


default search action
Sylvain Guilley
2020 – today
- 2024
- [j79]Carlos Rubio Garcia
, Simon Rommel
, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley
, Philippe Nguyen, Idelfonso Tafur Monroy
:
Quantum-resistant Transport Layer Security. Comput. Commun. 213: 345-358 (2024) - [j78]Md Toufiq Hasan Anik
, Hasin Ishraq Reefat
, Wei Cheng
, Jean-Luc Danger
, Sylvain Guilley
, Naghmeh Karimi
:
Multi-modal Pre-silicon Evaluation of Hardware Masking Styles. J. Electron. Test. 40(6): 723-740 (2024) - [j77]Wei Cheng
, Yi Liu, Sylvain Guilley
, Olivier Rioul
:
Toward finding best linear codes for side-channel protections (extended version). J. Cryptogr. Eng. 14(1): 131-145 (2024) - [j76]Claude Carlet
, Abderrahman Daif
, Sylvain Guilley
, Cédric Tavernier
:
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost. J. Cryptogr. Eng. 14(2): 223-240 (2024) - [j75]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Be My Guesses: The interplay between side-channel leakage metrics. Microprocess. Microsystems 107: 105045 (2024) - [j74]Wei Cheng
, Jingdian Ming
, Sylvain Guilley
, Jean-Luc Danger
:
Statistical Higher-Order Correlation Attacks Against Code-Based Masking. IEEE Trans. Computers 73(10): 2364-2377 (2024) - [j73]Mohammad Ebrahimabadi
, Suhee Sanjana Mehjabin
, Raphael Viera
, Sylvain Guilley
, Jean-Luc Danger
, Jean-Max Dutertre
, Naghmeh Karimi
:
DELFINES: Detecting Laser Fault Injection Attacks via Digital Sensors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(3): 774-787 (2024) - [j72]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking against SCA and FIA, with cost amortization. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 398-432 (2024) - [j71]Md Toufiq Hasan Anik
, Jean-Luc Danger
, Sylvain Guilley, Naghmeh Karimi
:
On the Resiliency of Protected Masked S-Boxes Against Template Attack in the Presence of Temperature and Aging Misalignments. IEEE Trans. Very Large Scale Integr. Syst. 32(5): 911-924 (2024) - [c205]Meriem Mahar, Maamar Ouladj
, Sylvain Guilley
, Hacène Belbachir
, Farid Mokrane:
Exact Template Attacks with Spectral Computation. AsianHOST 2024: 1-6 - [c204]Ville Yli-Mäyry, Thomas Perianin, Sylvain Guilley:
Automated Search of Instructions Vulnerable to Fault Injection Attacks in Command Authorization Checks of a TPM 2.0 Implementation. AsianHOST 2024: 1-6 - [c203]Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators. COSADE 2024: 177-196 - [c202]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Formal Security Proofs via Doeblin Coefficients: - Optimal Side-Channel Factorization from Noisy Leakage to Random Probing. CRYPTO (6) 2024: 389-426 - [c201]Sofiane Takarabt, Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:
Securing ISW Masking Scheme Against Glitches. DATE 2024: 1-2 - [c200]Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomas Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdenek Martinasek, Shivam Bhasin:
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation. ISVLSI 2024: 307-312 - [c199]Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Attacking Multi-Tenant FPGAs Without Manual Placement and Routing. ISVLSI 2024: 367-372 - [i78]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing. IACR Cryptol. ePrint Arch. 2024: 199 (2024) - [i77]Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomas Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdenek Martinasek, Shivam Bhasin:
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version). IACR Cryptol. ePrint Arch. 2024: 984 (2024) - [i76]Meriem Mahar, Mammar Ouladj, Sylvain Guilley, Hacène Belbachir, Farid Mokrane:
Exact Template Attacks with Spectral Computation. IACR Cryptol. ePrint Arch. 2024: 2056 (2024) - 2023
- [j70]Chong Xiao
, Ming Tang
, Sylvain Guilley:
Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks. J. Syst. Archit. 139: 102877 (2023) - [j69]Ke Xu
, Ming Tang
, Han Wang, Sylvain Guilley
:
Reverse-Engineering and Exploiting the Frontend Bus of Intel Processor. IEEE Trans. Computers 72(2): 360-373 (2023) - [j68]Arthur Beckers
, Sylvain Guilley
, Philippe Maurine
, Colin O'Flynn, Stjepan Picek
:
(Adversarial) Electromagnetic Disturbance in the Industry. IEEE Trans. Computers 72(2): 414-422 (2023) - [c198]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. COSADE 2023: 86-104 - [c197]Arnd Weber, Sylvain Guilley, René Rathfelder, Marc Stöttinger
, Christoph Lüth, Maja Malenko, Torsten Grawunder, Steffen Reith, Armand Puccetti, Jean-Pierre Seifert, Norbert Herfurth, Hagen Sankowski, Gernot Heiser:
Verified Value Chains, Innovation and Competition. CSR 2023: 470-476 - [c196]Md Toufiq Hasan Anik
, Hasin Ishraq Reefat
, Jean-Luc Danger
, Sylvain Guilley
, Naghmeh Karimi
:
Aging-Induced Failure Prognosis via Digital Sensors. ACM Great Lakes Symposium on VLSI 2023: 703-708 - [c195]Sofiane Takarabt, Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:
Security Order of Gate-Level Masking Schemes. HOST 2023: 57-67 - [c194]Javad Bahrami, Jean-Luc Danger, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:
Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks. ICICDT 2023: 10-15 - [c193]Sylvain Guilley:
Challenges in generating true random numbers considering the variety of corners, aging, and attacks. ICICDT 2023: xix - [c192]Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box to Threshold. INDOCRYPT (1) 2023: 48-67 - [c191]Lukas Vlasak
, Antoine Bouvet
, Sylvain Guilley
:
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. INDOCRYPT (1) 2023: 329-349 - [c190]Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. ISIT 2023: 654-659 - [c189]Yi Liu, Julien Béguinot, Wei Cheng, Sylvain Guilley, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations. ITW 2023: 81-86 - [c188]Julien Béguinot
, Wei Cheng
, Jean-Luc Danger
, Sylvain Guilley
, Olivier Rioul
, Ville Yli-Mäyry
:
Reliability of Ring Oscillator PUFs with Reduced Helper Data. IWSEC 2023: 36-56 - [c187]Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Special Session: Security Verification & Testing for SR-Latch TRNGs. VTS 2023: 1-10 - [i75]Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. CoRR abs/2305.06276 (2023) - [i74]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking to protect against both SCA and FIA. IACR Cryptol. ePrint Arch. 2023: 406 (2023) - [i73]Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box To Threshold. IACR Cryptol. ePrint Arch. 2023: 633 (2023) - [i72]Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomas Gerlich, Sylvain Guilley, Naina Gupta, Kai Hu, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdenek Martinasek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa:
BAKSHEESH: Similar Yet Different From GIFT. IACR Cryptol. ePrint Arch. 2023: 750 (2023) - [i71]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost. IACR Cryptol. ePrint Arch. 2023: 1746 (2023) - 2022
- [j67]Trevor Kroeger
, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs. J. Electron. Test. 38(3): 261-277 (2022) - [j66]Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 311-325 (2022) - [j65]Maamar Ouladj
, Sylvain Guilley
, Philippe Guillot, Farid Mokrane:
Spectral approach to process the (multivariate) high-order template attack against any masking scheme. J. Cryptogr. Eng. 12(1): 75-93 (2022) - [j64]Farzad Niknia
, Jean-Luc Danger
, Sylvain Guilley
, Naghmeh Karimi
:
Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(5): 1276-1289 (2022) - [j63]Qianmei Wu
, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu:
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 192-222 (2022) - [j62]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Side-Channel Expectation-Maximization Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 774-799 (2022) - [j61]Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger
:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. IEEE Trans. Inf. Forensics Secur. 17: 1624-1638 (2022) - [j60]Trevor Kroeger
, Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger
, Naghmeh Karimi
:
Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives. IEEE Trans. Very Large Scale Integr. Syst. 30(2): 187-200 (2022) - [c186]Amit Choudhari
, Sylvain Guilley, Khaled Karray:
SpecDefender: Transient Execution Attack Defender using Performance Counters. ASHES@CCS 2022: 15-24 - [c185]Wei Cheng, Olivier Rioul, Yi Liu, Julien Béguinot, Sylvain Guilley:
Side-Channel Information Leakage of Code-Based Masked Implementations. CWIT 2022: 51-56 - [c184]Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Leakage Power Analysis in Different S-Box Masking Protection Schemes. DATE 2022: 1263-1268 - [c183]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel Attacks of Secure Chips. DSD 2022: 496-503 - [c182]Idris Rais-Ali, Antoine Bouvet
, Sylvain Guilley:
Quantifying the Speed-Up Offered by Genetic Algorithms during Fault Injection Cartographies. FDTC 2022: 61-72 - [c181]Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin
, Raphael Viera
, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi:
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors. HOST 2022: 97-100 - [c180]Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. ISIT 2022: 654-659 - [c179]Javad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis. SECRYPT 2022: 661-668 - [c178]Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley:
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature. SECRYPT 2022: 701-706 - [i70]Amit Choudhari, Sylvain Guilley, Khaled Karray
:
CRYScanner: Finding cryptographic libraries misuse. IACR Cryptol. ePrint Arch. 2022: 29 (2022) - [i69]Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. IACR Cryptol. ePrint Arch. 2022: 461 (2022) - [i68]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. IACR Cryptol. ePrint Arch. 2022: 1738 (2022) - 2021
- [b2]Maamar Ouladj
, Sylvain Guilley:
Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach. Springer 2021, ISBN 978-3-030-77221-5, pp. 1-160 - [j59]Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger:
Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$. Cryptogr. Commun. 13(4): 527-542 (2021) - [j58]Md Toufiq Hasan Anik
, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Reducing Aging Impacts in Digital Sensors via Run-Time Calibration. J. Electron. Test. 37(5): 653-673 (2021) - [j57]Wei Cheng
, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting faults in inner product masking scheme. J. Cryptogr. Eng. 11(2): 119-133 (2021) - [j56]Thomas Perianin
, Sébastien Carré, Victor Dyseryn, Adrien Facon, Sylvain Guilley:
End-to-end automated cache-timing attack driven by machine learning. J. Cryptogr. Eng. 11(2): 135-146 (2021) - [j55]Margaux Dugardin, Werner Schindler
, Sylvain Guilley:
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. J. Math. Cryptol. 15(1): 408-433 (2021) - [j54]Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley
, Naghmeh Karimi
:
Detecting Failures and Attacks via Digital Sensors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(7): 1315-1326 (2021) - [j53]Wei Cheng
, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 465-495 (2021) - [j52]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 57-87 (2021) - [j51]Claude Carlet
, Éloi de Chérisey, Sylvain Guilley
, Selçuk Kavut, Deng Tang
:
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios. IEEE Trans. Inf. Forensics Secur. 16: 203-218 (2021) - [j50]Wei Cheng
, Sylvain Guilley
, Claude Carlet
, Sihem Mesnager
, Jean-Luc Danger
:
Optimizing Inner Product Masking Scheme by a Coding Theory Approach. IEEE Trans. Inf. Forensics Secur. 16: 220-235 (2021) - [j49]Yanbin Li
, Zhe Liu
, Sylvain Guilley
, Ming Tang
:
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack. IEEE Trans. Inf. Forensics Secur. 16: 4466-4481 (2021) - [c177]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - [c176]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks. COSADE 2021: 303-321 - [c175]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. DATE 2021: 1000-1005 - [c174]Md Toufiq Hasan Anik, Jean-Luc Danger, Omar Diankha, Mohammad Ebrahimabadi, Christoph Frisch, Sylvain Guilley, Naghmeh Karimi, Michael Pehl, Sofiane Takarabt:
Testing and Reliability Enhancement of Security Primitives. DFT 2021: 1-8 - [c173]Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin:
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. EuroS&P Workshops 2021: 96-102 - [c172]Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray
, Laurent Sauvage, Yves Mathieu:
Formal Evaluation and Construction of Glitch-resistant Masked Functions. HOST 2021: 304-313 - [c171]Sylvain Guilley, Michel Le Rolland, Damien Quenson:
Implementing Secure Applications Thanks to an Integrated Secure Element. ICISSP 2021: 566-571 - [c170]Patrick Solé, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Bent Sequences over Hadamard Codes for Physically Unclonable Functions. ISIT 2021: 801-806 - [c169]Olivier Rioul, Wei Cheng, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. ISIT 2021: 2596-2601 - [c168]Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
On Conditional Alpha-Information and its Application to Side-Channel Analysis. ITW 2021: 1-6 - [c167]Patrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Linear Programming Bounds on the Kissing Number of q-ary Codes. ITW 2021: 1-5 - [i67]Olivier Rioul, Wei Cheng
, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. CoRR abs/2102.02468 (2021) - [i66]Yi Liu, Wei Cheng
, Sylvain Guilley, Olivier Rioul:
On Conditional α-Information and its Application to Side-Channel Analysis. CoRR abs/2105.07167 (2021) - [i65]Wei Cheng
, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. CoRR abs/2105.07436 (2021) - [i64]Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Cryptol. ePrint Arch. 2021: 363 (2021) - [i63]Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane:
Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme. IACR Cryptol. ePrint Arch. 2021: 941 (2021) - [i62]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. IACR Cryptol. ePrint Arch. 2021: 1028 (2021) - [i61]Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley:
Security evaluation against side-channel analysis at compilation time. IACR Cryptol. ePrint Arch. 2021: 1521 (2021) - 2020
- [j48]Alexander Schaub, Olivier Rioul, Jean-Luc Danger, Sylvain Guilley, Joseph Boutros:
Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem. Adv. Math. Commun. 14(3): 491-505 (2020) - [j47]Sylvain Guilley
, Khaled Karray
, Thomas Perianin, Ritu Ranjan Shrivastwa
, Youssef Souissi, Sofiane Takarabt:
Side-Channel Evaluation Methodology on Software. Cryptogr. 4(4): 27 (2020) - [j46]Maamar Ouladj
, Nadia El Mrabet, Sylvain Guilley, Philippe Guillot, Gilles Millérioux:
On the power of template attacks in highly multivariate context. J. Cryptogr. Eng. 10(4): 337-354 (2020) - [j45]Houda Ferradi, Rémi Géraud
, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. J. Math. Cryptol. 14(1): 15-24 (2020) - [j44]Annelie Heuser
, Stjepan Picek
, Sylvain Guilley
, Nele Mentens
:
Lightweight Ciphers and Their Side-Channel Resilience. IEEE Trans. Computers 69(10): 1434-1448 (2020) - [j43]Fan Zhang
, Bolin Yang
, Xiaofei Dong
, Sylvain Guilley
, Zhe Liu
, Wei He
, Fangguo Zhang
, Kui Ren
:
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE. IEEE Trans. Computers 69(11): 1681-1693 (2020) - [c166]Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon:
Feasibility study of a camera-based PUF in a realistic scenario. ARES 2020: 31:1-31:6 - [c165]Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis with Few Encryptions. COSADE 2020: 3-24 - [c164]Maamar Ouladj
, Sylvain Guilley, Emmanuel Prouff:
On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks. COSADE 2020: 147-172 - [c163]Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert, Baptiste Pecatte:
Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks. COSADE 2020: 254-274 - [c162]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. DATE 2020: 454-459 - [c161]Alexander Schaub, Jean-Luc Danger, Olivier Rioul, Sylvain Guilley:
The Big Picture of Delay-PUF Dependability. ECCTD 2020: 1-4 - [c160]Amir Alipour, Vincent Beroulle, Bertrand Cambou, Jean-Luc Danger, Giorgio Di Natale, David Hély, Sylvain Guilley, Naghmeh Karimi:
PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community. ETS 2020: 1-10 - [c159]Md Toufiq Hasan Anik, Rachit Saini, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Failure and Attack Detection by Digital Sensors. ETS 2020: 1-2 - [c158]Md Toufiq Hasan Anik, Mohammad Ebrahimabadi, Hamed Pirsiavash, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability. ICCD 2020: 506-509 - [c157]Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. ICICS 2020: 3-19 - [c156]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. ITC 2020: 1-5 - [c155]Md Toufiq Hasan Anik, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
On the Effect of Aging on Digital Sensors. VLSID 2020: 189-194 - [i60]Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis With Few Encryptions. IACR Cryptol. ePrint Arch. 2020: 671 (2020) - [i59]Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by A Coding Theory Approach. IACR Cryptol. ePrint Arch. 2020: 692 (2020) - [i58]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2020: 876 (2020)
2010 – 2019
- 2019
- [j42]Claude Carlet, Abderrahman Daif
, Sylvain Guilley, Cédric Tavernier:
Polynomial direct sum masking to protect against both SCA and FIA. J. Cryptogr. Eng. 9(3): 303-312 (2019) - [j41]Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley:
Exhaustive single bit fault analysis. A use case against Mbedtls and OpenSSL's protection on ARM and Intel CPU. Microprocess. Microsystems 71 (2019) - [j40]Debapriya Basu Roy
, Shivam Bhasin
, Sylvain Guilley, Annelie Heuser
, Sikhar Patranabis
, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [j39]Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 49-79 (2019) - [c154]Youssef Souissi, Adrien Facon, Sylvain Guilley:
Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level. C2SI 2019: 3-12 - [c153]Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage
, Youssef Souissi, Yves Mathieu:
Cache-Timing Attacks Still Threaten IoT Devices. C2SI 2019: 13-30 - [c152]Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:
Speed-up of SCA Attacks on 32-bit Multiplications. C2SI 2019: 31-39 - [c151]Sébastien Carré, Adrien Facon, Sylvain Guilley, Sofiane Takarabt, Alexander Schaub, Youssef Souissi:
Cache-Timing Attack Detection and Prevention - Application to Crypto Libs and PQC. COSADE 2019: 13-21 - [c150]Etienne Tehrani, Tarik Graba, Abdelmalek Si-Merabet, Sylvain Guilley, Jean-Luc Danger:
Classification of Lightweight Block Ciphers for Specific Processor Accelerated Implementations. ICECS 2019: 747-750 - [c149]Kazuhide Fukushima
, Damien Marion
, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. ICISSP 2019: 67-74 - [c148]Kazuhide Fukushima
, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device. ICISSP (Revised Selected Papers) 2019: 74-92 - [c147]Éloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware. ISIT 2019: 310-315 - [c146]Jean-Luc Danger, Sylvain Guilley, Alexander Schaub:
Two-Metric Helper Data for Highly Robust and Secure Delay PUFs. IWASI 2019: 184-188 - [c145]Sébastien Carré, Victor Dyseryn, Adrien Facon, Sylvain Guilley, Thomas Perianin:
End-to-end automated cache-timing attack driven by Machine Learning. PROOFS 2019: 1-16 - [c144]Wei Cheng
, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection. PROOFS 2019: 17-32 - [p6]Claude Carlet, Sylvain Guilley, Cem Güneri, Sihem Mesnager, Ferruh Özbudak:
Construction of Efficient Codes for High-Order Direct Sum Masking. Security and Privacy in the Internet of Things 2019: 108-128 - [p5]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. Security and Privacy in the Internet of Things 2019: 148-166 - [e6]Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi:
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji. Lecture Notes in Computer Science 11445, Springer 2019, ISBN 978-3-030-16457-7 [contents] - [i57]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Profiling Side-channel Analysis in the Restricted Attacker Framework. IACR Cryptol. ePrint Arch. 2019: 168 (2019) - [i56]Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful. IACR Cryptol. ePrint Arch. 2019: 491 (2019) - [i55]Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:
Speed-up of SCA attacks on 32-bit multiplications. IACR Cryptol. ePrint Arch. 2019: 530 (2019) - [i54]Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger:
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection. IACR Cryptol. ePrint Arch. 2019: 919 (2019) - 2018
- [j38]Eloi de Chérisey
, Sylvain Guilley, Annelie Heuser, Olivier Rioul
:
On the optimality and practicability of mutual information analysis in some scenarios. Cryptogr. Commun. 10(1): 101-121 (2018) - [j37]Claude Carlet
, Sylvain Guilley
:
Statistical properties of side-channel and fault injection attacks using coding theory. Cryptogr. Commun. 10(5): 909-933 (2018) - [j36]Jean-Luc Danger, Youssef El Housni
, Adrien Facon, Cheikh Thiecoumba Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye
, Edoardo Persichetti
, Alexander Schaub:
On the Performance and Security of Multiplication in GF(2N). Cryptogr. 2(3): 25 (2018) - [j35]Naghmeh Karimi
, Jean-Luc Danger, Sylvain Guilley:
Impact of Aging on the Reliability of Delay PUFs. J. Electron. Test. 34(5): 571-586 (2018) - [j34]Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, Debdeep Mukhopadhyay, Zakaria Najm, Xuan Thuy Ngo:
The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. J. Hardw. Syst. Secur. 2(2): 162-178 (2018) - [j33]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multivariate High-Order Attacks of Shuffled Tables Recomputation. J. Cryptol. 31(2): 351-393 (2018) - [c143]Eloi de Chérisey, Sylvain Guilley, Olivier Rioul:
Confused yet Successful: - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR. Inscrypt 2018: 533-553 - [c142]Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley:
OpenSSL Bellcore's Protection Helps Fault Attack. DSD 2018: 500-507 - [c141]Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert:
CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity. DSD 2018: 529-536 - [c140]Alexander Schaub
, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul:
An Improved Analysis of Reliability and Entropy for Delay PUFs. DSD 2018: 553-560 - [c139]Antoine Bouvet
, Nicolas Bruneau, Adrien Facon
, Sylvain Guilley, Damien Marion
:
Give me your binary, I'll tell you if it leaks. DTIS 2018: 1-4 - [c138]Sylvain Guilley, Youssef El Housni
:
Random Numbers Generation: Tests and Attacks. FDTC 2018: 49-54 - [c137]Naghmeh Karimi, Sylvain Guilley, Jean-Luc Danger:
Impact of Aging on Template Attacks. ACM Great Lakes Symposium on VLSI 2018: 455-458 - [c136]Kais Chibani, Adrien Facon, Sylvain Guilley, Youssef Souissi:
Technology-agnostic power optimization for AES block cipher. ICECS 2018: 397-400 - [c135]Naghmeh Karimi, Jean-Luc Danger, Sylvain Guilley:
On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis. IOLTS 2018: 281-286 - [c134]Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Alexander Schaub, Youssef Souissi:
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms. IVSW 2018: 7-12 - [c133]Sofiane Takarabt, Kais Chibani, Adrien Facon, Sylvain Guilley, Yves Mathieu, Laurent Sauvage, Youssef Souissi:
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification. IVSW 2018: 74-79 - [c132]Nicolas Bruneau, Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Soshi Hamaguchi, Yohei Hori, Yousung Kang, Alexander Schaub:
Development of the Unified Security Requirements of PUFs During the Standardization Process. SecITC 2018: 314-330 - [c131]Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Damien Marion, Thomas Perianin:
Binary Data Analysis for Source Code Leakage Assessment. SecITC 2018: 391-409 - [c130]Khaled Karray, Jean-Luc Danger, Sylvain Guilley, Moulay Abdelaziz Elaabid:
Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection. WISTP 2018: 109-128 - [p4]Khaled Karray, Jean-Luc Danger, Sylvain Guilley, M. Abdelaziz Elaabid:
Attack Tree Construction and Its Application to the Connected Vehicle. Cyber-Physical Systems Security 2018: 175-190 - [p3]Khaled Karray, Jean-Luc Danger, Sylvain Guilley, M. Abdelaziz Elaabid:
Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks. Cyber-Physical Systems Security 2018: 219-254 - [p2]Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Axel Legay, Ming Tang:
Physical Security Versus Masking Schemes. Cyber-Physical Systems Security 2018: 269-284 - [i53]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Polynomial direct sum masking to protect against both SCA and FIA. IACR Cryptol. ePrint Arch. 2018: 531 (2018) - [i52]Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. IACR Cryptol. ePrint Arch. 2018: 798 (2018) - 2017
- [j32]Nikita Veshchikov, Sylvain Guilley:
Implementation flaws in the masking scheme of DPA Contest v4. IET Inf. Secur. 11(6): 356-362 (2017) - [j31]Sylvain Guilley:
Editorial about PROOFS 2015. J. Cryptogr. Eng. 7(1): 19-20 (2017) - [j30]Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy
:
Using modular extension to provably protect Edwards curves against fault attacks. J. Cryptogr. Eng. 7(4): 321-330 (2017) - [j29]Nicolas Bruneau, Sylvain Guilley
, Annelie Heuser, Damien Marion
, Olivier Rioul
:
Optimal side-channel attacks for multivariate leakages and multiple models. J. Cryptogr. Eng. 7(4): 331-341 (2017) - [j28]Stjepan Picek, Annelie Heuser
, Sylvain Guilley:
Template attack versus Bayes classifier. J. Cryptogr. Eng. 7(4): 343-351 (2017) - [j27]Xuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Tarik Graba, Yves Mathieu, Zakaria Najm, Shivam Bhasin:
Cryptographically Secure Shield for Security IPs Protection. IEEE Trans. Computers 66(2): 354-360 (2017) - [j26]Nicolas Bruneau, Claude Carlet, Sylvain Guilley
, Annelie Heuser, Emmanuel Prouff, Olivier Rioul
:
Stochastic Collision Attack. IEEE Trans. Inf. Forensics Secur. 12(9): 2090-2104 (2017) - [c129]Sylvain Guilley, Annelie Heuser, Olivier Rioul
:
Codes for Side-Channel Attacks and Protections. C2SI 2017: 35-55 - [c128]Romain Poussier, Qian Guo
, François-Xavier Standaert
, Claude Carlet, Sylvain Guilley:
Connecting and Improving Direct Sum Masking and Inner Product Masking. CARDIS 2017: 123-141 - [c127]Philippe Maurine, Sylvain Guilley:
Impacts of Technology Trends on Physical Attacks? COSADE 2017: 190-206 - [c126]Jean-Luc Danger, Sylvain Guilley, Philippe Nguyen, Robert Nguyen, Youssef Souissi:
Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow. DATE 2017: 1129-1134 - [c125]Naghmeh Karimi, Jean-Luc Danger, Mariem Slimani, Sylvain Guilley:
Impact of the switching activity on the aging of delay-PUFs. ETS 2017: 1-2 - [c124]Nikita Veshchikov, Sylvain Guilley:
Use of Simulators for Side-Channel Analysis. EuroS&P 2017: 51-59 - [c123]Nikita Veshchikov, Sylvain Guilley:
Use of Simulators for Side-Channel Analysis. EuroS&P Workshops 2017: 104-112 - [c122]Stjepan Picek, Annelie Heuser, Alan Jovic
, Simone A. Ludwig, Sylvain Guilley, Domagoj Jakobovic
, Nele Mentens
:
Side-channel analysis and machine learning: A practical perspective. IJCNN 2017: 4095-4102 - [c121]Sylvain Guilley, Annelie Heuser, Ming Tang, Olivier Rioul
:
Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition. SECITC 2017: 12-27 - [e5]Ulrich Kühne, Jean-Luc Danger, Sylvain Guilley:
PROOFS 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017. EPiC Series in Computing 49, EasyChair 2017 [contents] - [e4]Sylvain Guilley:
Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10348, Springer 2017, ISBN 978-3-319-64646-6 [contents] - [e3]Dooho Choi, Sylvain Guilley:
Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10144, 2017, ISBN 978-3-319-56548-4 [contents] - [i51]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? IACR Cryptol. ePrint Arch. 2017: 261 (2017) - [i50]Sylvain Guilley, Liran Lerman:
Bivariate attacks and confusion coefficients. IACR Cryptol. ePrint Arch. 2017: 263 (2017) - [i49]Naghmeh Karimi, Jean-Luc Danger, Florent Lozach, Sylvain Guilley:
Predictive Aging of Reliability of two Delay PUFs. IACR Cryptol. ePrint Arch. 2017: 347 (2017) - [i48]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template Attack vs Bayes Classifier. IACR Cryptol. ePrint Arch. 2017: 531 (2017) - [i47]Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage:
How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace. IACR Cryptol. ePrint Arch. 2017: 1144 (2017) - 2016
- [j25]Claude Carlet, Sylvain Guilley:
Complementary dual codes for counter-measures to side-channel attacks. Adv. Math. Commun. 10(1): 131-150 (2016) - [j24]Stjepan Picek, Claude Carlet, Sylvain Guilley, Julian F. Miller, Domagoj Jakobovic
:
Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography. Evol. Comput. 24(4): 667-694 (2016) - [j23]Pablo Rauzy
, Sylvain Guilley, Zakaria Najm:
Formally proved security of assembly code against power analysis - A case study on balanced logic. J. Cryptogr. Eng. 6(3): 201-216 (2016) - [j22]Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger:
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. J. Cryptogr. Eng. 6(3): 239-247 (2016) - [c120]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul
, François-Xavier Standaert
, Yannick Teglia:
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. ASIACRYPT (1) 2016: 573-601 - [c119]Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Improving the Big Mac Attack on Elliptic Curve Cryptography. The New Codebreakers 2016: 374-386 - [c118]Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden, Michaël Timbert:
Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter. The New Codebreakers 2016: 439-454 - [c117]Pierre-Alain Fouque
, Sylvain Guilley, Cédric Murdica, David Naccache:
Safe-Errors on SPA Protected Implementations with the Atomicity Technique. The New Codebreakers 2016: 479-493 - [c116]Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul
:
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. CHES 2016: 3-22 - [c115]Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley:
Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. COSADE 2016: 88-108 - [c114]Eloi de Chérisey
, Sylvain Guilley, Olivier Rioul
, Darshana Jayasinghe:
Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks. HASP@ISCA 2016: 7:1-7:8 - [c113]Olivier Rioul
, Annelie Heuser, Sylvain Guilley, Jean-Luc Danger:
Inter-class vs. mutual information as side-channel distinguishers. ISIT 2016: 805-809 - [c112]Olivier Rioul
, Patrick Solé, Sylvain Guilley, Jean-Luc Danger:
On the entropy of Physically Unclonable Functions. ISIT 2016: 2928-2932 - [c111]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
:
Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? RFIDSec 2016: 91-104 - [c110]Naghmeh Karimi, Jean-Luc Danger, Florent Lozach, Sylvain Guilley:
Predictive Aging of Reliability of Two Delay PUFs. SPACE 2016: 213-232 - [c109]Kazuhide Fukushima
, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage:
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology. Trustcom/BigDataSE/ISPA 2016: 201-207 - [i46]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion
, Olivier Rioul:
Less is More - Dimensionality Reduction from a Theoretical Perspective. IACR Cryptol. ePrint Arch. 2016: 359 (2016) - [i45]Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul:
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version. IACR Cryptol. ePrint Arch. 2016: 597 (2016) - [i44]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. IACR Cryptol. ePrint Arch. 2016: 772 (2016) - [i43]Sylvain Guilley, Annelie Heuser, Olivier Rioul:
A Key to Success - Success Exponents for Side-Channel Distinguishers. IACR Cryptol. ePrint Arch. 2016: 987 (2016) - [i42]Debapriya Basu Roy, Shivam Bhasin, Sikhar Patranabis, Debdeep Mukhopadhyay, Sylvain Guilley:
What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate. IACR Cryptol. ePrint Arch. 2016: 1152 (2016) - 2015
- [j21]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He:
Exploiting FPGA Block Memories for Protected Cryptographic Implementations. ACM Trans. Reconfigurable Technol. Syst. 8(3): 16:1-16:16 (2015) - [c108]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul
:
Less is More - Dimensionality Reduction from a Theoretical Perspective. CHES 2015: 22-41 - [c107]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multi-variate High-Order Attacks of Shuffled Tables Recomputation. CHES 2015: 475-494 - [c106]Xuan Thuy Ngo, Ingrid Exurville, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Jean-Baptiste Rigaud, Bruno Robisson:
Hardware trojan detection by delay and electromagnetic measurements. DATE 2015: 782-787 - [c105]Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, Sylvain Guilley:
Integrated Sensor: A Backdoor for Hardware Trojan Insertions? DSD 2015: 415-422 - [c104]Claude Carlet, Abderrahman Daif, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Xuan Thuy Ngo, Thibault Porteboeuf, Cédric Tavernier:
Optimized linear complementary codes implementation for hardware trojan prevention. ECCTD 2015: 1-4 - [c103]Xuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Olivier Emery:
Hardware property checker for run-time Hardware Trojan detection. ECCTD 2015: 1-4 - [c102]Xuan Thuy Ngo, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. HOST 2015: 82-87 - [c101]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
From theory to practice of private circuit: A cautionary note. ICCD 2015: 296-303 - [c100]Sylvain Guilley, Annelie Heuser, Olivier Rioul
:
A Key to Success - Success Exponents for Side-Channel Distinguishers. INDOCRYPT 2015: 270-290 - [c99]Alexander DeTrano, Sylvain Guilley, Xiaofei Guo, Naghmeh Karimi, Ramesh Karri
:
Exploiting small leakages in masks to turn a second-order attack into a first-order attack. HASP@ISCA 2015: 7:1-7:5 - [c98]Henitsoa Rakotomalala, Xuan Thuy Ngo, Zakaria Najm, Jean-Luc Danger, Sylvain Guilley:
Private circuits II versus fault injection attacks. ReConFig 2015: 1-9 - [c97]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm:
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. SPACE 2015: 248-268 - [c96]Stjepan Picek, Sylvain Guilley, Claude Carlet, Domagoj Jakobovic
, Julian F. Miller:
Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight. TPNC 2015: 71-82 - [i41]Pablo Rauzy, Sylvain Guilley, Zakaria Najm:
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic. CoRR abs/1506.05285 (2015) - [i40]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
Reconfigurable LUT: Boon or Bane for Secure Applications. IACR Cryptol. ePrint Arch. 2015: 120 (2015) - [i39]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks will Fall Off - Higher-Order Optimal Distinguishers. IACR Cryptol. ePrint Arch. 2015: 452 (2015) - [i38]Claude Carlet, Sylvain Guilley:
Complementary Dual Codes for Counter-measures to Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 603 (2015) - [i37]Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache:
Safe-Errors on SPA Protected implementations with the Atomicity Technique. IACR Cryptol. ePrint Arch. 2015: 794 (2015) - [i36]Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Improving the Big Mac Attack on Elliptic Curve Cryptography. IACR Cryptol. ePrint Arch. 2015: 819 (2015) - [i35]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation. IACR Cryptol. ePrint Arch. 2015: 837 (2015) - [i34]Pablo Rauzy, Martin Moreau, Sylvain Guilley, Zakaria Najm:
A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography. IACR Cryptol. ePrint Arch. 2015: 882 (2015) - [i33]Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrège, Carine Therond:
Dismantling real-world ECC with Horizontal and Vertical Template Attacks. IACR Cryptol. ePrint Arch. 2015: 1001 (2015) - 2014
- [j20]Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi, Emmanuel Prouff:
Achieving side-channel high-order correlation immunity with leakage squeezing. J. Cryptogr. Eng. 4(2): 107-121 (2014) - [j19]Pablo Rauzy
, Sylvain Guilley:
A formal proof of countermeasures against fault injection attacks on CRT-RSA. J. Cryptogr. Eng. 4(3): 173-185 (2014) - [j18]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler
, Marc Stöttinger
, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [j17]Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi:
Leakage squeezing: Optimal implementation and security evaluation. J. Math. Cryptol. 8(3): 249-295 (2014) - [j16]Claude Carlet, Finley Freibert, Sylvain Guilley, Michael Kiermaier, Jon-Lark Kim, Patrick Solé:
Higher-Order CIS Codes. IEEE Trans. Inf. Theory 60(9): 5283-5295 (2014) - [j15]Yeow Meng Chee
, Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, Han Mao Kiah, Jon-Lark Kim, Patrick Solé, Xiande Zhang:
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions. IEEE Trans. Inf. Theory 60(11): 7026-7034 (2014) - [c95]Amir Moradi
, Sylvain Guilley, Annelie Heuser:
Detecting Hidden Leakages. ACNS 2014: 324-342 - [c94]Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden, Michaël Timbert:
HCODE: Hardware-Enhanced Real-Time CFI. PPREW@ACSAC 2014: 6:1-6:11 - [c93]Suvadeep Hajra, Chester Rebeiro
, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay:
DRECON: DPA Resistant Encryption by Construction. AFRICACRYPT 2014: 420-439 - [c92]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks Will Fall Off - Higher-Order Optimal Distinguishers. ASIACRYPT (2) 2014: 344-365 - [c91]Xuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, Zakaria Najm:
Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses. WESS 2014: 7:1-7:10 - [c90]Annelie Heuser, Olivier Rioul, Sylvain Guilley:
Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory. CHES 2014: 55-74 - [c89]Annelie Heuser, Olivier Rioul
, Sylvain Guilley:
A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel Analysis vs. Differential Cryptanalysis. COSADE 2014: 9-28 - [c88]Alexander Schaub
, Emmanuel Schneider, Alexandros Hollender
, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul
:
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms. CRiSIS 2014: 116-130 - [c87]Pablo Rauzy
, Sylvain Guilley:
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA. FDTC 2014: 68-82 - [c86]Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Youssef Souissi:
High-order timing attacks. CS2@HiPEAC 2014: 7-12 - [c85]Jean-Michel Cioranesco, Jean-Luc Danger, Tarik Graba, Sylvain Guilley, Yves Mathieu, David Naccache, Xuan Thuy Ngo:
Cryptographically secure shields. HOST 2014: 25-31 - [c84]Claude Carlet, Sylvain Guilley:
Complementary Dual Codes for Counter-Measures to Side-Channel Attacks. ICMCTA 2014: 97-105 - [c83]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Side-channel leakage and trace compression using normalized inter-class variance. HASP@ISCA 2014: 7:1-7:9 - [c82]Pablo Rauzy
, Sylvain Guilley:
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security. PPREW@POPL 2014: 2:1-2:10 - [c81]Jean-Luc Danger, Sylvain Guilley, Florian Praden:
Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding. PPREW@POPL 2014: 5:1-5:11 - [c80]Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. SPACE 2014: 183-200 - [c79]Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Analysis and Improvements of the DPA Contest v4 Implementation. SPACE 2014: 201-218 - [c78]Julien Bringer, Claude Carlet, Hervé Chabanne
, Sylvain Guilley, Houssem Maghrebi:
Orthogonal Direct Sum Masking - A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks. WISTP 2014: 40-56 - [c77]Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake:
A Pre-processing Composition for Secret Key Recovery on Android Smartphone. WISTP 2014: 76-91 - [i32]Yeow Meng Chee, Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, Han Mao Kiah, Jon-Lark Kim, Patrick Solé, Xiande Zhang:
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions. CoRR abs/1401.3928 (2014) - [i31]Pablo Rauzy, Sylvain Guilley:
A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA. CoRR abs/1401.8170 (2014) - [i30]Pablo Rauzy, Sylvain Guilley:
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security. CoRR abs/1401.8172 (2014) - [i29]Claude Carlet, Finley Freibert, Sylvain Guilley, Michael Kiermaier, Jon-Lark Kim, Patrick Solé:
Higher-order CIS codes. CoRR abs/1406.4547 (2014) - [i28]Pablo Rauzy, Sylvain Guilley:
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA. CoRR abs/1412.0600 (2014) - [i27]Annelie Heuser, Sylvain Guilley, Olivier Rioul:
A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2014: 8 (2014) - [i26]Annelie Heuser, Olivier Rioul, Sylvain Guilley:
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory. IACR Cryptol. ePrint Arch. 2014: 527 (2014) - [i25]Pablo Rauzy, Sylvain Guilley:
Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA. IACR Cryptol. ePrint Arch. 2014: 559 (2014) - [i24]Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi:
Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks. IACR Cryptol. ePrint Arch. 2014: 665 (2014) - [i23]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage:
Hardware Trojan Horses in Cryptographic IP Cores. IACR Cryptol. ePrint Arch. 2014: 750 (2014) - [i22]Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. IACR Cryptol. ePrint Arch. 2014: 935 (2014) - [i21]Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul:
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms. IACR Cryptol. ePrint Arch. 2014: 959 (2014) - [i20]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance. IACR Cryptol. ePrint Arch. 2014: 1020 (2014) - 2013
- [j14]Sébastien Briais, Jean-Luc Danger, Sylvain Guilley:
A formal study of two physical countermeasures against side channel attacks. J. Cryptogr. Eng. 3(3): 169-180 (2013) - [j13]Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Jean-Luc Danger:
From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications. J. Cryptogr. Eng. 3(4): 213-225 (2013) - [j12]Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards. J. Cryptogr. Eng. 3(4): 241-265 (2013) - [c76]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul
:
Time-Frequency Analysis for Second-Order Attacks. CARDIS 2013: 108-122 - [c75]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
A low-entropy first-degree secure provable masking scheme for resource-constrained devices. WESS 2013: 7:1-7:10 - [c74]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage:
Hardware Trojan Horses in Cryptographic IP Cores. FDTC 2013: 15-29 - [c73]Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria:
Fault Injection to Reverse Engineer DES-Like Cryptosystems. FPS 2013: 105-121 - [c72]Sylvain Guilley, Damien Marion, Zakaria Najm, Youssef Souissi, Antoine Wurcker:
Software Camouflage. FPS 2013: 122-139 - [c71]Claude Carlet, Sylvain Guilley:
Side-channel indistinguishability. HASP@ISCA 2013: 9 - [c70]Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, Jon-Lark Kim, Patrick Solé:
Multiply constant weight codes. ISIT 2013: 306-310 - [c69]Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Dynamic countermeasure against the Zero Power Analysis. ISSPIT 2013: 140-147 - [c68]Shivam Bhasin, Wei He, Sylvain Guilley, Jean-Luc Danger:
Exploiting FPGA block memories for protected cryptographic implementations. ReCoSoC 2013: 1-8 - [e2]Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay:
Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings. Lecture Notes in Computer Science 8204, Springer 2013, ISBN 978-3-642-41223-3 [contents] - [i19]Shivam Bhasin, Claude Carlet, Sylvain Guilley:
Theory of masking with codewords in hardware: low-weight dth-order correlation-immune Boolean functions. IACR Cryptol. ePrint Arch. 2013: 303 (2013) - [i18]Pablo Rauzy, Sylvain Guilley:
A Formal Proof of Countermeasures against Fault Injection Attacks on CRT-RSA. IACR Cryptol. ePrint Arch. 2013: 506 (2013) - [i17]Pablo Rauzy, Sylvain Guilley, Zakaria Najm:
Formally Proved Security of Assembly Code Against Leakage. IACR Cryptol. ePrint Arch. 2013: 554 (2013) - [i16]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. IACR Cryptol. ePrint Arch. 2013: 717 (2013) - [i15]Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Dynamic Countermeasure Against the Zero Power Analysis. IACR Cryptol. ePrint Arch. 2013: 764 (2013) - [i14]Pablo Rauzy, Sylvain Guilley:
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack. IACR Cryptol. ePrint Arch. 2013: 810 (2013) - [i13]Amir Moradi, Sylvain Guilley, Annelie Heuser:
Detecting Hidden Leakages. IACR Cryptol. ePrint Arch. 2013: 842 (2013) - 2012
- [b1]Sylvain Guilley:
Protection des Accélérateurs Matériels de Cryptographie Symétrique. (Protection of Symmetric Cryptography Hardware Accelerators). Paris Diderot University, France, 2012 - [j11]Laurent Sauvage, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu:
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography. Int. J. Reconfigurable Comput. 2012: 360242:1-360242:9 (2012) - [j10]M. Abdelaziz Elaabid, Sylvain Guilley:
Portability of templates. J. Cryptogr. Eng. 2(1): 63-74 (2012) - [c67]Houssem Maghrebi, Claude Carlet, Sylvain Guilley, Jean-Luc Danger:
Optimal First-Order Masking with Linear and Non-linear Bijections. AFRICACRYPT 2012: 360-377 - [c66]Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
Low-Cost Countermeasure against RPA. CARDIS 2012: 106-122 - [c65]Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan
, Arthur Milchior, David Naccache, Thibault Porteboeuf:
3D Hardware Canaries. CHES 2012: 1-22 - [c64]Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst, David Naccache:
Same Values Power Analysis Using Special Points on Elliptic Curves. COSADE 2012: 183-198 - [c63]Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger:
A First-Order Leak-Free Masking Countermeasure. CT-RSA 2012: 156-170 - [c62]Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger:
Towards Different Flavors of Combined Side Channel Attacks. CT-RSA 2012: 245-259 - [c61]Maxime Nassar, Youssef Souissi, Sylvain Guilley, Jean-Luc Danger:
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. DATE 2012: 1173-1178 - [c60]Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, Lilian Bossuet:
An Easy-to-Design PUF Based on a Single Oscillator: The Loop PUF. DSD 2012: 156-162 - [c59]Sébastien Briais, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, David Naccache, Thibault Porteboeuf:
Random Active Shield. FDTC 2012: 103-113 - [c58]Houssem Maghrebi, Sylvain Guilley, Emmanuel Prouff, Jean-Luc Danger:
Register leakage masking using Gray code. HOST 2012: 37-42 - [c57]Houssem Maghrebi, Olivier Rioul
, Sylvain Guilley, Jean-Luc Danger:
Comparison between Side-Channel Analysis Distinguishers. ICICS 2012: 331-340 - [c56]Sylvain Guilley, Jean-Luc Danger, Robert Nguyen, Philippe Nguyen:
System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion. ICISTM 2012: 433-438 - [c55]Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi:
Leakage Squeezing of Order Two. INDOCRYPT 2012: 120-139 - [c54]Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger:
From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic Applications. MICRO Workshops 2012: 1-8 - [c53]Nicolas Debande, Youssef Souissi, M. Abdelaziz Elaabid, Sylvain Guilley, Jean-Luc Danger:
Wavelet transform based pre-processing for side channel analysis. MICRO Workshops 2012: 32-38 - [c52]Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui
, Jean-Luc Danger:
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems. WISTP 2012: 169-178 - [p1]Sylvain Guilley, Jean-Luc Danger:
Global Faults on Cryptographic Circuits. Fault Analysis in Cryptography 2012: 295-311 - [i12]Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger:
A First-Order Leak-Free Masking Countermeasure. IACR Cryptol. ePrint Arch. 2012: 28 (2012) - [i11]Houssem Maghrebi, Claude Carlet, Sylvain Guilley, Jean-Luc Danger:
Optimal First-Order Masking with Linear and Non-Linear Bijections. IACR Cryptol. ePrint Arch. 2012: 175 (2012) - [i10]Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Naccache, Thibault Porteboeuf:
3D Hardware Canaries. IACR Cryptol. ePrint Arch. 2012: 324 (2012) - [i9]Sébastien Briais, Sylvain Guilley, Jean-Luc Danger:
A formal study of two physical countermeasures against side channel attacks. IACR Cryptol. ePrint Arch. 2012: 430 (2012) - [i8]Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi:
Leakage Squeezing of Order Two. IACR Cryptol. ePrint Arch. 2012: 567 (2012) - 2011
- [j9]Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger:
Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks. IET Inf. Secur. 5(4): 181-190 (2011) - [c51]Youssef Souissi, Jean-Luc Danger, Sylvain Guilley, Shivam Bhasin, Maxime Nassar:
Embedded systems security: An evaluation methodology against Side Channel Attacks. DASIP 2011: 230-237 - [c50]Olivier Meynard, Denis Réal, Florent Flament, Sylvain Guilley, Naofumi Homma, Jean-Luc Danger:
Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques. DATE 2011: 1004-1009 - [c49]Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger:
Formal security evaluation of hardware Boolean masking against second-order attacks. HOST 2011: 40-46 - [c48]Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Denis Réal:
Performance evaluation of protocols resilient to physical attacks. HOST 2011: 51-56 - [c47]Maxime Nassar, Sylvain Guilley, Jean-Luc Danger:
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks. INDOCRYPT 2011: 22-39 - [c46]Maxime Nassar, Youssef Souissi, Sylvain Guilley, Jean-Luc Danger:
"Rank Correction": A New Side-Channel Approach for Secret Key Recovery. InfoSecHiComNet 2011: 128-143 - [c45]Shivam Bhasin, Sylvain Guilley, Youssef Souissi, Tarik Graba, Jean-Luc Danger:
Efficient Dual-Rail Implementations in FPGA Using Block RAMs. ReConFig 2011: 261-267 - [c44]Nicolas Debande, Youssef Souissi, Maxime Nassar, Sylvain Guilley, Thanh-Ha Le, Jean-Luc Danger:
"Re-synchronization by moments": An efficient solution to align Side-Channel traces. WIFS 2011: 1-6 - [c43]Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger:
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. WISTP 2011: 100-115 - [c42]Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger:
Leakage Squeezing Countermeasure against High-Order Attacks. WISTP 2011: 208-223 - [c41]Manuel San Pedro, Mate Soos, Sylvain Guilley:
FIRE: Fault Injection for Reverse Engineering. WISTP 2011: 280-293 - [e1]Luca Breveglieri, Sylvain Guilley, Israel Koren, David Naccache, Junko Takahashi:
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011, Tokyo, Japan, September 29, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1463-4 [contents] - [i7]Sumanta Chaudhuri, Sylvain Guilley, Philippe Hoogvorst, Jean-Luc Danger, Taha Beyrouthy, Alin Razafindraibe, Laurent Fesquet, Marc Renaudin:
A Secure Asynchronous FPGA Architecture, Experimental Results and Some Debug Feedback. CoRR abs/1103.1360 (2011) - [i6]Sumanta Chaudhuri, Sylvain Guilley:
Side-Channel Oscilloscope. CoRR abs/1103.1824 (2011) - [i5]Houssem Maghrebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger:
Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency. IACR Cryptol. ePrint Arch. 2011: 520 (2011) - [i4]Maxime Nassar, Sylvain Guilley, Jean-Luc Danger:
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2011: 534 (2011) - 2010
- [j8]Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu:
Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics. Int. J. Reconfigurable Comput. 2010: 375245:1-375245:12 (2010) - [j7]Sylvain Guilley, Laurent Sauvage
, Florent Flament, Vinh-Nga Vong, Philippe Hoogvorst, Renaud Pacalet:
Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics. IEEE Trans. Computers 59(9): 1250-1263 (2010) - [c40]M. Abdelaziz Elaabid, Sylvain Guilley:
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. AFRICACRYPT 2010: 243-260 - [c39]Shivam Bhasin, Sylvain Guilley, Florent Flament, Nidhal Selmane, Jean-Luc Danger:
Countering early evaluation: an approach towards robust dual-rail precharge logic. WESS 2010: 6 - [c38]Olivier Meynard, Denis Réal, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Frédéric Valette:
Characterization of the Electromagnetic Side Channel in Frequency Domain. Inscrypt 2010: 471-486 - [c37]Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger:
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks. CT-RSA 2010: 195-207 - [c36]Maxime Nassar, Shivam Bhasin, Jean-Luc Danger, Guillaume Duc, Sylvain Guilley:
BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation. DATE 2010: 849-854 - [c35]Olivier Meynard, Sylvain Guilley, Jean-Luc Danger, Laurent Sauvage:
Far Correlation-based EMA with a precharacterized leakage model. DATE 2010: 977-980 - [c34]Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane:
Fault Injection Resilience. FDTC 2010: 51-65 - [c33]Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament:
Entropy-based Power Attack. HOST 2010: 1-6 - [c32]Youssef Souissi, Sylvain Guilley, Jean-Luc Danger, Sami Mekki, Guillaume Duc:
Improvement of power analysis attacks using Kalman filter. ICASSP 2010: 1778-1781 - [c31]Youssef Souissi, Maxime Nassar, Sylvain Guilley, Jean-Luc Danger, Florent Flament:
First Principal Components Analysis: A New Side Channel Distinguisher. ICISC 2010: 407-419 - [c30]Sylvain Guilley, Laurent Sauvage, Julien Micolod, Denis Réal, Frédéric Valette:
Defeating Any Secret Cryptography with SCARE Attacks. LATINCRYPT 2010: 273-293 - [c29]Laurent Sauvage, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu:
Cross-Correlation Cartography. ReConFig 2010: 268-273 - [c28]Zouha Cherif, Florent Flament, Jean-Luc Danger, Shivam Bhasin, Sylvain Guilley, Hervé Chabanne:
Evaluation of White-Box and Grey-Box Noekeon Implementations in FPGA. ReConFig 2010: 310-315 - [c27]M. Abdelaziz Elaabid, Olivier Meynard, Sylvain Guilley, Jean-Luc Danger:
Combined Side-Channel Attacks. WISA 2010: 175-190 - [i3]M. Abdelaziz Elaabid, Sylvain Guilley:
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. IACR Cryptol. ePrint Arch. 2010: 116 (2010)
2000 – 2009
- 2009
- [j6]Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst:
High speed true random number generator based on open loop structures in FPGAs. Microelectron. J. 40(11): 1650-1656 (2009) - [j5]Laurent Sauvage, Sylvain Guilley, Yves Mathieu:
Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module. ACM Trans. Reconfigurable Technol. Syst. 2(1): 4:1-4:24 (2009) - [c26]Mohaned Kafi, Sylvain Guilley, Sandra Marcello, David Naccache:
Deconvolving Protected Signals. ARES 2009: 687-694 - [c25]Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Yves Mathieu, Maxime Nassar:
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints. DATE 2009: 640-645 - [c24]Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Tarik Graba, Jean-Luc Danger:
WDDL is Protected against Setup Time Violation Attacks. FDTC 2009: 73-83 - [c23]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Nidhal Selmane:
Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs. HOST 2009: 15-21 - [c22]Sylvain Guilley, Sumanta Chaudhuri
, Laurent Sauvage, Jean-Luc Danger, Taha Beyrouthy, Laurent Fesquet:
Updates on the potential of clock-less logics to strengthen cryptographic circuits against side-channel attacks. ICECS 2009: 351-354 - [c21]Shivam Bhasin, Jean-Luc Danger, Florent Flament, Tarik Graba, Sylvain Guilley, Yves Mathieu, Maxime Nassar, Laurent Sauvage, Nidhal Selmane:
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow. ReConFig 2009: 213-218 - [c20]Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu:
DPL on Stratix II FPGA: What to Expect?. ReConFig 2009: 243-248 - 2008
- [j4]Sylvain Guilley, Laurent Sauvage
, Philippe Hoogvorst, Renaud Pacalet, Guido Marco Bertoni
, Sumanta Chaudhuri
:
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks. IEEE Trans. Computers 57(11): 1482-1497 (2008) - [c19]Sumanta Chaudhuri
, Sylvain Guilley, Philippe Hoogvorst, Jean-Luc Danger, Taha Beyrouthy, Alin Razafindraibe, Laurent Fesquet, Marc Renaudin:
Physical Design of FPGA Interconnect to Prevent Information Leakage. ARC 2008: 87-98 - [c18]Sumanta Chaudhuri, Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Jean-Luc Danger:
An 8x8 run-time reconfigurable FPGA embedded in a SoC. DAC 2008: 120-125 - [c17]Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger:
Practical Setup Time Violation Attacks on AES. EDCC 2008: 91-96 - [c16]Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet:
Silicon-level Solutions to Counteract Passive and Active Attacks. FDTC 2008: 3-17 - [c15]Sumanta Chaudhuri, Jean-Luc Danger, Philippe Hoogvorst, Sylvain Guilley:
Efficient tiling patterns for reconfigurable gate arrays. FPGA 2008: 257 - [c14]Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Philippe Hoogvorst:
Area optimization of cryptographic co-processors implemented in dual-rail with precharge positive logic. FPL 2008: 161-166 - [c13]Sylvain Guilley, Sumanta Chaudhuri
, Jean-Luc Danger, Laurent Sauvage, Philippe Hoogvorst, Maxime Nassar, Tarik Graba, Vinh-Nga Vong:
Place-and-Route Impact on the Security of DPL Designs in FPGAs. HOST 2008: 26-32 - [c12]Farouk Khelil, Mohamed Hamdi, Sylvain Guilley, Jean-Luc Danger, Nidhal Selmane:
Fault Analysis Attack on an FPGA AES Implementation. NTMS 2008: 1-5 - [c11]Sumanta Chaudhuri
, Sylvain Guilley, Philippe Hoogvorst, Jean-Luc Danger:
Efficient tiling patterns for reconfigurable gate arrays. SLIP 2008: 11-18 - [c10]Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Tarik Graba, Yves Mathieu:
Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs. SSIRI 2008: 16-23 - [i2]Philippe Hoogvorst, Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Danger, Taha Beyrouthy, Laurent Fesquet:
A Reconfigurable Programmable Logic Block for a Multi-Style Asynchronous FPGA resistant to Side-Channel Attacks. CoRR abs/0809.3942 (2008) - 2007
- [j3]Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu:
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. IEEE Des. Test Comput. 24(6): 546-555 (2007) - [j2]Sylvain Guilley, Philippe Hoogvorst, Renaud Pacalet:
A fast pipelined multi-mode DES architecture operating in IP representation. Integr. 40(4): 479-489 (2007) - [c9]Sumanta Chaudhuri
, Jean-Luc Danger, Sylvain Guilley:
Efficient Modeling and Floorplanning of Embedded-FPGA Fabric. FPL 2007: 665-669 - [c8]Taha Beyrouthy, Alin Razafindraibe, Laurent Fesquet, Marc Renaudin, Sumanta Chaudhuri
, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst:
A Novel Asynchronous e-FPGA Architecture for Security Applications. FPT 2007: 369-372 - [c7]Philippe Hoogvorst, Sylvain Guilley, Sumanta Chaudhuri, Alin Razafindraibe, Taha Beyrouthy, Laurent Fesquet:
A Reconfigurable Cell for a Multi-Style Asynchronous FPGA. ReCoSoC 2007: 15-22 - [c6]Qing Xu, M. B. C. Silva, Jean-Luc Danger, Sylvain Guilley, Patrick Bellot, Philippe Gallion, Francisco Mendieta:
Towards Quantum Key Distribution System using Homodyne Detection with Differential Time-Multiplexed Reference. RIVF 2007: 158-165 - [i1]M. Abdelaziz Elaabid, Sylvain Guilley, Philippe Hoogvorst:
Template Attacks with a Power Model. IACR Cryptol. ePrint Arch. 2007: 443 (2007) - 2006
- [c5]Sumanta Chaudhuri
, Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst:
FASE: An Open Run-Time Reconfigurable FPGA Architecture for Tamper-Resistant and Secure Embedded Systems. ReConFig 2006: 47-55 - 2005
- [c4]Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet:
The "Backend Duplication" Method. CHES 2005: 383-397 - [c3]Sylvain Guilley, Philippe Hoogvorst:
The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations. SEC 2005: 589-600 - 2004
- [j1]Sylvain Guilley, Renaud Pacalet:
SoCs security: a war against side-channels. Ann. des Télécommunications 59(7-8): 998-1009 (2004) - [c2]Sylvain Guilley, Philippe Hoogvorst, Renaud Pacalet:
Differential Power Analysis Model and Some Results. CARDIS 2004: 127-142 - [c1]Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet, Jean Provost:
CMOS Structures Suitable for Secured Hardware. DATE 2004: 1414-1415
Coauthor Index
aka: Moulay Abdelaziz Elaabid

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 20:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
