default search action
Yannick Teglia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Quentin Le Roux, Eric Bourbao, Yannick Teglia, Kassem Kallas:
A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems. IEEE Access 12: 47433-47468 (2024) - [c20]Régis Leveugle, Nathan Hocquette, Charles Labarre, Romain Plumaugat, Loic Tcharoukian, Valentin Martinoli, Yannick Teglia:
Secured Bus as a Countermeasure against Covert Channels: NEORV32 Case Study. LATS 2024: 1-2 - 2022
- [c19]Valentin Martinoli, Yannick Teglia, Abdellah Bouagoun, Régis Leveugle:
Recovering Information on the CVA6 RISC-V CPU with a Baremetal Micro-Architectural Covert Channel. IOLTS 2022: 1-6 - [i6]Valentin Martinoli, Yannick Teglia, Abdellah Bouagoun, Régis Leveugle:
CVA6's Data cache: Structure and Behavior. CoRR abs/2202.03749 (2022) - 2021
- [c18]Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi:
SideLine: How Delay-Lines (May) Leak Secrets from Your SoC. COSADE 2021: 3-30 - [c17]Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi:
FaultLine: Software-Based Fault Injection on Memory Transfers. HOST 2021: 46-55 - 2020
- [i5]Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi:
SideLine: How Delay-Lines (May) Leak Secrets from your SoC. CoRR abs/2009.07773 (2020) - [i4]Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi:
SideLine: How Delay-Lines (May) Leak Secrets from your SoC. IACR Cryptol. ePrint Arch. 2020: 1127 (2020)
2010 – 2019
- 2019
- [c16]Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi, Francis Olivier:
Remote Side-Channel Attacks on Heterogeneous SoC. CARDIS 2019: 109-125 - [c15]Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi:
High-Speed Ring Oscillator based Sensors for Remote Side-Channel Attacks on FPGAs. ReConFig 2019: 1-8 - 2018
- [j4]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multivariate High-Order Attacks of Shuffled Tables Recomputation. J. Cryptol. 31(2): 351-393 (2018) - [e1]Thomas Eisenbarth, Yannick Teglia:
Smart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10728, Springer 2018, ISBN 978-3-319-75207-5 [contents] - 2017
- [j3]Mathieu Carbone, Yannick Teglia, Gilles R. Ducharme, Philippe Maurine:
Mutual information analysis: higher-order statistical moments, efficiency and efficacy. J. Cryptogr. Eng. 7(1): 1-17 (2017) - 2016
- [c14]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-Xavier Standaert, Yannick Teglia:
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. ASIACRYPT (1) 2016: 573-601 - [c13]Lydie Terras, Yannick Teglia, Michel Agoyan, Régis Leveugle:
Taking into account indirect jumps or calls in continuous control-flow checking. IDT 2016: 125-130 - 2015
- [c12]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multi-variate High-Order Attacks of Shuffled Tables Recomputation. CHES 2015: 475-494 - [c11]Mathieu Carbone, Yannick Teglia, Philippe Maurine, Gilles R. Ducharme:
Interest of MIA in frequency domain? CS2@HiPEAC 2015: 35-38 - [i3]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation. IACR Cryptol. ePrint Arch. 2015: 837 (2015) - 2014
- [j2]Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A model of the leakage in the frequency domain and its application to CPA and DPA. J. Cryptogr. Eng. 4(3): 197-212 (2014) - [c10]Mathieu Carbone, Sébastien Tiran, Sébastien Ordas, Michel Agoyan, Yannick Teglia, Gilles R. Ducharme, Philippe Maurine:
On Adaptive Bandwidth Selection for Efficient MIA. COSADE 2014: 82-97 - [c9]Patrick Haddad, Yannick Teglia, Florent Bernard, Viktor Fischer:
On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models. DATE 2014: 1-6 - [c8]Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A frequency leakage model for SCA. HOST 2014: 97-100 - [c7]Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. SPACE 2014: 183-200 - [i2]Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. IACR Cryptol. ePrint Arch. 2014: 935 (2014) - 2013
- [i1]Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A Frequency Leakage Model and its application to CPA and DPA. IACR Cryptol. ePrint Arch. 2013: 278 (2013) - 2011
- [j1]Frédérique Robert-Inacio, Alain Trémeau, Mike Fournigault, Yannick Teglia, Pierre-Yvan Liardet:
Shape analysis for power signal cryptanalysis on secure components. J. Syst. Softw. 84(5): 753-762 (2011) - [c6]Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Information Leakage Discovery Techniques to Enhance Secure Chip Design. WISTP 2011: 128-143 - 2010
- [c5]Fabien Herbaut, Pierre-Yvan Liardet, Nicolas Méloni, Yannick Teglia, Pascal Véron:
Random Euclidean Addition Chain Generation and Its Application to Point Multiplication. INDOCRYPT 2010: 238-261 - [c4]Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Improving first order differential power attacks through digital signal processing. SIN 2010: 124-133
2000 – 2009
- 2006
- [c3]Mike Fournigault, Pierre-Yvan Liardet, Yannick Teglia, Alain Trémeau, Frédérique Robert-Inacio:
Reverse Engineering of Embedded Software Using Syntactic Pattern Recognition. OTM Workshops (1) 2006: 527-536 - [c2]Fida El Haje, Yuri Golubev, Pierre-Yvan Liardet, Yannick Teglia:
On Statistical Testing of Random Numbers Generators. SCN 2006: 271-287 - 2004
- [c1]Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia:
Leak Resistant Arithmetic. CHES 2004: 62-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-06 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint