita Veshchikov and Sylvain Guilley}, title = {Implementation flaws in the masking scheme of {DPA} Contest v4}, journal = {{IET} Inf. Secur.}, volume = {11}, number = {6}, pages = {356--362}, year = {2017}, url = {https://doi.org/10.1049/iet-ifs.2016.0475}, doi = {10.1049/IET-IFS.2016.0475}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/VeshchikovG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Guilley17, author = {Sylvain Guilley}, title = {Editorial about {PROOFS} 2015}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {19--20}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0140-7}, doi = {10.1007/S13389-016-0140-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Guilley17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DugardinGMNR17, author = {Margaux Dugardin and Sylvain Guilley and Martin Moreau and Zakaria Najm and Pablo Rauzy}, title = {Using modular extension to provably protect Edwards curves against fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {321--330}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0167-4}, doi = {10.1007/S13389-017-0167-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/DugardinGMNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BruneauGHMR17, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, title = {Optimal side-channel attacks for multivariate leakages and multiple models}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {331--341}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0170-9}, doi = {10.1007/S13389-017-0170-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BruneauGHMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PicekHG17, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Template attack versus Bayes classifier}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {343--351}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0172-7}, doi = {10.1007/S13389-017-0172-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PicekHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/NgoDGGMNB17, author = {Xuan Thuy Ngo and Jean{-}Luc Danger and Sylvain Guilley and Tarik Graba and Yves Mathieu and Zakaria Najm and Shivam Bhasin}, title = {Cryptographically Secure Shield for Security IPs Protection}, journal = {{IEEE} Trans. Computers}, volume = {66}, number = {2}, pages = {354--360}, year = {2017}, url = {https://doi.org/10.1109/TC.2016.2584041}, doi = {10.1109/TC.2016.2584041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/NgoDGGMNB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BruneauCGHPR17, author = {Nicolas Bruneau and Claude Carlet and Sylvain Guilley and Annelie Heuser and Emmanuel Prouff and Olivier Rioul}, title = {Stochastic Collision Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2090--2104}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2697401}, doi = {10.1109/TIFS.2017.2697401}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/GuilleyHR17, author = {Sylvain Guilley and Annelie Heuser and Olivier Rioul}, editor = {Said El Hajji and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Codes for Side-Channel Attacks and Protections}, booktitle = {Codes, Cryptology and Information Security - Second International Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet}, series = {Lecture Notes in Computer Science}, volume = {10194}, pages = {35--55}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-55589-8\_3}, doi = {10.1007/978-3-319-55589-8\_3}, timestamp = {Tue, 27 Aug 2019 17:49:45 +0200}, biburl = {https://dblp.org/rec/conf/c2si/GuilleyHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PoussierGSCG17, author = {Romain Poussier and Qian Guo and Fran{\c{c}}ois{-}Xavier Standaert and Claude Carlet and Sylvain Guilley}, editor = {Thomas Eisenbarth and Yannick Teglia}, title = {Connecting and Improving Direct Sum Masking and Inner Product Masking}, booktitle = {Smart Card Research and Advanced Applications - 16th International Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10728}, pages = {123--141}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75208-2\_8}, doi = {10.1007/978-3-319-75208-2\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/PoussierGSCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MaurineG17, author = {Philippe Maurine and Sylvain Guilley}, editor = {Sylvain Guilley}, title = {Impacts of Technology Trends on Physical Attacks?}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {190--206}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_12}, doi = {10.1007/978-3-319-64647-3\_12}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MaurineG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/DangerGNNS17, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Nguyen and Robert Nguyen and Youssef Souissi}, editor = {David Atienza and Giorgio Di Natale}, title = {Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2017, Lausanne, Switzerland, March 27-31, 2017}, pages = {1129--1134}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/DATE.2017.7927159}, doi = {10.23919/DATE.2017.7927159}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/DangerGNNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/KarimiDSG17, author = {Naghmeh Karimi and Jean{-}Luc Danger and Mariem Slimani and Sylvain Guilley}, title = {Impact of the switching activity on the aging of delay-PUFs}, booktitle = {22nd {IEEE} European Test Symposium, {ETS} 2017, Limassol, Cyprus, May 22-26, 2017}, pages = {1--2}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ETS.2017.7968223}, doi = {10.1109/ETS.2017.7968223}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/ets/KarimiDSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/VeshchikovG17, author = {Nikita Veshchikov and Sylvain Guilley}, title = {Use of Simulators for Side-Channel Analysis}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {51--59}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.31}, doi = {10.1109/EUROSP.2017.31}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/VeshchikovG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/VeshchikovG17a, author = {Nikita Veshchikov and Sylvain Guilley}, title = {Use of Simulators for Side-Channel Analysis}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017}, pages = {104--112}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSPW.2017.59}, doi = {10.1109/EUROSPW.2017.59}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/VeshchikovG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/PicekHJLGJM17, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Simone A. Ludwig and Sylvain Guilley and Domagoj Jakobovic and Nele Mentens}, title = {Side-channel analysis and machine learning: {A} practical perspective}, booktitle = {2017 International Joint Conference on Neural Networks, {IJCNN} 2017, Anchorage, AK, USA, May 14-19, 2017}, pages = {4095--4102}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IJCNN.2017.7966373}, doi = {10.1109/IJCNN.2017.7966373}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/PicekHJLGJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GuilleyHTR17, author = {Sylvain Guilley and Annelie Heuser and Ming Tang and Olivier Rioul}, editor = {Pooya Farshim and Emil Simion}, title = {Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {12--27}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_2}, doi = {10.1007/978-3-319-69284-5\_2}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/GuilleyHTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2017proofs, editor = {Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Sylvain Guilley}, title = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017}, series = {EPiC Series in Computing}, volume = {49}, publisher = {EasyChair}, year = {2017}, url = {https://easychair.org/publications/volume/PROOFS\_2017}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/2017proofs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2017, editor = {Sylvain Guilley}, title = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3}, doi = {10.1007/978-3-319-64647-3}, isbn = {978-3-319-64646-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2016, editor = {Dooho Choi and Sylvain Guilley}, title = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56549-1}, doi = {10.1007/978-3-319-56549-1}, isbn = {978-3-319-56548-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuserPGM17, author = {Annelie Heuser and Stjepan Picek and Sylvain Guilley and Nele Mentens}, title = {Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2017}, url = {http://eprint.iacr.org/2017/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuserPGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilleyL17, author = {Sylvain Guilley and Liran Lerman}, title = {Bivariate attacks and confusion coefficients}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2017}, url = {http://eprint.iacr.org/2017/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilleyL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarimiDLG17, author = {Naghmeh Karimi and Jean{-}Luc Danger and Florent Lozach and Sylvain Guilley}, title = {Predictive Aging of Reliability of two Delay PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2017}, url = {http://eprint.iacr.org/2017/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarimiDLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHG17, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Template Attack vs Bayes Classifier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2017}, url = {http://eprint.iacr.org/2017/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengZCZ0GS17, author = {Wei Cheng and Chao Zheng and Yuchen Cao and Yongbin Zhou and Hailong Zhang and Sylvain Guilley and Laurent Sauvage}, title = {How Far Can We Reach? Breaking RSM-Masked {AES-128} Implementation Using Only One Trace}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1144}, year = {2017}, url = {http://eprint.iacr.org/2017/1144}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengZCZ0GS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/CarletG16, author = {Claude Carlet and Sylvain Guilley}, title = {Complementary dual codes for counter-measures to side-channel attacks}, journal = {Adv. Math. Commun.}, volume = {10}, number = {1}, pages = {131--150}, year = {2016}, url = {https://doi.org/10.3934/amc.2016.10.131}, doi = {10.3934/AMC.2016.10.131}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/CarletG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ec/PicekCGMJ16, author = {Stjepan Picek and Claude Carlet and Sylvain Guilley and Julian F. Miller and Domagoj Jakobovic}, title = {Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography}, journal = {Evol. Comput.}, volume = {24}, number = {4}, pages = {667--694}, year = {2016}, url = {https://doi.org/10.1162/EVCO\_a\_00190}, doi = {10.1162/EVCO\_A\_00190}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ec/PicekCGMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RauzyGN16, author = {Pablo Rauzy and Sylvain Guilley and Zakaria Najm}, title = {Formally proved security of assembly code against power analysis - {A} case study on balanced logic}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {201--216}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0105-2}, doi = {10.1007/S13389-015-0105-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RauzyGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NgoNBGD16, author = {Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger}, title = {Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {239--247}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0129-2}, doi = {10.1007/S13389-016-0129-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NgoNBGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BruneauGHRST16, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert and Yannick Teglia}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {573--601}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_21}, doi = {10.1007/978-3-662-53887-6\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BruneauGHRST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/DangerGHMN16, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Improving the Big Mac Attack on Elliptic Curve Cryptography}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {374--386}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_23}, doi = {10.1007/978-3-662-49301-4\_23}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/DangerGHMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/DangerGPPT16, author = {Jean{-}Luc Danger and Sylvain Guilley and Thibault Porteboeuf and Florian Praden and Micha{\"{e}}l Timbert}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {439--454}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_27}, doi = {10.1007/978-3-662-49301-4\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/DangerGPPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/FouqueGMN16, author = {Pierre{-}Alain Fouque and Sylvain Guilley and C{\'{e}}dric Murdica and David Naccache}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Safe-Errors on {SPA} Protected Implementations with the Atomicity Technique}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {479--493}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_30}, doi = {10.1007/978-3-662-49301-4\_30}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/FouqueGMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DugardinGDNR16, author = {Margaux Dugardin and Sylvain Guilley and Jean{-}Luc Danger and Zakaria Najm and Olivier Rioul}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {3--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_1}, doi = {10.1007/978-3-662-53140-2\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/DugardinGDNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DugardinPNBDG16, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Dismantling Real-World {ECC} with Horizontal and Vertical Template Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, pages = {88--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0\_6}, doi = {10.1007/978-3-319-43283-0\_6}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/DugardinPNBDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CheriseyGRJ16, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Olivier Rioul and Darshana Jayasinghe}, title = {Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Korea, June 18, 2016}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2948618.2948625}, doi = {10.1145/2948618.2948625}, timestamp = {Tue, 06 Nov 2018 11:07:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/CheriseyGRJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/RioulHGD16, author = {Olivier Rioul and Annelie Heuser and Sylvain Guilley and Jean{-}Luc Danger}, title = {Inter-class vs. mutual information as side-channel distinguishers}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {805--809}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541410}, doi = {10.1109/ISIT.2016.7541410}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/RioulHGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/RioulSGD16, author = {Olivier Rioul and Patrick Sol{\'{e}} and Sylvain Guilley and Jean{-}Luc Danger}, title = {On the entropy of Physically Unclonable Functions}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {2928--2932}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541835}, doi = {10.1109/ISIT.2016.7541835}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/RioulSGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/HeuserPGM16, author = {Annelie Heuser and Stjepan Picek and Sylvain Guilley and Nele Mentens}, editor = {Gerhard P. Hancke and Konstantinos Markantonakis}, title = {Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?}, booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10155}, pages = {91--104}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62024-4\_7}, doi = {10.1007/978-3-319-62024-4\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/HeuserPGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/KarimiDLG16, author = {Naghmeh Karimi and Jean{-}Luc Danger and Florent Lozach and Sylvain Guilley}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Predictive Aging of Reliability of Two Delay PUFs}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {213--232}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_12}, doi = {10.1007/978-3-319-49445-6\_12}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/KarimiDLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16, author = {Kazuhide Fukushima and Youssef Souissi and Seira Hidano and Robert Nguyen and Jean{-}Luc Danger and Sylvain Guilley and Yuto Nakano and Shinsaku Kiyomoto and Laurent Sauvage}, title = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {201--207}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0064}, doi = {10.1109/TRUSTCOM.2016.0064}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauGHMR16, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, title = {Less is More - Dimensionality Reduction from a Theoretical Perspective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2016}, url = {http://eprint.iacr.org/2016/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauGHMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DugardinGDNR16, author = {Margaux Dugardin and Sylvain Guilley and Jean{-}Luc Danger and Zakaria Najm and Olivier Rioul}, title = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2016}, url = {http://eprint.iacr.org/2016/597}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DugardinGDNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelgarricBBDDGH16, author = {Pierre Belgarric and Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Annelie Heuser and Zakaria Najm and Olivier Rioul}, title = {Time-Frequency Analysis for Second-Order Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2016}, url = {http://eprint.iacr.org/2016/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilleyHR16, author = {Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {A Key to Success - Success Exponents for Side-Channel Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {987}, year = {2016}, url = {http://eprint.iacr.org/2016/987}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilleyHR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyBPMG16, author = {Debapriya Basu Roy and Shivam Bhasin and Sikhar Patranabis and Debdeep Mukhopadhyay and Sylvain Guilley}, title = {What Lies Ahead: Extending {TVLA} Testing Methodology Towards Success Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1152}, year = {2016}, url = {http://eprint.iacr.org/2016/1152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyBPMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/BhasinDGH15, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Wei He}, title = {Exploiting {FPGA} Block Memories for Protected Cryptographic Implementations}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {8}, number = {3}, pages = {16:1--16:16}, year = {2015}, url = {https://doi.org/10.1145/2629552}, doi = {10.1145/2629552}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/BhasinDGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BruneauGHMR15, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Less is More - Dimensionality Reduction from a Theoretical Perspective}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {22--41}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_2}, doi = {10.1007/978-3-662-48324-4\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BruneauGHMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BruneauGNT15, author = {Nicolas Bruneau and Sylvain Guilley and Zakaria Najm and Yannick Teglia}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Multi-variate High-Order Attacks of Shuffled Tables Recomputation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {475--494}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_24}, doi = {10.1007/978-3-662-48324-4\_24}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BruneauGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NgoEBDGNRR15, author = {Xuan Thuy Ngo and Ingrid Exurville and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Jean{-}Baptiste Rigaud and Bruno Robisson}, editor = {Wolfgang Nebel and David Atienza}, title = {Hardware trojan detection by delay and electromagnetic measurements}, booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March 9-13, 2015}, pages = {782--787}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2755931}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/NgoEBDGNRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/NgoNBRDG15, author = {Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and Debapriya Basu Roy and Jean{-}Luc Danger and Sylvain Guilley}, title = {Integrated Sensor: {A} Backdoor for Hardware Trojan Insertions?}, booktitle = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira, Portugal, August 26-28, 2015}, pages = {415--422}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSD.2015.119}, doi = {10.1109/DSD.2015.119}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/NgoNBRDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/CarletDDGNNPT15, author = {Claude Carlet and Abderrahman Daif and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Xuan Thuy Ngo and Thibault Porteboeuf and C{\'{e}}dric Tavernier}, title = {Optimized linear complementary codes implementation for hardware trojan prevention}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim, Norway, August 24-26, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECCTD.2015.7300075}, doi = {10.1109/ECCTD.2015.7300075}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/CarletDDGNNPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/NgoDGNE15, author = {Xuan Thuy Ngo and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Olivier Emery}, title = {Hardware property checker for run-time Hardware Trojan detection}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim, Norway, August 24-26, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECCTD.2015.7300085}, doi = {10.1109/ECCTD.2015.7300085}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/NgoDGNE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/NgoBDGN15, author = {Xuan Thuy Ngo and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {82--87}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140242}, doi = {10.1109/HST.2015.7140242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/NgoBDGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/RoyBGDM15, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger and Debdeep Mukhopadhyay}, title = {From theory to practice of private circuit: {A} cautionary note}, booktitle = {33rd {IEEE} International Conference on Computer Design, {ICCD} 2015, New York City, NY, USA, October 18-21, 2015}, pages = {296--303}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICCD.2015.7357117}, doi = {10.1109/ICCD.2015.7357117}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/RoyBGDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GuilleyHR15, author = {Sylvain Guilley and Annelie Heuser and Olivier Rioul}, editor = {Alex Biryukov and Vipul Goyal}, title = {A Key to Success - Success Exponents for Side-Channel Distinguishers}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9462}, pages = {270--290}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26617-6\_15}, doi = {10.1007/978-3-319-26617-6\_15}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GuilleyHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/DeTranoGGKK15, author = {Alexander DeTrano and Sylvain Guilley and Xiaofei Guo and Naghmeh Karimi and Ramesh Karri}, editor = {Ruby B. Lee and Weidong Shi and Jakub Szefer}, title = {Exploiting small leakages in masks to turn a second-order attack into a first-order attack}, booktitle = {Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015}, pages = {7:1--7:5}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768566.2768573}, doi = {10.1145/2768566.2768573}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/DeTranoGGKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/RakotomalalaNND15, author = {Henitsoa Rakotomalala and Xuan Thuy Ngo and Zakaria Najm and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Michael H{\"{u}}bner and Maya B. Gokhale and Ren{\'{e}} Cumplido}, title = {Private circuits {II} versus fault injection attacks}, booktitle = {International Conference on ReConFigurable Computing and FPGAs, ReConFig 2015, Riviera Maya, Mexico, December 7-9, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ReConFig.2015.7393338}, doi = {10.1109/RECONFIG.2015.7393338}, timestamp = {Wed, 28 Apr 2021 16:06:54 +0200}, biburl = {https://dblp.org/rec/conf/reconfig/RakotomalalaNND15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/RoyBGDMNN15, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger and Debdeep Mukhopadhyay and Xuan Thuy Ngo and Zakaria Najm}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Reconfigurable {LUT:} {A} Double Edged Sword for Security-Critical Applications}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {248--268}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_15}, doi = {10.1007/978-3-319-24126-5\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/RoyBGDMNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpnc/PicekGCJM15, author = {Stjepan Picek and Sylvain Guilley and Claude Carlet and Domagoj Jakobovic and Julian F. Miller}, editor = {Adrian{-}Horia Dediu and Luis Magdalena and Carlos Mart{\'{\i}}n{-}Vide}, title = {Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight}, booktitle = {Theory and Practice of Natural Computing - Fourth International Conference, {TPNC} 2015, Mieres, Spain, December 15-16, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9477}, pages = {71--82}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26841-5\_6}, doi = {10.1007/978-3-319-26841-5\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpnc/PicekGCJM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RauzyGN15, author = {Pablo Rauzy and Sylvain Guilley and Zakaria Najm}, title = {Formally Proved Security of Assembly Code Against Power Analysis: {A} Case Study on Balanced Logic}, journal = {CoRR}, volume = {abs/1506.05285}, year = {2015}, url = {http://arxiv.org/abs/1506.05285}, eprinttype = {arXiv}, eprint = {1506.05285}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RauzyGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyBGDM15, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger and Debdeep Mukhopadhyay}, title = {Reconfigurable {LUT:} Boon or Bane for Secure Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2015}, url = {http://eprint.iacr.org/2015/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyBGDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauGHR15, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {Masks will Fall Off - Higher-Order Optimal Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2015}, url = {http://eprint.iacr.org/2015/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauGHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletG15, author = {Claude Carlet and Sylvain Guilley}, title = {Complementary Dual Codes for Counter-measures to Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2015}, url = {http://eprint.iacr.org/2015/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueGMN15, author = {Pierre{-}Alain Fouque and Sylvain Guilley and C{\'{e}}dric Murdica and David Naccache}, title = {Safe-Errors on {SPA} Protected implementations with the Atomicity Technique}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2015}, url = {http://eprint.iacr.org/2015/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueGMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DangerGHMN15, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Improving the Big Mac Attack on Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2015}, url = {http://eprint.iacr.org/2015/819}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DangerGHMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauGNT15, author = {Nicolas Bruneau and Sylvain Guilley and Zakaria Najm and Yannick Teglia}, title = {Multi-Variate High-Order Attacks of Shuffled Tables Recomputation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {837}, year = {2015}, url = {http://eprint.iacr.org/2015/837}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RauzyMGN15, author = {Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm}, title = {A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {882}, year = {2015}, url = {http://eprint.iacr.org/2015/882}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RauzyMGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DugardinPNBDGCT15, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean{-}Luc Danger and Sylvain Guilley and Jean{-}Christophe Courr{\`{e}}ge and Carine Therond}, title = {Dismantling real-world {ECC} with Horizontal and Vertical Template Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1001}, year = {2015}, url = {http://eprint.iacr.org/2015/1001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletDGMP14, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi and Emmanuel Prouff}, title = {Achieving side-channel high-order correlation immunity with leakage squeezing}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {2}, pages = {107--121}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0067-1}, doi = {10.1007/S13389-013-0067-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RauzyG14, author = {Pablo Rauzy and Sylvain Guilley}, title = {A formal proof of countermeasures against fault injection attacks on {CRT-RSA}}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {3}, pages = {173--185}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0065-3}, doi = {10.1007/S13389-013-0065-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RauzyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14, author = {Christophe Clavier and Jean{-}Luc Danger and Guillaume Duc and M. Abdelaziz Elaabid and Beno{\^{\i}}t G{\'{e}}rard and Sylvain Guilley and Annelie Heuser and Michael Kasper and Yang Li and Victor Lomn{\'{e}} and Daisuke Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent Sauvage and Werner Schindler and Marc St{\"{o}}ttinger and Nicolas Veyrat{-}Charvillon and Matthieu Walle and Antoine Wurcker}, title = {Practical improvements of side-channel attacks on {AES:} feedback from the 2nd {DPA} contest}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {259--274}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0075-9}, doi = {10.1007/S13389-014-0075-9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CarletDGM14, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, title = {Leakage squeezing: Optimal implementation and security evaluation}, journal = {J. Math. Cryptol.}, volume = {8}, number = {3}, pages = {249--295}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0018}, doi = {10.1515/JMC-2012-0018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/CarletDGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CarletFGKKS14, author = {Claude Carlet and Finley Freibert and Sylvain Guilley and Michael Kiermaier and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Higher-Order {CIS} Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {9}, pages = {5283--5295}, year = {2014}, url = {https://doi.org/10.1109/TIT.2014.2332468}, doi = {10.1109/TIT.2014.2332468}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CarletFGKKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CheeCDGKKSZ14, author = {Yeow Meng Chee and Zouha Cherif and Jean{-}Luc Danger and Sylvain Guilley and Han Mao Kiah and Jon{-}Lark Kim and Patrick Sol{\'{e}} and Xiande Zhang}, title = {Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {11}, pages = {7026--7034}, year = {2014}, url = {https://doi.org/10.1109/TIT.2014.2359207}, doi = {10.1109/TIT.2014.2359207}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CheeCDGKKSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MoradiGH14, author = {Amir Moradi and Sylvain Guilley and Annelie Heuser}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Detecting Hidden Leakages}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {324--342}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_20}, doi = {10.1007/978-3-319-07536-5\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MoradiGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DangerGPPT14, author = {Jean{-}Luc Danger and Sylvain Guilley and Thibault Porteboeuf and Florian Praden and Micha{\"{e}}l Timbert}, editor = {Mila Dalla Preda and Jeffrey Todd McDonald}, title = {{HCODE:} Hardware-Enhanced Real-Time {CFI}}, booktitle = {Proceedings of the 4th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC 2014, New Orleans, LA, USA, December 9, 2014}, pages = {6:1--6:11}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2689702.2689708}, doi = {10.1145/2689702.2689708}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DangerGPPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/HajraRBBSGM14, author = {Suvadeep Hajra and Chester Rebeiro and Shivam Bhasin and Gaurav Bajaj and Sahil Sharma and Sylvain Guilley and Debdeep Mukhopadhyay}, editor = {David Pointcheval and Damien Vergnaud}, title = {{DRECON:} {DPA} Resistant Encryption by Construction}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {420--439}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_25}, doi = {10.1007/978-3-319-06734-6\_25}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/HajraRBBSGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BruneauGHR14, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Masks Will Fall Off - Higher-Order Optimal Distinguishers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {344--365}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_19}, doi = {10.1007/978-3-662-45608-8\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BruneauGHR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/NgoGBDN14, author = {Xuan Thuy Ngo and Sylvain Guilley and Shivam Bhasin and Jean{-}Luc Danger and Zakaria Najm}, editor = {Ting Yu and Shengqi Yang}, title = {Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses}, booktitle = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS} '14, New Delhi, India, October 17, 2014}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2668322.2668329}, doi = {10.1145/2668322.2668329}, timestamp = {Tue, 06 Nov 2018 11:07:42 +0100}, biburl = {https://dblp.org/rec/conf/cases/NgoGBDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HeuserRG14, author = {Annelie Heuser and Olivier Rioul and Sylvain Guilley}, editor = {Lejla Batina and Matthew Robshaw}, title = {Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {55--74}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_4}, doi = {10.1007/978-3-662-44709-3\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/HeuserRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/HeuserRG14, author = {Annelie Heuser and Olivier Rioul and Sylvain Guilley}, editor = {Emmanuel Prouff}, title = {A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel Analysis vs. Differential Cryptanalysis}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {9--28}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_2}, doi = {10.1007/978-3-319-10175-0\_2}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HeuserRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/SchaubSHCJTHGR14, author = {Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul}, editor = {Javier L{\'{o}}pez and Indrajit Ray and Bruno Crispo}, title = {Attacking Suggest Boxes in Web Applications Over {HTTPS} Using Side-Channel Stochastic Algorithms}, booktitle = {Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8924}, pages = {116--130}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17127-2\_8}, doi = {10.1007/978-3-319-17127-2\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/SchaubSHCJTHGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/RauzyG14, author = {Pablo Rauzy and Sylvain Guilley}, editor = {Assia Tria and Dooho Choi}, title = {Countermeasures against High-Order Fault-Injection Attacks on {CRT-RSA}}, booktitle = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2014, Busan, South Korea, September 23, 2014}, pages = {68--82}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FDTC.2014.17}, doi = {10.1109/FDTC.2014.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/RauzyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/DangerDGS14, author = {Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Youssef Souissi}, editor = {Jens Knoop and Valentina Salapura and Israel Koren and Gerardo Pelosi}, title = {High-order timing attacks}, booktitle = {Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014}, pages = {7--12}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556315.2556316}, doi = {10.1145/2556315.2556316}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/DangerDGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CioranescoDGGMNN14, author = {Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Tarik Graba and Sylvain Guilley and Yves Mathieu and David Naccache and Xuan Thuy Ngo}, title = {Cryptographically secure shields}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {25--31}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855563}, doi = {10.1109/HST.2014.6855563}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CioranescoDGGMNN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcta/CarletG14, author = {Claude Carlet and Sylvain Guilley}, editor = {Raquel Pinto and Paula Rocha Malonek and Paolo Vettori}, title = {Complementary Dual Codes for Counter-Measures to Side-Channel Attacks}, booktitle = {Coding Theory and Applications, 4th International Castle Meeting, {ICMCTA} 2014, Palmela Castle, Portugal, September 15-18, 2014}, series = {{CIM} Series in Mathematical Sciences}, volume = {3}, pages = {97--105}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17296-5\_9}, doi = {10.1007/978-3-319-17296-5\_9}, timestamp = {Wed, 23 Aug 2017 10:30:53 +0200}, biburl = {https://dblp.org/rec/conf/icmcta/CarletG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhasinDGN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel leakage and trace compression using normalized inter-class variance}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {7:1--7:9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611772}, doi = {10.1145/2611765.2611772}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/RauzyG14, author = {Pablo Rauzy and Sylvain Guilley}, editor = {Suresh Jagannathan and Peter Sewell}, title = {Formal Analysis of {CRT-RSA} Vigilant's Countermeasure Against the BellCoRe Attack: {A} Pledge for Formal Methods in the Field of Implementation Security}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {2:1--2:10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2556466}, doi = {10.1145/2556464.2556466}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/RauzyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/DangerGP14, author = {Jean{-}Luc Danger and Sylvain Guilley and Florian Praden}, editor = {Suresh Jagannathan and Peter Sewell}, title = {Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {5:1--5:11}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2556469}, doi = {10.1145/2556464.2556469}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/DangerGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BruneauDGHT14, author = {Nicolas Bruneau and Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia}, editor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont}, title = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {183--200}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_13}, doi = {10.1007/978-3-319-12060-7\_13}, timestamp = {Mon, 15 Jun 2020 17:10:47 +0200}, biburl = {https://dblp.org/rec/conf/space/BruneauDGHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BhasinBDGN14, author = {Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, editor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont}, title = {Analysis and Improvements of the {DPA} Contest v4 Implementation}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {201--218}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_14}, doi = {10.1007/978-3-319-12060-7\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/BhasinBDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BringerCCGM14, author = {Julien Bringer and Claude Carlet and Herv{\'{e}} Chabanne and Sylvain Guilley and Houssem Maghrebi}, editor = {David Naccache and Damien Sauveron}, title = {Orthogonal Direct Sum Masking - {A} Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {40--56}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_4}, doi = {10.1007/978-3-662-43826-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BringerCCGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14, author = {Yuto Nakano and Youssef Souissi and Robert Nguyen and Laurent Sauvage and Jean{-}Luc Danger and Sylvain Guilley and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {David Naccache and Damien Sauveron}, title = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {76--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_6}, doi = {10.1007/978-3-662-43826-8\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CheeCDGKKSZ14, author = {Yeow Meng Chee and Zouha Cherif and Jean{-}Luc Danger and Sylvain Guilley and Han Mao Kiah and Jon{-}Lark Kim and Patrick Sol{\'{e}} and Xiande Zhang}, title = {Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions}, journal = {CoRR}, volume = {abs/1401.3928}, year = {2014}, url = {http://arxiv.org/abs/1401.3928}, eprinttype = {arXiv}, eprint = {1401.3928}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CheeCDGKKSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RauzyG14, author = {Pablo Rauzy and Sylvain Guilley}, title = {A Formal Proof of Countermeasures against Fault Injection Attacks on {CRT-RSA}}, journal = {CoRR}, volume = {abs/1401.8170}, year = {2014}, url = {http://arxiv.org/abs/1401.8170}, eprinttype = {arXiv}, eprint = {1401.8170}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RauzyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RauzyG14a, author = {Pablo Rauzy and Sylvain Guilley}, title = {Formal Analysis of {CRT-RSA} Vigilant's Countermeasure Against the BellCoRe Attack: {A} Pledge for Formal Methods in the Field of Implementation Security}, journal = {CoRR}, volume = {abs/1401.8172}, year = {2014}, url = {http://arxiv.org/abs/1401.8172}, eprinttype = {arXiv}, eprint = {1401.8172}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RauzyG14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CarletFGKKS14, author = {Claude Carlet and Finley Freibert and Sylvain Guilley and Michael Kiermaier and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Higher-order {CIS} codes}, journal = {CoRR}, volume = {abs/1406.4547}, year = {2014}, url = {http://arxiv.org/abs/1406.4547}, eprinttype = {arXiv}, eprint = {1406.4547}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CarletFGKKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RauzyG14b, author = {Pablo Rauzy and Sylvain Guilley}, title = {Countermeasures Against High-Order Fault-Injection Attacks on {CRT-RSA}}, journal = {CoRR}, volume = {abs/1412.0600}, year = {2014}, url = {http://arxiv.org/abs/1412.0600}, eprinttype = {arXiv}, eprint = {1412.0600}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RauzyG14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuserGR14, author = {Annelie Heuser and Sylvain Guilley and Olivier Rioul}, title = {A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2014}, url = {http://eprint.iacr.org/2014/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuserGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuserRG14, author = {Annelie Heuser and Olivier Rioul and Sylvain Guilley}, title = {Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2014}, url = {http://eprint.iacr.org/2014/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuserRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RauzyG14, author = {Pablo Rauzy and Sylvain Guilley}, title = {Countermeasures Against High-Order Fault-Injection Attacks on {CRT-RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2014}, url = {http://eprint.iacr.org/2014/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RauzyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCCGM14a, author = {Julien Bringer and Claude Carlet and Herv{\'{e}} Chabanne and Sylvain Guilley and Houssem Maghrebi}, title = {Orthogonal Direct Sum Masking: {A} Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2014}, url = {http://eprint.iacr.org/2014/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCCGM14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinDGNS14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage}, title = {Hardware Trojan Horses in Cryptographic {IP} Cores}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {750}, year = {2014}, url = {http://eprint.iacr.org/2014/750}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinDGNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauDGHT14, author = {Nicolas Bruneau and Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia}, title = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {935}, year = {2014}, url = {http://eprint.iacr.org/2014/935}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauDGHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchaubSHCJTHGR14, author = {Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul}, title = {Attacking Suggest Boxes in Web Applications Over {HTTPS} Using Side-Channel Stochastic Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2014}, url = {http://eprint.iacr.org/2014/959}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchaubSHCJTHGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinDGN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1020}, year = {2014}, url = {http://eprint.iacr.org/2014/1020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BriaisDG13, author = {S{\'{e}}bastien Briais and Jean{-}Luc Danger and Sylvain Guilley}, title = {A formal study of two physical countermeasures against side channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {3}, pages = {169--180}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0054-6}, doi = {10.1007/S13389-013-0054-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BriaisDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BhasinGHD13, author = {Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Jean{-}Luc Danger}, title = {From cryptography to hardware: analyzing and protecting embedded Xilinx {BRAM} for cryptographic applications}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {213--225}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0048-4}, doi = {10.1007/S13389-013-0048-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BhasinGHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {241--265}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0062-6}, doi = {10.1007/S13389-013-0062-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BelgarricBBDDGHNR13, author = {Pierre Belgarric and Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Annelie Heuser and Zakaria Najm and Olivier Rioul}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Time-Frequency Analysis for Second-Order Attacks}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {108--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_8}, doi = {10.1007/978-3-319-08302-5\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BelgarricBBDDGHNR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/BhasinDGN13, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {A low-entropy first-degree secure provable masking scheme for resource-constrained devices}, booktitle = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013, Montreal, Quebec, Canada, September 29 - October 4, 2013}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2527317.2527324}, doi = {10.1145/2527317.2527324}, timestamp = {Tue, 06 Nov 2018 11:07:42 +0100}, biburl = {https://dblp.org/rec/conf/cases/BhasinDGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/BhasinDGNS13, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage}, editor = {Wieland Fischer and J{\"{o}}rn{-}Marc Schmidt}, title = {Hardware Trojan Horses in Cryptographic {IP} Cores}, booktitle = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013}, pages = {15--29}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FDTC.2013.15}, doi = {10.1109/FDTC.2013.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BhasinDGNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BouderGRT13, author = {H{\'{e}}l{\`{e}}ne Le Bouder and Sylvain Guilley and Bruno Robisson and Assia Tria}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Fault Injection to Reverse Engineer DES-Like Cryptosystems}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {105--121}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_7}, doi = {10.1007/978-3-319-05302-8\_7}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/BouderGRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/GuilleyMNSW13, author = {Sylvain Guilley and Damien Marion and Zakaria Najm and Youssef Souissi and Antoine Wurcker}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Software Camouflage}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {122--139}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_8}, doi = {10.1007/978-3-319-05302-8\_8}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/GuilleyMNSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CarletG13, author = {Claude Carlet and Sylvain Guilley}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel indistinguishability}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {9}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487735}, doi = {10.1145/2487726.2487735}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/CarletG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CherifDGKS13, author = {Zouha Cherif and Jean{-}Luc Danger and Sylvain Guilley and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Multiply constant weight codes}, booktitle = {Proceedings of the 2013 {IEEE} International Symposium on Information Theory, Istanbul, Turkey, July 7-12, 2013}, pages = {306--310}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISIT.2013.6620237}, doi = {10.1109/ISIT.2013.6620237}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/CherifDGKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Dynamic countermeasure against the Zero Power Analysis}, booktitle = {{IEEE} International Symposium on Signal Processing and Information Technology, Athens, Greece, December 12-15, 2013}, pages = {140--147}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISSPIT.2013.6781869}, doi = {10.1109/ISSPIT.2013.6781869}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recosoc/BhasinHGD13, author = {Shivam Bhasin and Wei He and Sylvain Guilley and Jean{-}Luc Danger}, title = {Exploiting {FPGA} block memories for protected cryptographic implementations}, booktitle = {2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Darmstadt, Germany, July 10-12, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ReCoSoC.2013.6581529}, doi = {10.1109/RECOSOC.2013.6581529}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/recosoc/BhasinHGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/space/2013, editor = {Benedikt Gierlichs and Sylvain Guilley and Debdeep Mukhopadhyay}, title = {Security, Privacy, and Applied Cryptography Engineering - Third International Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8204}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41224-0}, doi = {10.1007/978-3-642-41224-0}, isbn = {978-3-642-41223-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinCG13, author = {Shivam Bhasin and Claude Carlet and Sylvain Guilley}, title = {Theory of masking with codewords in hardware: low-weight \emph{d}th-order correlation-immune Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2013}, url = {http://eprint.iacr.org/2013/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RauzyG13, author = {Pablo Rauzy and Sylvain Guilley}, title = {A Formal Proof of Countermeasures against Fault Injection Attacks on {CRT-RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2013}, url = {http://eprint.iacr.org/2013/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RauzyG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RauzyGN13, author = {Pablo Rauzy and Sylvain Guilley and Zakaria Najm}, title = {Formally Proved Security of Assembly Code Against Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2013}, url = {http://eprint.iacr.org/2013/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RauzyGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinDGN13, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {{NICV:} Normalized Inter-Class Variance for Detection of Side-Channel Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {717}, year = {2013}, url = {http://eprint.iacr.org/2013/717}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinDGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Dynamic Countermeasure Against the Zero Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {764}, year = {2013}, url = {http://eprint.iacr.org/2013/764}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RauzyG13a, author = {Pablo Rauzy and Sylvain Guilley}, title = {Formal Analysis of {CRT-RSA} Vigilant's Countermeasure Against the BellCoRe Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {810}, year = {2013}, url = {http://eprint.iacr.org/2013/810}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RauzyG13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiGH13, author = {Amir Moradi and Sylvain Guilley and Annelie Heuser}, title = {Detecting Hidden Leakages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {842}, year = {2013}, url = {http://eprint.iacr.org/2013/842}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Guilley12, author = {Sylvain Guilley}, title = {Protection des Acc{\'{e}}l{\'{e}}rateurs Mat{\'{e}}riels de Cryptographie Sym{\'{e}}trique. (Protection of Symmetric Cryptography Hardware Accelerators)}, year = {2012}, url = {https://tel.archives-ouvertes.fr/tel-00815544}, timestamp = {Sat, 30 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Guilley12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijrc/SauvageGFDM12, author = {Laurent Sauvage and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Yves Mathieu}, title = {Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography}, journal = {Int. J. Reconfigurable Comput.}, volume = {2012}, pages = {360242:1--360242:9}, year = {2012}, url = {https://doi.org/10.1155/2012/360242}, doi = {10.1155/2012/360242}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijrc/SauvageGFDM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ElaabidG12, author = {M. Abdelaziz Elaabid and Sylvain Guilley}, title = {Portability of templates}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {63--74}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0030-6}, doi = {10.1007/S13389-012-0030-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ElaabidG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/MaghrebiCGD12, author = {Houssem Maghrebi and Claude Carlet and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Optimal First-Order Masking with Linear and Non-linear Bijections}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {360--377}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_22}, doi = {10.1007/978-3-642-31410-0\_22}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/MaghrebiCGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DangerGHMN12, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, editor = {Stefan Mangard}, title = {Low-Cost Countermeasure against {RPA}}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {106--122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_8}, doi = {10.1007/978-3-642-37288-9\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DangerGHMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BriaisCCDGJMNP12, author = {S{\'{e}}bastien Briais and St{\'{e}}phane Caron and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and Jacques{-}Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {3D Hardware Canaries}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {1--22}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_1}, doi = {10.1007/978-3-642-33027-8\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BriaisCCDGJMNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MurdicaGDHN12, author = {C{\'{e}}dric Murdica and Sylvain Guilley and Jean{-}Luc Danger and Philippe Hoogvorst and David Naccache}, editor = {Werner Schindler and Sorin A. Huss}, title = {Same Values Power Analysis Using Special Points on Elliptic Curves}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {183--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_14}, doi = {10.1007/978-3-642-29912-4\_14}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MurdicaGDHN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MaghrebiPGD12, author = {Houssem Maghrebi and Emmanuel Prouff and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Orr Dunkelman}, title = {A First-Order Leak-Free Masking Countermeasure}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {156--170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_10}, doi = {10.1007/978-3-642-27954-6\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MaghrebiPGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SouissiBGND12, author = {Youssef Souissi and Shivam Bhasin and Sylvain Guilley and Maxime Nassar and Jean{-}Luc Danger}, editor = {Orr Dunkelman}, title = {Towards Different Flavors of Combined Side Channel Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {245--259}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_16}, doi = {10.1007/978-3-642-27954-6\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SouissiBGND12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NassarSGD12, author = {Maxime Nassar and Youssef Souissi and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Wolfgang Rosenstiel and Lothar Thiele}, title = {{RSM:} {A} small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs}, booktitle = {2012 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012}, pages = {1173--1178}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/DATE.2012.6176671}, doi = {10.1109/DATE.2012.6176671}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/NassarSGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/CherifDGB12, author = {Zouha Cherif and Jean{-}Luc Danger and Sylvain Guilley and Lilian Bossuet}, title = {An Easy-to-Design {PUF} Based on a Single Oscillator: The Loop {PUF}}, booktitle = {15th Euromicro Conference on Digital System Design, {DSD} 2012, Cesme, Izmir, Turkey, September 5-8, 2012}, pages = {156--162}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSD.2012.22}, doi = {10.1109/DSD.2012.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/CherifDGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/BriaisCDGNP12, author = {S{\'{e}}bastien Briais and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and David Naccache and Thibault Porteboeuf}, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {Random Active Shield}, booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, pages = {103--113}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FDTC.2012.11}, doi = {10.1109/FDTC.2012.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BriaisCDGNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MaghrebiGPD12, author = {Houssem Maghrebi and Sylvain Guilley and Emmanuel Prouff and Jean{-}Luc Danger}, title = {Register leakage masking using Gray code}, booktitle = {2012 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012}, pages = {37--42}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HST.2012.6224316}, doi = {10.1109/HST.2012.6224316}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MaghrebiGPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaghrebiRGD12, author = {Houssem Maghrebi and Olivier Rioul and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Comparison between Side-Channel Analysis Distinguishers}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {331--340}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_30}, doi = {10.1007/978-3-642-34129-8\_30}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaghrebiRGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icistm/GuilleyDNN12, author = {Sylvain Guilley and Jean{-}Luc Danger and Robert Nguyen and Philippe Nguyen}, editor = {Sumeet Dua and Aryya Gangopadhyay and Parimala Thulasiraman and Umberto Straccia and Michael A. Shepherd and Benno Stein}, title = {System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion}, booktitle = {Information Systems, Technology and Management - 6th International Conference, {ICISTM} 2012, Grenoble, France, March 28-30, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {285}, pages = {433--438}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29166-1\_41}, doi = {10.1007/978-3-642-29166-1\_41}, timestamp = {Wed, 30 Oct 2019 15:50:13 +0100}, biburl = {https://dblp.org/rec/conf/icistm/GuilleyDNN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/CarletDGM12, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Leakage Squeezing of Order Two}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {120--139}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_8}, doi = {10.1007/978-3-642-34931-7\_8}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/CarletDGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/BhasinGD12, author = {Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger}, title = {From Cryptography to Hardware: Analyzing Embedded Xilinx {BRAM} for Cryptographic Applications}, booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MICROW.2012.11}, doi = {10.1109/MICROW.2012.11}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/BhasinGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/DebandeSEGD12, author = {Nicolas Debande and Youssef Souissi and M. Abdelaziz Elaabid and Sylvain Guilley and Jean{-}Luc Danger}, title = {Wavelet transform based pre-processing for side channel analysis}, booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012}, pages = {32--38}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MICROW.2012.15}, doi = {10.1109/MICROW.2012.15}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/DebandeSEGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SouissiDMGMD12, author = {Youssef Souissi and Nicolas Debande and Sami Mekki and Sylvain Guilley and Ali Maalaoui and Jean{-}Luc Danger}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {169--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_15}, doi = {10.1007/978-3-642-30955-7\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SouissiDMGMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/GuilleyD12, author = {Sylvain Guilley and Jean{-}Luc Danger}, editor = {Marc Joye and Michael Tunstall}, title = {Global Faults on Cryptographic Circuits}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {295--311}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_17}, doi = {10.1007/978-3-642-29656-7\_17}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/GuilleyD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiPGD12, author = {Houssem Maghrebi and Emmanuel Prouff and Sylvain Guilley and Jean{-}Luc Danger}, title = {A First-Order Leak-Free Masking Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2012}, url = {http://eprint.iacr.org/2012/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiPGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiCGD12, author = {Houssem Maghrebi and Claude Carlet and Sylvain Guilley and Jean{-}Luc Danger}, title = {Optimal First-Order Masking with Linear and Non-Linear Bijections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2012}, url = {http://eprint.iacr.org/2012/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiCGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BriaisCCDGJMNP12, author = {S{\'{e}}bastien Briais and St{\'{e}}phane Caron and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and Jacques{-}Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf}, title = {3D Hardware Canaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2012}, url = {http://eprint.iacr.org/2012/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BriaisCCDGJMNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BriaisGD12, author = {S{\'{e}}bastien Briais and Sylvain Guilley and Jean{-}Luc Danger}, title = {A formal study of two physical countermeasures against side channel attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2012}, url = {http://eprint.iacr.org/2012/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BriaisGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGM12, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, title = {Leakage Squeezing of Order Two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2012}, url = {http://eprint.iacr.org/2012/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SelmaneBGD11, author = {Nidhal Selmane and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger}, title = {Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks}, journal = {{IET} Inf. Secur.}, volume = {5}, number = {4}, pages = {181--190}, year = {2011}, url = {https://doi.org/10.1049/iet-ifs.2010.0238}, doi = {10.1049/IET-IFS.2010.0238}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SelmaneBGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasip/SouissiDGBN11, author = {Youssef Souissi and Jean{-}Luc Danger and Sylvain Guilley and Shivam Bhasin and Maxime Nassar}, editor = {Jari Nurmi and Tapani Ahonen}, title = {Embedded systems security: An evaluation methodology against Side Channel Attacks}, booktitle = {2011 Conference on Design and Architectures for Signal and Image Processing, {DASIP} 2011, Tampere, Finland, November 2-4, 2011}, pages = {230--237}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/DASIP.2011.6136885}, doi = {10.1109/DASIP.2011.6136885}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dasip/SouissiDGBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/MeynardRFGHD11, author = {Olivier Meynard and Denis R{\'{e}}al and Florent Flament and Sylvain Guilley and Naofumi Homma and Jean{-}Luc Danger}, title = {Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques}, booktitle = {Design, Automation and Test in Europe, {DATE} 2011, Grenoble, France, March 14-18, 2011}, pages = {1004--1009}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5763163/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/MeynardRFGHD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MaghrebiGD11, author = {Houssem Maghrebi and Sylvain Guilley and Jean{-}Luc Danger}, title = {Formal security evaluation of hardware Boolean masking against second-order attacks}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {40--46}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5954993}, doi = {10.1109/HST.2011.5954993}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MaghrebiGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GuilleySDSR11, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Nidhal Selmane and Denis R{\'{e}}al}, title = {Performance evaluation of protocols resilient to physical attacks}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {51--56}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5954995}, doi = {10.1109/HST.2011.5954995}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GuilleySDSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NassarGD11, author = {Maxime Nassar and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {22--39}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_4}, doi = {10.1007/978-3-642-25578-6\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NassarGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosechicomnet/NassarSGD11, author = {Maxime Nassar and Youssef Souissi and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Marc Joye and Debdeep Mukhopadhyay and Michael Tunstall}, title = {"Rank Correction": {A} New Side-Channel Approach for Secret Key Recovery}, booktitle = {Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7011}, pages = {128--143}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24586-2\_12}, doi = {10.1007/978-3-642-24586-2\_12}, timestamp = {Fri, 27 Mar 2020 08:56:51 +0100}, biburl = {https://dblp.org/rec/conf/infosechicomnet/NassarSGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/BhasinGSGD11, author = {Shivam Bhasin and Sylvain Guilley and Youssef Souissi and Tarik Graba and Jean{-}Luc Danger}, editor = {Peter M. Athanas and J{\"{u}}rgen Becker and Ren{\'{e}} Cumplido}, title = {Efficient Dual-Rail Implementations in {FPGA} Using Block RAMs}, booktitle = {2011 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2011, Cancun, Mexico, November 30 - December 2, 2011}, pages = {261--267}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ReConFig.2011.32}, doi = {10.1109/RECONFIG.2011.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/BhasinGSGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/DebandeSNGLD11, author = {Nicolas Debande and Youssef Souissi and Maxime Nassar and Sylvain Guilley and Thanh{-}Ha Le and Jean{-}Luc Danger}, title = {"Re-synchronization by moments": An efficient solution to align Side-Channel traces}, booktitle = {2011 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WIFS.2011.6123143}, doi = {10.1109/WIFS.2011.6123143}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/DebandeSNGLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GuilleyKLD11, author = {Sylvain Guilley and Karim Khalfallah and Victor Lomn{\'{e}} and Jean{-}Luc Danger}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Formal Framework for the Evaluation of Waveform Resynchronization Algorithms}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {100--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_7}, doi = {10.1007/978-3-642-21040-2\_7}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/GuilleyKLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MaghrebiGD11, author = {Houssem Maghrebi and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Leakage Squeezing Countermeasure against High-Order Attacks}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {208--223}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_14}, doi = {10.1007/978-3-642-21040-2\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MaghrebiGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PedroSG11, author = {Manuel San Pedro and Mate Soos and Sylvain Guilley}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {{FIRE:} Fault Injection for Reverse Engineering}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {280--293}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_20}, doi = {10.1007/978-3-642-21040-2\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PedroSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2011, editor = {Luca Breveglieri and Sylvain Guilley and Israel Koren and David Naccache and Junko Takahashi}, title = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2011, Tokyo, Japan, September 29, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6075045/proceeding}, isbn = {978-1-4577-1463-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-1360, author = {Sumanta Chaudhuri and Sylvain Guilley and Philippe Hoogvorst and Jean{-}Luc Danger and Taha Beyrouthy and Alin Razafindraibe and Laurent Fesquet and Marc Renaudin}, title = {A Secure Asynchronous {FPGA} Architecture, Experimental Results and Some Debug Feedback}, journal = {CoRR}, volume = {abs/1103.1360}, year = {2011}, url = {http://arxiv.org/abs/1103.1360}, eprinttype = {arXiv}, eprint = {1103.1360}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-1360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-1824, author = {Sumanta Chaudhuri and Sylvain Guilley}, title = {Side-Channel Oscilloscope}, journal = {CoRR}, volume = {abs/1103.1824}, year = {2011}, url = {http://arxiv.org/abs/1103.1824}, eprinttype = {arXiv}, eprint = {1103.1824}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-1824.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghebiGCD11, author = {Houssem Maghrebi and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger}, title = {Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2011}, url = {http://eprint.iacr.org/2011/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghebiGCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NassarGD11, author = {Maxime Nassar and Sylvain Guilley and Jean{-}Luc Danger}, title = {Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2011}, url = {http://eprint.iacr.org/2011/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NassarGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijrc/SauvageNGFDM10, author = {Laurent Sauvage and Maxime Nassar and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Yves Mathieu}, title = {Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics}, journal = {Int. J. Reconfigurable Comput.}, volume = {2010}, pages = {375245:1--375245:12}, year = {2010}, url = {https://doi.org/10.1155/2010/375245}, doi = {10.1155/2010/375245}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijrc/SauvageNGFDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/GuilleySFVHP10, author = {Sylvain Guilley and Laurent Sauvage and Florent Flament and Vinh{-}Nga Vong and Philippe Hoogvorst and Renaud Pacalet}, title = {Evaluation of Power Constant Dual-Rail Logics Countermeasures against {DPA} with Design Time Security Metrics}, journal = {{IEEE} Trans. Computers}, volume = {59}, number = {9}, pages = {1250--1263}, year = {2010}, url = {https://doi.org/10.1109/TC.2010.104}, doi = {10.1109/TC.2010.104}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/GuilleySFVHP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ElaabidG10, author = {M. Abdelaziz Elaabid and Sylvain Guilley}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {243--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_15}, doi = {10.1007/978-3-642-12678-9\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ElaabidG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/BhasinGFSD10, author = {Shivam Bhasin and Sylvain Guilley and Florent Flament and Nidhal Selmane and Jean{-}Luc Danger}, title = {Countering early evaluation: an approach towards robust dual-rail precharge logic}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873554}, doi = {10.1145/1873548.1873554}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/BhasinGFSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MeynardRGFDV10, author = {Olivier Meynard and Denis R{\'{e}}al and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Characterization of the Electromagnetic Side Channel in Frequency Domain}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {471--486}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_33}, doi = {10.1007/978-3-642-21518-6\_33}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MeynardRGFDV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BhasinGSD10, author = {Shivam Bhasin and Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger}, editor = {Josef Pieprzyk}, title = {Unrolling Cryptographic Circuits: {A} Simple Countermeasure Against Side-Channel Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {195--207}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_14}, doi = {10.1007/978-3-642-11925-5\_14}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BhasinGSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NassarBDDG10, author = {Maxime Nassar and Shivam Bhasin and Jean{-}Luc Danger and Guillaume Duc and Sylvain Guilley}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {{BCDL:} {A} high speed balanced {DPL} for {FPGA} with global precharge and no early evaluation}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {849--854}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456932}, doi = {10.1109/DATE.2010.5456932}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/NassarBDDG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/MeynardGDS10, author = {Olivier Meynard and Sylvain Guilley and Jean{-}Luc Danger and Laurent Sauvage}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {Far Correlation-based {EMA} with a precharacterized leakage model}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {977--980}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456906}, doi = {10.1109/DATE.2010.5456906}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/MeynardGDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/GuilleySDS10, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Nidhal Selmane}, editor = {Luca Breveglieri and Marc Joye and Israel Koren and David Naccache and Ingrid Verbauwhede}, title = {Fault Injection Resilience}, booktitle = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2010, Santa Barbara, California, USA, 21 August 2010}, pages = {51--65}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FDTC.2010.15}, doi = {10.1109/FDTC.2010.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/GuilleySDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MaghrebiGDF10, author = {Houssem Maghrebi and Sylvain Guilley and Jean{-}Luc Danger and Florent Flament}, editor = {Jim Plusquellic and Ken Mai}, title = {Entropy-based Power Attack}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513124}, doi = {10.1109/HST.2010.5513124}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MaghrebiGDF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/SouissiGDMD10, author = {Youssef Souissi and Sylvain Guilley and Jean{-}Luc Danger and Sami Mekki and Guillaume Duc}, title = {Improvement of power analysis attacks using Kalman filter}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2010, 14-19 March 2010, Sheraton Dallas Hotel, Dallas, Texas, {USA}}, pages = {1778--1781}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICASSP.2010.5495428}, doi = {10.1109/ICASSP.2010.5495428}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/SouissiGDMD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SouissiNGDF10, author = {Youssef Souissi and Maxime Nassar and Sylvain Guilley and Jean{-}Luc Danger and Florent Flament}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {First Principal Components Analysis: {A} New Side Channel Distinguisher}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {407--419}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_27}, doi = {10.1007/978-3-642-24209-0\_27}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SouissiNGDF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/GuilleySMRV10, author = {Sylvain Guilley and Laurent Sauvage and Julien Micolod and Denis R{\'{e}}al and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {Defeating Any Secret Cryptography with {SCARE} Attacks}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {273--293}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_17}, doi = {10.1007/978-3-642-14712-8\_17}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/GuilleySMRV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/SauvageGFDM10, author = {Laurent Sauvage and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Yves Mathieu}, editor = {Viktor K. Prasanna and J{\"{u}}rgen Becker and Ren{\'{e}} Cumplido}, title = {Cross-Correlation Cartography}, booktitle = {ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings}, pages = {268--273}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ReConFig.2010.75}, doi = {10.1109/RECONFIG.2010.75}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/SauvageGFDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/CherifFDBGC10, author = {Zouha Cherif and Florent Flament and Jean{-}Luc Danger and Shivam Bhasin and Sylvain Guilley and Herv{\'{e}} Chabanne}, editor = {Viktor K. Prasanna and J{\"{u}}rgen Becker and Ren{\'{e}} Cumplido}, title = {Evaluation of White-Box and Grey-Box Noekeon Implementations in {FPGA}}, booktitle = {ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings}, pages = {310--315}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ReConFig.2010.36}, doi = {10.1109/RECONFIG.2010.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/CherifFDBGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ElaabidMGD10, author = {M. Abdelaziz Elaabid and Olivier Meynard and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Yongwha Chung and Moti Yung}, title = {Combined Side-Channel Attacks}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {175--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_13}, doi = {10.1007/978-3-642-17955-6\_13}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElaabidG10, author = {M. Abdelaziz Elaabid and Sylvain Guilley}, title = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2010}, url = {http://eprint.iacr.org/2010/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElaabidG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mj/DangerGH09, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst}, title = {High speed true random number generator based on open loop structures in FPGAs}, journal = {Microelectron. J.}, volume = {40}, number = {11}, pages = {1650--1656}, year = {2009}, url = {https://doi.org/10.1016/j.mejo.2009.02.004}, doi = {10.1016/J.MEJO.2009.02.004}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mj/DangerGH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/SauvageGM09, author = {Laurent Sauvage and Sylvain Guilley and Yves Mathieu}, title = {Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {2}, number = {1}, pages = {4:1--4:24}, year = {2009}, url = {https://doi.org/10.1145/1502781.1502785}, doi = {10.1145/1502781.1502785}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/SauvageGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KafiGMN09, author = {Mohaned Kafi and Sylvain Guilley and Sandra Marcello and David Naccache}, title = {Deconvolving Protected Signals}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {687--694}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.197}, doi = {10.1109/ARES.2009.197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KafiGMN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/SauvageGDMN09, author = {Laurent Sauvage and Sylvain Guilley and Jean{-}Luc Danger and Yves Mathieu and Maxime Nassar}, editor = {Luca Benini and Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller}, title = {Successful attack on an FPGA-based {WDDL} {DES} cryptoprocessor without place and route constraints}, booktitle = {Design, Automation and Test in Europe, {DATE} 2009, Nice, France, April 20-24, 2009}, pages = {640--645}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/DATE.2009.5090745}, doi = {10.1109/DATE.2009.5090745}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/SauvageGDMN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/SelmaneBGGD09, author = {Nidhal Selmane and Shivam Bhasin and Sylvain Guilley and Tarik Graba and Jean{-}Luc Danger}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {{WDDL} is Protected against Setup Time Violation Attacks}, booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, pages = {73--83}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FDTC.2009.40}, doi = {10.1109/FDTC.2009.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/SelmaneBGGD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BhasinDGS09, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Nidhal Selmane}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Security Evaluation of Different {AES} Implementations Against Practical Setup Time Violation Attacks in FPGAs}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings}, pages = {15--21}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HST.2009.5225057}, doi = {10.1109/HST.2009.5225057}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BhasinDGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/GuilleyCSDBF09, author = {Sylvain Guilley and Sumanta Chaudhuri and Laurent Sauvage and Jean{-}Luc Danger and Taha Beyrouthy and Laurent Fesquet}, title = {Updates on the potential of clock-less logics to strengthen cryptographic circuits against side-channel attacks}, booktitle = {16th {IEEE} International Conference on Electronics, Circuits, and Systems, {ICECS} 2009, Yasmine Hammamet, Tunisia, 13-19 December, 2009}, pages = {351--354}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICECS.2009.5411008}, doi = {10.1109/ICECS.2009.5411008}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/GuilleyCSDBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/BhasinDFGGMNSS09, author = {Shivam Bhasin and Jean{-}Luc Danger and Florent Flament and Tarik Graba and Sylvain Guilley and Yves Mathieu and Maxime Nassar and Laurent Sauvage and Nidhal Selmane}, editor = {Viktor K. Prasanna and Lionel Torres and Ren{\'{e}} Cumplido}, title = {Combined {SCA} and {DFA} Countermeasures Integrable in a {FPGA} Design Flow}, booktitle = {ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings}, pages = {213--218}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ReConFig.2009.50}, doi = {10.1109/RECONFIG.2009.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/BhasinDFGGMNSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/SauvageNGFDM09, author = {Laurent Sauvage and Maxime Nassar and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Yves Mathieu}, editor = {Viktor K. Prasanna and Lionel Torres and Ren{\'{e}} Cumplido}, title = {{DPL} on Stratix {II} {FPGA:} What to Expect?}, booktitle = {ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ReConFig.2009.58}, doi = {10.1109/RECONFIG.2009.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/SauvageNGFDM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/GuilleySHPBC08, author = {Sylvain Guilley and Laurent Sauvage and Philippe Hoogvorst and Renaud Pacalet and Guido Marco Bertoni and Sumanta Chaudhuri}, title = {Security Evaluation of {WDDL} and SecLib Countermeasures against Power Attacks}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {11}, pages = {1482--1497}, year = {2008}, url = {https://doi.org/10.1109/TC.2008.109}, doi = {10.1109/TC.2008.109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/GuilleySHPBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/ChaudhuriGHDBRFR08, author = {Sumanta Chaudhuri and Sylvain Guilley and Philippe Hoogvorst and Jean{-}Luc Danger and Taha Beyrouthy and Alin Razafindraibe and Laurent Fesquet and Marc Renaudin}, editor = {Roger F. Woods and Katherine Compton and Christos{-}Savvas Bouganis and Pedro C. Diniz}, title = {Physical Design of {FPGA} Interconnect to Prevent Information Leakage}, booktitle = {Reconfigurable Computing: Architectures, Tools and Applications, 4th International Workshop, {ARC} 2008, London, UK, March 26-28, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4943}, pages = {87--98}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78610-8\_11}, doi = {10.1007/978-3-540-78610-8\_11}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/ChaudhuriGHDBRFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/ChaudhuriGFHD08, author = {Sumanta Chaudhuri and Sylvain Guilley and Florent Flament and Philippe Hoogvorst and Jean{-}Luc Danger}, editor = {Limor Fix}, title = {An 8x8 run-time reconfigurable {FPGA} embedded in a SoC}, booktitle = {Proceedings of the 45th Design Automation Conference, {DAC} 2008, Anaheim, CA, USA, June 8-13, 2008}, pages = {120--125}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1391469.1391500}, doi = {10.1145/1391469.1391500}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/ChaudhuriGFHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/SelmaneGD08, author = {Nidhal Selmane and Sylvain Guilley and Jean{-}Luc Danger}, title = {Practical Setup Time Violation Attacks on {AES}}, booktitle = {Seventh European Dependable Computing Conference, {EDCC-7} 2008, Kaunas, Lithuania, 7-9 May 2008}, pages = {91--96}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EDCC-7.2008.11}, doi = {10.1109/EDCC-7.2008.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/SelmaneGD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/GuilleySDSP08, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Nidhal Selmane and Renaud Pacalet}, editor = {Luca Breveglieri and Shay Gueron and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {Silicon-level Solutions to Counteract Passive and Active Attacks}, booktitle = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FDTC.2008.18}, doi = {10.1109/FDTC.2008.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/GuilleySDSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/ChaudhuriDHG08, author = {Sumanta Chaudhuri and Jean{-}Luc Danger and Philippe Hoogvorst and Sylvain Guilley}, editor = {Mike Hutton and Paul Chow}, title = {Efficient tiling patterns for reconfigurable gate arrays}, booktitle = {Proceedings of the {ACM/SIGDA} 16th International Symposium on Field Programmable Gate Arrays, {FPGA} 2008, Monterey, California, USA, February 24-26, 2008}, pages = {257}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1344671.1344709}, doi = {10.1145/1344671.1344709}, timestamp = {Tue, 06 Nov 2018 16:58:23 +0100}, biburl = {https://dblp.org/rec/conf/fpga/ChaudhuriDHG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/GuilleySDH08, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Philippe Hoogvorst}, title = {Area optimization of cryptographic co-processors implemented in dual-rail with precharge positive logic}, booktitle = {{FPL} 2008, International Conference on Field Programmable Logic and Applications, Heidelberg, Germany, 8-10 September 2008}, pages = {161--166}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/FPL.2008.4629925}, doi = {10.1109/FPL.2008.4629925}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/GuilleySDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GuilleyCDSHNGV08, author = {Sylvain Guilley and Sumanta Chaudhuri and Jean{-}Luc Danger and Laurent Sauvage and Philippe Hoogvorst and Maxime Nassar and Tarik Graba and Vinh{-}Nga Vong}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Place-and-Route Impact on the Security of {DPL} Designs in FPGAs}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {26--32}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559042}, doi = {10.1109/HST.2008.4559042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GuilleyCDSHNGV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/KhelilHGDS08, author = {Farouk Khelil and Mohamed Hamdi and Sylvain Guilley and Jean{-}Luc Danger and Nidhal Selmane}, editor = {Akshai Aggarwal and Mohamad Badra and Fabio Massacci}, title = {Fault Analysis Attack on an {FPGA} {AES} Implementation}, booktitle = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NTMS.2008.ECP.45}, doi = {10.1109/NTMS.2008.ECP.45}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/KhelilHGDS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/slip/ChaudhuriGHD08, author = {Sumanta Chaudhuri and Sylvain Guilley and Philippe Hoogvorst and Jean{-}Luc Danger}, editor = {Ion I. Mandoiu and Andrew A. Kennings}, title = {Efficient tiling patterns for reconfigurable gate arrays}, booktitle = {The Tenth International Workshop on System-Level Interconnect Prediction {(SLIP} 2008), Newcastle, UK, April 5-8, 2008, Proceedings}, pages = {11--18}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1353610.1353613}, doi = {10.1145/1353610.1353613}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/slip/ChaudhuriGHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/GuilleySDGM08, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Tarik Graba and Yves Mathieu}, title = {Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs}, booktitle = {Second International Conference on Secure System Integration and Reliability Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan}, pages = {16--23}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SSIRI.2008.31}, doi = {10.1109/SSIRI.2008.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/GuilleySDGM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0809-3942, author = {Philippe Hoogvorst and Sylvain Guilley and Sumanta Chaudhuri and Jean{-}Luc Danger and Taha Beyrouthy and Laurent Fesquet}, title = {A Reconfigurable Programmable Logic Block for a Multi-Style Asynchronous {FPGA} resistant to Side-Channel Attacks}, journal = {CoRR}, volume = {abs/0809.3942}, year = {2008}, url = {http://arxiv.org/abs/0809.3942}, eprinttype = {arXiv}, eprint = {0809.3942}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0809-3942.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/GuilleyFHPM07, author = {Sylvain Guilley and Florent Flament and Philippe Hoogvorst and Renaud Pacalet and Yves Mathieu}, title = {Secured {CAD} Back-End Flow for Power-Analysis-Resistant Cryptoprocessors}, journal = {{IEEE} Des. Test Comput.}, volume = {24}, number = {6}, pages = {546--555}, year = {2007}, url = {https://doi.org/10.1109/MDT.2007.202}, doi = {10.1109/MDT.2007.202}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/GuilleyFHPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/GuilleyHP07, author = {Sylvain Guilley and Philippe Hoogvorst and Renaud Pacalet}, title = {A fast pipelined multi-mode {DES} architecture operating in {IP} representation}, journal = {Integr.}, volume = {40}, number = {4}, pages = {479--489}, year = {2007}, url = {https://doi.org/10.1016/j.vlsi.2006.06.004}, doi = {10.1016/J.VLSI.2006.06.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/GuilleyHP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/ChaudhuriDG07, author = {Sumanta Chaudhuri and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Koen Bertels and Walid A. Najjar and Arjan J. van Genderen and Stamatis Vassiliadis}, title = {Efficient Modeling and Floorplanning of Embedded-FPGA Fabric}, booktitle = {{FPL} 2007, International Conference on Field Programmable Logic and Applications, Amsterdam, The Netherlands, 27-29 August 2007}, pages = {665--669}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/FPL.2007.4380741}, doi = {10.1109/FPL.2007.4380741}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/ChaudhuriDG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/BeyrouthyRFRCGDH07, author = {Taha Beyrouthy and Alin Razafindraibe and Laurent Fesquet and Marc Renaudin and Sumanta Chaudhuri and Sylvain Guilley and Jean{-}Luc Danger and Philippe Hoogvorst}, editor = {Hideharu Amano and Andy Ye and Takeshi Ikenaga}, title = {A Novel Asynchronous e-FPGA Architecture for Security Applications}, booktitle = {2007 International Conference on Field-Programmable Technology, {ICFPT} 2007, Kitakyushu, Japan, December 12-14, 2007}, pages = {369--372}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/FPT.2007.4439288}, doi = {10.1109/FPT.2007.4439288}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fpt/BeyrouthyRFRCGDH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recosoc/HoogvorstGCRBF07, author = {Philippe Hoogvorst and Sylvain Guilley and Sumanta Chaudhuri and Alin Razafindraibe and Taha Beyrouthy and Laurent Fesquet}, editor = {Gilles Sassatelli and Manfred Glesner and Christophe Bobda and Pascal Benoit}, title = {A Reconfigurable Cell for a Multi-Style Asynchronous {FPGA}}, booktitle = {Proceedings of the 3rd International Workshop on Reconfigurable Communication-centric Systems-on-Chip, ReCoSoC 2007, Montpellier, France, June 2007}, pages = {15--22}, publisher = {Univ. Montpellier {II}}, year = {2007}, timestamp = {Fri, 03 Oct 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/recosoc/HoogvorstGCRBF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rivf/XuSDGBGM07, author = {Qing Xu and M. B. C. Silva and Jean{-}Luc Danger and Sylvain Guilley and Patrick Bellot and Philippe Gallion and Francisco Mendieta}, title = {Towards Quantum Key Distribution System using Homodyne Detection with Differential Time-Multiplexed Reference}, booktitle = {2007 {IEEE} International Conference on Research, Innovation and Vision for the Future in Computing {\&} Communication Technologies, {RIVF} 2007, Hanoi, Vietnam, 5-9 March 2007}, pages = {158--165}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/RIVF.2007.369151}, doi = {10.1109/RIVF.2007.369151}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rivf/XuSDGBGM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AabidGH07, author = {M. Abdelaziz Elaabid and Sylvain Guilley and Philippe Hoogvorst}, title = {Template Attacks with a Power Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2007}, url = {http://eprint.iacr.org/2007/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AabidGH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/ChaudhuriDGH06, author = {Sumanta Chaudhuri and Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst}, editor = {Ren{\'{e}} Cumplido{-}Parra and C{\'{e}}sar Torres{-}Huitzil and Andr{\'{e}}s D. Garc{\'{\i}}a}, title = {{FASE:} An Open Run-Time Reconfigurable {FPGA} Architecture for Tamper-Resistant and Secure Embedded Systems}, booktitle = {2006 {IEEE} International Conference on Reconfigurable Computing and FPGA's, ReConFig 2006, San Luis Potosi, Mexico, September 20-22, 2006}, pages = {47--55}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/RECONF.2006.307752}, doi = {10.1109/RECONF.2006.307752}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/ChaudhuriDGH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuilleyHMP05, author = {Sylvain Guilley and Philippe Hoogvorst and Yves Mathieu and Renaud Pacalet}, editor = {Josyula R. Rao and Berk Sunar}, title = {The "Backend Duplication" Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {383--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_28}, doi = {10.1007/11545262\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GuilleyHMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GuilleyH05, author = {Sylvain Guilley and Philippe Hoogvorst}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {589--600}, publisher = {Springer}, year = {2005}, timestamp = {Fri, 19 May 2017 01:25:10 +0200}, biburl = {https://dblp.org/rec/conf/sec/GuilleyH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/GuilleyP04, author = {Sylvain Guilley and Renaud Pacalet}, title = {SoCs security: a war against side-channels}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {59}, number = {7-8}, pages = {998--1009}, year = {2004}, url = {https://doi.org/10.1007/BF03180031}, doi = {10.1007/BF03180031}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/GuilleyP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GuilleyHP04, author = {Sylvain Guilley and Philippe Hoogvorst and Renaud Pacalet}, editor = {Jean{-}Jacques Quisquater and Pierre Paradinas and Yves Deswarte and Anas Abou El Kalam}, title = {Differential Power Analysis Model and Some Results}, booktitle = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {153}, pages = {127--142}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8147-2\_9}, doi = {10.1007/1-4020-8147-2\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/GuilleyHP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/GuilleyHMPP04, author = {Sylvain Guilley and Philippe Hoogvorst and Yves Mathieu and Renaud Pacalet and Jean Provost}, title = {{CMOS} Structures Suitable for Secured Hardware}, booktitle = {2004 Design, Automation and Test in Europe Conference and Exposition {(DATE} 2004), 16-20 February 2004, Paris, France}, pages = {1414--1415}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/DATE.2004.1269113}, doi = {10.1109/DATE.2004.1269113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/GuilleyHMPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.