Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jean-Luc Danger
@article{DBLP:journals/tcad/EbrahimabadiMVGDDK24, author = {Mohammad Ebrahimabadi and Suhee Sanjana Mehjabin and Raphael Viera and Sylvain Guilley and Jean{-}Luc Danger and Jean{-}Max Dutertre and Naghmeh Karimi}, title = {{DELFINES:} Detecting Laser Fault Injection Attacks via Digital Sensors}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {43}, number = {3}, pages = {774--787}, year = {2024}, url = {https://doi.org/10.1109/TCAD.2023.3322623}, doi = {10.1109/TCAD.2023.3322623}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/EbrahimabadiMVGDDK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BahramiEGDK24, author = {Javad Bahrami and Mohammad Ebrahimabadi and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, editor = {Romain Wacquez and Naofumi Homma}, title = {Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, {COSADE} 2024, Gardanne, France, April 9-10, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14595}, pages = {177--196}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57543-3\_10}, doi = {10.1007/978-3-031-57543-3\_10}, timestamp = {Mon, 15 Apr 2024 21:35:29 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BahramiEGDK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NabhanDRDS23, author = {Roukoz Nabhan and Jean{-}Max Dutertre and Jean{-}Baptiste Rigaud and Jean{-}Luc Danger and Laurent Sauvage}, title = {Highlighting Two {EM} Fault Models While Analyzing a Digital Sensor Limitations}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2023, Antwerp, Belgium, April 17-19, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/DATE56975.2023.10137124}, doi = {10.23919/DATE56975.2023.10137124}, timestamp = {Wed, 07 Jun 2023 22:08:03 +0200}, biburl = {https://dblp.org/rec/conf/date/NabhanDRDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/NabhanDRDS23, author = {Roukoz Nabhan and Jean{-}Max Dutertre and Jean{-}Baptiste Rigaud and Jean{-}Luc Danger and Laurent Sauvage}, title = {A Tale of Two Models: Discussing the Timing and Sampling {EM} Fault Injection Models}, booktitle = {Workshop on Fault Detection and Tolerance in Cryptography, {FDTC} 2023, Prague, Czech Republic, September 10, 2023}, pages = {1--12}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/FDTC60478.2023.00010}, doi = {10.1109/FDTC60478.2023.00010}, timestamp = {Fri, 19 Apr 2024 12:26:32 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/NabhanDRDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/AnikRDGK23, author = {Md Toufiq Hasan Anik and Hasin Ishraq Reefat and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, editor = {Himanshu Thapliyal and Ronald F. DeMara and Inna Partin{-}Vaisband and Srinivas Katkoori}, title = {Aging-Induced Failure Prognosis via Digital Sensors}, booktitle = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI} 2023, Knoxville, TN, USA, June 5-7, 2023}, pages = {703--708}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3583781.3590204}, doi = {10.1145/3583781.3590204}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/AnikRDGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/ForcioliDC23, author = {Quentin Forcioli and Jean{-}Luc Danger and Sumanta Chaudhuri}, title = {A gem5 based Platform for Micro-Architectural Security Analysis}, booktitle = {Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29 October 2023}, pages = {91--99}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3623652.3623674}, doi = {10.1145/3623652.3623674}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hasp/ForcioliDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icicdt/BahramiDEGK23, author = {Javad Bahrami and Jean{-}Luc Danger and Mohammad Ebrahimabadi and Sylvain Guilley and Naghmeh Karimi}, title = {Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks}, booktitle = {International Conference on {IC} Design and Technology, {ICICDT} 2023, Tokyo, Japan, September 25-28, 2023}, pages = {10--15}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICICDT59917.2023.10332319}, doi = {10.1109/ICICDT59917.2023.10332319}, timestamp = {Thu, 04 Jan 2024 08:13:40 +0100}, biburl = {https://dblp.org/rec/conf/icicdt/BahramiDEGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/AlkhatibMGD23, author = {Natasha Alkhatib and Maria Mushtaq and Hadi Ghauch and Jean{-}Luc Danger}, title = {Here comes {SAID:} {A} {SOME/IP} Attention-based mechanism for Intrusion Detection}, booktitle = {Fourteenth International Conference on Ubiquitous and Future Networks, {ICUFN} 2023, Paris, France, July 4-7, 2023}, pages = {462--467}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICUFN57995.2023.10200508}, doi = {10.1109/ICUFN57995.2023.10200508}, timestamp = {Thu, 17 Aug 2023 15:10:39 +0200}, biburl = {https://dblp.org/rec/conf/icufn/AlkhatibMGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BeguinotCDGRY23, author = {Julien B{\'{e}}guinot and Wei Cheng and Jean{-}Luc Danger and Sylvain Guilley and Olivier Rioul and Ville Yli{-}M{\"{a}}yry}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Reliability of Ring Oscillator PUFs with Reduced Helper Data}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {36--56}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_3}, doi = {10.1007/978-3-031-41326-1\_3}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BeguinotCDGRY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/VarillonSD23, author = {Arnaud Varillon and Laurent Sauvage and Jean{-}Luc Danger}, editor = {Francesco Regazzoni and Bodhisatwa Mazumdar and Sri Parameswaran}, title = {High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of {RSA}}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 13th International Conference, {SPACE} 2023, Roorkee, India, December 14-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14412}, pages = {139--161}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51583-5\_9}, doi = {10.1007/978-3-031-51583-5\_9}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/space/VarillonSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vts/BahramiEDGK23, author = {Javad Bahrami and Mohammad Ebrahimabadi and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Special Session: Security Verification {\&} Testing for SR-Latch TRNGs}, booktitle = {41st {IEEE} {VLSI} Test Symposium, {VTS} 2023, San Diego, CA, USA, April 24-26, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTS56346.2023.10140057}, doi = {10.1109/VTS56346.2023.10140057}, timestamp = {Fri, 09 Jun 2023 15:18:15 +0200}, biburl = {https://dblp.org/rec/conf/vts/BahramiEDGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BerthetTDS23, author = {Pierre{-}Augustin Berthet and C{\'{e}}dric Tavernier and Jean{-}Luc Danger and Laurent Sauvage}, title = {Quasi-linear Masking to Protect Kyber against both {SCA} and {FIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1220}, year = {2023}, url = {https://eprint.iacr.org/2023/1220}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BerthetTDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/KroegerCDGK22, author = {Trevor Kroeger and Wei Cheng and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Cross-PUF Attacks: Targeting {FPGA} Implementation of Arbiter-PUFs}, journal = {J. Electron. Test.}, volume = {38}, number = {3}, pages = {261--277}, year = {2022}, url = {https://doi.org/10.1007/s10836-022-06012-z}, doi = {10.1007/S10836-022-06012-Z}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/et/KroegerCDGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/NikniaDGK22, author = {Farzad Niknia and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {41}, number = {5}, pages = {1276--1289}, year = {2022}, url = {https://doi.org/10.1109/TCAD.2021.3088803}, doi = {10.1109/TCAD.2021.3088803}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/NikniaDGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcasI/TebelmannDP22, author = {Lars Tebelmann and Jean{-}Luc Danger and Michael Pehl}, title = {Interleaved Challenge Loop {PUF:} {A} Highly Side-Channel Protected Oscillator-Based {PUF}}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {69}, number = {12}, pages = {5121--5134}, year = {2022}, url = {https://doi.org/10.1109/TCSI.2022.3208325}, doi = {10.1109/TCSI.2022.3208325}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcasI/TebelmannDP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengGD22, author = {Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger}, title = {Information Leakage in Code-Based Masking: {A} Systematic Evaluation by Higher-Order Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1624--1638}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3167914}, doi = {10.1109/TIFS.2022.3167914}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChengGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/KroegerCGDK22, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {30}, number = {2}, pages = {187--200}, year = {2022}, url = {https://doi.org/10.1109/TVLSI.2021.3129141}, doi = {10.1109/TVLSI.2021.3129141}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/KroegerCGDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/AlkhatibMGD22, author = {Natasha Alkhatib and Maria Mushtaq and Hadi Ghauch and Jean{-}Luc Danger}, title = {{CAN-BERT} do it? Controller Area Network Intrusion Detection System based on {BERT} Language Model}, booktitle = {19th {IEEE/ACS} International Conference on Computer Systems and Applications, {AICCSA} 2022, Abu Dhabi, United Arab Emirates, December 5-8, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AICCSA56895.2022.10017800}, doi = {10.1109/AICCSA56895.2022.10017800}, timestamp = {Thu, 26 Jan 2023 11:35:09 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/AlkhatibMGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BahramiEDGK22, author = {Javad Bahrami and Mohammad Ebrahimabadi and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, editor = {Cristiana Bolchini and Ingrid Verbauwhede and Ioana Vatajelu}, title = {Leakage Power Analysis in Different S-Box Masking Protection Schemes}, booktitle = {2022 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2022, Antwerp, Belgium, March 14-23, 2022}, pages = {1263--1268}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/DATE54114.2022.9774763}, doi = {10.23919/DATE54114.2022.9774763}, timestamp = {Wed, 25 May 2022 22:56:19 +0200}, biburl = {https://dblp.org/rec/conf/date/BahramiEDGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/EbrahimabadiMVG22, author = {Mohammad Ebrahimabadi and Suhee Sanjana Mehjabin and Raphael Viera and Sylvain Guilley and Jean{-}Luc Danger and Jean{-}Max Dutertre and Naghmeh Karimi}, title = {Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2022, McLean, VA, USA, June 27-30, 2022}, pages = {97--100}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HOST54066.2022.9840318}, doi = {10.1109/HOST54066.2022.9840318}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/EbrahimabadiMVG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivs/AlkhatibMGD22, author = {Natasha Alkhatib and Maria Mushtaq and Hadi Ghauch and Jean{-}Luc Danger}, title = {Unsupervised Network Intrusion Detection System for {AVTP} in Automotive Ethernet Networks}, booktitle = {2022 {IEEE} Intelligent Vehicles Symposium, {IV} 2022, Aachen, Germany, June 4-9, 2022}, pages = {1731--1738}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IV51971.2022.9827285}, doi = {10.1109/IV51971.2022.9827285}, timestamp = {Tue, 26 Jul 2022 10:29:07 +0200}, biburl = {https://dblp.org/rec/conf/ivs/AlkhatibMGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BahramiETDGK22, author = {Javad Bahrami and Mohammad Ebrahimabadi and Sofiane Takarabt and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {661--668}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011307600003283}, doi = {10.5220/0011307600003283}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BahramiETDGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-00045, author = {Natasha Alkhatib and Maria Mushtaq and Hadi Ghauch and Jean{-}Luc Danger}, title = {AVTPnet: Convolutional Autoencoder for {AVTP} anomaly detection in Automotive Ethernet Networks}, journal = {CoRR}, volume = {abs/2202.00045}, year = {2022}, url = {https://arxiv.org/abs/2202.00045}, eprinttype = {arXiv}, eprint = {2202.00045}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-00045.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-09439, author = {Natasha Alkhatib and Maria Mushtaq and Hadi Ghauch and Jean{-}Luc Danger}, title = {{CAN-BERT} do it? Controller Area Network Intrusion Detection System based on {BERT} Language Model}, journal = {CoRR}, volume = {abs/2210.09439}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.09439}, doi = {10.48550/ARXIV.2210.09439}, eprinttype = {arXiv}, eprint = {2210.09439}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-09439.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengGD22, author = {Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger}, title = {Information Leakage in Code-based Masking: {A} Systematic Evaluation by Higher-Order Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2022}, url = {https://eprint.iacr.org/2022/461}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/caaitrit/ChabanneDGK21, author = {Herv{\'{e}} Chabanne and Jean{-}Luc Danger and Linda Guiga and Ulrich K{\"{u}}hne}, title = {Side channel attacks for architecture extraction of neural networks}, journal = {{CAAI} Trans. Intell. Technol.}, volume = {6}, number = {1}, pages = {3--16}, year = {2021}, url = {https://doi.org/10.1049/cit2.12026}, doi = {10.1049/CIT2.12026}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/caaitrit/ChabanneDGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChengGD21, author = {Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger}, title = {Categorizing all linear codes of {IPM} over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}\{2{\^{}}\{8\}\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {527--542}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00483-1}, doi = {10.1007/S12095-021-00483-1}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ChengGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/AnikEDGK21, author = {Md Toufiq Hasan Anik and Mohammad Ebrahimabadi and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Reducing Aging Impacts in Digital Sensors via Run-Time Calibration}, journal = {J. Electron. Test.}, volume = {37}, number = {5}, pages = {653--673}, year = {2021}, url = {https://doi.org/10.1007/s10836-021-05976-8}, doi = {10.1007/S10836-021-05976-8}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/et/AnikEDGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChengCGDG21, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Jean{-}Luc Danger and Sylvain Guilley}, title = {Detecting faults in inner product masking scheme}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {119--133}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00227-6}, doi = {10.1007/S13389-020-00227-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChengCGDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/AnikDGK21, author = {Md Toufiq Hasan Anik and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Detecting Failures and Attacks via Digital Sensors}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {40}, number = {7}, pages = {1315--1326}, year = {2021}, url = {https://doi.org/10.1109/TCAD.2020.3020921}, doi = {10.1109/TCAD.2020.3020921}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/AnikDGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengGCDM21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger and Sihem Mesnager}, title = {Information Leakages in Code-based Masking: {A} Unified Quantification Approach}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {465--495}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.465-495}, doi = {10.46586/TCHES.V2021.I3.465-495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengGCDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengGCMD21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean{-}Luc Danger}, title = {Optimizing Inner Product Masking Scheme by a Coding Theory Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {220--235}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3009609}, doi = {10.1109/TIFS.2020.3009609}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChengGCMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Yli-MayryUMNBMG21, author = {Ville Yli{-}M{\"{a}}yry and Rei Ueno and Noriyuki Miura and Makoto Nagata and Shivam Bhasin and Yves Mathieu and Tarik Graba and Jean{-}Luc Danger and Naofumi Homma}, title = {Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: {A} Case Study of Power Analysis on {PRINCE}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {1351--1364}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3033441}, doi = {10.1109/TIFS.2020.3033441}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Yli-MayryUMNBMG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChabanneDGK21, author = {Herv{\'{e}} Chabanne and Jean{-}Luc Danger and Linda Guiga and Ulrich K{\"{u}}hne}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12726}, pages = {363--392}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78372-3\_14}, doi = {10.1007/978-3-030-78372-3\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChabanneDGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/TebelmannKDP21, author = {Lars Tebelmann and Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Michael Pehl}, editor = {Shivam Bhasin and Fabrizio De Santis}, title = {Analysis and Protection of the Two-Metric Helper Data Scheme}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12910}, pages = {279--302}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89915-8\_13}, doi = {10.1007/978-3-030-89915-8\_13}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/TebelmannKDP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/KroegerCGDK21, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, editor = {Shivam Bhasin and Fabrizio De Santis}, title = {Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12910}, pages = {303--321}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89915-8\_14}, doi = {10.1007/978-3-030-89915-8\_14}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/KroegerCGDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/KroegerCGDK21, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2021, Grenoble, France, February 1-5, 2021}, pages = {1000--1005}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/DATE51398.2021.9474137}, doi = {10.23919/DATE51398.2021.9474137}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/KroegerCGDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/AnikDDEFGKPT21, author = {Md Toufiq Hasan Anik and Jean{-}Luc Danger and Omar Diankha and Mohammad Ebrahimabadi and Christoph Frisch and Sylvain Guilley and Naghmeh Karimi and Michael Pehl and Sofiane Takarabt}, editor = {Luigi Dilillo and Luca Cassano and Athanasios Papadimitriou}, title = {Testing and Reliability Enhancement of Security Primitives}, booktitle = {36th {IEEE} International Symposium on Defect and Fault Tolerance in {VLSI} and Nanotechnology Systems, {DFT} 2021, Athens, Greece, October 6-8, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DFT52944.2021.9568297}, doi = {10.1109/DFT52944.2021.9568297}, timestamp = {Fri, 22 Oct 2021 15:23:35 +0200}, biburl = {https://dblp.org/rec/conf/dft/AnikDDEFGKPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/TehraniGSD21, author = {Etienne Tehrani and Tarik Graba and Abdelmalek Si{-}Merabet and Jean{-}Luc Danger}, editor = {Francesco Leporati and Salvatore Vitabile and Amund Skavhaug}, title = {{RSM} Protection of the {PRESENT} Lightweight Cipher as a {RISC-V} Extension}, booktitle = {24th Euromicro Conference on Digital System Design, {DSD} 2021, Virtual Event / Palermo, Sicily, Italy, September 1-3, 2021}, pages = {325--332}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSD53832.2021.00056}, doi = {10.1109/DSD53832.2021.00056}, timestamp = {Mon, 07 Nov 2022 07:58:07 +0100}, biburl = {https://dblp.org/rec/conf/dsd/TehraniGSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/KhuatDD21, author = {Vanthanh Khuat and Jean{-}Max Dutertre and Jean{-}Luc Danger}, editor = {Francesco Leporati and Salvatore Vitabile and Amund Skavhaug}, title = {Analysis of a Laser-induced Instructions Replay Fault Model in a 32-bit Microcontroller}, booktitle = {24th Euromicro Conference on Digital System Design, {DSD} 2021, Virtual Event / Palermo, Sicily, Italy, September 1-3, 2021}, pages = {363--370}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSD53832.2021.00061}, doi = {10.1109/DSD53832.2021.00061}, timestamp = {Fri, 15 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsd/KhuatDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ForcioliDMBBMNF21, author = {Quentin Forcioli and Jean{-}Luc Danger and Cl{\'{e}}mentine Maurice and Lilian Bossuet and Florent Bruguier and Maria Mushtaq and David Novo and Lo{\"{\i}}c France and Pascal Benoit and Sylvain Guilley and Thomas Perianin}, title = {Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {96--102}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSPW54576.2021.00017}, doi = {10.1109/EUROSPW54576.2021.00017}, timestamp = {Mon, 08 Nov 2021 16:43:34 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/ForcioliDMBBMNF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/KhuatDD21, author = {Vanthanh Khuat and Jean{-}Luc Danger and Jean{-}Max Dutertre}, title = {Laser Fault Injection in a 32-bit Microcontroller: from the Flash Interface to the Execution Pipeline}, booktitle = {18th Workshop on Fault Detection and Tolerance in Cryptography, {FDTC} 2021, Milan, Italy, September 17, 2021}, pages = {74--85}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/FDTC53659.2021.00020}, doi = {10.1109/FDTC53659.2021.00020}, timestamp = {Mon, 18 Oct 2021 17:08:54 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/KhuatDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/KhalfaouiLVGMDU21, author = {Sameh Khalfaoui and Jean Leneutre and Arthur Villard and Ivan Gazeau and Jingxuan Ma and Jean{-}Luc Danger and Pascal Urien}, editor = {Mauro Andreolini and Mirco Marchetti and Dimiter R. Avresky}, title = {Water- {PUF:} An Insider Threat Resistant {PUF} Enrollment Protocol Based on Machine Learning Watermarking}, booktitle = {20th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2021, Boston, MA, USA, November 23-26, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NCA53618.2021.9685239}, doi = {10.1109/NCA53618.2021.9685239}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/KhalfaouiLVGMDU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/ChabanneDGK21, author = {Herv{\'{e}} Chabanne and Jean{-}Luc Danger and Linda Guiga and Ulrich K{\"{u}}hne}, editor = {Lejla Batina and Stjepan Picek and Mainack Mondal}, title = {Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, {SPACE} 2021, Kolkata, India, December 10-13, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13162}, pages = {148--167}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95085-9\_8}, doi = {10.1007/978-3-030-95085-9\_8}, timestamp = {Thu, 03 Feb 2022 09:28:39 +0100}, biburl = {https://dblp.org/rec/conf/space/ChabanneDGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08262, author = {Natasha Alkhatib and Hadi Ghauch and Jean{-}Luc Danger}, title = {{SOME/IP} Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks}, journal = {CoRR}, volume = {abs/2108.08262}, year = {2021}, url = {https://arxiv.org/abs/2108.08262}, eprinttype = {arXiv}, eprint = {2108.08262}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08262.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengGCDM21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger and Sihem Mesnager}, title = {Information Leakages in Code-based Masking: {A} Unified Quantification Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2021}, url = {https://eprint.iacr.org/2021/363}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengGCDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TebelmannKDP21, author = {Lars Tebelmann and Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Michael Pehl}, title = {Analysis and Protection of the Two-metric Helper Data Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {830}, year = {2021}, url = {https://eprint.iacr.org/2021/830}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TebelmannKDP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauCDFG21, author = {Nicolas Bruneau and Charles Christen and Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley}, title = {Security evaluation against side-channel analysis at compilation time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1521}, year = {2021}, url = {https://eprint.iacr.org/2021/1521}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BruneauCDFG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/SchaubRDGB20, author = {Alexander Schaub and Olivier Rioul and Jean{-}Luc Danger and Sylvain Guilley and Joseph Boutros}, title = {Challenge codes for physically unclonable functions with Gaussian delays: {A} maximum entropy problem}, journal = {Adv. Math. Commun.}, volume = {14}, number = {3}, pages = {491--505}, year = {2020}, url = {https://doi.org/10.3934/amc.2020060}, doi = {10.3934/AMC.2020060}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/SchaubRDGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/UenoHMMMNBMGD20, author = {Rei Ueno and Naofumi Homma and Sumio Morioka and Noriyuki Miura and Kohei Matsuda and Makoto Nagata and Shivam Bhasin and Yves Mathieu and Tarik Graba and Jean{-}Luc Danger}, title = {High Throughput/Gate {AES} Hardware Architectures Based on Datapath Compression}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {4}, pages = {534--548}, year = {2020}, url = {https://doi.org/10.1109/TC.2019.2957355}, doi = {10.1109/TC.2019.2957355}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/UenoHMMMNBMGD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asianhost/TrabelsiSD20, author = {Oualid Trabelsi and Laurent Sauvage and Jean{-}Luc Danger}, title = {Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller Instruction Buffer}, booktitle = {Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2020, Kolkata, India, December 15-17, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsianHOST51057.2020.9358270}, doi = {10.1109/ASIANHOST51057.2020.9358270}, timestamp = {Wed, 03 Mar 2021 11:46:43 +0100}, biburl = {https://dblp.org/rec/conf/asianhost/TrabelsiSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DangerFGHKSTP20, author = {Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley and Karine Heydemann and Ulrich K{\"{u}}hne and Abdelmalek Si{-}Merabet and Micha{\"{e}}l Timbert and Baptiste Pecatte}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {254--274}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_12}, doi = {10.1007/978-3-030-68773-1\_12}, timestamp = {Fri, 05 Feb 2021 12:30:03 +0100}, biburl = {https://dblp.org/rec/conf/cosade/DangerFGHKSTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/TebelmannDP20, author = {Lars Tebelmann and Jean{-}Luc Danger and Michael Pehl}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Self-secured {PUF:} Protecting the Loop {PUF} by Masking}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {293--314}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_14}, doi = {10.1007/978-3-030-68773-1\_14}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/TebelmannDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/KroegerCGDK20, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {Effect of Aging on {PUF} Modeling Attacks based on Power Side-Channel Observations}, booktitle = {2020 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020}, pages = {454--459}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/DATE48585.2020.9116428}, doi = {10.23919/DATE48585.2020.9116428}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/KroegerCGDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/TehraniGSD20, author = {Etienne Tehrani and Tarik Graba and Abdelmalek Si{-}Merabet and Jean{-}Luc Danger}, title = {{RISC-V} Extension for Lightweight Cryptography}, booktitle = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj, Slovenia, August 26-28, 2020}, pages = {222--228}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSD51259.2020.00045}, doi = {10.1109/DSD51259.2020.00045}, timestamp = {Wed, 14 Oct 2020 14:37:25 +0200}, biburl = {https://dblp.org/rec/conf/dsd/TehraniGSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dtis/MenuDPRD20, author = {Alexandre Menu and Jean{-}Max Dutertre and Olivier Potin and Jean{-}Baptiste Rigaud and Jean{-}Luc Danger}, title = {Experimental Analysis of the Electromagnetic Instruction Skip Fault Model}, booktitle = {15th Design {\&} Technology of Integrated Systems in Nanoscale Era, {DTIS} 2020, Marrakech, Morocco, April 1-3, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DTIS48698.2020.9081261}, doi = {10.1109/DTIS48698.2020.9081261}, timestamp = {Mon, 11 May 2020 11:29:38 +0200}, biburl = {https://dblp.org/rec/conf/dtis/MenuDPRD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/0001DRG20, author = {Alexander Schaub and Jean{-}Luc Danger and Olivier Rioul and Sylvain Guilley}, title = {The Big Picture of Delay-PUF Dependability}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2020, Sofia, Bulgaria, September 7-10, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ECCTD49232.2020.9218396}, doi = {10.1109/ECCTD49232.2020.9218396}, timestamp = {Wed, 14 Oct 2020 15:01:07 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/0001DRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/AlipourBCDNHGK20, author = {Amir Alipour and Vincent Beroulle and Bertrand Cambou and Jean{-}Luc Danger and Giorgio Di Natale and David H{\'{e}}ly and Sylvain Guilley and Naghmeh Karimi}, title = {{PUF} Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community}, booktitle = {{IEEE} European Test Symposium, {ETS} 2020, Tallinn, Estonia, May 25-29, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ETS48528.2020.9131578}, doi = {10.1109/ETS48528.2020.9131578}, timestamp = {Wed, 15 Jul 2020 13:23:41 +0200}, biburl = {https://dblp.org/rec/conf/ets/AlipourBCDNHGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/AnikSDGK20, author = {Md Toufiq Hasan Anik and Rachit Saini and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {Failure and Attack Detection by Digital Sensors}, booktitle = {{IEEE} European Test Symposium, {ETS} 2020, Tallinn, Estonia, May 25-29, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ETS48528.2020.9131580}, doi = {10.1109/ETS48528.2020.9131580}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ets/AnikSDGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/MenuDRCMD20, author = {Alexandre Menu and Jean{-}Max Dutertre and Jean{-}Baptiste Rigaud and Brice Colombier and Pierre{-}Alain Mo{\"{e}}llic and Jean{-}Luc Danger}, title = {Single-bit Laser Fault Model in {NOR} Flash Memories: Analysis and Exploitation}, booktitle = {17th Workshop on Fault Detection and Tolerance in Cryptography, {FDTC} 2020, Milan, Italy, September 13, 2020}, pages = {41--48}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/FDTC51366.2020.00013}, doi = {10.1109/FDTC51366.2020.00013}, timestamp = {Thu, 29 Oct 2020 16:42:41 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/MenuDRCMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/AnikEPDGK20, author = {Md Toufiq Hasan Anik and Mohammad Ebrahimabadi and Hamed Pirsiavash and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, title = {On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability}, booktitle = {38th {IEEE} International Conference on Computer Design, {ICCD} 2020, Hartford, CT, USA, October 18-21, 2020}, pages = {506--509}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCD50377.2020.00091}, doi = {10.1109/ICCD50377.2020.00091}, timestamp = {Mon, 11 Jan 2021 13:35:27 +0100}, biburl = {https://dblp.org/rec/conf/iccd/AnikEPDGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itc/KroegerCGDK20, author = {Trevor Kroeger and Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel}, booktitle = {{IEEE} International Test Conference, {ITC} 2020, Washington, DC, USA, November 1-6, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ITC44778.2020.9325241}, doi = {10.1109/ITC44778.2020.9325241}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itc/KroegerCGDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/AnikGDK20, author = {Md Toufiq Hasan Anik and Sylvain Guilley and Jean{-}Luc Danger and Naghmeh Karimi}, title = {On the Effect of Aging on Digital Sensors}, booktitle = {33rd International Conference on {VLSI} Design and 19th International Conference on Embedded Systems, {VLSID} 2020, Bangalore, India, January 4-8, 2020}, pages = {189--194}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VLSID49098.2020.00050}, doi = {10.1109/VLSID49098.2020.00050}, timestamp = {Mon, 14 Nov 2022 15:28:08 +0100}, biburl = {https://dblp.org/rec/conf/vlsid/AnikGDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TebelmannDP20, author = {Lars Tebelmann and Jean{-}Luc Danger and Michael Pehl}, title = {Self-Secured {PUF:} Protecting the Loop {PUF} by Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2020}, url = {https://eprint.iacr.org/2020/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TebelmannDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengGCMD20, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean{-}Luc Danger}, title = {Optimizing Inner Product Masking Scheme by {A} Coding Theory Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2020}, url = {https://eprint.iacr.org/2020/692}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengGCMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/DangerFKN19, author = {Jean{-}Luc Danger and Laurent Fribourg and Ulrich K{\"{u}}hne and Maha Naceur}, title = {LAOCO{\"{O}}N: {A} Run-Time Monitoring and Verification Approach for Hardware Trojan Detection}, booktitle = {22nd Euromicro Conference on Digital System Design, {DSD} 2019, Kallithea, Greece, August 28-30, 2019}, pages = {269--276}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSD.2019.00047}, doi = {10.1109/DSD.2019.00047}, timestamp = {Wed, 23 Oct 2019 17:11:33 +0200}, biburl = {https://dblp.org/rec/conf/dsd/DangerFKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/MenuBDRD19, author = {Alexandre Menu and Shivam Bhasin and Jean{-}Max Dutertre and Jean{-}Baptiste Rigaud and Jean{-}Luc Danger}, title = {Precise Spatio-Temporal Electromagnetic Fault Injections on Data Transfers}, booktitle = {2019 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2019, Atlanta, GA, USA, August 24, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/FDTC.2019.00009}, doi = {10.1109/FDTC.2019.00009}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/MenuBDRD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ColombierMDMRD19, author = {Brice Colombier and Alexandre Menu and Jean{-}Max Dutertre and Pierre{-}Alain Mo{\"{e}}llic and Jean{-}Baptiste Rigaud and Jean{-}Luc Danger}, title = {Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2019, McLean, VA, USA, May 5-10, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HST.2019.8741030}, doi = {10.1109/HST.2019.8741030}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/host/ColombierMDMRD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/TehraniGSGD19, author = {Etienne Tehrani and Tarik Graba and Abdelmalek Si{-}Merabet and Sylvain Guilley and Jean{-}Luc Danger}, title = {Classification of Lightweight Block Ciphers for Specific Processor Accelerated Implementations}, booktitle = {26th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2019, Genoa, Italy, November 27-29, 2019}, pages = {747--750}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICECS46596.2019.8965156}, doi = {10.1109/ICECS46596.2019.8965156}, timestamp = {Mon, 03 Feb 2020 12:19:05 +0100}, biburl = {https://dblp.org/rec/conf/icecsys/TehraniGSGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwasi/DangerG019, author = {Jean{-}Luc Danger and Sylvain Guilley and Alexander Schaub}, title = {Two-Metric Helper Data for Highly Robust and Secure Delay PUFs}, booktitle = {{IEEE} 8th International Workshop on Advances in Sensors and Interfaces, {IWASI} 2019, Otranto, Italy, June 13-14, 2019}, pages = {184--188}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IWASI.2019.8791249}, doi = {10.1109/IWASI.2019.8791249}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwasi/DangerG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/proofs/ChengCGDG19, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Karine Heydemann and Ulrich K{\"{u}}hne and Letitia Li}, title = {Detecting Faults in Inner-Product Masking Scheme - {IPM-FD:} {IPM} with Fault Detection}, booktitle = {Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA, August 24, 2019}, series = {Kalpa Publications in Computing}, volume = {11}, pages = {17--32}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/fv2n}, doi = {10.29007/FV2N}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/proofs/ChengCGDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengCGGD19, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Sylvain Guilley and Jean{-}Luc Danger}, title = {Detecting Faults in Inner Product Masking Scheme - {IPM-FD:} {IPM} with Fault Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {919}, year = {2019}, url = {https://eprint.iacr.org/2019/919}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengCGGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DangerHFGGHNPS18, author = {Jean{-}Luc Danger and Youssef El Housni and Adrien Facon and Cheikh Thiecoumba Gueye and Sylvain Guilley and Sylvie Herbel and Ousmane Ndiaye and Edoardo Persichetti and Alexander Schaub}, title = {On the Performance and Security of Multiplication in \emph{GF}(2\({}^{\mbox{\emph{N}}}\))}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {25}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030025}, doi = {10.3390/CRYPTOGRAPHY2030025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DangerHFGGHNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/KarimiDG18, author = {Naghmeh Karimi and Jean{-}Luc Danger and Sylvain Guilley}, title = {Impact of Aging on the Reliability of Delay PUFs}, journal = {J. Electron. Test.}, volume = {34}, number = {5}, pages = {571--586}, year = {2018}, url = {https://doi.org/10.1007/s10836-018-5745-6}, doi = {10.1007/S10836-018-5745-6}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/et/KarimiDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/RoyBDGHMNN18, author = {Debapriya Basu Roy and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Wei He and Debdeep Mukhopadhyay and Zakaria Najm and Xuan Thuy Ngo}, title = {The Conflicted Usage of RLUTs for Security-Critical Applications on {FPGA}}, journal = {J. Hardw. Syst. Secur.}, volume = {2}, number = {2}, pages = {162--178}, year = {2018}, url = {https://doi.org/10.1007/s41635-018-0035-4}, doi = {10.1007/S41635-018-0035-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/RoyBDGHMNN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangWXWZPD18, author = {Ming Tang and Pengbo Wang and Xiaoqi Ma and Wenjie Chang and Huanguo Zhang and Guojun Peng and Jean{-}Luc Danger}, title = {An Efficient {SCA} Leakage Model Construction Method Under Predictable Evaluation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {12}, pages = {3008--3018}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2837644}, doi = {10.1109/TIFS.2018.2837644}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangWXWZPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/DangerYGMSSMN18, author = {Jean{-}Luc Danger and Risa Yashiro and Tarik Graba and Yves Mathieu and Abdelmalek Si{-}Merabet and Kazuo Sakiyama and Noriyuki Miura and Makoto Nagata}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {Analysis of Mixed {PUF-TRNG} Circuit Based on SR-Latches in {FD-SOI} Technology}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {508--515}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00090}, doi = {10.1109/DSD.2018.00090}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/DangerYGMSSMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/DangerFGHKMT18, author = {Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley and Karine Heydemann and Ulrich K{\"{u}}hne and Abdelmalek Si{-}Merabet and Micha{\"{e}}l Timbert}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {CCFI-Cache: {A} Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {529--536}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00093}, doi = {10.1109/DSD.2018.00093}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/DangerFGHKMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/SchaubDGR18, author = {Alexander Schaub and Jean{-}Luc Danger and Sylvain Guilley and Olivier Rioul}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {An Improved Analysis of Reliability and Entropy for Delay PUFs}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {553--560}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00096}, doi = {10.1109/DSD.2018.00096}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/SchaubDGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/KarimiGD18, author = {Naghmeh Karimi and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Deming Chen and Houman Homayoun and Baris Taskin}, title = {Impact of Aging on Template Attacks}, booktitle = {Proceedings of the 2018 on Great Lakes Symposium on VLSI, {GLSVLSI} 2018, Chicago, IL, USA, May 23-25, 2018}, pages = {455--458}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194554.3194638}, doi = {10.1145/3194554.3194638}, timestamp = {Wed, 10 Mar 2021 14:55:38 +0100}, biburl = {https://dblp.org/rec/conf/glvlsi/KarimiGD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/KarimiDG18, author = {Naghmeh Karimi and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Dimitris Gizopoulos and Dan Alexandrescu and Mihalis Maniatakos and Panagiota Papavramidou}, title = {On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis}, booktitle = {24th {IEEE} International Symposium on On-Line Testing And Robust System Design, {IOLTS} 2018, Platja D'Aro, Spain, July 2-4, 2018}, pages = {281--286}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IOLTS.2018.8474089}, doi = {10.1109/IOLTS.2018.8474089}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/iolts/KarimiDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/BruneauDFGHHK018, author = {Nicolas Bruneau and Jean{-}Luc Danger and Adrien Facon and Sylvain Guilley and Soshi Hamaguchi and Yohei Hori and Yousung Kang and Alexander Schaub}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Development of the Unified Security Requirements of PUFs During the Standardization Process}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {314--330}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_24}, doi = {10.1007/978-3-030-12942-2\_24}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/secitc/BruneauDFGHHK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/TehraniDG18, author = {Etienne Tehrani and Jean{-}Luc Danger and Tarik Graba}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Generic Architecture for Lightweight Block Ciphers: {A} First Step Towards Agile Implementation of Multiple Ciphers}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {28--43}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_4}, doi = {10.1007/978-3-030-20074-9\_4}, timestamp = {Tue, 14 May 2019 14:17:01 +0200}, biburl = {https://dblp.org/rec/conf/wistp/TehraniDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KarrayDGE18, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and Moulay Abdelaziz Elaabid}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {109--128}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_9}, doi = {10.1007/978-3-030-20074-9\_9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KarrayDGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/KarrayDGE18, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and M. Abdelaziz Elaabid}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Attack Tree Construction and Its Application to the Connected Vehicle}, booktitle = {Cyber-Physical Systems Security}, pages = {175--190}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_9}, doi = {10.1007/978-3-319-98935-8\_9}, timestamp = {Fri, 08 Mar 2019 12:57:04 +0100}, biburl = {https://dblp.org/rec/books/sp/18/KarrayDGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/KarrayDGE18a, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and M. Abdelaziz Elaabid}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks}, booktitle = {Cyber-Physical Systems Security}, pages = {219--254}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_11}, doi = {10.1007/978-3-319-98935-8\_11}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/KarrayDGE18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/DangerGHLT18, author = {Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Axel Legay and Ming Tang}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Physical Security Versus Masking Schemes}, booktitle = {Cyber-Physical Systems Security}, pages = {269--284}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_13}, doi = {10.1007/978-3-319-98935-8\_13}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/DangerGHLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ColombierMDMRD18, author = {Brice Colombier and Alexandre Menu and Jean{-}Max Dutertre and Pierre{-}Alain Mo{\"{e}}llic and Jean{-}Baptiste Rigaud and Jean{-}Luc Danger}, title = {Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1042}, year = {2018}, url = {https://eprint.iacr.org/2018/1042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ColombierMDMRD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/NgoDGGMNB17, author = {Xuan Thuy Ngo and Jean{-}Luc Danger and Sylvain Guilley and Tarik Graba and Yves Mathieu and Zakaria Najm and Shivam Bhasin}, title = {Cryptographically Secure Shield for Security IPs Protection}, journal = {{IEEE} Trans. Computers}, volume = {66}, number = {2}, pages = {354--360}, year = {2017}, url = {https://doi.org/10.1109/TC.2016.2584041}, doi = {10.1109/TC.2016.2584041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/NgoDGGMNB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/TangGHRLD17, author = {Ming Tang and Zhipeng Guo and Annelie Heuser and Yanzhen Ren and Jie Li and Jean{-}Luc Danger}, title = {{PFD} - {A} Flexible Higher-Order Masking Scheme}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {36}, number = {8}, pages = {1327--1339}, year = {2017}, url = {https://doi.org/10.1109/TCAD.2016.2629441}, doi = {10.1109/TCAD.2016.2629441}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/TangGHRLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/TangQGMHD17, author = {Ming Tang and Zhenlong Qiu and Zhipeng Guo and Yi Mu and Xinyi Huang and Jean{-}Luc Danger}, title = {A Generic Table Recomputation-Based Higher-Order Masking}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {36}, number = {11}, pages = {1779--1789}, year = {2017}, url = {https://doi.org/10.1109/TCAD.2017.2661823}, doi = {10.1109/TCAD.2017.2661823}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/TangQGMHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/DangerGNNS17, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Nguyen and Robert Nguyen and Youssef Souissi}, editor = {David Atienza and Giorgio Di Natale}, title = {Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2017, Lausanne, Switzerland, March 27-31, 2017}, pages = {1129--1134}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/DATE.2017.7927159}, doi = {10.23919/DATE.2017.7927159}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/DangerGNNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/KarimiDSG17, author = {Naghmeh Karimi and Jean{-}Luc Danger and Mariem Slimani and Sylvain Guilley}, title = {Impact of the switching activity on the aging of delay-PUFs}, booktitle = {22nd {IEEE} European Test Symposium, {ETS} 2017, Limassol, Cyprus, May 22-26, 2017}, pages = {1--2}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ETS.2017.7968223}, doi = {10.1109/ETS.2017.7968223}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/ets/KarimiDSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2017proofs, editor = {Ulrich K{\"{u}}hne and Jean{-}Luc Danger and Sylvain Guilley}, title = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, September 29th, 2017}, series = {EPiC Series in Computing}, volume = {49}, publisher = {EasyChair}, year = {2017}, url = {https://easychair.org/publications/volume/PROOFS\_2017}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/2017proofs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/space/2017, editor = {Sk Subidh Ali and Jean{-}Luc Danger and Thomas Eisenbarth}, title = {Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, {SPACE} 2017, Goa, India, December 13-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10662}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71501-8}, doi = {10.1007/978-3-319-71501-8}, isbn = {978-3-319-71500-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarimiDLG17, author = {Naghmeh Karimi and Jean{-}Luc Danger and Florent Lozach and Sylvain Guilley}, title = {Predictive Aging of Reliability of two Delay PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2017}, url = {http://eprint.iacr.org/2017/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarimiDLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NgoNBGD16, author = {Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger}, title = {Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {239--247}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0129-2}, doi = {10.1007/S13389-016-0129-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NgoNBGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/DangerGHMN16, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Improving the Big Mac Attack on Elliptic Curve Cryptography}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {374--386}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_23}, doi = {10.1007/978-3-662-49301-4\_23}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/DangerGHMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/DangerGPPT16, author = {Jean{-}Luc Danger and Sylvain Guilley and Thibault Porteboeuf and Florian Praden and Micha{\"{e}}l Timbert}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {439--454}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_27}, doi = {10.1007/978-3-662-49301-4\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/DangerGPPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DugardinGDNR16, author = {Margaux Dugardin and Sylvain Guilley and Jean{-}Luc Danger and Zakaria Najm and Olivier Rioul}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {3--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_1}, doi = {10.1007/978-3-662-53140-2\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/DugardinGDNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DugardinPNBDG16, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Dismantling Real-World {ECC} with Horizontal and Vertical Template Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, pages = {88--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0\_6}, doi = {10.1007/978-3-319-43283-0\_6}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/DugardinPNBDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/MiuraNHBNND16, author = {Noriyuki Miura and Zakaria Najm and Wei He and Shivam Bhasin and Xuan Thuy Ngo and Makoto Nagata and Jean{-}Luc Danger}, title = {{PLL} to the rescue: a novel {EM} fault countermeasure}, booktitle = {Proceedings of the 53rd Annual Design Automation Conference, {DAC} 2016, Austin, TX, USA, June 5-9, 2016}, pages = {90:1--90:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897937.2898065}, doi = {10.1145/2897937.2898065}, timestamp = {Tue, 06 Nov 2018 16:58:19 +0100}, biburl = {https://dblp.org/rec/conf/dac/MiuraNHBNND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/RioulHGD16, author = {Olivier Rioul and Annelie Heuser and Sylvain Guilley and Jean{-}Luc Danger}, title = {Inter-class vs. mutual information as side-channel distinguishers}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {805--809}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541410}, doi = {10.1109/ISIT.2016.7541410}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/RioulHGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/RioulSGD16, author = {Olivier Rioul and Patrick Sol{\'{e}} and Sylvain Guilley and Jean{-}Luc Danger}, title = {On the entropy of Physically Unclonable Functions}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {2928--2932}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541835}, doi = {10.1109/ISIT.2016.7541835}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/RioulSGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/KarimiDLG16, author = {Naghmeh Karimi and Jean{-}Luc Danger and Florent Lozach and Sylvain Guilley}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Predictive Aging of Reliability of Two Delay PUFs}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {213--232}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_12}, doi = {10.1007/978-3-319-49445-6\_12}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/KarimiDLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16, author = {Kazuhide Fukushima and Youssef Souissi and Seira Hidano and Robert Nguyen and Jean{-}Luc Danger and Sylvain Guilley and Yuto Nakano and Shinsaku Kiyomoto and Laurent Sauvage}, title = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {201--207}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0064}, doi = {10.1109/TRUSTCOM.2016.0064}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujimotoBND16, author = {Daisuke Fujimoto and Shivam Bhasin and Makoto Nagata and Jean{-}Luc Danger}, title = {A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2016}, url = {http://eprint.iacr.org/2016/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujimotoBND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DugardinGDNR16, author = {Margaux Dugardin and Sylvain Guilley and Jean{-}Luc Danger and Zakaria Najm and Olivier Rioul}, title = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2016}, url = {http://eprint.iacr.org/2016/597}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DugardinGDNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelgarricBBDDGH16, author = {Pierre Belgarric and Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Annelie Heuser and Zakaria Najm and Olivier Rioul}, title = {Time-Frequency Analysis for Second-Order Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2016}, url = {http://eprint.iacr.org/2016/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HeBOGTD15, author = {Wei He and Shivam Bhasin and Andr{\'{e}}s Otero and Tarik Graba and Eduardo de la Torre and Jean{-}Luc Danger}, title = {Sophisticated security verification on routing repaired balanced cell-based dual-rail logic against side channel analysis}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {1}, pages = {1--13}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2013.0058}, doi = {10.1049/IET-IFS.2013.0058}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HeBOGTD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/BhasinDGH15, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Wei He}, title = {Exploiting {FPGA} Block Memories for Protected Cryptographic Implementations}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {8}, number = {3}, pages = {16:1--16:16}, year = {2015}, url = {https://doi.org/10.1145/2629552}, doi = {10.1145/2629552}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/BhasinDGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/EndoLHSOFNKDA15, author = {Sho Endo and Yang Li and Naofumi Homma and Kazuo Sakiyama and Kazuo Ohta and Daisuke Fujimoto and Makoto Nagata and Toshihiro Katashita and Jean{-}Luc Danger and Takafumi Aoki}, title = {A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {23}, number = {8}, pages = {1429--1438}, year = {2015}, url = {https://doi.org/10.1109/TVLSI.2014.2339892}, doi = {10.1109/TVLSI.2014.2339892}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/EndoLHSOFNKDA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/FujimotoNBD15, author = {Daisuke Fujimoto and Makoto Nagata and Shivam Bhasin and Jean{-}Luc Danger}, title = {A novel methodology for testing hardware security and trust exploiting On-Chip Power noise Measurement}, booktitle = {The 20th Asia and South Pacific Design Automation Conference, {ASP-DAC} 2015, Chiba, Japan, January 19-22, 2015}, pages = {749--754}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ASPDAC.2015.7059100}, doi = {10.1109/ASPDAC.2015.7059100}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/FujimotoNBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NgoEBDGNRR15, author = {Xuan Thuy Ngo and Ingrid Exurville and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Jean{-}Baptiste Rigaud and Bruno Robisson}, editor = {Wolfgang Nebel and David Atienza}, title = {Hardware trojan detection by delay and electromagnetic measurements}, booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March 9-13, 2015}, pages = {782--787}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2755931}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/NgoEBDGNRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/NgoNBRDG15, author = {Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and Debapriya Basu Roy and Jean{-}Luc Danger and Sylvain Guilley}, title = {Integrated Sensor: {A} Backdoor for Hardware Trojan Insertions?}, booktitle = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira, Portugal, August 26-28, 2015}, pages = {415--422}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSD.2015.119}, doi = {10.1109/DSD.2015.119}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/NgoNBRDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/CarletDDGNNPT15, author = {Claude Carlet and Abderrahman Daif and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Xuan Thuy Ngo and Thibault Porteboeuf and C{\'{e}}dric Tavernier}, title = {Optimized linear complementary codes implementation for hardware trojan prevention}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim, Norway, August 24-26, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECCTD.2015.7300075}, doi = {10.1109/ECCTD.2015.7300075}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/CarletDDGNNPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/NgoDGNE15, author = {Xuan Thuy Ngo and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Olivier Emery}, title = {Hardware property checker for run-time Hardware Trojan detection}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim, Norway, August 24-26, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECCTD.2015.7300085}, doi = {10.1109/ECCTD.2015.7300085}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/NgoDGNE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High precision fault injections on the instruction cache of ARMv7-M architectures}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {62--67}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140238}, doi = {10.1109/HST.2015.7140238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/NgoBDGN15, author = {Xuan Thuy Ngo and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {82--87}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140242}, doi = {10.1109/HST.2015.7140242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/NgoBDGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/RoyBGDM15, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger and Debdeep Mukhopadhyay}, title = {From theory to practice of private circuit: {A} cautionary note}, booktitle = {33rd {IEEE} International Conference on Computer Design, {ICCD} 2015, New York City, NY, USA, October 18-21, 2015}, pages = {296--303}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICCD.2015.7357117}, doi = {10.1109/ICCD.2015.7357117}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/RoyBGDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icicdt/AmouriBMGD15, author = {Emna Amouri and Shivam Bhasin and Yves Mathieu and Tarik Graba and Jean{-}Luc Danger}, title = {Countering early propagation and routing imbalance of {DPL} designs in a tree-based {FPGA}}, booktitle = {2015 International Conference on {IC} Design {\&} Technology, {ICICDT} 2015, Leuven, Belgium, June 1-3, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICICDT.2015.7165897}, doi = {10.1109/ICICDT.2015.7165897}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icicdt/AmouriBMGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/RakotomalalaNND15, author = {Henitsoa Rakotomalala and Xuan Thuy Ngo and Zakaria Najm and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Michael H{\"{u}}bner and Maya B. Gokhale and Ren{\'{e}} Cumplido}, title = {Private circuits {II} versus fault injection attacks}, booktitle = {International Conference on ReConFigurable Computing and FPGAs, ReConFig 2015, Riviera Maya, Mexico, December 7-9, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ReConFig.2015.7393338}, doi = {10.1109/RECONFIG.2015.7393338}, timestamp = {Wed, 28 Apr 2021 16:06:54 +0200}, biburl = {https://dblp.org/rec/conf/reconfig/RakotomalalaNND15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/RoyBGDMNN15, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger and Debdeep Mukhopadhyay and Xuan Thuy Ngo and Zakaria Najm}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Reconfigurable {LUT:} {A} Double Edged Sword for Security-Critical Applications}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {248--268}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_15}, doi = {10.1007/978-3-319-24126-5\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/RoyBGDMNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures}, journal = {CoRR}, volume = {abs/1510.01537}, year = {2015}, url = {http://arxiv.org/abs/1510.01537}, eprinttype = {arXiv}, eprint = {1510.01537}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyBGDM15, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger and Debdeep Mukhopadhyay}, title = {Reconfigurable {LUT:} Boon or Bane for Secure Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2015}, url = {http://eprint.iacr.org/2015/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyBGDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2015}, url = {http://eprint.iacr.org/2015/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DangerGHMN15, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Improving the Big Mac Attack on Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2015}, url = {http://eprint.iacr.org/2015/819}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DangerGHMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DugardinPNBDGCT15, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean{-}Luc Danger and Sylvain Guilley and Jean{-}Christophe Courr{\`{e}}ge and Carine Therond}, title = {Dismantling real-world {ECC} with Horizontal and Vertical Template Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1001}, year = {2015}, url = {http://eprint.iacr.org/2015/1001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujimotoMNHHAHKSLBBBD14, author = {Daisuke Fujimoto and Noriyuki Miura and Makoto Nagata and Yu{-}ichi Hayashi and Naofumi Homma and Takafumi Aoki and Yohei Hori and Toshihiro Katashita and Kazuo Sakiyama and Thanh{-}Ha Le and Julien Bringer and Pirouz Bazargan{-}Sabet and Shivam Bhasin and Jean{-}Luc Danger}, title = {Power Noise Measurements of Cryptographic {VLSI} Circuits Regarding Side-Channel Information Leakage}, journal = {{IEICE} Trans. Electron.}, volume = {97-C}, number = {4}, pages = {272--279}, year = {2014}, url = {https://doi.org/10.1587/transele.E97.C.272}, doi = {10.1587/TRANSELE.E97.C.272}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FujimotoMNHHAHKSLBBBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletDGMP14, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi and Emmanuel Prouff}, title = {Achieving side-channel high-order correlation immunity with leakage squeezing}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {2}, pages = {107--121}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0067-1}, doi = {10.1007/S13389-013-0067-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14, author = {Christophe Clavier and Jean{-}Luc Danger and Guillaume Duc and M. Abdelaziz Elaabid and Beno{\^{\i}}t G{\'{e}}rard and Sylvain Guilley and Annelie Heuser and Michael Kasper and Yang Li and Victor Lomn{\'{e}} and Daisuke Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent Sauvage and Werner Schindler and Marc St{\"{o}}ttinger and Nicolas Veyrat{-}Charvillon and Matthieu Walle and Antoine Wurcker}, title = {Practical improvements of side-channel attacks on {AES:} feedback from the 2nd {DPA} contest}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {259--274}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0075-9}, doi = {10.1007/S13389-014-0075-9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CarletDGM14, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, title = {Leakage squeezing: Optimal implementation and security evaluation}, journal = {J. Math. Cryptol.}, volume = {8}, number = {3}, pages = {249--295}, year = {2014}, url = {https://doi.org/10.1515/jmc-2012-0018}, doi = {10.1515/JMC-2012-0018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/CarletDGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CheeCDGKKSZ14, author = {Yeow Meng Chee and Zouha Cherif and Jean{-}Luc Danger and Sylvain Guilley and Han Mao Kiah and Jon{-}Lark Kim and Patrick Sol{\'{e}} and Xiande Zhang}, title = {Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {11}, pages = {7026--7034}, year = {2014}, url = {https://doi.org/10.1109/TIT.2014.2359207}, doi = {10.1109/TIT.2014.2359207}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CheeCDGKKSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DangerGPPT14, author = {Jean{-}Luc Danger and Sylvain Guilley and Thibault Porteboeuf and Florian Praden and Micha{\"{e}}l Timbert}, editor = {Mila Dalla Preda and Jeffrey Todd McDonald}, title = {{HCODE:} Hardware-Enhanced Real-Time {CFI}}, booktitle = {Proceedings of the 4th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC 2014, New Orleans, LA, USA, December 9, 2014}, pages = {6:1--6:11}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2689702.2689708}, doi = {10.1145/2689702.2689708}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DangerGPPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/NgoGBDN14, author = {Xuan Thuy Ngo and Sylvain Guilley and Shivam Bhasin and Jean{-}Luc Danger and Zakaria Najm}, editor = {Ting Yu and Shengqi Yang}, title = {Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses}, booktitle = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS} '14, New Delhi, India, October 17, 2014}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2668322.2668329}, doi = {10.1145/2668322.2668329}, timestamp = {Tue, 06 Nov 2018 11:07:42 +0100}, biburl = {https://dblp.org/rec/conf/cases/NgoGBDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BerthierBBCCDFG14, author = {Ma{\"{e}}l Berthier and Yves Bocktaels and Julien Bringer and Herv{\'{e}} Chabanne and Taoufik Chouta and Jean{-}Luc Danger and M{\'{e}}lanie Favre and Tarik Graba}, editor = {Emmanuel Prouff}, title = {Studying Leakages on an Embedded Biometric System Using Side Channel Analysis}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {281--298}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_19}, doi = {10.1007/978-3-319-10175-0\_19}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BerthierBBCCDFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/HamdiouiDNSBT14, author = {Said Hamdioui and Jean{-}Luc Danger and Giorgio Di Natale and Fethulah Smailbegovic and Gerard van Battum and Mark M. Tehranipoor}, editor = {Gerhard P. Fettweis and Wolfgang Nebel}, title = {Hacking and protecting {IC} hardware}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2014, Dresden, Germany, March 24-28, 2014}, pages = {1--7}, publisher = {European Design and Automation Association}, year = {2014}, url = {https://doi.org/10.7873/DATE.2014.112}, doi = {10.7873/DATE.2014.112}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/HamdiouiDNSBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BhasinDGMFN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Tarik Graba and Yves Mathieu and Daisuke Fujimoto and Makoto Nagata}, editor = {Christian Berger and Ina Schaefer}, title = {Physical Security Evaluation at an Early Design-Phase: {A} Side-Channel Aware Simulation Methodology}, booktitle = {International Workshop on Engineering Simulations for Cyber-Physical Systems, {ES4CPS} '14, Dresden, Germany, March 28 - 28, 2014}, pages = {13}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2589650.2559628}, doi = {10.1145/2589650.2559628}, timestamp = {Wed, 28 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/BhasinDGMFN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/AmouriBMGDM14, author = {Emna Amouri and Shivam Bhasin and Yves Mathieu and Tarik Graba and Jean{-}Luc Danger and Habib Mehrez}, title = {Balancing {WDDL} dual-rail logic in a tree-based {FPGA} to enhance physical security}, booktitle = {24th International Conference on Field Programmable Logic and Applications, {FPL} 2014, Munich, Germany, 2-4 September, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/FPL.2014.6927422}, doi = {10.1109/FPL.2014.6927422}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/AmouriBMGDM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/DangerDGS14, author = {Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Youssef Souissi}, editor = {Jens Knoop and Valentina Salapura and Israel Koren and Gerardo Pelosi}, title = {High-order timing attacks}, booktitle = {Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014}, pages = {7--12}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556315.2556316}, doi = {10.1145/2556315.2556316}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/DangerDGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CioranescoDGGMNN14, author = {Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Tarik Graba and Sylvain Guilley and Yves Mathieu and David Naccache and Xuan Thuy Ngo}, title = {Cryptographically secure shields}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {25--31}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855563}, doi = {10.1109/HST.2014.6855563}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CioranescoDGGMNN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/FujimotoTMNHHBD14, author = {Daisuke Fujimoto and Daichi Tanaka and Noriyuki Miura and Makoto Nagata and Yu{-}ichi Hayashi and Naofumi Homma and Shivam Bhasin and Jean{-}Luc Danger}, title = {Side-channel leakage on silicon substrate of {CMOS} cryptographic chip}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {32--37}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855564}, doi = {10.1109/HST.2014.6855564}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/FujimotoTMNHHBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BhasinGDN14, author = {Shivam Bhasin and Tarik Graba and Jean{-}Luc Danger and Zakaria Najm}, title = {A look into {SIMON} from a side-channel perspective}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {56--59}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855568}, doi = {10.1109/HST.2014.6855568}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BhasinGDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14, author = {Taoufik Chouta and Tarik Graba and Jean{-}Luc Danger and Julien Bringer and Ma{\"{e}}l Berthier and Yves Bocktaels and M{\'{e}}lanie Favre and Herv{\'{e}} Chabanne}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side channel analysis on an embedded hardware fingerprint biometric comparator {\&} low cost countermeasures}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611771}, doi = {10.1145/2611765.2611771}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhasinDGN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel leakage and trace compression using normalized inter-class variance}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {7:1--7:9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611772}, doi = {10.1145/2611765.2611772}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/DangerGP14, author = {Jean{-}Luc Danger and Sylvain Guilley and Florian Praden}, editor = {Suresh Jagannathan and Peter Sewell}, title = {Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding}, booktitle = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego, CA, {USA}}, pages = {5:1--5:11}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556464.2556469}, doi = {10.1145/2556464.2556469}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/DangerGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BruneauDGHT14, author = {Nicolas Bruneau and Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia}, editor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont}, title = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {183--200}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_13}, doi = {10.1007/978-3-319-12060-7\_13}, timestamp = {Mon, 15 Jun 2020 17:10:47 +0200}, biburl = {https://dblp.org/rec/conf/space/BruneauDGHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BhasinBDGN14, author = {Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, editor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont}, title = {Analysis and Improvements of the {DPA} Contest v4 Implementation}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {201--218}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_14}, doi = {10.1007/978-3-319-12060-7\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/BhasinBDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14, author = {Yuto Nakano and Youssef Souissi and Robert Nguyen and Laurent Sauvage and Jean{-}Luc Danger and Sylvain Guilley and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {David Naccache and Damien Sauveron}, title = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {76--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_6}, doi = {10.1007/978-3-662-43826-8\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2013, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05302-8}, doi = {10.1007/978-3-319-05302-8}, isbn = {978-3-319-05301-1}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CheeCDGKKSZ14, author = {Yeow Meng Chee and Zouha Cherif and Jean{-}Luc Danger and Sylvain Guilley and Han Mao Kiah and Jon{-}Lark Kim and Patrick Sol{\'{e}} and Xiande Zhang}, title = {Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions}, journal = {CoRR}, volume = {abs/1401.3928}, year = {2014}, url = {http://arxiv.org/abs/1401.3928}, eprinttype = {arXiv}, eprint = {1401.3928}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CheeCDGKKSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BerthierBBCCDFG14, author = {Ma{\"{e}}l Berthier and Yves Bocktaels and Julien Bringer and Herv{\'{e}} Chabanne and Taoufik Chouta and Jean{-}Luc Danger and M{\'{e}}lanie Favre and Tarik Graba}, title = {Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2014}, url = {http://eprint.iacr.org/2014/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BerthierBBCCDFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinDGNS14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage}, title = {Hardware Trojan Horses in Cryptographic {IP} Cores}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {750}, year = {2014}, url = {http://eprint.iacr.org/2014/750}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinDGNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauDGHT14, author = {Nicolas Bruneau and Jean{-}Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia}, title = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {935}, year = {2014}, url = {http://eprint.iacr.org/2014/935}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauDGHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinDGN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1020}, year = {2014}, url = {http://eprint.iacr.org/2014/1020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BriaisDG13, author = {S{\'{e}}bastien Briais and Jean{-}Luc Danger and Sylvain Guilley}, title = {A formal study of two physical countermeasures against side channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {3}, pages = {169--180}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0054-6}, doi = {10.1007/S13389-013-0054-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BriaisDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BhasinGHD13, author = {Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Jean{-}Luc Danger}, title = {From cryptography to hardware: analyzing and protecting embedded Xilinx {BRAM} for cryptographic applications}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {213--225}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0048-4}, doi = {10.1007/S13389-013-0048-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BhasinGHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {241--265}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0062-6}, doi = {10.1007/S13389-013-0062-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BelgarricBBDDGHNR13, author = {Pierre Belgarric and Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Annelie Heuser and Zakaria Najm and Olivier Rioul}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Time-Frequency Analysis for Second-Order Attacks}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {108--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_8}, doi = {10.1007/978-3-319-08302-5\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BelgarricBBDDGHNR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/BhasinDGN13, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {A low-entropy first-degree secure provable masking scheme for resource-constrained devices}, booktitle = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013, Montreal, Quebec, Canada, September 29 - October 4, 2013}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2527317.2527324}, doi = {10.1145/2527317.2527324}, timestamp = {Tue, 06 Nov 2018 11:07:42 +0100}, biburl = {https://dblp.org/rec/conf/cases/BhasinDGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/LiEDHALDOS13, author = {Yang Li and Sho Endo and Nicolas Debande and Naofumi Homma and Takafumi Aoki and Thanh{-}Ha Le and Jean{-}Luc Danger and Kazuo Ohta and Kazuo Sakiyama}, editor = {Emmanuel Prouff}, title = {Exploring the Relations between Fault Sensitivity and Power Consumption}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {137--153}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_9}, doi = {10.1007/978-3-642-40026-1\_9}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/LiEDHALDOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/LozachBGD13, author = {Florent Lozach and Molka Ben{-}Romdhane and Tarik Graba and Jean{-}Luc Danger}, title = {{FPGA} Design of an Open-Loop True Random Number Generator}, booktitle = {2013 Euromicro Conference on Digital System Design, {DSD} 2013, Los Alamitos, CA, USA, September 4-6, 2013}, pages = {615--622}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSD.2013.73}, doi = {10.1109/DSD.2013.73}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/LozachBGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/BhasinDGNS13, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage}, editor = {Wieland Fischer and J{\"{o}}rn{-}Marc Schmidt}, title = {Hardware Trojan Horses in Cryptographic {IP} Cores}, booktitle = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013}, pages = {15--29}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FDTC.2013.15}, doi = {10.1109/FDTC.2013.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BhasinDGNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/CherifDLMB13, author = {Zouha Cherif and Jean{-}Luc Danger and Florent Lozach and Yves Mathieu and Lilian Bossuet}, editor = {Ruby B. Lee and Weidong Shi}, title = {Evaluation of delay PUFs on {CMOS} 65 nm technology: {ASIC} vs {FPGA}}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {4}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487730}, doi = {10.1145/2487726.2487730}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/CherifDLMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/CherifDGKS13, author = {Zouha Cherif and Jean{-}Luc Danger and Sylvain Guilley and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Multiply constant weight codes}, booktitle = {Proceedings of the 2013 {IEEE} International Symposium on Information Theory, Istanbul, Turkey, July 7-12, 2013}, pages = {306--310}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISIT.2013.6620237}, doi = {10.1109/ISIT.2013.6620237}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/CherifDGKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Dynamic countermeasure against the Zero Power Analysis}, booktitle = {{IEEE} International Symposium on Signal Processing and Information Technology, Athens, Greece, December 12-15, 2013}, pages = {140--147}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISSPIT.2013.6781869}, doi = {10.1109/ISSPIT.2013.6781869}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/newcas/Ben-RomdhaneGDM13, author = {Molka Ben{-}Romdhane and Tarik Graba and Jean{-}Luc Danger and Yves Mathieu}, title = {Design methodology of an {ASIC} {TRNG} based on an open-loop delay chain}, booktitle = {{IEEE} 11th International New Circuits and Systems Conference, {NEWCAS} 2013, Paris, France, June 16-19, 2013}, pages = {1--4}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/NEWCAS.2013.6573654}, doi = {10.1109/NEWCAS.2013.6573654}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/newcas/Ben-RomdhaneGDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recosoc/BhasinHGD13, author = {Shivam Bhasin and Wei He and Sylvain Guilley and Jean{-}Luc Danger}, title = {Exploiting {FPGA} block memories for protected cryptographic implementations}, booktitle = {2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Darmstadt, Germany, July 10-12, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ReCoSoC.2013.6581529}, doi = {10.1109/RECOSOC.2013.6581529}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/recosoc/BhasinHGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Ben-RomdhaneGD13, author = {Molka Ben{-}Romdhane and Tarik Graba and Jean{-}Luc Danger}, editor = {Michael Huth and N. Asokan and Srdjan Capkun and Ivan Flechais and Lizzie Coles{-}Kemp}, title = {Stochastic Model of a Metastability-Based True Random Number Generator}, booktitle = {Trust and Trustworthy Computing - 6th International Conference, {TRUST} 2013, London, UK, June 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7904}, pages = {92--105}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38908-5\_7}, doi = {10.1007/978-3-642-38908-5\_7}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/conf/trust/Ben-RomdhaneGD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinDGN13, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {{NICV:} Normalized Inter-Class Variance for Detection of Side-Channel Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {717}, year = {2013}, url = {http://eprint.iacr.org/2013/717}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinDGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Dynamic Countermeasure Against the Zero Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {764}, year = {2013}, url = {http://eprint.iacr.org/2013/764}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijrc/SauvageGFDM12, author = {Laurent Sauvage and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Yves Mathieu}, title = {Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography}, journal = {Int. J. Reconfigurable Comput.}, volume = {2012}, pages = {360242:1--360242:9}, year = {2012}, url = {https://doi.org/10.1155/2012/360242}, doi = {10.1155/2012/360242}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijrc/SauvageGFDM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/MaghrebiCGD12, author = {Houssem Maghrebi and Claude Carlet and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Optimal First-Order Masking with Linear and Non-linear Bijections}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {360--377}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_22}, doi = {10.1007/978-3-642-31410-0\_22}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/MaghrebiCGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DangerGHMN12, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, editor = {Stefan Mangard}, title = {Low-Cost Countermeasure against {RPA}}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {106--122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_8}, doi = {10.1007/978-3-642-37288-9\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DangerGHMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BriaisCCDGJMNP12, author = {S{\'{e}}bastien Briais and St{\'{e}}phane Caron and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and Jacques{-}Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {3D Hardware Canaries}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {1--22}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_1}, doi = {10.1007/978-3-642-33027-8\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BriaisCCDGJMNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MurdicaGDHN12, author = {C{\'{e}}dric Murdica and Sylvain Guilley and Jean{-}Luc Danger and Philippe Hoogvorst and David Naccache}, editor = {Werner Schindler and Sorin A. Huss}, title = {Same Values Power Analysis Using Special Points on Elliptic Curves}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {183--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_14}, doi = {10.1007/978-3-642-29912-4\_14}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MurdicaGDHN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MaghrebiPGD12, author = {Houssem Maghrebi and Emmanuel Prouff and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Orr Dunkelman}, title = {A First-Order Leak-Free Masking Countermeasure}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {156--170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_10}, doi = {10.1007/978-3-642-27954-6\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MaghrebiPGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SouissiBGND12, author = {Youssef Souissi and Shivam Bhasin and Sylvain Guilley and Maxime Nassar and Jean{-}Luc Danger}, editor = {Orr Dunkelman}, title = {Towards Different Flavors of Combined Side Channel Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {245--259}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_16}, doi = {10.1007/978-3-642-27954-6\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SouissiBGND12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NassarSGD12, author = {Maxime Nassar and Youssef Souissi and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Wolfgang Rosenstiel and Lothar Thiele}, title = {{RSM:} {A} small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs}, booktitle = {2012 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012}, pages = {1173--1178}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/DATE.2012.6176671}, doi = {10.1109/DATE.2012.6176671}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/NassarSGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/CherifDGB12, author = {Zouha Cherif and Jean{-}Luc Danger and Sylvain Guilley and Lilian Bossuet}, title = {An Easy-to-Design {PUF} Based on a Single Oscillator: The Loop {PUF}}, booktitle = {15th Euromicro Conference on Digital System Design, {DSD} 2012, Cesme, Izmir, Turkey, September 5-8, 2012}, pages = {156--162}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSD.2012.22}, doi = {10.1109/DSD.2012.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/CherifDGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/ChoutaDSG12, author = {Taoufik Chouta and Jean{-}Luc Danger and Laurent Sauvage and Tarik Graba}, title = {A Small and High-Performance Coprocessor for Fingerprint Match-on-Card}, booktitle = {15th Euromicro Conference on Digital System Design, {DSD} 2012, Cesme, Izmir, Turkey, September 5-8, 2012}, pages = {915--922}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSD.2012.14}, doi = {10.1109/DSD.2012.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/ChoutaDSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/BriaisCDGNP12, author = {S{\'{e}}bastien Briais and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and David Naccache and Thibault Porteboeuf}, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {Random Active Shield}, booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, pages = {103--113}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FDTC.2012.11}, doi = {10.1109/FDTC.2012.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BriaisCDGNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MaghrebiGPD12, author = {Houssem Maghrebi and Sylvain Guilley and Emmanuel Prouff and Jean{-}Luc Danger}, title = {Register leakage masking using Gray code}, booktitle = {2012 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012}, pages = {37--42}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HST.2012.6224316}, doi = {10.1109/HST.2012.6224316}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MaghrebiGPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaghrebiRGD12, author = {Houssem Maghrebi and Olivier Rioul and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Comparison between Side-Channel Analysis Distinguishers}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {331--340}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_30}, doi = {10.1007/978-3-642-34129-8\_30}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaghrebiRGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icistm/GuilleyDNN12, author = {Sylvain Guilley and Jean{-}Luc Danger and Robert Nguyen and Philippe Nguyen}, editor = {Sumeet Dua and Aryya Gangopadhyay and Parimala Thulasiraman and Umberto Straccia and Michael A. Shepherd and Benno Stein}, title = {System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion}, booktitle = {Information Systems, Technology and Management - 6th International Conference, {ICISTM} 2012, Grenoble, France, March 28-30, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {285}, pages = {433--438}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29166-1\_41}, doi = {10.1007/978-3-642-29166-1\_41}, timestamp = {Wed, 30 Oct 2019 15:50:13 +0100}, biburl = {https://dblp.org/rec/conf/icistm/GuilleyDNN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/CarletDGM12, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Leakage Squeezing of Order Two}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {120--139}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_8}, doi = {10.1007/978-3-642-34931-7\_8}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/CarletDGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/BhasinGD12, author = {Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger}, title = {From Cryptography to Hardware: Analyzing Embedded Xilinx {BRAM} for Cryptographic Applications}, booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MICROW.2012.11}, doi = {10.1109/MICROW.2012.11}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/BhasinGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/DebandeSEGD12, author = {Nicolas Debande and Youssef Souissi and M. Abdelaziz Elaabid and Sylvain Guilley and Jean{-}Luc Danger}, title = {Wavelet transform based pre-processing for side channel analysis}, booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012}, pages = {32--38}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MICROW.2012.15}, doi = {10.1109/MICROW.2012.15}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/DebandeSEGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/SouissiDMGMD12, author = {Youssef Souissi and Nicolas Debande and Sami Mekki and Sylvain Guilley and Ali Maalaoui and Jean{-}Luc Danger}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {169--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_15}, doi = {10.1007/978-3-642-30955-7\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/SouissiDMGMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/GuilleyD12, author = {Sylvain Guilley and Jean{-}Luc Danger}, editor = {Marc Joye and Michael Tunstall}, title = {Global Faults on Cryptographic Circuits}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {295--311}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_17}, doi = {10.1007/978-3-642-29656-7\_17}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/GuilleyD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiPGD12, author = {Houssem Maghrebi and Emmanuel Prouff and Sylvain Guilley and Jean{-}Luc Danger}, title = {A First-Order Leak-Free Masking Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2012}, url = {http://eprint.iacr.org/2012/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiPGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiCGD12, author = {Houssem Maghrebi and Claude Carlet and Sylvain Guilley and Jean{-}Luc Danger}, title = {Optimal First-Order Masking with Linear and Non-Linear Bijections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2012}, url = {http://eprint.iacr.org/2012/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiCGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BriaisCCDGJMNP12, author = {S{\'{e}}bastien Briais and St{\'{e}}phane Caron and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and Jacques{-}Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf}, title = {3D Hardware Canaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2012}, url = {http://eprint.iacr.org/2012/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BriaisCCDGJMNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BriaisGD12, author = {S{\'{e}}bastien Briais and Sylvain Guilley and Jean{-}Luc Danger}, title = {A formal study of two physical countermeasures against side channel attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2012}, url = {http://eprint.iacr.org/2012/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BriaisGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGM12, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, title = {Leakage Squeezing of Order Two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2012}, url = {http://eprint.iacr.org/2012/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SelmaneBGD11, author = {Nidhal Selmane and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger}, title = {Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks}, journal = {{IET} Inf. Secur.}, volume = {5}, number = {4}, pages = {181--190}, year = {2011}, url = {https://doi.org/10.1049/iet-ifs.2010.0238}, doi = {10.1049/IET-IFS.2010.0238}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SelmaneBGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasip/SouissiDGBN11, author = {Youssef Souissi and Jean{-}Luc Danger and Sylvain Guilley and Shivam Bhasin and Maxime Nassar}, editor = {Jari Nurmi and Tapani Ahonen}, title = {Embedded systems security: An evaluation methodology against Side Channel Attacks}, booktitle = {2011 Conference on Design and Architectures for Signal and Image Processing, {DASIP} 2011, Tampere, Finland, November 2-4, 2011}, pages = {230--237}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/DASIP.2011.6136885}, doi = {10.1109/DASIP.2011.6136885}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dasip/SouissiDGBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/MeynardRFGHD11, author = {Olivier Meynard and Denis R{\'{e}}al and Florent Flament and Sylvain Guilley and Naofumi Homma and Jean{-}Luc Danger}, title = {Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques}, booktitle = {Design, Automation and Test in Europe, {DATE} 2011, Grenoble, France, March 14-18, 2011}, pages = {1004--1009}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5763163/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/MeynardRFGHD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etfa/ThomasRFGDD11, author = {S{\'{e}}bastien Thomas and Didier Regis and David Faura and Marc Gatti and Guillaume Duc and Jean{-}Luc Danger}, editor = {Zoubir Mammeri}, title = {Non intrusive fault detection through electromagnetism analysis}, booktitle = {{IEEE} 16th Conference on Emerging Technologies {\&} Factory Automation, {ETFA} 2011, Toulouse, France, September 5-9, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ETFA.2011.6059065}, doi = {10.1109/ETFA.2011.6059065}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/etfa/ThomasRFGDD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MaghrebiGD11, author = {Houssem Maghrebi and Sylvain Guilley and Jean{-}Luc Danger}, title = {Formal security evaluation of hardware Boolean masking against second-order attacks}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {40--46}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5954993}, doi = {10.1109/HST.2011.5954993}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MaghrebiGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GuilleySDSR11, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Nidhal Selmane and Denis R{\'{e}}al}, title = {Performance evaluation of protocols resilient to physical attacks}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {51--56}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5954995}, doi = {10.1109/HST.2011.5954995}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GuilleySDSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NassarGD11, author = {Maxime Nassar and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {22--39}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_4}, doi = {10.1007/978-3-642-25578-6\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NassarGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosechicomnet/NassarSGD11, author = {Maxime Nassar and Youssef Souissi and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Marc Joye and Debdeep Mukhopadhyay and Michael Tunstall}, title = {"Rank Correction": {A} New Side-Channel Approach for Secret Key Recovery}, booktitle = {Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7011}, pages = {128--143}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24586-2\_12}, doi = {10.1007/978-3-642-24586-2\_12}, timestamp = {Fri, 27 Mar 2020 08:56:51 +0100}, biburl = {https://dblp.org/rec/conf/infosechicomnet/NassarSGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/BhasinGSGD11, author = {Shivam Bhasin and Sylvain Guilley and Youssef Souissi and Tarik Graba and Jean{-}Luc Danger}, editor = {Peter M. Athanas and J{\"{u}}rgen Becker and Ren{\'{e}} Cumplido}, title = {Efficient Dual-Rail Implementations in {FPGA} Using Block RAMs}, booktitle = {2011 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2011, Cancun, Mexico, November 30 - December 2, 2011}, pages = {261--267}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ReConFig.2011.32}, doi = {10.1109/RECONFIG.2011.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/BhasinGSGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/DebandeSNGLD11, author = {Nicolas Debande and Youssef Souissi and Maxime Nassar and Sylvain Guilley and Thanh{-}Ha Le and Jean{-}Luc Danger}, title = {"Re-synchronization by moments": An efficient solution to align Side-Channel traces}, booktitle = {2011 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WIFS.2011.6123143}, doi = {10.1109/WIFS.2011.6123143}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/DebandeSNGLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GuilleyKLD11, author = {Sylvain Guilley and Karim Khalfallah and Victor Lomn{\'{e}} and Jean{-}Luc Danger}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Formal Framework for the Evaluation of Waveform Resynchronization Algorithms}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {100--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_7}, doi = {10.1007/978-3-642-21040-2\_7}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/GuilleyKLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MaghrebiGD11, author = {Houssem Maghrebi and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Leakage Squeezing Countermeasure against High-Order Attacks}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {208--223}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_14}, doi = {10.1007/978-3-642-21040-2\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MaghrebiGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-1360, author = {Sumanta Chaudhuri and Sylvain Guilley and Philippe Hoogvorst and Jean{-}Luc Danger and Taha Beyrouthy and Alin Razafindraibe and Laurent Fesquet and Marc Renaudin}, title = {A Secure Asynchronous {FPGA} Architecture, Experimental Results and Some Debug Feedback}, journal = {CoRR}, volume = {abs/1103.1360}, year = {2011}, url = {http://arxiv.org/abs/1103.1360}, eprinttype = {arXiv}, eprint = {1103.1360}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-1360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghebiGCD11, author = {Houssem Maghrebi and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger}, title = {Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2011}, url = {http://eprint.iacr.org/2011/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghebiGCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NassarGD11, author = {Maxime Nassar and Sylvain Guilley and Jean{-}Luc Danger}, title = {Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2011}, url = {http://eprint.iacr.org/2011/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NassarGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijrc/SauvageNGFDM10, author = {Laurent Sauvage and Maxime Nassar and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Yves Mathieu}, title = {Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics}, journal = {Int. J. Reconfigurable Comput.}, volume = {2010}, pages = {375245:1--375245:12}, year = {2010}, url = {https://doi.org/10.1155/2010/375245}, doi = {10.1155/2010/375245}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijrc/SauvageNGFDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/BhasinGFSD10, author = {Shivam Bhasin and Sylvain Guilley and Florent Flament and Nidhal Selmane and Jean{-}Luc Danger}, title = {Countering early evaluation: an approach towards robust dual-rail precharge logic}, booktitle = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS} 2010, Scottsdale, AZ, USA, October 24, 2010}, pages = {6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873548.1873554}, doi = {10.1145/1873548.1873554}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/BhasinGFSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MeynardRGFDV10, author = {Olivier Meynard and Denis R{\'{e}}al and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Characterization of the Electromagnetic Side Channel in Frequency Domain}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {471--486}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_33}, doi = {10.1007/978-3-642-21518-6\_33}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MeynardRGFDV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BhasinGSD10, author = {Shivam Bhasin and Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger}, editor = {Josef Pieprzyk}, title = {Unrolling Cryptographic Circuits: {A} Simple Countermeasure Against Side-Channel Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {195--207}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_14}, doi = {10.1007/978-3-642-11925-5\_14}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BhasinGSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NassarBDDG10, author = {Maxime Nassar and Shivam Bhasin and Jean{-}Luc Danger and Guillaume Duc and Sylvain Guilley}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {{BCDL:} {A} high speed balanced {DPL} for {FPGA} with global precharge and no early evaluation}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {849--854}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456932}, doi = {10.1109/DATE.2010.5456932}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/NassarBDDG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/MeynardGDS10, author = {Olivier Meynard and Sylvain Guilley and Jean{-}Luc Danger and Laurent Sauvage}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {Far Correlation-based {EMA} with a precharacterized leakage model}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {977--980}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456906}, doi = {10.1109/DATE.2010.5456906}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/MeynardGDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/GuilleySDS10, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Nidhal Selmane}, editor = {Luca Breveglieri and Marc Joye and Israel Koren and David Naccache and Ingrid Verbauwhede}, title = {Fault Injection Resilience}, booktitle = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2010, Santa Barbara, California, USA, 21 August 2010}, pages = {51--65}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FDTC.2010.15}, doi = {10.1109/FDTC.2010.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/GuilleySDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MaghrebiGDF10, author = {Houssem Maghrebi and Sylvain Guilley and Jean{-}Luc Danger and Florent Flament}, editor = {Jim Plusquellic and Ken Mai}, title = {Entropy-based Power Attack}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513124}, doi = {10.1109/HST.2010.5513124}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MaghrebiGDF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/SouissiGDMD10, author = {Youssef Souissi and Sylvain Guilley and Jean{-}Luc Danger and Sami Mekki and Guillaume Duc}, title = {Improvement of power analysis attacks using Kalman filter}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2010, 14-19 March 2010, Sheraton Dallas Hotel, Dallas, Texas, {USA}}, pages = {1778--1781}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICASSP.2010.5495428}, doi = {10.1109/ICASSP.2010.5495428}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/SouissiGDMD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SouissiNGDF10, author = {Youssef Souissi and Maxime Nassar and Sylvain Guilley and Jean{-}Luc Danger and Florent Flament}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {First Principal Components Analysis: {A} New Side Channel Distinguisher}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {407--419}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_27}, doi = {10.1007/978-3-642-24209-0\_27}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SouissiNGDF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/SauvageGFDM10, author = {Laurent Sauvage and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Yves Mathieu}, editor = {Viktor K. Prasanna and J{\"{u}}rgen Becker and Ren{\'{e}} Cumplido}, title = {Cross-Correlation Cartography}, booktitle = {ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings}, pages = {268--273}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ReConFig.2010.75}, doi = {10.1109/RECONFIG.2010.75}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/SauvageGFDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/CherifFDBGC10, author = {Zouha Cherif and Florent Flament and Jean{-}Luc Danger and Shivam Bhasin and Sylvain Guilley and Herv{\'{e}} Chabanne}, editor = {Viktor K. Prasanna and J{\"{u}}rgen Becker and Ren{\'{e}} Cumplido}, title = {Evaluation of White-Box and Grey-Box Noekeon Implementations in {FPGA}}, booktitle = {ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings}, pages = {310--315}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ReConFig.2010.36}, doi = {10.1109/RECONFIG.2010.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/CherifFDBGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ElaabidMGD10, author = {M. Abdelaziz Elaabid and Olivier Meynard and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Yongwha Chung and Moti Yung}, title = {Combined Side-Channel Attacks}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {175--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_13}, doi = {10.1007/978-3-642-17955-6\_13}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mj/DangerGH09, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst}, title = {High speed true random number generator based on open loop structures in FPGAs}, journal = {Microelectron. J.}, volume = {40}, number = {11}, pages = {1650--1656}, year = {2009}, url = {https://doi.org/10.1016/j.mejo.2009.02.004}, doi = {10.1016/J.MEJO.2009.02.004}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mj/DangerGH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wsn/MekkiDM09, author = {Sami Mekki and Jean{-}Luc Danger and Benoit Miscopein}, title = {On the Implementation of a Probabilistic Equalizer for Low-Cost Impulse Radio {UWB} in High Data Rate}, journal = {Wirel. Sens. Netw.}, volume = {1}, number = {4}, pages = {245--256}, year = {2009}, url = {https://doi.org/10.4236/wsn.2009.14031}, doi = {10.4236/WSN.2009.14031}, timestamp = {Wed, 25 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wsn/MekkiDM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/SauvageGDMN09, author = {Laurent Sauvage and Sylvain Guilley and Jean{-}Luc Danger and Yves Mathieu and Maxime Nassar}, editor = {Luca Benini and Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller}, title = {Successful attack on an FPGA-based {WDDL} {DES} cryptoprocessor without place and route constraints}, booktitle = {Design, Automation and Test in Europe, {DATE} 2009, Nice, France, April 20-24, 2009}, pages = {640--645}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/DATE.2009.5090745}, doi = {10.1109/DATE.2009.5090745}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/SauvageGDMN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/SelmaneBGGD09, author = {Nidhal Selmane and Shivam Bhasin and Sylvain Guilley and Tarik Graba and Jean{-}Luc Danger}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {{WDDL} is Protected against Setup Time Violation Attacks}, booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, pages = {73--83}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FDTC.2009.40}, doi = {10.1109/FDTC.2009.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/SelmaneBGGD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BhasinDGS09, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Nidhal Selmane}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Security Evaluation of Different {AES} Implementations Against Practical Setup Time Violation Attacks in FPGAs}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings}, pages = {15--21}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HST.2009.5225057}, doi = {10.1109/HST.2009.5225057}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BhasinDGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/GuilleyCSDBF09, author = {Sylvain Guilley and Sumanta Chaudhuri and Laurent Sauvage and Jean{-}Luc Danger and Taha Beyrouthy and Laurent Fesquet}, title = {Updates on the potential of clock-less logics to strengthen cryptographic circuits against side-channel attacks}, booktitle = {16th {IEEE} International Conference on Electronics, Circuits, and Systems, {ICECS} 2009, Yasmine Hammamet, Tunisia, 13-19 December, 2009}, pages = {351--354}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICECS.2009.5411008}, doi = {10.1109/ICECS.2009.5411008}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/GuilleyCSDBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/BringerCD09, author = {Julien Bringer and Herv{\'{e}} Chabanne and Jean{-}Luc Danger}, editor = {Viktor K. Prasanna and Lionel Torres and Ren{\'{e}} Cumplido}, title = {Protecting the {NOEKEON} Cipher against {SCARE} Attacks in FPGAs by Using Dynamic Implementations}, booktitle = {ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings}, pages = {183--188}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ReConFig.2009.19}, doi = {10.1109/RECONFIG.2009.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/BringerCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/BhasinDFGGMNSS09, author = {Shivam Bhasin and Jean{-}Luc Danger and Florent Flament and Tarik Graba and Sylvain Guilley and Yves Mathieu and Maxime Nassar and Laurent Sauvage and Nidhal Selmane}, editor = {Viktor K. Prasanna and Lionel Torres and Ren{\'{e}} Cumplido}, title = {Combined {SCA} and {DFA} Countermeasures Integrable in a {FPGA} Design Flow}, booktitle = {ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings}, pages = {213--218}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ReConFig.2009.50}, doi = {10.1109/RECONFIG.2009.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/BhasinDFGGMNSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/SauvageNGFDM09, author = {Laurent Sauvage and Maxime Nassar and Sylvain Guilley and Florent Flament and Jean{-}Luc Danger and Yves Mathieu}, editor = {Viktor K. Prasanna and Lionel Torres and Ren{\'{e}} Cumplido}, title = {{DPL} on Stratix {II} {FPGA:} What to Expect?}, booktitle = {ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ReConFig.2009.58}, doi = {10.1109/RECONFIG.2009.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/SauvageNGFDM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCD09, author = {Julien Bringer and Herv{\'{e}} Chabanne and Jean{-}Luc Danger}, title = {Protecting the {NOEKEON} Cipher Against {SCARE} Attacks in FPGAs by using Dynamic Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2009}, url = {http://eprint.iacr.org/2009/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/ChaudhuriGHDBRFR08, author = {Sumanta Chaudhuri and Sylvain Guilley and Philippe Hoogvorst and Jean{-}Luc Danger and Taha Beyrouthy and Alin Razafindraibe and Laurent Fesquet and Marc Renaudin}, editor = {Roger F. Woods and Katherine Compton and Christos{-}Savvas Bouganis and Pedro C. Diniz}, title = {Physical Design of {FPGA} Interconnect to Prevent Information Leakage}, booktitle = {Reconfigurable Computing: Architectures, Tools and Applications, 4th International Workshop, {ARC} 2008, London, UK, March 26-28, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4943}, pages = {87--98}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78610-8\_11}, doi = {10.1007/978-3-540-78610-8\_11}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/ChaudhuriGHDBRFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/ChaudhuriGFHD08, author = {Sumanta Chaudhuri and Sylvain Guilley and Florent Flament and Philippe Hoogvorst and Jean{-}Luc Danger}, editor = {Limor Fix}, title = {An 8x8 run-time reconfigurable {FPGA} embedded in a SoC}, booktitle = {Proceedings of the 45th Design Automation Conference, {DAC} 2008, Anaheim, CA, USA, June 8-13, 2008}, pages = {120--125}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1391469.1391500}, doi = {10.1145/1391469.1391500}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/ChaudhuriGFHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/SelmaneGD08, author = {Nidhal Selmane and Sylvain Guilley and Jean{-}Luc Danger}, title = {Practical Setup Time Violation Attacks on {AES}}, booktitle = {Seventh European Dependable Computing Conference, {EDCC-7} 2008, Kaunas, Lithuania, 7-9 May 2008}, pages = {91--96}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EDCC-7.2008.11}, doi = {10.1109/EDCC-7.2008.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edcc/SelmaneGD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/GuilleySDSP08, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Nidhal Selmane and Renaud Pacalet}, editor = {Luca Breveglieri and Shay Gueron and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {Silicon-level Solutions to Counteract Passive and Active Attacks}, booktitle = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FDTC.2008.18}, doi = {10.1109/FDTC.2008.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/GuilleySDSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/ChaudhuriDHG08, author = {Sumanta Chaudhuri and Jean{-}Luc Danger and Philippe Hoogvorst and Sylvain Guilley}, editor = {Mike Hutton and Paul Chow}, title = {Efficient tiling patterns for reconfigurable gate arrays}, booktitle = {Proceedings of the {ACM/SIGDA} 16th International Symposium on Field Programmable Gate Arrays, {FPGA} 2008, Monterey, California, USA, February 24-26, 2008}, pages = {257}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1344671.1344709}, doi = {10.1145/1344671.1344709}, timestamp = {Tue, 06 Nov 2018 16:58:23 +0100}, biburl = {https://dblp.org/rec/conf/fpga/ChaudhuriDHG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/GuilleySDH08, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Philippe Hoogvorst}, title = {Area optimization of cryptographic co-processors implemented in dual-rail with precharge positive logic}, booktitle = {{FPL} 2008, International Conference on Field Programmable Logic and Applications, Heidelberg, Germany, 8-10 September 2008}, pages = {161--166}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/FPL.2008.4629925}, doi = {10.1109/FPL.2008.4629925}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/GuilleySDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GuilleyCDSHNGV08, author = {Sylvain Guilley and Sumanta Chaudhuri and Jean{-}Luc Danger and Laurent Sauvage and Philippe Hoogvorst and Maxime Nassar and Tarik Graba and Vinh{-}Nga Vong}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Place-and-Route Impact on the Security of {DPL} Designs in FPGAs}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings}, pages = {26--32}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HST.2008.4559042}, doi = {10.1109/HST.2008.4559042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GuilleyCDSHNGV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iswcs/MekkiDMB08, author = {Sami Mekki and Jean{-}Luc Danger and Benoit Miscopein and Joseph J. Boutros}, title = {{EM} channel estimation in a low-cost {UWB} receiver based on energy detection}, booktitle = {Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, {ISWCS} 2008, 21-24 October 2008, Reykjav{\'{\i}}k, Iceland}, pages = {214--218}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISWCS.2008.4726049}, doi = {10.1109/ISWCS.2008.4726049}, timestamp = {Fri, 07 May 2021 15:32:09 +0200}, biburl = {https://dblp.org/rec/conf/iswcs/MekkiDMB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/KhelilHGDS08, author = {Farouk Khelil and Mohamed Hamdi and Sylvain Guilley and Jean{-}Luc Danger and Nidhal Selmane}, editor = {Akshai Aggarwal and Mohamad Badra and Fabio Massacci}, title = {Fault Analysis Attack on an {FPGA} {AES} Implementation}, booktitle = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NTMS.2008.ECP.45}, doi = {10.1109/NTMS.2008.ECP.45}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/KhelilHGDS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/slip/ChaudhuriGHD08, author = {Sumanta Chaudhuri and Sylvain Guilley and Philippe Hoogvorst and Jean{-}Luc Danger}, editor = {Ion I. Mandoiu and Andrew A. Kennings}, title = {Efficient tiling patterns for reconfigurable gate arrays}, booktitle = {The Tenth International Workshop on System-Level Interconnect Prediction {(SLIP} 2008), Newcastle, UK, April 5-8, 2008, Proceedings}, pages = {11--18}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1353610.1353613}, doi = {10.1145/1353610.1353613}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/slip/ChaudhuriGHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/GuilleySDGM08, author = {Sylvain Guilley and Laurent Sauvage and Jean{-}Luc Danger and Tarik Graba and Yves Mathieu}, title = {Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs}, booktitle = {Second International Conference on Secure System Integration and Reliability Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan}, pages = {16--23}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SSIRI.2008.31}, doi = {10.1109/SSIRI.2008.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/GuilleySDGM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/MekkiDMSB08, author = {Sami Mekki and Jean{-}Luc Danger and Benoit Miscopein and Jean Schwoerer and Joseph Jean Boutros}, title = {Probabilistic Equalizer for Ultra-Wideband Energy Detection}, booktitle = {Proceedings of the 67th {IEEE} Vehicular Technology Conference, {VTC} Spring 2008, 11-14 May 2008, Singapore}, pages = {1108--1112}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/VETECS.2008.235}, doi = {10.1109/VETECS.2008.235}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/MekkiDMSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0809-3942, author = {Philippe Hoogvorst and Sylvain Guilley and Sumanta Chaudhuri and Jean{-}Luc Danger and Taha Beyrouthy and Laurent Fesquet}, title = {A Reconfigurable Programmable Logic Block for a Multi-Style Asynchronous {FPGA} resistant to Side-Channel Attacks}, journal = {CoRR}, volume = {abs/0809.3942}, year = {2008}, url = {http://arxiv.org/abs/0809.3942}, eprinttype = {arXiv}, eprint = {0809.3942}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0809-3942.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/GuilloudBTD07, author = {Fr{\'{e}}d{\'{e}}ric Guilloud and Emmanuel Boutillon and Jacky Tousch and Jean{-}Luc Danger}, title = {Generic Description and Synthesis of {LDPC} Decoders}, journal = {{IEEE} Trans. Commun.}, volume = {55}, number = {11}, pages = {2084--2091}, year = {2007}, url = {https://doi.org/10.1109/TCOMM.2007.908517}, doi = {10.1109/TCOMM.2007.908517}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/GuilloudBTD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/ChaudhuriDG07, author = {Sumanta Chaudhuri and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Koen Bertels and Walid A. Najjar and Arjan J. van Genderen and Stamatis Vassiliadis}, title = {Efficient Modeling and Floorplanning of Embedded-FPGA Fabric}, booktitle = {{FPL} 2007, International Conference on Field Programmable Logic and Applications, Amsterdam, The Netherlands, 27-29 August 2007}, pages = {665--669}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/FPL.2007.4380741}, doi = {10.1109/FPL.2007.4380741}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/ChaudhuriDG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/BeyrouthyRFRCGDH07, author = {Taha Beyrouthy and Alin Razafindraibe and Laurent Fesquet and Marc Renaudin and Sumanta Chaudhuri and Sylvain Guilley and Jean{-}Luc Danger and Philippe Hoogvorst}, editor = {Hideharu Amano and Andy Ye and Takeshi Ikenaga}, title = {A Novel Asynchronous e-FPGA Architecture for Security Applications}, booktitle = {2007 International Conference on Field-Programmable Technology, {ICFPT} 2007, Kitakyushu, Japan, December 12-14, 2007}, pages = {369--372}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/FPT.2007.4439288}, doi = {10.1109/FPT.2007.4439288}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fpt/BeyrouthyRFRCGDH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rivf/XuSDGBGM07, author = {Qing Xu and M. B. C. Silva and Jean{-}Luc Danger and Sylvain Guilley and Patrick Bellot and Philippe Gallion and Francisco Mendieta}, title = {Towards Quantum Key Distribution System using Homodyne Detection with Differential Time-Multiplexed Reference}, booktitle = {2007 {IEEE} International Conference on Research, Innovation and Vision for the Future in Computing {\&} Communication Technologies, {RIVF} 2007, Hanoi, Vietnam, 5-9 March 2007}, pages = {158--165}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/RIVF.2007.369151}, doi = {10.1109/RIVF.2007.369151}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rivf/XuSDGBGM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/KrikidisDN06, author = {Ioannis Krikidis and Jean{-}Luc Danger and Lirida A. B. Naviner}, title = {An iterative reconfigurability approach for {WCDMA} high-data-rate communications}, journal = {{IEEE} Wirel. Commun.}, volume = {13}, number = {3}, pages = {8--14}, year = {2006}, url = {https://doi.org/10.1109/MWC.2006.1700065}, doi = {10.1109/MWC.2006.1700065}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/KrikidisDN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/ChaudhuriDGH06, author = {Sumanta Chaudhuri and Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst}, editor = {Ren{\'{e}} Cumplido{-}Parra and C{\'{e}}sar Torres{-}Huitzil and Andr{\'{e}}s D. Garc{\'{\i}}a}, title = {{FASE:} An Open Run-Time Reconfigurable {FPGA} Architecture for Tamper-Resistant and Secure Embedded Systems}, booktitle = {2006 {IEEE} International Conference on Reconfigurable Computing and FPGA's, ReConFig 2006, San Luis Potosi, Mexico, September 20-22, 2006}, pages = {47--55}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/RECONF.2006.307752}, doi = {10.1109/RECONF.2006.307752}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/ChaudhuriDGH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/SouzaKNDBN05, author = {Daniel C. de Souza and Ioannis Krikidis and Lirida A. B. Naviner and Jean{-}Luc Danger and M. A. de Barros and B. G. A. Neto}, title = {Heterogeneous implementation of a rake receiver for {DS-CDMA} communication systems}, booktitle = {12th {IEEE} International Conference on Electronics, Circuits, and Systems, {ICECS} 2005, Gammarth, Tunisia, December 11-14, 2005}, pages = {1--4}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICECS.2005.4633551}, doi = {10.1109/ICECS.2005.4633551}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/SouzaKNDBN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/KrikidisDN05, author = {Ioannis Krikidis and Jean{-}Luc Danger and Lirida A. B. Naviner}, title = {Reconfigurable Implementation Issues of a Detection Scheme for {DS-CDMA} High Data Rate Connections}, booktitle = {Proceedings of the {IEEE} 16th International Symposium on Personal, Indoor and Mobile Radio Communications, Berlin, Germany, September 11-14, 2005}, pages = {695--699}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/PIMRC.2005.1651525}, doi = {10.1109/PIMRC.2005.1651525}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/KrikidisDN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/KrikidisDN04, author = {Ioannis Krikidis and Jean{-}Luc Danger and Lirida A. B. Naviner}, title = {A finger configuration algorithm for a reconfigurable Rake receiver}, booktitle = {2004 {IEEE} Wireless Communications and Networking Conference , {WCNC} 2004, Atlanta, Georgia, USA, 21-25 March 2004}, pages = {311--315}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/WCNC.2004.1311563}, doi = {10.1109/WCNC.2004.1311563}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/KrikidisDN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GuilloudBD02, author = {Fr{\'{e}}d{\'{e}}ric Guilloud and Emmanuel Boutillon and Jean{-}Luc Danger}, title = {Bit error rate calculation for a multiband non-coherent on-off keying demodulation}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2002, April 28 - May 2, 2002, New York City, NY, {USA}}, pages = {202--206}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ICC.2002.996845}, doi = {10.1109/ICC.2002.996845}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/GuilloudBD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/GarciaDB00, author = {Andr{\'{e}}s D. Garc{\'{\i}}a and Jean{-}Luc Danger and Wayne P. Burleson}, editor = {Steve Trimberger and Scott Hauck}, title = {Low power digital design in FPGAs (poster abstract): a study of pipeline architectures implemented in a {FPGA} using a low supply voltage to reduce power consumption}, booktitle = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable Gate Arrays, {FPGA} 2000, Monterey, CA, USA, February 10-11, 2000}, pages = {220}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/329166.329220}, doi = {10.1145/329166.329220}, timestamp = {Tue, 06 Nov 2018 16:58:22 +0100}, biburl = {https://dblp.org/rec/conf/fpga/GarciaDB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/DangerGBL00, author = {Jean{-}Luc Danger and Adel Ghazel and Emmanuel Boutillon and H{\'{e}}di Laamari}, title = {Efficient {FPGA} implementation of Gaussian noise generator for communication channel emulation}, booktitle = {Proceedings of the 2000 7th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2000, Jounieh, Lebanon, December 17-20, 2000}, pages = {366--369}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ICECS.2000.911557}, doi = {10.1109/ICECS.2000.911557}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/DangerGBL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/GarciaBD00, author = {Andr{\'{e}}s D. Garc{\'{\i}}a and Wayne P. Burleson and Jean{-}Luc Danger}, title = {Low power digital design in FPGAs: a study of pipeline architectures implemented in a {FPGA} using a low supply voltage to reduce power consumption}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2000, Emerging Technologies for the 21st Century, Geneva, Switzerland, 28-31 May 2000, Proceedings}, pages = {561--564}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ISCAS.2000.857496}, doi = {10.1109/ISCAS.2000.857496}, timestamp = {Fri, 13 Aug 2021 09:26:01 +0200}, biburl = {https://dblp.org/rec/conf/iscas/GarciaBD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/NavinerDL99, author = {Lirida A. B. Naviner and Jean{-}Luc Danger and C. Laurent}, editor = {Sinan Kaptanoglu and Steve Trimberger}, title = {High-Performance Low-Cost Implementation of Two-Dimensional {DCT} Processor nn {FPGA}}, booktitle = {Proceedings of the 1999 {ACM/SIGDA} Seventh International Symposium on Field Programmable Gate Arrays, {FPGA} 1999, Monterey, CA, USA, February 21-23, 1999}, pages = {249}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/296399.296514}, doi = {10.1145/296399.296514}, timestamp = {Tue, 06 Nov 2018 16:58:22 +0100}, biburl = {https://dblp.org/rec/conf/fpga/NavinerDL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/GarciaBD99, author = {Andr{\'{e}}s D. Garc{\'{\i}}a and Wayne P. Burleson and Jean{-}Luc Danger}, editor = {Patrick Lysaght and James Irvine and Reiner W. Hartenstein}, title = {Power Modelling in Field Programmable Gate Arrays {(FPGA)}}, booktitle = {Field-Programmable Logic and Applications, 9th International Workshop, FPL'99, Glasgow, UK, August 30 - September 1, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1673}, pages = {396--404}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48302-1\_44}, doi = {10.1007/978-3-540-48302-1\_44}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/fpl/GarciaBD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.