Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Cécile Canovas
@inproceedings{DBLP:conf/icfsp/DestouetDFP21, author = {Gabriel Destouet and C{\'{e}}cile Dumas and Anne Frassati and Val{\'{e}}rie Perrier}, title = {Generalized Morse Wavelet Frame Estimation Applied to Side-Channel Analysis}, booktitle = {6th International Conference on Frontiers of Signal Processing, {ICFSP} 2021, Paris, France, September 9-11, 2021}, pages = {52--57}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICFSP53514.2021.9646423}, doi = {10.1109/ICFSP53514.2021.9646423}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfsp/DestouetDFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BenadjilaPSCD20, author = {Ryad Benadjila and Emmanuel Prouff and R{\'{e}}mi Strullu and Eleonora Cagli and C{\'{e}}cile Dumas}, title = {Deep learning for side-channel analysis and introduction to {ASCAD} database}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {163--188}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00220-8}, doi = {10.1007/S13389-019-00220-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BenadjilaPSCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MasureDP20, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {A Comprehensive Study of Deep Learning for Side-Channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {348--375}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.348-375}, doi = {10.13154/TCHES.V2020.I1.348-375}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/MasureDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DestouetDFP20, author = {Gabriel Destouet and C{\'{e}}cile Dumas and Anne Frassati and Val{\'{e}}rie Perrier}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {71--89}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_4}, doi = {10.1007/978-3-030-68773-1\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/DestouetDFP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MasureBCCCDM20, author = {Lo{\"{\i}}c Masure and Nicolas Belleville and Eleonora Cagli and Marie{-}Angela Cornelie and Damien Courouss{\'{e}} and C{\'{e}}cile Dumas and Laurent Maingault}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Deep Learning Side-Channel Analysis on Large-Scale Traces - {A} Case Study on a Polymorphic {AES}}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {440--460}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_22}, doi = {10.1007/978-3-030-58951-6\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MasureBCCCDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DestouetDFP20, author = {Gabriel Destouet and C{\'{e}}cile Dumas and Anne Frassati and Val{\'{e}}rie Perrier}, title = {Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2020}, url = {https://eprint.iacr.org/2020/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DestouetDFP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureBCCCDM20, author = {Lo{\"{\i}}c Masure and Nicolas Belleville and Eleonora Cagli and Marie{-}Angela Cornelie and Damien Courouss{\'{e}} and C{\'{e}}cile Dumas and Laurent Maingault}, title = {Deep Learning Side-Channel Analysis on Large-Scale Traces - {A} Case Study on a Polymorphic {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {881}, year = {2020}, url = {https://eprint.iacr.org/2020/881}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureBCCCDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CarboneCCDDDPV19, author = {Mathieu Carbone and Vincent Conin and Marie{-}Angela Cornelie and Fran{\c{c}}ois Dassance and Guillaume Dufresne and C{\'{e}}cile Dumas and Emmanuel Prouff and Alexandre Venelli}, title = {Deep Learning to Evaluate Secure {RSA} Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {132--161}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.132-161}, doi = {10.13154/TCHES.V2019.I2.132-161}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CarboneCCDDDPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MasureDP19, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, editor = {Ilia Polian and Marc St{\"{o}}ttinger}, title = {Gradient Visualization for General Characterization in Profiling Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, {COSADE} 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11421}, pages = {145--167}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16350-1\_9}, doi = {10.1007/978-3-030-16350-1\_9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/MasureDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarboneCCDDDPV19, author = {Mathieu Carbone and Vincent Conin and Marie{-}Angela Cornelie and Fran{\c{c}}ois Dassance and Guillaume Dufresne and C{\'{e}}cile Dumas and Emmanuel Prouff and Alexandre Venelli}, title = {Deep Learning to Evaluate Secure {RSA} Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2019}, url = {https://eprint.iacr.org/2019/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarboneCCDDDPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureDP19, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {A Comprehensive Study of Deep Learning for Side-Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2019}, url = {https://eprint.iacr.org/2019/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffSBCD18, author = {Emmanuel Prouff and R{\'{e}}mi Strullu and Ryad Benadjila and Eleonora Cagli and C{\'{e}}cile Dumas}, title = {Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to {ASCAD} Database}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2018}, url = {http://eprint.iacr.org/2018/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffSBCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureDP18, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {Gradient Visualization for General Characterization in Profiling Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2018}, url = {https://eprint.iacr.org/2018/1196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CagliDP17, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, editor = {Wieland Fischer and Naofumi Homma}, title = {Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {45--68}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_3}, doi = {10.1007/978-3-319-66787-4\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CagliDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CagliDP17, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures - Profiling Attacks without Pre-Processing -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2017}, url = {http://eprint.iacr.org/2017/740}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CagliDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CagliDP16, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, editor = {Kerstin Lemke{-}Rust and Michael Tunstall}, title = {Kernel Discriminant Analysis for Information Extraction in the Presence of Masking}, booktitle = {Smart Card Research and Advanced Applications - 15th International Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10146}, pages = {1--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54669-8\_1}, doi = {10.1007/978-3-319-54669-8\_1}, timestamp = {Fri, 27 Mar 2020 08:58:07 +0100}, biburl = {https://dblp.org/rec/conf/cardis/CagliDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CagliDP15, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, editor = {Naofumi Homma and Marcel Medwed}, title = {Enhancing Dimensionality Reduction Methods for Side-Channel Attacks}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {15--33}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_2}, doi = {10.1007/978-3-319-31271-2\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/CagliDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DureuilPCDC15, author = {Louis Dureuil and Marie{-}Laure Potet and Philippe de Choudens and C{\'{e}}cile Dumas and Jessy Cl{\'{e}}di{\`{e}}re}, editor = {Naofumi Homma and Marcel Medwed}, title = {From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {107--124}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_7}, doi = {10.1007/978-3-319-31271-2\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DureuilPCDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/LingeDL14, author = {Yanis Linge and C{\'{e}}cile Dumas and Sophie Lambert{-}Lacroix}, editor = {Emmanuel Prouff}, title = {Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {199--213}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_14}, doi = {10.1007/978-3-319-10175-0\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/LingeDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingeDL14, author = {Yanis Linge and C{\'{e}}cile Dumas and Sophie Lambert{-}Lacroix}, title = {Maximal Information Coefficient Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2014}, url = {http://eprint.iacr.org/2014/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LingeDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/SoucarrosCCE13, author = {Mathilde Soucarros and Jessy Cl{\'{e}}di{\`{e}}re and C{\'{e}}cile Canovas{-}Dumas and Philippe Elbaz{-}Vincent}, title = {Fault Analysis and Evaluation of a True Random Number Generator Embedded in a Processor}, journal = {J. Electron. Test.}, volume = {29}, number = {3}, pages = {367--381}, year = {2013}, url = {https://doi.org/10.1007/s10836-013-5356-1}, doi = {10.1007/S10836-013-5356-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/et/SoucarrosCCE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingeDL13, author = {Yanis Linge and C{\'{e}}cile Dumas and Sophie Lambert{-}Lacroix}, title = {Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {859}, year = {2013}, url = {http://eprint.iacr.org/2013/859}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LingeDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BerzatiCG12, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {David Naccache}, title = {Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {233--247}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_16}, doi = {10.1007/978-3-642-28368-0\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BerzatiCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BerzatiCG12, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {Marc Joye and Michael Tunstall}, title = {A Survey of Differential Fault Analysis Against Classical {RSA} Implementations}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {111--124}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_7}, doi = {10.1007/978-3-642-29656-7\_7}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/BerzatiCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SoucarrosCCER11, author = {Mathilde Soucarros and C{\'{e}}cile Canovas{-}Dumas and Jessy Cl{\'{e}}di{\`{e}}re and Philippe Elbaz{-}Vincent and Denis R{\'{e}}al}, title = {Influence of the temperature on true random number generators}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {24--27}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5954990}, doi = {10.1109/HST.2011.5954990}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SoucarrosCCER11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BerzatiCG10, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Public Key Perturbation of Randomized {RSA} Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {306--319}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_21}, doi = {10.1007/978-3-642-15031-9\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BerzatiCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BerzatiCG10, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, title = {Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2010}, url = {http://eprint.iacr.org/2010/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BerzatiCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BerzatiCDG09, author = {Alexandre Berzati and C{\'{e}}cile Canovas and Jean{-}Guillaume Dumas and Louis Goubin}, editor = {Marc Fischlin}, title = {Fault Attacks on {RSA} Public Keys: Left-To-Right Implementations Are Also Vulnerable}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {414--428}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_28}, doi = {10.1007/978-3-642-00862-7\_28}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BerzatiCDG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CastagnosBCDGGPS09, author = {Guilhem Castagnos and Alexandre Berzati and C{\'{e}}cile Canovas and Blandine Debraize and Louis Goubin and Aline Gouget and Pascal Paillier and Stephanie Salgado}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Fault Analysis of Grain-128}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings}, pages = {7--14}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HST.2009.5225030}, doi = {10.1109/HST.2009.5225030}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CastagnosBCDGGPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BerzatiCG09, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Fault Analysis of Rabbit: Toward a Secret Key Leakage}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {72--87}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_5}, doi = {10.1007/978-3-642-10628-6\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BerzatiCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0901-0911, author = {Alexandre Berzati and C{\'{e}}cile Canovas and Jean{-}Guillaume Dumas and Louis Goubin}, title = {Fault Attacks on {RSA} Public Keys: Left-To-Right Implementations are also Vulnerable}, journal = {CoRR}, volume = {abs/0901.0911}, year = {2009}, url = {http://arxiv.org/abs/0901.0911}, eprinttype = {arXiv}, eprint = {0901.0911}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0901-0911.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeCC08, author = {Thanh{-}Ha Le and C{\'{e}}cile Canovas and Jessy Cl{\'{e}}di{\`{e}}re}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {An overview of side channel analysis attacks}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {33--43}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368319}, doi = {10.1145/1368310.1368319}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LeCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BerzatiCG08, author = {Alexandre Berzati and C{\'{e}}cile Canovas and Louis Goubin}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Perturbating {RSA} Public Keys: An Improved Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {380--395}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_24}, doi = {10.1007/978-3-540-85053-3\_24}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/BerzatiCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/RealCCDV08, author = {Denis R{\'{e}}al and C{\'{e}}cile Canovas and Jessy Cl{\'{e}}di{\`{e}}re and M'hamed Drissi and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Donatella Sciuto}, title = {Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis}, booktitle = {Design, Automation and Test in Europe, {DATE} 2008, Munich, Germany, March 10-14, 2008}, pages = {1274--1279}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1109/DATE.2008.4484854}, doi = {10.1109/DATE.2008.4484854}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/RealCCDV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/BerzatiCG08, author = {Alexandre Berzati and C{\'{e}}cile Canovas and Louis Goubin}, editor = {Luca Breveglieri and Shay Gueron and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {In(security) Against Fault Injection Attacks for {CRT-RSA} Implementations}, booktitle = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008}, pages = {101--107}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FDTC.2008.9}, doi = {10.1109/FDTC.2008.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BerzatiCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeNCC07, author = {Thanh{-}Ha Le and Quoc{-}Thinh Nguyen{-}Vuong and C{\'{e}}cile Canovas and Jessy Cl{\'{e}}di{\`{e}}re}, title = {Novel Approaches for Improving the Power Consumption Models in Correlation Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2007}, url = {http://eprint.iacr.org/2007/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeNCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LeCCRSL06, author = {Thanh{-}Ha Le and Jessy Cl{\'{e}}di{\`{e}}re and C{\'{e}}cile Canovas and Bruno Robisson and Christine Servi{\`{e}}re and Jean{-}Louis Lacoume}, editor = {Louis Goubin and Mitsuru Matsui}, title = {A Proposition for Correlation Power Analysis Enhancement}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {174--186}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_14}, doi = {10.1007/11894063\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LeCCRSL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanovasC05, author = {C{\'{e}}cile Canovas and Jessy Cl{\'{e}}di{\`{e}}re}, title = {What do S-boxes Say in Differential Side Channel Attacks?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2005}, url = {http://eprint.iacr.org/2005/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanovasC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/Canovas-DumasC00, author = {C{\'{e}}cile Canovas{-}Dumas and Paul Caspi}, editor = {Michel Parigot and Andrei Voronkov}, title = {A {PVS} Proof Obligation Generator for Lustre Programs}, booktitle = {Logic for Programming and Automated Reasoning, 7th International Conference, {LPAR} 2000, Reunion Island, France, November 11-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1955}, pages = {179--188}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44404-1\_12}, doi = {10.1007/3-540-44404-1\_12}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/lpar/Canovas-DumasC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.