A new second-order side channel attack based on linear regression
G Dabosville, J Doget, E Prouff - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
… Guillaume Dabosville received the graduate degree from the University of Caen, where
he received the master’s degree in computer science and cryptology in 2001. He has been …
he received the master’s degree in computer science and cryptology in 2001. He has been …
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks
G Dabosville, H Maghrebi, A Lhuillery… - … on Digital System …, 2019 - ieeexplore.ieee.org
Relay attacks are nowadays well known and most designers of secure authentication protocols
are aware of them. At present, the main methods to prevent these attacks are based on …
are aware of them. At present, the main methods to prevent these attacks are based on …
A privacy-preserving NFC mobile pass for transport systems
G Arfaoui, G Dabosville, S Gambs… - EAI Endorsed …, 2014 - inria.hal.science
The emergence of the NFC (Near Field Communication) technology brings new capacities
to the next generation of smartphones, but also new security and privacy challenges. Indeed …
to the next generation of smartphones, but also new security and privacy challenges. Indeed …
Combined attack on CRT-RSA: why public verification must not be public?
This article introduces a new Combined Attack on a CRT-RSA implementation resistant
against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the …
against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the …
[PDF][PDF] A New Second-Order Side Channel Attack Based on Linear Regression–Appendices–
G Dabosville, J Doget, E Prouff - researchgate.net
Since the preliminary works of Kocher et al. in the nineties, studying and enforcing the
resistance of cryptographic implementations against Side Channel Analysis (SCA) is became a …
resistance of cryptographic implementations against Side Channel Analysis (SCA) is became a …
A New Second Order Side Channel Attack Based on Linear Regression
J Doget, G Dabosville, E Prouff - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Embedded implementations of cryptographic primitives need protection against Side Channel
Analysis. Stochastic attacks, introduced by Schindler et al. at CHES 2005, are an example …
Analysis. Stochastic attacks, introduced by Schindler et al. at CHES 2005, are an example …
[PDF][PDF] Risk analysis of the CARDME concept
G Dabosville - researchgate.net
CARDME specifies a generic framework for an Electronic Fee Collection system intended to
be used by the motorway operators to charge their customers. The paper focuses on the …
be used by the motorway operators to charge their customers. The paper focuses on the …
EUROCRYPT 2010
H Gilbert - 2010 - Springer
… We specifically acknowledge the kind efforts of Hervé Chabanne, Guillaume Dabosville,
Jean-Bernard Fischer, Paul Friedel, Marc Joye, François Larbey, Kristin Lauter, Bruno Martin, …
Jean-Bernard Fischer, Paul Friedel, Marc Joye, François Larbey, Kristin Lauter, Bruno Martin, …
On the physical security of cryptographic implementations
M Rivain - 2009 - orbilu.uni.lu
In modern cryptography, an encryption system is usually studied in the so-called black-box
model. In this model, the cryptosystem is seen as an oracle replying to message encryption (…
model. In this model, the cryptosystem is seen as an oracle replying to message encryption (…
[BOOK][B] Cryptographic Hardware and Embedded Systems--CHES 2012: 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings
E Prouff, PR Schaumont - 2012 - books.google.com
… Bucci Parshuram Budhathoki Claude Carlet Pierre-Louis Cayrel Hervé Chabanne Chien-Ning
Chen Ray Cheung Jean-Christophe Courrege Guillaume Dabosville Joan Daemen …
Chen Ray Cheung Jean-Christophe Courrege Guillaume Dabosville Joan Daemen …