BibTeX records: Jean-Luc Danger

download as .bib file

@article{DBLP:journals/tcad/EbrahimabadiMVGDDK24,
  author       = {Mohammad Ebrahimabadi and
                  Suhee Sanjana Mehjabin and
                  Raphael Viera and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Jean{-}Max Dutertre and
                  Naghmeh Karimi},
  title        = {{DELFINES:} Detecting Laser Fault Injection Attacks via Digital Sensors},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {43},
  number       = {3},
  pages        = {774--787},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCAD.2023.3322623},
  doi          = {10.1109/TCAD.2023.3322623},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/EbrahimabadiMVGDDK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BahramiEGDK24,
  author       = {Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  editor       = {Romain Wacquez and
                  Naofumi Homma},
  title        = {Impact of Process Mismatch and Device Aging on SR-Latch Based True
                  Random Number Generators},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 15th International
                  Workshop, {COSADE} 2024, Gardanne, France, April 9-10, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14595},
  pages        = {177--196},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57543-3\_10},
  doi          = {10.1007/978-3-031-57543-3\_10},
  timestamp    = {Mon, 15 Apr 2024 21:35:29 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BahramiEGDK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NabhanDRDS23,
  author       = {Roukoz Nabhan and
                  Jean{-}Max Dutertre and
                  Jean{-}Baptiste Rigaud and
                  Jean{-}Luc Danger and
                  Laurent Sauvage},
  title        = {Highlighting Two {EM} Fault Models While Analyzing a Digital Sensor
                  Limitations},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2023, Antwerp, Belgium, April 17-19, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/DATE56975.2023.10137124},
  doi          = {10.23919/DATE56975.2023.10137124},
  timestamp    = {Wed, 07 Jun 2023 22:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/date/NabhanDRDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/NabhanDRDS23,
  author       = {Roukoz Nabhan and
                  Jean{-}Max Dutertre and
                  Jean{-}Baptiste Rigaud and
                  Jean{-}Luc Danger and
                  Laurent Sauvage},
  title        = {A Tale of Two Models: Discussing the Timing and Sampling {EM} Fault
                  Injection Models},
  booktitle    = {Workshop on Fault Detection and Tolerance in Cryptography, {FDTC}
                  2023, Prague, Czech Republic, September 10, 2023},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/FDTC60478.2023.00010},
  doi          = {10.1109/FDTC60478.2023.00010},
  timestamp    = {Fri, 19 Apr 2024 12:26:32 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/NabhanDRDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/AnikRDGK23,
  author       = {Md Toufiq Hasan Anik and
                  Hasin Ishraq Reefat and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  editor       = {Himanshu Thapliyal and
                  Ronald F. DeMara and
                  Inna Partin{-}Vaisband and
                  Srinivas Katkoori},
  title        = {Aging-Induced Failure Prognosis via Digital Sensors},
  booktitle    = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI}
                  2023, Knoxville, TN, USA, June 5-7, 2023},
  pages        = {703--708},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3583781.3590204},
  doi          = {10.1145/3583781.3590204},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/AnikRDGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hasp/ForcioliDC23,
  author       = {Quentin Forcioli and
                  Jean{-}Luc Danger and
                  Sumanta Chaudhuri},
  title        = {A gem5 based Platform for Micro-Architectural Security Analysis},
  booktitle    = {Proceedings of the 12th International Workshop on Hardware and Architectural
                  Support for Security and Privacy, {HASP} 2023, Toronto, Canada, 29
                  October 2023},
  pages        = {91--99},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623652.3623674},
  doi          = {10.1145/3623652.3623674},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hasp/ForcioliDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icicdt/BahramiDEGK23,
  author       = {Javad Bahrami and
                  Jean{-}Luc Danger and
                  Mohammad Ebrahimabadi and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Challenges in Generating True Random Numbers Considering the Variety
                  of Corners, Aging, and Intentional Attacks},
  booktitle    = {International Conference on {IC} Design and Technology, {ICICDT} 2023,
                  Tokyo, Japan, September 25-28, 2023},
  pages        = {10--15},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICICDT59917.2023.10332319},
  doi          = {10.1109/ICICDT59917.2023.10332319},
  timestamp    = {Thu, 04 Jan 2024 08:13:40 +0100},
  biburl       = {https://dblp.org/rec/conf/icicdt/BahramiDEGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/AlkhatibMGD23,
  author       = {Natasha Alkhatib and
                  Maria Mushtaq and
                  Hadi Ghauch and
                  Jean{-}Luc Danger},
  title        = {Here comes {SAID:} {A} {SOME/IP} Attention-based mechanism for Intrusion
                  Detection},
  booktitle    = {Fourteenth International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2023, Paris, France, July 4-7, 2023},
  pages        = {462--467},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICUFN57995.2023.10200508},
  doi          = {10.1109/ICUFN57995.2023.10200508},
  timestamp    = {Thu, 17 Aug 2023 15:10:39 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/AlkhatibMGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/BeguinotCDGRY23,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Ville Yli{-}M{\"{a}}yry},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Reliability of Ring Oscillator PUFs with Reduced Helper Data},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {36--56},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_3},
  doi          = {10.1007/978-3-031-41326-1\_3},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/BeguinotCDGRY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/VarillonSD23,
  author       = {Arnaud Varillon and
                  Laurent Sauvage and
                  Jean{-}Luc Danger},
  editor       = {Francesco Regazzoni and
                  Bodhisatwa Mazumdar and
                  Sri Parameswaran},
  title        = {High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations
                  of {RSA}},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 13th International
                  Conference, {SPACE} 2023, Roorkee, India, December 14-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14412},
  pages        = {139--161},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51583-5\_9},
  doi          = {10.1007/978-3-031-51583-5\_9},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/space/VarillonSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vts/BahramiEDGK23,
  author       = {Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Special Session: Security Verification {\&} Testing for SR-Latch
                  TRNGs},
  booktitle    = {41st {IEEE} {VLSI} Test Symposium, {VTS} 2023, San Diego, CA, USA,
                  April 24-26, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTS56346.2023.10140057},
  doi          = {10.1109/VTS56346.2023.10140057},
  timestamp    = {Fri, 09 Jun 2023 15:18:15 +0200},
  biburl       = {https://dblp.org/rec/conf/vts/BahramiEDGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BerthetTDS23,
  author       = {Pierre{-}Augustin Berthet and
                  C{\'{e}}dric Tavernier and
                  Jean{-}Luc Danger and
                  Laurent Sauvage},
  title        = {Quasi-linear Masking to Protect Kyber against both {SCA} and {FIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1220},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1220},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BerthetTDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/KroegerCDGK22,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Cross-PUF Attacks: Targeting {FPGA} Implementation of Arbiter-PUFs},
  journal      = {J. Electron. Test.},
  volume       = {38},
  number       = {3},
  pages        = {261--277},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10836-022-06012-z},
  doi          = {10.1007/S10836-022-06012-Z},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/et/KroegerCDGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/NikniaDGK22,
  author       = {Farzad Niknia and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Aging Effects on Template Attacks Launched on Dual-Rail Protected
                  Chips},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {41},
  number       = {5},
  pages        = {1276--1289},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCAD.2021.3088803},
  doi          = {10.1109/TCAD.2021.3088803},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/NikniaDGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasI/TebelmannDP22,
  author       = {Lars Tebelmann and
                  Jean{-}Luc Danger and
                  Michael Pehl},
  title        = {Interleaved Challenge Loop {PUF:} {A} Highly Side-Channel Protected
                  Oscillator-Based {PUF}},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {69},
  number       = {12},
  pages        = {5121--5134},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSI.2022.3208325},
  doi          = {10.1109/TCSI.2022.3208325},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcasI/TebelmannDP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengGD22,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Information Leakage in Code-Based Masking: {A} Systematic Evaluation
                  by Higher-Order Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1624--1638},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3167914},
  doi          = {10.1109/TIFS.2022.3167914},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/KroegerCGDK22,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks
                  on Arbiter-PUFs and Their Derivatives},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {30},
  number       = {2},
  pages        = {187--200},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVLSI.2021.3129141},
  doi          = {10.1109/TVLSI.2021.3129141},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/KroegerCGDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/AlkhatibMGD22,
  author       = {Natasha Alkhatib and
                  Maria Mushtaq and
                  Hadi Ghauch and
                  Jean{-}Luc Danger},
  title        = {{CAN-BERT} do it? Controller Area Network Intrusion Detection System
                  based on {BERT} Language Model},
  booktitle    = {19th {IEEE/ACS} International Conference on Computer Systems and Applications,
                  {AICCSA} 2022, Abu Dhabi, United Arab Emirates, December 5-8, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AICCSA56895.2022.10017800},
  doi          = {10.1109/AICCSA56895.2022.10017800},
  timestamp    = {Thu, 26 Jan 2023 11:35:09 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/AlkhatibMGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BahramiEDGK22,
  author       = {Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  editor       = {Cristiana Bolchini and
                  Ingrid Verbauwhede and
                  Ioana Vatajelu},
  title        = {Leakage Power Analysis in Different S-Box Masking Protection Schemes},
  booktitle    = {2022 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2022, Antwerp, Belgium, March 14-23, 2022},
  pages        = {1263--1268},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/DATE54114.2022.9774763},
  doi          = {10.23919/DATE54114.2022.9774763},
  timestamp    = {Wed, 25 May 2022 22:56:19 +0200},
  biburl       = {https://dblp.org/rec/conf/date/BahramiEDGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/EbrahimabadiMVG22,
  author       = {Mohammad Ebrahimabadi and
                  Suhee Sanjana Mehjabin and
                  Raphael Viera and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Jean{-}Max Dutertre and
                  Naghmeh Karimi},
  title        = {Detecting Laser Fault Injection Attacks via Time-to-Digital Converter
                  Sensors},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2022, McLean, VA, USA, June 27-30, 2022},
  pages        = {97--100},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HOST54066.2022.9840318},
  doi          = {10.1109/HOST54066.2022.9840318},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/EbrahimabadiMVG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivs/AlkhatibMGD22,
  author       = {Natasha Alkhatib and
                  Maria Mushtaq and
                  Hadi Ghauch and
                  Jean{-}Luc Danger},
  title        = {Unsupervised Network Intrusion Detection System for {AVTP} in Automotive
                  Ethernet Networks},
  booktitle    = {2022 {IEEE} Intelligent Vehicles Symposium, {IV} 2022, Aachen, Germany,
                  June 4-9, 2022},
  pages        = {1731--1738},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IV51971.2022.9827285},
  doi          = {10.1109/IV51971.2022.9827285},
  timestamp    = {Tue, 26 Jul 2022 10:29:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ivs/AlkhatibMGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BahramiETDGK22,
  author       = {Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Sofiane Takarabt and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On the Practicality of Relying on Simulations in Different Abstraction
                  Levels for Pre-silicon Side-Channel Analysis},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {661--668},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011307600003283},
  doi          = {10.5220/0011307600003283},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BahramiETDGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-00045,
  author       = {Natasha Alkhatib and
                  Maria Mushtaq and
                  Hadi Ghauch and
                  Jean{-}Luc Danger},
  title        = {AVTPnet: Convolutional Autoencoder for {AVTP} anomaly detection in
                  Automotive Ethernet Networks},
  journal      = {CoRR},
  volume       = {abs/2202.00045},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.00045},
  eprinttype    = {arXiv},
  eprint       = {2202.00045},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-00045.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-09439,
  author       = {Natasha Alkhatib and
                  Maria Mushtaq and
                  Hadi Ghauch and
                  Jean{-}Luc Danger},
  title        = {{CAN-BERT} do it? Controller Area Network Intrusion Detection System
                  based on {BERT} Language Model},
  journal      = {CoRR},
  volume       = {abs/2210.09439},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.09439},
  doi          = {10.48550/ARXIV.2210.09439},
  eprinttype    = {arXiv},
  eprint       = {2210.09439},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-09439.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengGD22,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Information Leakage in Code-based Masking: {A} Systematic Evaluation
                  by Higher-Order Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/461},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/caaitrit/ChabanneDGK21,
  author       = {Herv{\'{e}} Chabanne and
                  Jean{-}Luc Danger and
                  Linda Guiga and
                  Ulrich K{\"{u}}hne},
  title        = {Side channel attacks for architecture extraction of neural networks},
  journal      = {{CAAI} Trans. Intell. Technol.},
  volume       = {6},
  number       = {1},
  pages        = {3--16},
  year         = {2021},
  url          = {https://doi.org/10.1049/cit2.12026},
  doi          = {10.1049/CIT2.12026},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/caaitrit/ChabanneDGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/ChengGD21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Categorizing all linear codes of {IPM} over {\textdollar}\{{\textbackslash}mathbb
                  \{F\}\}{\_}\{2{\^{}}\{8\}\}{\textdollar}},
  journal      = {Cryptogr. Commun.},
  volume       = {13},
  number       = {4},
  pages        = {527--542},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12095-021-00483-1},
  doi          = {10.1007/S12095-021-00483-1},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/ChengGD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/AnikEDGK21,
  author       = {Md Toufiq Hasan Anik and
                  Mohammad Ebrahimabadi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Reducing Aging Impacts in Digital Sensors via Run-Time Calibration},
  journal      = {J. Electron. Test.},
  volume       = {37},
  number       = {5},
  pages        = {653--673},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10836-021-05976-8},
  doi          = {10.1007/S10836-021-05976-8},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/et/AnikEDGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChengCGDG21,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Detecting faults in inner product masking scheme},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {119--133},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00227-6},
  doi          = {10.1007/S13389-020-00227-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChengCGDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/AnikDGK21,
  author       = {Md Toufiq Hasan Anik and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Detecting Failures and Attacks via Digital Sensors},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {40},
  number       = {7},
  pages        = {1315--1326},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCAD.2020.3020921},
  doi          = {10.1109/TCAD.2020.3020921},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/AnikDGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengGCDM21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger and
                  Sihem Mesnager},
  title        = {Information Leakages in Code-based Masking: {A} Unified Quantification
                  Approach},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {465--495},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.465-495},
  doi          = {10.46586/TCHES.V2021.I3.465-495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengGCDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengGCMD21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Sihem Mesnager and
                  Jean{-}Luc Danger},
  title        = {Optimizing Inner Product Masking Scheme by a Coding Theory Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {220--235},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3009609},
  doi          = {10.1109/TIFS.2020.3009609},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengGCMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Yli-MayryUMNBMG21,
  author       = {Ville Yli{-}M{\"{a}}yry and
                  Rei Ueno and
                  Noriyuki Miura and
                  Makoto Nagata and
                  Shivam Bhasin and
                  Yves Mathieu and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Naofumi Homma},
  title        = {Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers:
                  {A} Case Study of Power Analysis on {PRINCE}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {1351--1364},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3033441},
  doi          = {10.1109/TIFS.2020.3033441},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Yli-MayryUMNBMG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChabanneDGK21,
  author       = {Herv{\'{e}} Chabanne and
                  Jean{-}Luc Danger and
                  Linda Guiga and
                  Ulrich K{\"{u}}hne},
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional
                  Neural Networks},
  booktitle    = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12726},
  pages        = {363--392},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78372-3\_14},
  doi          = {10.1007/978-3-030-78372-3\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChabanneDGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/TebelmannKDP21,
  author       = {Lars Tebelmann and
                  Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Michael Pehl},
  editor       = {Shivam Bhasin and
                  Fabrizio De Santis},
  title        = {Analysis and Protection of the Two-Metric Helper Data Scheme},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 12th International
                  Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12910},
  pages        = {279--302},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89915-8\_13},
  doi          = {10.1007/978-3-030-89915-8\_13},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/TebelmannKDP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/KroegerCGDK21,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  editor       = {Shivam Bhasin and
                  Fabrizio De Santis},
  title        = {Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its
                  Derivatives Against Power Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 12th International
                  Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12910},
  pages        = {303--321},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89915-8\_14},
  doi          = {10.1007/978-3-030-89915-8\_14},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/KroegerCGDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KroegerCGDK21,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling
                  Attacks},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2021, Grenoble, France, February 1-5, 2021},
  pages        = {1000--1005},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/DATE51398.2021.9474137},
  doi          = {10.23919/DATE51398.2021.9474137},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/KroegerCGDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/AnikDDEFGKPT21,
  author       = {Md Toufiq Hasan Anik and
                  Jean{-}Luc Danger and
                  Omar Diankha and
                  Mohammad Ebrahimabadi and
                  Christoph Frisch and
                  Sylvain Guilley and
                  Naghmeh Karimi and
                  Michael Pehl and
                  Sofiane Takarabt},
  editor       = {Luigi Dilillo and
                  Luca Cassano and
                  Athanasios Papadimitriou},
  title        = {Testing and Reliability Enhancement of Security Primitives},
  booktitle    = {36th {IEEE} International Symposium on Defect and Fault Tolerance
                  in {VLSI} and Nanotechnology Systems, {DFT} 2021, Athens, Greece,
                  October 6-8, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DFT52944.2021.9568297},
  doi          = {10.1109/DFT52944.2021.9568297},
  timestamp    = {Fri, 22 Oct 2021 15:23:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dft/AnikDDEFGKPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/TehraniGSD21,
  author       = {Etienne Tehrani and
                  Tarik Graba and
                  Abdelmalek Si{-}Merabet and
                  Jean{-}Luc Danger},
  editor       = {Francesco Leporati and
                  Salvatore Vitabile and
                  Amund Skavhaug},
  title        = {{RSM} Protection of the {PRESENT} Lightweight Cipher as a {RISC-V}
                  Extension},
  booktitle    = {24th Euromicro Conference on Digital System Design, {DSD} 2021, Virtual
                  Event / Palermo, Sicily, Italy, September 1-3, 2021},
  pages        = {325--332},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSD53832.2021.00056},
  doi          = {10.1109/DSD53832.2021.00056},
  timestamp    = {Mon, 07 Nov 2022 07:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/TehraniGSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/KhuatDD21,
  author       = {Vanthanh Khuat and
                  Jean{-}Max Dutertre and
                  Jean{-}Luc Danger},
  editor       = {Francesco Leporati and
                  Salvatore Vitabile and
                  Amund Skavhaug},
  title        = {Analysis of a Laser-induced Instructions Replay Fault Model in a 32-bit
                  Microcontroller},
  booktitle    = {24th Euromicro Conference on Digital System Design, {DSD} 2021, Virtual
                  Event / Palermo, Sicily, Italy, September 1-3, 2021},
  pages        = {363--370},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSD53832.2021.00061},
  doi          = {10.1109/DSD53832.2021.00061},
  timestamp    = {Fri, 15 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsd/KhuatDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ForcioliDMBBMNF21,
  author       = {Quentin Forcioli and
                  Jean{-}Luc Danger and
                  Cl{\'{e}}mentine Maurice and
                  Lilian Bossuet and
                  Florent Bruguier and
                  Maria Mushtaq and
                  David Novo and
                  Lo{\"{\i}}c France and
                  Pascal Benoit and
                  Sylvain Guilley and
                  Thomas Perianin},
  title        = {Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural
                  Level},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {96--102},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSPW54576.2021.00017},
  doi          = {10.1109/EUROSPW54576.2021.00017},
  timestamp    = {Mon, 08 Nov 2021 16:43:34 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/ForcioliDMBBMNF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/KhuatDD21,
  author       = {Vanthanh Khuat and
                  Jean{-}Luc Danger and
                  Jean{-}Max Dutertre},
  title        = {Laser Fault Injection in a 32-bit Microcontroller: from the Flash
                  Interface to the Execution Pipeline},
  booktitle    = {18th Workshop on Fault Detection and Tolerance in Cryptography, {FDTC}
                  2021, Milan, Italy, September 17, 2021},
  pages        = {74--85},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/FDTC53659.2021.00020},
  doi          = {10.1109/FDTC53659.2021.00020},
  timestamp    = {Mon, 18 Oct 2021 17:08:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/KhuatDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/KhalfaouiLVGMDU21,
  author       = {Sameh Khalfaoui and
                  Jean Leneutre and
                  Arthur Villard and
                  Ivan Gazeau and
                  Jingxuan Ma and
                  Jean{-}Luc Danger and
                  Pascal Urien},
  editor       = {Mauro Andreolini and
                  Mirco Marchetti and
                  Dimiter R. Avresky},
  title        = {Water- {PUF:} An Insider Threat Resistant {PUF} Enrollment Protocol
                  Based on Machine Learning Watermarking},
  booktitle    = {20th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2021, Boston, MA, USA, November 23-26, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/NCA53618.2021.9685239},
  doi          = {10.1109/NCA53618.2021.9685239},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/KhalfaouiLVGMDU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/ChabanneDGK21,
  author       = {Herv{\'{e}} Chabanne and
                  Jean{-}Luc Danger and
                  Linda Guiga and
                  Ulrich K{\"{u}}hne},
  editor       = {Lejla Batina and
                  Stjepan Picek and
                  Mainack Mondal},
  title        = {Parasite: Mitigating Physical Side-Channel Attacks Against Neural
                  Networks},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 11th International
                  Conference, {SPACE} 2021, Kolkata, India, December 10-13, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13162},
  pages        = {148--167},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95085-9\_8},
  doi          = {10.1007/978-3-030-95085-9\_8},
  timestamp    = {Thu, 03 Feb 2022 09:28:39 +0100},
  biburl       = {https://dblp.org/rec/conf/space/ChabanneDGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08262,
  author       = {Natasha Alkhatib and
                  Hadi Ghauch and
                  Jean{-}Luc Danger},
  title        = {{SOME/IP} Intrusion Detection using Deep Learning-based Sequential
                  Models in Automotive Ethernet Networks},
  journal      = {CoRR},
  volume       = {abs/2108.08262},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08262},
  eprinttype    = {arXiv},
  eprint       = {2108.08262},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08262.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengGCDM21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger and
                  Sihem Mesnager},
  title        = {Information Leakages in Code-based Masking: {A} Unified Quantification
                  Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/363},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengGCDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TebelmannKDP21,
  author       = {Lars Tebelmann and
                  Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Michael Pehl},
  title        = {Analysis and Protection of the Two-metric Helper Data Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {830},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/830},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TebelmannKDP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauCDFG21,
  author       = {Nicolas Bruneau and
                  Charles Christen and
                  Jean{-}Luc Danger and
                  Adrien Facon and
                  Sylvain Guilley},
  title        = {Security evaluation against side-channel analysis at compilation time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1521},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1521},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauCDFG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/SchaubRDGB20,
  author       = {Alexander Schaub and
                  Olivier Rioul and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Joseph Boutros},
  title        = {Challenge codes for physically unclonable functions with Gaussian
                  delays: {A} maximum entropy problem},
  journal      = {Adv. Math. Commun.},
  volume       = {14},
  number       = {3},
  pages        = {491--505},
  year         = {2020},
  url          = {https://doi.org/10.3934/amc.2020060},
  doi          = {10.3934/AMC.2020060},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/SchaubRDGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/UenoHMMMNBMGD20,
  author       = {Rei Ueno and
                  Naofumi Homma and
                  Sumio Morioka and
                  Noriyuki Miura and
                  Kohei Matsuda and
                  Makoto Nagata and
                  Shivam Bhasin and
                  Yves Mathieu and
                  Tarik Graba and
                  Jean{-}Luc Danger},
  title        = {High Throughput/Gate {AES} Hardware Architectures Based on Datapath
                  Compression},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {4},
  pages        = {534--548},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2019.2957355},
  doi          = {10.1109/TC.2019.2957355},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/UenoHMMMNBMGD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asianhost/TrabelsiSD20,
  author       = {Oualid Trabelsi and
                  Laurent Sauvage and
                  Jean{-}Luc Danger},
  title        = {Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller
                  Instruction Buffer},
  booktitle    = {Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2020,
                  Kolkata, India, December 15-17, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsianHOST51057.2020.9358270},
  doi          = {10.1109/ASIANHOST51057.2020.9358270},
  timestamp    = {Wed, 03 Mar 2021 11:46:43 +0100},
  biburl       = {https://dblp.org/rec/conf/asianhost/TrabelsiSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DangerFGHKSTP20,
  author       = {Jean{-}Luc Danger and
                  Adrien Facon and
                  Sylvain Guilley and
                  Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Abdelmalek Si{-}Merabet and
                  Micha{\"{e}}l Timbert and
                  Baptiste Pecatte},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Processor Anchor to Increase the Robustness Against Fault Injection
                  and Cyber Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {254--274},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_12},
  doi          = {10.1007/978-3-030-68773-1\_12},
  timestamp    = {Fri, 05 Feb 2021 12:30:03 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/DangerFGHKSTP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/TebelmannDP20,
  author       = {Lars Tebelmann and
                  Jean{-}Luc Danger and
                  Michael Pehl},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Self-secured {PUF:} Protecting the Loop {PUF} by Masking},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {293--314},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_14},
  doi          = {10.1007/978-3-030-68773-1\_14},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/TebelmannDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KroegerCGDK20,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {Effect of Aging on {PUF} Modeling Attacks based on Power Side-Channel
                  Observations},
  booktitle    = {2020 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020},
  pages        = {454--459},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/DATE48585.2020.9116428},
  doi          = {10.23919/DATE48585.2020.9116428},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/KroegerCGDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/TehraniGSD20,
  author       = {Etienne Tehrani and
                  Tarik Graba and
                  Abdelmalek Si{-}Merabet and
                  Jean{-}Luc Danger},
  title        = {{RISC-V} Extension for Lightweight Cryptography},
  booktitle    = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj,
                  Slovenia, August 26-28, 2020},
  pages        = {222--228},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSD51259.2020.00045},
  doi          = {10.1109/DSD51259.2020.00045},
  timestamp    = {Wed, 14 Oct 2020 14:37:25 +0200},
  biburl       = {https://dblp.org/rec/conf/dsd/TehraniGSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dtis/MenuDPRD20,
  author       = {Alexandre Menu and
                  Jean{-}Max Dutertre and
                  Olivier Potin and
                  Jean{-}Baptiste Rigaud and
                  Jean{-}Luc Danger},
  title        = {Experimental Analysis of the Electromagnetic Instruction Skip Fault
                  Model},
  booktitle    = {15th Design {\&} Technology of Integrated Systems in Nanoscale
                  Era, {DTIS} 2020, Marrakech, Morocco, April 1-3, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DTIS48698.2020.9081261},
  doi          = {10.1109/DTIS48698.2020.9081261},
  timestamp    = {Mon, 11 May 2020 11:29:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dtis/MenuDPRD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/0001DRG20,
  author       = {Alexander Schaub and
                  Jean{-}Luc Danger and
                  Olivier Rioul and
                  Sylvain Guilley},
  title        = {The Big Picture of Delay-PUF Dependability},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2020, Sofia,
                  Bulgaria, September 7-10, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ECCTD49232.2020.9218396},
  doi          = {10.1109/ECCTD49232.2020.9218396},
  timestamp    = {Wed, 14 Oct 2020 15:01:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/0001DRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/AlipourBCDNHGK20,
  author       = {Amir Alipour and
                  Vincent Beroulle and
                  Bertrand Cambou and
                  Jean{-}Luc Danger and
                  Giorgio Di Natale and
                  David H{\'{e}}ly and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {{PUF} Enrollment and Life Cycle Management: Solutions and Perspectives
                  for the Test Community},
  booktitle    = {{IEEE} European Test Symposium, {ETS} 2020, Tallinn, Estonia, May
                  25-29, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ETS48528.2020.9131578},
  doi          = {10.1109/ETS48528.2020.9131578},
  timestamp    = {Wed, 15 Jul 2020 13:23:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/AlipourBCDNHGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/AnikSDGK20,
  author       = {Md Toufiq Hasan Anik and
                  Rachit Saini and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {Failure and Attack Detection by Digital Sensors},
  booktitle    = {{IEEE} European Test Symposium, {ETS} 2020, Tallinn, Estonia, May
                  25-29, 2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ETS48528.2020.9131580},
  doi          = {10.1109/ETS48528.2020.9131580},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/AnikSDGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/MenuDRCMD20,
  author       = {Alexandre Menu and
                  Jean{-}Max Dutertre and
                  Jean{-}Baptiste Rigaud and
                  Brice Colombier and
                  Pierre{-}Alain Mo{\"{e}}llic and
                  Jean{-}Luc Danger},
  title        = {Single-bit Laser Fault Model in {NOR} Flash Memories: Analysis and
                  Exploitation},
  booktitle    = {17th Workshop on Fault Detection and Tolerance in Cryptography, {FDTC}
                  2020, Milan, Italy, September 13, 2020},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/FDTC51366.2020.00013},
  doi          = {10.1109/FDTC51366.2020.00013},
  timestamp    = {Thu, 29 Oct 2020 16:42:41 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/MenuDRCMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/AnikEPDGK20,
  author       = {Md Toufiq Hasan Anik and
                  Mohammad Ebrahimabadi and
                  Hamed Pirsiavash and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  title        = {On-Chip Voltage and Temperature Digital Sensor for Security, Reliability,
                  and Portability},
  booktitle    = {38th {IEEE} International Conference on Computer Design, {ICCD} 2020,
                  Hartford, CT, USA, October 18-21, 2020},
  pages        = {506--509},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCD50377.2020.00091},
  doi          = {10.1109/ICCD50377.2020.00091},
  timestamp    = {Mon, 11 Jan 2021 13:35:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/AnikEPDGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/KroegerCGDK20,
  author       = {Trevor Kroeger and
                  Wei Cheng and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel},
  booktitle    = {{IEEE} International Test Conference, {ITC} 2020, Washington, DC,
                  USA, November 1-6, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ITC44778.2020.9325241},
  doi          = {10.1109/ITC44778.2020.9325241},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itc/KroegerCGDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/AnikGDK20,
  author       = {Md Toufiq Hasan Anik and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Naghmeh Karimi},
  title        = {On the Effect of Aging on Digital Sensors},
  booktitle    = {33rd International Conference on {VLSI} Design and 19th International
                  Conference on Embedded Systems, {VLSID} 2020, Bangalore, India, January
                  4-8, 2020},
  pages        = {189--194},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VLSID49098.2020.00050},
  doi          = {10.1109/VLSID49098.2020.00050},
  timestamp    = {Mon, 14 Nov 2022 15:28:08 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsid/AnikGDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TebelmannDP20,
  author       = {Lars Tebelmann and
                  Jean{-}Luc Danger and
                  Michael Pehl},
  title        = {Self-Secured {PUF:} Protecting the Loop {PUF} by Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TebelmannDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengGCMD20,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Sihem Mesnager and
                  Jean{-}Luc Danger},
  title        = {Optimizing Inner Product Masking Scheme by {A} Coding Theory Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/692},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengGCMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/DangerFKN19,
  author       = {Jean{-}Luc Danger and
                  Laurent Fribourg and
                  Ulrich K{\"{u}}hne and
                  Maha Naceur},
  title        = {LAOCO{\"{O}}N: {A} Run-Time Monitoring and Verification Approach
                  for Hardware Trojan Detection},
  booktitle    = {22nd Euromicro Conference on Digital System Design, {DSD} 2019, Kallithea,
                  Greece, August 28-30, 2019},
  pages        = {269--276},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSD.2019.00047},
  doi          = {10.1109/DSD.2019.00047},
  timestamp    = {Wed, 23 Oct 2019 17:11:33 +0200},
  biburl       = {https://dblp.org/rec/conf/dsd/DangerFKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/MenuBDRD19,
  author       = {Alexandre Menu and
                  Shivam Bhasin and
                  Jean{-}Max Dutertre and
                  Jean{-}Baptiste Rigaud and
                  Jean{-}Luc Danger},
  title        = {Precise Spatio-Temporal Electromagnetic Fault Injections on Data Transfers},
  booktitle    = {2019 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2019, Atlanta, GA, USA, August 24, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/FDTC.2019.00009},
  doi          = {10.1109/FDTC.2019.00009},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/MenuBDRD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ColombierMDMRD19,
  author       = {Brice Colombier and
                  Alexandre Menu and
                  Jean{-}Max Dutertre and
                  Pierre{-}Alain Mo{\"{e}}llic and
                  Jean{-}Baptiste Rigaud and
                  Jean{-}Luc Danger},
  title        = {Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption
                  on a 32-bit Microcontroller},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2019, McLean, VA, USA, May 5-10, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HST.2019.8741030},
  doi          = {10.1109/HST.2019.8741030},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/host/ColombierMDMRD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/TehraniGSGD19,
  author       = {Etienne Tehrani and
                  Tarik Graba and
                  Abdelmalek Si{-}Merabet and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Classification of Lightweight Block Ciphers for Specific Processor
                  Accelerated Implementations},
  booktitle    = {26th {IEEE} International Conference on Electronics, Circuits and
                  Systems, {ICECS} 2019, Genoa, Italy, November 27-29, 2019},
  pages        = {747--750},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICECS46596.2019.8965156},
  doi          = {10.1109/ICECS46596.2019.8965156},
  timestamp    = {Mon, 03 Feb 2020 12:19:05 +0100},
  biburl       = {https://dblp.org/rec/conf/icecsys/TehraniGSGD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwasi/DangerG019,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Alexander Schaub},
  title        = {Two-Metric Helper Data for Highly Robust and Secure Delay PUFs},
  booktitle    = {{IEEE} 8th International Workshop on Advances in Sensors and Interfaces,
                  {IWASI} 2019, Otranto, Italy, June 13-14, 2019},
  pages        = {184--188},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IWASI.2019.8791249},
  doi          = {10.1109/IWASI.2019.8791249},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwasi/DangerG019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/proofs/ChengCGDG19,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Letitia Li},
  title        = {Detecting Faults in Inner-Product Masking Scheme - {IPM-FD:} {IPM}
                  with Fault Detection},
  booktitle    = {Proceedings of 8th International Workshop on Security Proofs for Embedded
                  Systems, {PROOFS} 2019, colocated with {CHES} 2018, Atlanta, GA, USA,
                  August 24, 2019},
  series       = {Kalpa Publications in Computing},
  volume       = {11},
  pages        = {17--32},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/fv2n},
  doi          = {10.29007/FV2N},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/proofs/ChengCGDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengCGGD19,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Detecting Faults in Inner Product Masking Scheme - {IPM-FD:} {IPM}
                  with Fault Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {919},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/919},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengCGGD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DangerHFGGHNPS18,
  author       = {Jean{-}Luc Danger and
                  Youssef El Housni and
                  Adrien Facon and
                  Cheikh Thiecoumba Gueye and
                  Sylvain Guilley and
                  Sylvie Herbel and
                  Ousmane Ndiaye and
                  Edoardo Persichetti and
                  Alexander Schaub},
  title        = {On the Performance and Security of Multiplication in \emph{GF}(2\({}^{\mbox{\emph{N}}}\))},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {25},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030025},
  doi          = {10.3390/CRYPTOGRAPHY2030025},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/DangerHFGGHNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/KarimiDG18,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Impact of Aging on the Reliability of Delay PUFs},
  journal      = {J. Electron. Test.},
  volume       = {34},
  number       = {5},
  pages        = {571--586},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10836-018-5745-6},
  doi          = {10.1007/S10836-018-5745-6},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/et/KarimiDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/RoyBDGHMNN18,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Wei He and
                  Debdeep Mukhopadhyay and
                  Zakaria Najm and
                  Xuan Thuy Ngo},
  title        = {The Conflicted Usage of RLUTs for Security-Critical Applications on
                  {FPGA}},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {162--178},
  year         = {2018},
  url          = {https://doi.org/10.1007/s41635-018-0035-4},
  doi          = {10.1007/S41635-018-0035-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/RoyBDGHMNN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangWXWZPD18,
  author       = {Ming Tang and
                  Pengbo Wang and
                  Xiaoqi Ma and
                  Wenjie Chang and
                  Huanguo Zhang and
                  Guojun Peng and
                  Jean{-}Luc Danger},
  title        = {An Efficient {SCA} Leakage Model Construction Method Under Predictable
                  Evaluation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {12},
  pages        = {3008--3018},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2837644},
  doi          = {10.1109/TIFS.2018.2837644},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangWXWZPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/DangerYGMSSMN18,
  author       = {Jean{-}Luc Danger and
                  Risa Yashiro and
                  Tarik Graba and
                  Yves Mathieu and
                  Abdelmalek Si{-}Merabet and
                  Kazuo Sakiyama and
                  Noriyuki Miura and
                  Makoto Nagata},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {Analysis of Mixed {PUF-TRNG} Circuit Based on SR-Latches in {FD-SOI}
                  Technology},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {508--515},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00090},
  doi          = {10.1109/DSD.2018.00090},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/DangerYGMSSMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/DangerFGHKMT18,
  author       = {Jean{-}Luc Danger and
                  Adrien Facon and
                  Sylvain Guilley and
                  Karine Heydemann and
                  Ulrich K{\"{u}}hne and
                  Abdelmalek Si{-}Merabet and
                  Micha{\"{e}}l Timbert},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {CCFI-Cache: {A} Transparent and Flexible Hardware Protection for Code
                  and Control-Flow Integrity},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {529--536},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00093},
  doi          = {10.1109/DSD.2018.00093},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/DangerFGHKMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/SchaubDGR18,
  author       = {Alexander Schaub and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Olivier Rioul},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {An Improved Analysis of Reliability and Entropy for Delay PUFs},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {553--560},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00096},
  doi          = {10.1109/DSD.2018.00096},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/SchaubDGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/KarimiGD18,
  author       = {Naghmeh Karimi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Deming Chen and
                  Houman Homayoun and
                  Baris Taskin},
  title        = {Impact of Aging on Template Attacks},
  booktitle    = {Proceedings of the 2018 on Great Lakes Symposium on VLSI, {GLSVLSI}
                  2018, Chicago, IL, USA, May 23-25, 2018},
  pages        = {455--458},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3194554.3194638},
  doi          = {10.1145/3194554.3194638},
  timestamp    = {Wed, 10 Mar 2021 14:55:38 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/KarimiGD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/KarimiDG18,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Dimitris Gizopoulos and
                  Dan Alexandrescu and
                  Mihalis Maniatakos and
                  Panagiota Papavramidou},
  title        = {On the Effect of Aging in Detecting Hardware Trojan Horses with Template
                  Analysis},
  booktitle    = {24th {IEEE} International Symposium on On-Line Testing And Robust
                  System Design, {IOLTS} 2018, Platja D'Aro, Spain, July 2-4, 2018},
  pages        = {281--286},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IOLTS.2018.8474089},
  doi          = {10.1109/IOLTS.2018.8474089},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iolts/KarimiDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/BruneauDFGHHK018,
  author       = {Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Adrien Facon and
                  Sylvain Guilley and
                  Soshi Hamaguchi and
                  Yohei Hori and
                  Yousung Kang and
                  Alexander Schaub},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Development of the Unified Security Requirements of PUFs During the
                  Standardization Process},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {314--330},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_24},
  doi          = {10.1007/978-3-030-12942-2\_24},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/BruneauDFGHHK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/TehraniDG18,
  author       = {Etienne Tehrani and
                  Jean{-}Luc Danger and
                  Tarik Graba},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Generic Architecture for Lightweight Block Ciphers: {A} First Step
                  Towards Agile Implementation of Multiple Ciphers},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {28--43},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_4},
  doi          = {10.1007/978-3-030-20074-9\_4},
  timestamp    = {Tue, 14 May 2019 14:17:01 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/TehraniDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KarrayDGE18,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Moulay Abdelaziz Elaabid},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Prediction-Based Intrusion Detection System for In-Vehicle Networks
                  Using Supervised Learning and Outlier-Detection},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_9},
  doi          = {10.1007/978-3-030-20074-9\_9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KarrayDGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/KarrayDGE18,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  M. Abdelaziz Elaabid},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Attack Tree Construction and Its Application to the Connected Vehicle},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_9},
  doi          = {10.1007/978-3-319-98935-8\_9},
  timestamp    = {Fri, 08 Mar 2019 12:57:04 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/KarrayDGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/KarrayDGE18a,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  M. Abdelaziz Elaabid},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Identifier Randomization: An Efficient Protection Against CAN-Bus
                  Attacks},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {219--254},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_11},
  doi          = {10.1007/978-3-319-98935-8\_11},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/KarrayDGE18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/DangerGHLT18,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Axel Legay and
                  Ming Tang},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Physical Security Versus Masking Schemes},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {269--284},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_13},
  doi          = {10.1007/978-3-319-98935-8\_13},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/DangerGHLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ColombierMDMRD18,
  author       = {Brice Colombier and
                  Alexandre Menu and
                  Jean{-}Max Dutertre and
                  Pierre{-}Alain Mo{\"{e}}llic and
                  Jean{-}Baptiste Rigaud and
                  Jean{-}Luc Danger},
  title        = {Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption
                  on a 32-bit Microcontroller},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1042},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ColombierMDMRD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/NgoDGGMNB17,
  author       = {Xuan Thuy Ngo and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Tarik Graba and
                  Yves Mathieu and
                  Zakaria Najm and
                  Shivam Bhasin},
  title        = {Cryptographically Secure Shield for Security IPs Protection},
  journal      = {{IEEE} Trans. Computers},
  volume       = {66},
  number       = {2},
  pages        = {354--360},
  year         = {2017},
  url          = {https://doi.org/10.1109/TC.2016.2584041},
  doi          = {10.1109/TC.2016.2584041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/NgoDGGMNB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/TangGHRLD17,
  author       = {Ming Tang and
                  Zhipeng Guo and
                  Annelie Heuser and
                  Yanzhen Ren and
                  Jie Li and
                  Jean{-}Luc Danger},
  title        = {{PFD} - {A} Flexible Higher-Order Masking Scheme},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {36},
  number       = {8},
  pages        = {1327--1339},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCAD.2016.2629441},
  doi          = {10.1109/TCAD.2016.2629441},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/TangGHRLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/TangQGMHD17,
  author       = {Ming Tang and
                  Zhenlong Qiu and
                  Zhipeng Guo and
                  Yi Mu and
                  Xinyi Huang and
                  Jean{-}Luc Danger},
  title        = {A Generic Table Recomputation-Based Higher-Order Masking},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {36},
  number       = {11},
  pages        = {1779--1789},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCAD.2017.2661823},
  doi          = {10.1109/TCAD.2017.2661823},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/TangQGMHD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/DangerGNNS17,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Nguyen and
                  Robert Nguyen and
                  Youssef Souissi},
  editor       = {David Atienza and
                  Giorgio Di Natale},
  title        = {Analyzing security breaches of countermeasures throughout the refinement
                  process in hardware design flow},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2017, Lausanne, Switzerland, March 27-31, 2017},
  pages        = {1129--1134},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/DATE.2017.7927159},
  doi          = {10.23919/DATE.2017.7927159},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/DangerGNNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/KarimiDSG17,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Mariem Slimani and
                  Sylvain Guilley},
  title        = {Impact of the switching activity on the aging of delay-PUFs},
  booktitle    = {22nd {IEEE} European Test Symposium, {ETS} 2017, Limassol, Cyprus,
                  May 22-26, 2017},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ETS.2017.7968223},
  doi          = {10.1109/ETS.2017.7968223},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/KarimiDSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2017proofs,
  editor       = {Ulrich K{\"{u}}hne and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {{PROOFS} 2017, 6th International Workshop on Security Proofs for Embedded
                  Systems, Taipei, Taiwan, September 29th, 2017},
  series       = {EPiC Series in Computing},
  volume       = {49},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://easychair.org/publications/volume/PROOFS\_2017},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/2017proofs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/space/2017,
  editor       = {Sk Subidh Ali and
                  Jean{-}Luc Danger and
                  Thomas Eisenbarth},
  title        = {Security, Privacy, and Applied Cryptography Engineering - 7th International
                  Conference, {SPACE} 2017, Goa, India, December 13-17, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10662},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71501-8},
  doi          = {10.1007/978-3-319-71501-8},
  isbn         = {978-3-319-71500-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarimiDLG17,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Florent Lozach and
                  Sylvain Guilley},
  title        = {Predictive Aging of Reliability of two Delay PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarimiDLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NgoNBGD16,
  author       = {Xuan Thuy Ngo and
                  Zakaria Najm and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Method taking into account process dispersion to detect hardware Trojan
                  Horse by side-channel analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {239--247},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0129-2},
  doi          = {10.1007/S13389-016-0129-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NgoNBGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/DangerGHMN16,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Improving the Big Mac Attack on Elliptic Curve Cryptography},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {374--386},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_23},
  doi          = {10.1007/978-3-662-49301-4\_23},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/DangerGHMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/DangerGPPT16,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Thibault Porteboeuf and
                  Florian Praden and
                  Micha{\"{e}}l Timbert},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Hardware-Enforced Protection Against Buffer Overflow Using Masked
                  Program Counter},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {439--454},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_27},
  doi          = {10.1007/978-3-662-49301-4\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/DangerGPPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DugardinGDNR16,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Zakaria Najm and
                  Olivier Rioul},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_1},
  doi          = {10.1007/978-3-662-53140-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DugardinGDNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DugardinPNBDG16,
  author       = {Margaux Dugardin and
                  Louiza Papachristodoulou and
                  Zakaria Najm and
                  Lejla Batina and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Dismantling Real-World {ECC} with Horizontal and Vertical Template
                  Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  pages        = {88--108},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0\_6},
  doi          = {10.1007/978-3-319-43283-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/DugardinPNBDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/MiuraNHBNND16,
  author       = {Noriyuki Miura and
                  Zakaria Najm and
                  Wei He and
                  Shivam Bhasin and
                  Xuan Thuy Ngo and
                  Makoto Nagata and
                  Jean{-}Luc Danger},
  title        = {{PLL} to the rescue: a novel {EM} fault countermeasure},
  booktitle    = {Proceedings of the 53rd Annual Design Automation Conference, {DAC}
                  2016, Austin, TX, USA, June 5-9, 2016},
  pages        = {90:1--90:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897937.2898065},
  doi          = {10.1145/2897937.2898065},
  timestamp    = {Tue, 06 Nov 2018 16:58:19 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/MiuraNHBNND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/RioulHGD16,
  author       = {Olivier Rioul and
                  Annelie Heuser and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Inter-class vs. mutual information as side-channel distinguishers},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {805--809},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541410},
  doi          = {10.1109/ISIT.2016.7541410},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/RioulHGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/RioulSGD16,
  author       = {Olivier Rioul and
                  Patrick Sol{\'{e}} and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {On the entropy of Physically Unclonable Functions},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {2928--2932},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541835},
  doi          = {10.1109/ISIT.2016.7541835},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/RioulSGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/KarimiDLG16,
  author       = {Naghmeh Karimi and
                  Jean{-}Luc Danger and
                  Florent Lozach and
                  Sylvain Guilley},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Predictive Aging of Reliability of Two Delay PUFs},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_12},
  doi          = {10.1007/978-3-319-49445-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/KarimiDLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16,
  author       = {Kazuhide Fukushima and
                  Youssef Souissi and
                  Seira Hidano and
                  Robert Nguyen and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Laurent Sauvage},
  title        = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes:
                  The Final Piece of All-in-One Assessment Methodology},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {201--207},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0064},
  doi          = {10.1109/TRUSTCOM.2016.0064},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujimotoBND16,
  author       = {Daisuke Fujimoto and
                  Shivam Bhasin and
                  Makoto Nagata and
                  Jean{-}Luc Danger},
  title        = {A Novel Methodology for Testing Hardware Security and Trust Exploiting
                  On-Chip Power Noise Measurements (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujimotoBND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DugardinGDNR16,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Zakaria Najm and
                  Olivier Rioul},
  title        = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
                  - Extended Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/597},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DugardinGDNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelgarricBBDDGH16,
  author       = {Pierre Belgarric and
                  Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Zakaria Najm and
                  Olivier Rioul},
  title        = {Time-Frequency Analysis for Second-Order Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HeBOGTD15,
  author       = {Wei He and
                  Shivam Bhasin and
                  Andr{\'{e}}s Otero and
                  Tarik Graba and
                  Eduardo de la Torre and
                  Jean{-}Luc Danger},
  title        = {Sophisticated security verification on routing repaired balanced cell-based
                  dual-rail logic against side channel analysis},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {1--13},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0058},
  doi          = {10.1049/IET-IFS.2013.0058},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HeBOGTD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/BhasinDGH15,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Wei He},
  title        = {Exploiting {FPGA} Block Memories for Protected Cryptographic Implementations},
  journal      = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume       = {8},
  number       = {3},
  pages        = {16:1--16:16},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629552},
  doi          = {10.1145/2629552},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trets/BhasinDGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/EndoLHSOFNKDA15,
  author       = {Sho Endo and
                  Yang Li and
                  Naofumi Homma and
                  Kazuo Sakiyama and
                  Kazuo Ohta and
                  Daisuke Fujimoto and
                  Makoto Nagata and
                  Toshihiro Katashita and
                  Jean{-}Luc Danger and
                  Takafumi Aoki},
  title        = {A Silicon-Level Countermeasure Against Fault Sensitivity Analysis
                  and Its Evaluation},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {23},
  number       = {8},
  pages        = {1429--1438},
  year         = {2015},
  url          = {https://doi.org/10.1109/TVLSI.2014.2339892},
  doi          = {10.1109/TVLSI.2014.2339892},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/EndoLHSOFNKDA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/FujimotoNBD15,
  author       = {Daisuke Fujimoto and
                  Makoto Nagata and
                  Shivam Bhasin and
                  Jean{-}Luc Danger},
  title        = {A novel methodology for testing hardware security and trust exploiting
                  On-Chip Power noise Measurement},
  booktitle    = {The 20th Asia and South Pacific Design Automation Conference, {ASP-DAC}
                  2015, Chiba, Japan, January 19-22, 2015},
  pages        = {749--754},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ASPDAC.2015.7059100},
  doi          = {10.1109/ASPDAC.2015.7059100},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aspdac/FujimotoNBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NgoEBDGNRR15,
  author       = {Xuan Thuy Ngo and
                  Ingrid Exurville and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Jean{-}Baptiste Rigaud and
                  Bruno Robisson},
  editor       = {Wolfgang Nebel and
                  David Atienza},
  title        = {Hardware trojan detection by delay and electromagnetic measurements},
  booktitle    = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
                  Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
                  9-13, 2015},
  pages        = {782--787},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2755931},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/NgoEBDGNRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/NgoNBRDG15,
  author       = {Xuan Thuy Ngo and
                  Zakaria Najm and
                  Shivam Bhasin and
                  Debapriya Basu Roy and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Integrated Sensor: {A} Backdoor for Hardware Trojan Insertions?},
  booktitle    = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira,
                  Portugal, August 26-28, 2015},
  pages        = {415--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSD.2015.119},
  doi          = {10.1109/DSD.2015.119},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/NgoNBRDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/CarletDDGNNPT15,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Xuan Thuy Ngo and
                  Thibault Porteboeuf and
                  C{\'{e}}dric Tavernier},
  title        = {Optimized linear complementary codes implementation for hardware trojan
                  prevention},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim,
                  Norway, August 24-26, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECCTD.2015.7300075},
  doi          = {10.1109/ECCTD.2015.7300075},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/CarletDDGNNPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/NgoDGNE15,
  author       = {Xuan Thuy Ngo and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Olivier Emery},
  title        = {Hardware property checker for run-time Hardware Trojan detection},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim,
                  Norway, August 24-26, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECCTD.2015.7300085},
  doi          = {10.1109/ECCTD.2015.7300085},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/NgoDGNE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High precision fault injections on the instruction cache of ARMv7-M
                  architectures},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {62--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140238},
  doi          = {10.1109/HST.2015.7140238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/NgoBDGN15,
  author       = {Xuan Thuy Ngo and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Linear complementary dual code improvement to strengthen encoded circuit
                  against hardware Trojan horses},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {82--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140242},
  doi          = {10.1109/HST.2015.7140242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/NgoBDGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/RoyBGDM15,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Debdeep Mukhopadhyay},
  title        = {From theory to practice of private circuit: {A} cautionary note},
  booktitle    = {33rd {IEEE} International Conference on Computer Design, {ICCD} 2015,
                  New York City, NY, USA, October 18-21, 2015},
  pages        = {296--303},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCD.2015.7357117},
  doi          = {10.1109/ICCD.2015.7357117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/RoyBGDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icicdt/AmouriBMGD15,
  author       = {Emna Amouri and
                  Shivam Bhasin and
                  Yves Mathieu and
                  Tarik Graba and
                  Jean{-}Luc Danger},
  title        = {Countering early propagation and routing imbalance of {DPL} designs
                  in a tree-based {FPGA}},
  booktitle    = {2015 International Conference on {IC} Design {\&} Technology,
                  {ICICDT} 2015, Leuven, Belgium, June 1-3, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICICDT.2015.7165897},
  doi          = {10.1109/ICICDT.2015.7165897},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icicdt/AmouriBMGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/RakotomalalaNND15,
  author       = {Henitsoa Rakotomalala and
                  Xuan Thuy Ngo and
                  Zakaria Najm and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Michael H{\"{u}}bner and
                  Maya B. Gokhale and
                  Ren{\'{e}} Cumplido},
  title        = {Private circuits {II} versus fault injection attacks},
  booktitle    = {International Conference on ReConFigurable Computing and FPGAs, ReConFig
                  2015, Riviera Maya, Mexico, December 7-9, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ReConFig.2015.7393338},
  doi          = {10.1109/RECONFIG.2015.7393338},
  timestamp    = {Wed, 28 Apr 2021 16:06:54 +0200},
  biburl       = {https://dblp.org/rec/conf/reconfig/RakotomalalaNND15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/RoyBGDMNN15,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Debdeep Mukhopadhyay and
                  Xuan Thuy Ngo and
                  Zakaria Najm},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Reconfigurable {LUT:} {A} Double Edged Sword for Security-Critical
                  Applications},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {248--268},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_15},
  doi          = {10.1007/978-3-319-24126-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/RoyBGDMNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High Precision Fault Injections on the Instruction Cache of ARMv7-M
                  Architectures},
  journal      = {CoRR},
  volume       = {abs/1510.01537},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.01537},
  eprinttype    = {arXiv},
  eprint       = {1510.01537},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyBGDM15,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Debdeep Mukhopadhyay},
  title        = {Reconfigurable {LUT:} Boon or Bane for Secure Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyBGDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High Precision Fault Injections on the Instruction Cache of ARMv7-M
                  Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DangerGHMN15,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Improving the Big Mac Attack on Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/819},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DangerGHMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DugardinPNBDGCT15,
  author       = {Margaux Dugardin and
                  Louiza Papachristodoulou and
                  Zakaria Najm and
                  Lejla Batina and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jean{-}Christophe Courr{\`{e}}ge and
                  Carine Therond},
  title        = {Dismantling real-world {ECC} with Horizontal and Vertical Template
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1001},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujimotoMNHHAHKSLBBBD14,
  author       = {Daisuke Fujimoto and
                  Noriyuki Miura and
                  Makoto Nagata and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Yohei Hori and
                  Toshihiro Katashita and
                  Kazuo Sakiyama and
                  Thanh{-}Ha Le and
                  Julien Bringer and
                  Pirouz Bazargan{-}Sabet and
                  Shivam Bhasin and
                  Jean{-}Luc Danger},
  title        = {Power Noise Measurements of Cryptographic {VLSI} Circuits Regarding
                  Side-Channel Information Leakage},
  journal      = {{IEICE} Trans. Electron.},
  volume       = {97-C},
  number       = {4},
  pages        = {272--279},
  year         = {2014},
  url          = {https://doi.org/10.1587/transele.E97.C.272},
  doi          = {10.1587/TRANSELE.E97.C.272},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujimotoMNHHAHKSLBBBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGMP14,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {Achieving side-channel high-order correlation immunity with leakage
                  squeezing},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {107--121},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0067-1},
  doi          = {10.1007/S13389-013-0067-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14,
  author       = {Christophe Clavier and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  M. Abdelaziz Elaabid and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Michael Kasper and
                  Yang Li and
                  Victor Lomn{\'{e}} and
                  Daisuke Nakatsu and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Laurent Sauvage and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger and
                  Nicolas Veyrat{-}Charvillon and
                  Matthieu Walle and
                  Antoine Wurcker},
  title        = {Practical improvements of side-channel attacks on {AES:} feedback
                  from the 2nd {DPA} contest},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {259--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0075-9},
  doi          = {10.1007/S13389-014-0075-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CarletDGM14,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Leakage squeezing: Optimal implementation and security evaluation},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {249--295},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2012-0018},
  doi          = {10.1515/JMC-2012-0018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/CarletDGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CheeCDGKKSZ14,
  author       = {Yeow Meng Chee and
                  Zouha Cherif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Han Mao Kiah and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}} and
                  Xiande Zhang},
  title        = {Multiply Constant-Weight Codes and the Reliability of Loop Physically
                  Unclonable Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {60},
  number       = {11},
  pages        = {7026--7034},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIT.2014.2359207},
  doi          = {10.1109/TIT.2014.2359207},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CheeCDGKKSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DangerGPPT14,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Thibault Porteboeuf and
                  Florian Praden and
                  Micha{\"{e}}l Timbert},
  editor       = {Mila Dalla Preda and
                  Jeffrey Todd McDonald},
  title        = {{HCODE:} Hardware-Enhanced Real-Time {CFI}},
  booktitle    = {Proceedings of the 4th Program Protection and Reverse Engineering
                  Workshop, PPREW@ACSAC 2014, New Orleans, LA, USA, December 9, 2014},
  pages        = {6:1--6:11},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2689702.2689708},
  doi          = {10.1145/2689702.2689708},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DangerGPPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/NgoGBDN14,
  author       = {Xuan Thuy Ngo and
                  Sylvain Guilley and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Zakaria Najm},
  editor       = {Ting Yu and
                  Shengqi Yang},
  title        = {Encoding the state of integrated circuits: a proactive and reactive
                  protection against hardware Trojans horses},
  booktitle    = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS}
                  '14, New Delhi, India, October 17, 2014},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2668322.2668329},
  doi          = {10.1145/2668322.2668329},
  timestamp    = {Tue, 06 Nov 2018 11:07:42 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/NgoGBDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BerthierBBCCDFG14,
  author       = {Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Taoufik Chouta and
                  Jean{-}Luc Danger and
                  M{\'{e}}lanie Favre and
                  Tarik Graba},
  editor       = {Emmanuel Prouff},
  title        = {Studying Leakages on an Embedded Biometric System Using Side Channel
                  Analysis},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {281--298},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_19},
  doi          = {10.1007/978-3-319-10175-0\_19},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BerthierBBCCDFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/HamdiouiDNSBT14,
  author       = {Said Hamdioui and
                  Jean{-}Luc Danger and
                  Giorgio Di Natale and
                  Fethulah Smailbegovic and
                  Gerard van Battum and
                  Mark M. Tehranipoor},
  editor       = {Gerhard P. Fettweis and
                  Wolfgang Nebel},
  title        = {Hacking and protecting {IC} hardware},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2014, Dresden, Germany, March 24-28, 2014},
  pages        = {1--7},
  publisher    = {European Design and Automation Association},
  year         = {2014},
  url          = {https://doi.org/10.7873/DATE.2014.112},
  doi          = {10.7873/DATE.2014.112},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/HamdiouiDNSBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BhasinDGMFN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Tarik Graba and
                  Yves Mathieu and
                  Daisuke Fujimoto and
                  Makoto Nagata},
  editor       = {Christian Berger and
                  Ina Schaefer},
  title        = {Physical Security Evaluation at an Early Design-Phase: {A} Side-Channel
                  Aware Simulation Methodology},
  booktitle    = {International Workshop on Engineering Simulations for Cyber-Physical
                  Systems, {ES4CPS} '14, Dresden, Germany, March 28 - 28, 2014},
  pages        = {13},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2589650.2559628},
  doi          = {10.1145/2589650.2559628},
  timestamp    = {Wed, 28 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/BhasinDGMFN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/AmouriBMGDM14,
  author       = {Emna Amouri and
                  Shivam Bhasin and
                  Yves Mathieu and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Habib Mehrez},
  title        = {Balancing {WDDL} dual-rail logic in a tree-based {FPGA} to enhance
                  physical security},
  booktitle    = {24th International Conference on Field Programmable Logic and Applications,
                  {FPL} 2014, Munich, Germany, 2-4 September, 2014},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/FPL.2014.6927422},
  doi          = {10.1109/FPL.2014.6927422},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/AmouriBMGDM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/DangerDGS14,
  author       = {Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Youssef Souissi},
  editor       = {Jens Knoop and
                  Valentina Salapura and
                  Israel Koren and
                  Gerardo Pelosi},
  title        = {High-order timing attacks},
  booktitle    = {Proceedings of the First Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556315.2556316},
  doi          = {10.1145/2556315.2556316},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipeac/DangerDGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CioranescoDGGMNN14,
  author       = {Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Tarik Graba and
                  Sylvain Guilley and
                  Yves Mathieu and
                  David Naccache and
                  Xuan Thuy Ngo},
  title        = {Cryptographically secure shields},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {25--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855563},
  doi          = {10.1109/HST.2014.6855563},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CioranescoDGGMNN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/FujimotoTMNHHBD14,
  author       = {Daisuke Fujimoto and
                  Daichi Tanaka and
                  Noriyuki Miura and
                  Makoto Nagata and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma and
                  Shivam Bhasin and
                  Jean{-}Luc Danger},
  title        = {Side-channel leakage on silicon substrate of {CMOS} cryptographic
                  chip},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {32--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855564},
  doi          = {10.1109/HST.2014.6855564},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/FujimotoTMNHHBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BhasinGDN14,
  author       = {Shivam Bhasin and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Zakaria Najm},
  title        = {A look into {SIMON} from a side-channel perspective},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {56--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855568},
  doi          = {10.1109/HST.2014.6855568},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BhasinGDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/ChoutaGDBBBFC14,
  author       = {Taoufik Chouta and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  M{\'{e}}lanie Favre and
                  Herv{\'{e}} Chabanne},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side channel analysis on an embedded hardware fingerprint biometric
                  comparator {\&} low cost countermeasures},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611771},
  doi          = {10.1145/2611765.2611771},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/ChoutaGDBBBFC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhasinDGN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel leakage and trace compression using normalized inter-class
                  variance},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {7:1--7:9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611772},
  doi          = {10.1145/2611765.2611772},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/DangerGP14,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Florian Praden},
  editor       = {Suresh Jagannathan and
                  Peter Sewell},
  title        = {Hardware-enforced Protection against Software Reverse-Engineering
                  based on an Instruction Set Encoding},
  booktitle    = {Proceedings of the 3rd {ACM} {SIGPLAN} Program Protection and Reverse
                  Engineering Workshop 2014, {PPREW} 2014, January 25, 2014, San Diego,
                  CA, {USA}},
  pages        = {5:1--5:11},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556464.2556469},
  doi          = {10.1145/2556464.2556469},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/DangerGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BruneauDGHT14,
  author       = {Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Yannick Teglia},
  editor       = {Rajat Subhra Chakraborty and
                  Vashek Matyas and
                  Patrick Schaumont},
  title        = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                  Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8804},
  pages        = {183--200},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12060-7\_13},
  doi          = {10.1007/978-3-319-12060-7\_13},
  timestamp    = {Mon, 15 Jun 2020 17:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/space/BruneauDGHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BhasinBDGN14,
  author       = {Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  editor       = {Rajat Subhra Chakraborty and
                  Vashek Matyas and
                  Patrick Schaumont},
  title        = {Analysis and Improvements of the {DPA} Contest v4 Implementation},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                  Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8804},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12060-7\_14},
  doi          = {10.1007/978-3-319-12060-7\_14},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/BhasinBDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14,
  author       = {Yuto Nakano and
                  Youssef Souissi and
                  Robert Nguyen and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_6},
  doi          = {10.1007/978-3-662-43826-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2013,
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05302-8},
  doi          = {10.1007/978-3-319-05302-8},
  isbn         = {978-3-319-05301-1},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CheeCDGKKSZ14,
  author       = {Yeow Meng Chee and
                  Zouha Cherif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Han Mao Kiah and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}} and
                  Xiande Zhang},
  title        = {Multiply Constant-Weight Codes and the Reliability of Loop Physically
                  Unclonable Functions},
  journal      = {CoRR},
  volume       = {abs/1401.3928},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.3928},
  eprinttype    = {arXiv},
  eprint       = {1401.3928},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CheeCDGKKSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BerthierBBCCDFG14,
  author       = {Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Taoufik Chouta and
                  Jean{-}Luc Danger and
                  M{\'{e}}lanie Favre and
                  Tarik Graba},
  title        = {Studying Potential Side Channel Leakages on an Embedded Biometric
                  Comparison System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BerthierBBCCDFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinDGNS14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Xuan Thuy Ngo and
                  Laurent Sauvage},
  title        = {Hardware Trojan Horses in Cryptographic {IP} Cores},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {750},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/750},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinDGNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauDGHT14,
  author       = {Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Yannick Teglia},
  title        = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {935},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/935},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauDGHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinDGN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Side-Channel Leakage and Trace Compression using Normalized Inter-Class
                  Variance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1020},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/1020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BriaisDG13,
  author       = {S{\'{e}}bastien Briais and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {A formal study of two physical countermeasures against side channel
                  attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {169--180},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0054-6},
  doi          = {10.1007/S13389-013-0054-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BriaisDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BhasinGHD13,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Jean{-}Luc Danger},
  title        = {From cryptography to hardware: analyzing and protecting embedded Xilinx
                  {BRAM} for cryptographic applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {213--225},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0048-4},
  doi          = {10.1007/S13389-013-0048-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BhasinGHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {A synthesis of side-channel attacks on elliptic curve cryptography
                  in smart-cards},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {241--265},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0062-6},
  doi          = {10.1007/S13389-013-0062-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BelgarricBBDDGHNR13,
  author       = {Pierre Belgarric and
                  Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Zakaria Najm and
                  Olivier Rioul},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Time-Frequency Analysis for Second-Order Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {108--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_8},
  doi          = {10.1007/978-3-319-08302-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BelgarricBBDDGHNR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/BhasinDGN13,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {A low-entropy first-degree secure provable masking scheme for resource-constrained
                  devices},
  booktitle    = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013,
                  Montreal, Quebec, Canada, September 29 - October 4, 2013},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2527317.2527324},
  doi          = {10.1145/2527317.2527324},
  timestamp    = {Tue, 06 Nov 2018 11:07:42 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/BhasinDGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/LiEDHALDOS13,
  author       = {Yang Li and
                  Sho Endo and
                  Nicolas Debande and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Thanh{-}Ha Le and
                  Jean{-}Luc Danger and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Emmanuel Prouff},
  title        = {Exploring the Relations between Fault Sensitivity and Power Consumption},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1\_9},
  doi          = {10.1007/978-3-642-40026-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/LiEDHALDOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/LozachBGD13,
  author       = {Florent Lozach and
                  Molka Ben{-}Romdhane and
                  Tarik Graba and
                  Jean{-}Luc Danger},
  title        = {{FPGA} Design of an Open-Loop True Random Number Generator},
  booktitle    = {2013 Euromicro Conference on Digital System Design, {DSD} 2013, Los
                  Alamitos, CA, USA, September 4-6, 2013},
  pages        = {615--622},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSD.2013.73},
  doi          = {10.1109/DSD.2013.73},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/LozachBGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BhasinDGNS13,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Xuan Thuy Ngo and
                  Laurent Sauvage},
  editor       = {Wieland Fischer and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Hardware Trojan Horses in Cryptographic {IP} Cores},
  booktitle    = {2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los
                  Alamitos, CA, USA, August 20, 2013},
  pages        = {15--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FDTC.2013.15},
  doi          = {10.1109/FDTC.2013.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/BhasinDGNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/CherifDLMB13,
  author       = {Zouha Cherif and
                  Jean{-}Luc Danger and
                  Florent Lozach and
                  Yves Mathieu and
                  Lilian Bossuet},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Evaluation of delay PUFs on {CMOS} 65 nm technology: {ASIC} vs {FPGA}},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487730},
  doi          = {10.1145/2487726.2487730},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/CherifDLMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/CherifDGKS13,
  author       = {Zouha Cherif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Multiply constant weight codes},
  booktitle    = {Proceedings of the 2013 {IEEE} International Symposium on Information
                  Theory, Istanbul, Turkey, July 7-12, 2013},
  pages        = {306--310},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISIT.2013.6620237},
  doi          = {10.1109/ISIT.2013.6620237},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/CherifDGKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Dynamic countermeasure against the Zero Power Analysis},
  booktitle    = {{IEEE} International Symposium on Signal Processing and Information
                  Technology, Athens, Greece, December 12-15, 2013},
  pages        = {140--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSPIT.2013.6781869},
  doi          = {10.1109/ISSPIT.2013.6781869},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/newcas/Ben-RomdhaneGDM13,
  author       = {Molka Ben{-}Romdhane and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Yves Mathieu},
  title        = {Design methodology of an {ASIC} {TRNG} based on an open-loop delay
                  chain},
  booktitle    = {{IEEE} 11th International New Circuits and Systems Conference, {NEWCAS}
                  2013, Paris, France, June 16-19, 2013},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/NEWCAS.2013.6573654},
  doi          = {10.1109/NEWCAS.2013.6573654},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/newcas/Ben-RomdhaneGDM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recosoc/BhasinHGD13,
  author       = {Shivam Bhasin and
                  Wei He and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Exploiting {FPGA} block memories for protected cryptographic implementations},
  booktitle    = {2013 8th International Workshop on Reconfigurable and Communication-Centric
                  Systems-on-Chip (ReCoSoC), Darmstadt, Germany, July 10-12, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ReCoSoC.2013.6581529},
  doi          = {10.1109/RECOSOC.2013.6581529},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/recosoc/BhasinHGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Ben-RomdhaneGD13,
  author       = {Molka Ben{-}Romdhane and
                  Tarik Graba and
                  Jean{-}Luc Danger},
  editor       = {Michael Huth and
                  N. Asokan and
                  Srdjan Capkun and
                  Ivan Flechais and
                  Lizzie Coles{-}Kemp},
  title        = {Stochastic Model of a Metastability-Based True Random Number Generator},
  booktitle    = {Trust and Trustworthy Computing - 6th International Conference, {TRUST}
                  2013, London, UK, June 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7904},
  pages        = {92--105},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38908-5\_7},
  doi          = {10.1007/978-3-642-38908-5\_7},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Ben-RomdhaneGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinDGN13,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {{NICV:} Normalized Inter-Class Variance for Detection of Side-Channel
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {717},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/717},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinDGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Dynamic Countermeasure Against the Zero Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {764},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/764},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijrc/SauvageGFDM12,
  author       = {Laurent Sauvage and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Yves Mathieu},
  title        = {Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography},
  journal      = {Int. J. Reconfigurable Comput.},
  volume       = {2012},
  pages        = {360242:1--360242:9},
  year         = {2012},
  url          = {https://doi.org/10.1155/2012/360242},
  doi          = {10.1155/2012/360242},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijrc/SauvageGFDM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MaghrebiCGD12,
  author       = {Houssem Maghrebi and
                  Claude Carlet and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Optimal First-Order Masking with Linear and Non-linear Bijections},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {360--377},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_22},
  doi          = {10.1007/978-3-642-31410-0\_22},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/MaghrebiCGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DangerGHMN12,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  editor       = {Stefan Mangard},
  title        = {Low-Cost Countermeasure against {RPA}},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {106--122},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_8},
  doi          = {10.1007/978-3-642-37288-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DangerGHMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BriaisCCDGJMNP12,
  author       = {S{\'{e}}bastien Briais and
                  St{\'{e}}phane Caron and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jacques{-}Henri Jourdan and
                  Arthur Milchior and
                  David Naccache and
                  Thibault Porteboeuf},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {3D Hardware Canaries},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_1},
  doi          = {10.1007/978-3-642-33027-8\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BriaisCCDGJMNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MurdicaGDHN12,
  author       = {C{\'{e}}dric Murdica and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Philippe Hoogvorst and
                  David Naccache},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Same Values Power Analysis Using Special Points on Elliptic Curves},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_14},
  doi          = {10.1007/978-3-642-29912-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MurdicaGDHN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MaghrebiPGD12,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Orr Dunkelman},
  title        = {A First-Order Leak-Free Masking Countermeasure},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_10},
  doi          = {10.1007/978-3-642-27954-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MaghrebiPGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SouissiBGND12,
  author       = {Youssef Souissi and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Maxime Nassar and
                  Jean{-}Luc Danger},
  editor       = {Orr Dunkelman},
  title        = {Towards Different Flavors of Combined Side Channel Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_16},
  doi          = {10.1007/978-3-642-27954-6\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SouissiBGND12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NassarSGD12,
  author       = {Maxime Nassar and
                  Youssef Souissi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Wolfgang Rosenstiel and
                  Lothar Thiele},
  title        = {{RSM:} {A} small and fast countermeasure for AES, secure against 1st
                  and 2nd-order zero-offset SCAs},
  booktitle    = {2012 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012},
  pages        = {1173--1178},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/DATE.2012.6176671},
  doi          = {10.1109/DATE.2012.6176671},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/NassarSGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/CherifDGB12,
  author       = {Zouha Cherif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Lilian Bossuet},
  title        = {An Easy-to-Design {PUF} Based on a Single Oscillator: The Loop {PUF}},
  booktitle    = {15th Euromicro Conference on Digital System Design, {DSD} 2012, Cesme,
                  Izmir, Turkey, September 5-8, 2012},
  pages        = {156--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSD.2012.22},
  doi          = {10.1109/DSD.2012.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/CherifDGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/ChoutaDSG12,
  author       = {Taoufik Chouta and
                  Jean{-}Luc Danger and
                  Laurent Sauvage and
                  Tarik Graba},
  title        = {A Small and High-Performance Coprocessor for Fingerprint Match-on-Card},
  booktitle    = {15th Euromicro Conference on Digital System Design, {DSD} 2012, Cesme,
                  Izmir, Turkey, September 5-8, 2012},
  pages        = {915--922},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSD.2012.14},
  doi          = {10.1109/DSD.2012.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/ChoutaDSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BriaisCDGNP12,
  author       = {S{\'{e}}bastien Briais and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  David Naccache and
                  Thibault Porteboeuf},
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {Random Active Shield},
  booktitle    = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  pages        = {103--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FDTC.2012.11},
  doi          = {10.1109/FDTC.2012.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/BriaisCDGNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaghrebiGPD12,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Emmanuel Prouff and
                  Jean{-}Luc Danger},
  title        = {Register leakage masking using Gray code},
  booktitle    = {2012 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012},
  pages        = {37--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HST.2012.6224316},
  doi          = {10.1109/HST.2012.6224316},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaghrebiGPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaghrebiRGD12,
  author       = {Houssem Maghrebi and
                  Olivier Rioul and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Comparison between Side-Channel Analysis Distinguishers},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {331--340},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_30},
  doi          = {10.1007/978-3-642-34129-8\_30},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaghrebiRGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icistm/GuilleyDNN12,
  author       = {Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Robert Nguyen and
                  Philippe Nguyen},
  editor       = {Sumeet Dua and
                  Aryya Gangopadhyay and
                  Parimala Thulasiraman and
                  Umberto Straccia and
                  Michael A. Shepherd and
                  Benno Stein},
  title        = {System-Level Methods to Prevent Reverse-Engineering, Cloning, and
                  Trojan Insertion},
  booktitle    = {Information Systems, Technology and Management - 6th International
                  Conference, {ICISTM} 2012, Grenoble, France, March 28-30, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {285},
  pages        = {433--438},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29166-1\_41},
  doi          = {10.1007/978-3-642-29166-1\_41},
  timestamp    = {Wed, 30 Oct 2019 15:50:13 +0100},
  biburl       = {https://dblp.org/rec/conf/icistm/GuilleyDNN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/CarletDGM12,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Leakage Squeezing of Order Two},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {120--139},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_8},
  doi          = {10.1007/978-3-642-34931-7\_8},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/CarletDGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/BhasinGD12,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {From Cryptography to Hardware: Analyzing Embedded Xilinx {BRAM} for
                  Cryptographic Applications},
  booktitle    = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
                  {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
                  1-5, 2012},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MICROW.2012.11},
  doi          = {10.1109/MICROW.2012.11},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/BhasinGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/DebandeSEGD12,
  author       = {Nicolas Debande and
                  Youssef Souissi and
                  M. Abdelaziz Elaabid and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Wavelet transform based pre-processing for side channel analysis},
  booktitle    = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
                  {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
                  1-5, 2012},
  pages        = {32--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MICROW.2012.15},
  doi          = {10.1109/MICROW.2012.15},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/DebandeSEGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/SouissiDMGMD12,
  author       = {Youssef Souissi and
                  Nicolas Debande and
                  Sami Mekki and
                  Sylvain Guilley and
                  Ali Maalaoui and
                  Jean{-}Luc Danger},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {On the Optimality of Correlation Power Attack on Embedded Cryptographic
                  Systems},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {169--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_15},
  doi          = {10.1007/978-3-642-30955-7\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/SouissiDMGMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/GuilleyD12,
  author       = {Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Global Faults on Cryptographic Circuits},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {295--311},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_17},
  doi          = {10.1007/978-3-642-29656-7\_17},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/GuilleyD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiPGD12,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {A First-Order Leak-Free Masking Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiPGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiCGD12,
  author       = {Houssem Maghrebi and
                  Claude Carlet and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Optimal First-Order Masking with Linear and Non-Linear Bijections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiCGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BriaisCCDGJMNP12,
  author       = {S{\'{e}}bastien Briais and
                  St{\'{e}}phane Caron and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jacques{-}Henri Jourdan and
                  Arthur Milchior and
                  David Naccache and
                  Thibault Porteboeuf},
  title        = {3D Hardware Canaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BriaisCCDGJMNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BriaisGD12,
  author       = {S{\'{e}}bastien Briais and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {A formal study of two physical countermeasures against side channel
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BriaisGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGM12,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Leakage Squeezing of Order Two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SelmaneBGD11,
  author       = {Nidhal Selmane and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Security evaluation of application-specific integrated circuits and
                  field programmable gate arrays against setup time violation attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {181--190},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0238},
  doi          = {10.1049/IET-IFS.2010.0238},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SelmaneBGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasip/SouissiDGBN11,
  author       = {Youssef Souissi and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Shivam Bhasin and
                  Maxime Nassar},
  editor       = {Jari Nurmi and
                  Tapani Ahonen},
  title        = {Embedded systems security: An evaluation methodology against Side
                  Channel Attacks},
  booktitle    = {2011 Conference on Design and Architectures for Signal and Image Processing,
                  {DASIP} 2011, Tampere, Finland, November 2-4, 2011},
  pages        = {230--237},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/DASIP.2011.6136885},
  doi          = {10.1109/DASIP.2011.6136885},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dasip/SouissiDGBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/MeynardRFGHD11,
  author       = {Olivier Meynard and
                  Denis R{\'{e}}al and
                  Florent Flament and
                  Sylvain Guilley and
                  Naofumi Homma and
                  Jean{-}Luc Danger},
  title        = {Enhancement of simple electro-magnetic attacks by pre-characterization
                  in frequency domain and demodulation techniques},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2011, Grenoble, France,
                  March 14-18, 2011},
  pages        = {1004--1009},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/5763163/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/MeynardRFGHD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etfa/ThomasRFGDD11,
  author       = {S{\'{e}}bastien Thomas and
                  Didier Regis and
                  David Faura and
                  Marc Gatti and
                  Guillaume Duc and
                  Jean{-}Luc Danger},
  editor       = {Zoubir Mammeri},
  title        = {Non intrusive fault detection through electromagnetism analysis},
  booktitle    = {{IEEE} 16th Conference on Emerging Technologies {\&} Factory Automation,
                  {ETFA} 2011, Toulouse, France, September 5-9, 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ETFA.2011.6059065},
  doi          = {10.1109/ETFA.2011.6059065},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/etfa/ThomasRFGDD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaghrebiGD11,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Formal security evaluation of hardware Boolean masking against second-order
                  attacks},
  booktitle    = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
                  Diego, California, {USA}},
  pages        = {40--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HST.2011.5954993},
  doi          = {10.1109/HST.2011.5954993},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaghrebiGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuilleySDSR11,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Nidhal Selmane and
                  Denis R{\'{e}}al},
  title        = {Performance evaluation of protocols resilient to physical attacks},
  booktitle    = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
                  Diego, California, {USA}},
  pages        = {51--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HST.2011.5954995},
  doi          = {10.1109/HST.2011.5954995},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GuilleySDSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NassarGD11,
  author       = {Maxime Nassar and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Formal Analysis of the Entropy / Security Trade-off in First-Order
                  Masking Countermeasures against Side-Channel Attacks},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {22--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_4},
  doi          = {10.1007/978-3-642-25578-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NassarGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosechicomnet/NassarSGD11,
  author       = {Maxime Nassar and
                  Youssef Souissi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Marc Joye and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {"Rank Correction": {A} New Side-Channel Approach for Secret
                  Key Recovery},
  booktitle    = {Security Aspects in Information Technology - First International Conference,
                  InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7011},
  pages        = {128--143},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24586-2\_12},
  doi          = {10.1007/978-3-642-24586-2\_12},
  timestamp    = {Fri, 27 Mar 2020 08:56:51 +0100},
  biburl       = {https://dblp.org/rec/conf/infosechicomnet/NassarSGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/BhasinGSGD11,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Youssef Souissi and
                  Tarik Graba and
                  Jean{-}Luc Danger},
  editor       = {Peter M. Athanas and
                  J{\"{u}}rgen Becker and
                  Ren{\'{e}} Cumplido},
  title        = {Efficient Dual-Rail Implementations in {FPGA} Using Block RAMs},
  booktitle    = {2011 International Conference on Reconfigurable Computing and FPGAs,
                  ReConFig 2011, Cancun, Mexico, November 30 - December 2, 2011},
  pages        = {261--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ReConFig.2011.32},
  doi          = {10.1109/RECONFIG.2011.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/BhasinGSGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/DebandeSNGLD11,
  author       = {Nicolas Debande and
                  Youssef Souissi and
                  Maxime Nassar and
                  Sylvain Guilley and
                  Thanh{-}Ha Le and
                  Jean{-}Luc Danger},
  title        = {"Re-synchronization by moments": An efficient solution to
                  align Side-Channel traces},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123143},
  doi          = {10.1109/WIFS.2011.6123143},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/DebandeSNGLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GuilleyKLD11,
  author       = {Sylvain Guilley and
                  Karim Khalfallah and
                  Victor Lomn{\'{e}} and
                  Jean{-}Luc Danger},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Formal Framework for the Evaluation of Waveform Resynchronization
                  Algorithms},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_7},
  doi          = {10.1007/978-3-642-21040-2\_7},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/GuilleyKLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MaghrebiGD11,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Leakage Squeezing Countermeasure against High-Order Attacks},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_14},
  doi          = {10.1007/978-3-642-21040-2\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MaghrebiGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-1360,
  author       = {Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  Jean{-}Luc Danger and
                  Taha Beyrouthy and
                  Alin Razafindraibe and
                  Laurent Fesquet and
                  Marc Renaudin},
  title        = {A Secure Asynchronous {FPGA} Architecture, Experimental Results and
                  Some Debug Feedback},
  journal      = {CoRR},
  volume       = {abs/1103.1360},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.1360},
  eprinttype    = {arXiv},
  eprint       = {1103.1360},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-1360.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghebiGCD11,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger},
  title        = {Classification of High-Order Boolean Masking Schemes and Improvements
                  of their Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghebiGCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NassarGD11,
  author       = {Maxime Nassar and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Formal Analysis of the Entropy / Security Trade-off in First-Order
                  Masking Countermeasures against Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NassarGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijrc/SauvageNGFDM10,
  author       = {Laurent Sauvage and
                  Maxime Nassar and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Yves Mathieu},
  title        = {Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail
                  Logics},
  journal      = {Int. J. Reconfigurable Comput.},
  volume       = {2010},
  pages        = {375245:1--375245:12},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/375245},
  doi          = {10.1155/2010/375245},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijrc/SauvageNGFDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/BhasinGFSD10,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Florent Flament and
                  Nidhal Selmane and
                  Jean{-}Luc Danger},
  title        = {Countering early evaluation: an approach towards robust dual-rail
                  precharge logic},
  booktitle    = {Proceedings of the 5th Workshop on Embedded Systems Security, {WESS}
                  2010, Scottsdale, AZ, USA, October 24, 2010},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873548.1873554},
  doi          = {10.1145/1873548.1873554},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/BhasinGFSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MeynardRGFDV10,
  author       = {Olivier Meynard and
                  Denis R{\'{e}}al and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Characterization of the Electromagnetic Side Channel in Frequency
                  Domain},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {471--486},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_33},
  doi          = {10.1007/978-3-642-21518-6\_33},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MeynardRGFDV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BhasinGSD10,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger},
  editor       = {Josef Pieprzyk},
  title        = {Unrolling Cryptographic Circuits: {A} Simple Countermeasure Against
                  Side-Channel Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {195--207},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_14},
  doi          = {10.1007/978-3-642-11925-5\_14},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BhasinGSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NassarBDDG10,
  author       = {Maxime Nassar and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  Sylvain Guilley},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {{BCDL:} {A} high speed balanced {DPL} for {FPGA} with global precharge
                  and no early evaluation},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {849--854},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456932},
  doi          = {10.1109/DATE.2010.5456932},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/NassarBDDG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/MeynardGDS10,
  author       = {Olivier Meynard and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Laurent Sauvage},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {Far Correlation-based {EMA} with a precharacterized leakage model},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {977--980},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456906},
  doi          = {10.1109/DATE.2010.5456906},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/MeynardGDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/GuilleySDS10,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Nidhal Selmane},
  editor       = {Luca Breveglieri and
                  Marc Joye and
                  Israel Koren and
                  David Naccache and
                  Ingrid Verbauwhede},
  title        = {Fault Injection Resilience},
  booktitle    = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2010, Santa Barbara, California, USA, 21 August 2010},
  pages        = {51--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FDTC.2010.15},
  doi          = {10.1109/FDTC.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/GuilleySDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaghrebiGDF10,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Florent Flament},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Entropy-based Power Attack},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513124},
  doi          = {10.1109/HST.2010.5513124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaghrebiGDF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/SouissiGDMD10,
  author       = {Youssef Souissi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Sami Mekki and
                  Guillaume Duc},
  title        = {Improvement of power analysis attacks using Kalman filter},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2010, 14-19 March 2010, Sheraton Dallas
                  Hotel, Dallas, Texas, {USA}},
  pages        = {1778--1781},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICASSP.2010.5495428},
  doi          = {10.1109/ICASSP.2010.5495428},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/SouissiGDMD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SouissiNGDF10,
  author       = {Youssef Souissi and
                  Maxime Nassar and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Florent Flament},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {First Principal Components Analysis: {A} New Side Channel Distinguisher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {407--419},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_27},
  doi          = {10.1007/978-3-642-24209-0\_27},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SouissiNGDF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/SauvageGFDM10,
  author       = {Laurent Sauvage and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Yves Mathieu},
  editor       = {Viktor K. Prasanna and
                  J{\"{u}}rgen Becker and
                  Ren{\'{e}} Cumplido},
  title        = {Cross-Correlation Cartography},
  booktitle    = {ReConFig'10: 2010 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings},
  pages        = {268--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ReConFig.2010.75},
  doi          = {10.1109/RECONFIG.2010.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/SauvageGFDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/CherifFDBGC10,
  author       = {Zouha Cherif and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Herv{\'{e}} Chabanne},
  editor       = {Viktor K. Prasanna and
                  J{\"{u}}rgen Becker and
                  Ren{\'{e}} Cumplido},
  title        = {Evaluation of White-Box and Grey-Box Noekeon Implementations in {FPGA}},
  booktitle    = {ReConFig'10: 2010 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings},
  pages        = {310--315},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ReConFig.2010.36},
  doi          = {10.1109/RECONFIG.2010.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/CherifFDBGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ElaabidMGD10,
  author       = {M. Abdelaziz Elaabid and
                  Olivier Meynard and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Combined Side-Channel Attacks},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_13},
  doi          = {10.1007/978-3-642-17955-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mj/DangerGH09,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst},
  title        = {High speed true random number generator based on open loop structures
                  in FPGAs},
  journal      = {Microelectron. J.},
  volume       = {40},
  number       = {11},
  pages        = {1650--1656},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.mejo.2009.02.004},
  doi          = {10.1016/J.MEJO.2009.02.004},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mj/DangerGH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wsn/MekkiDM09,
  author       = {Sami Mekki and
                  Jean{-}Luc Danger and
                  Benoit Miscopein},
  title        = {On the Implementation of a Probabilistic Equalizer for Low-Cost Impulse
                  Radio {UWB} in High Data Rate},
  journal      = {Wirel. Sens. Netw.},
  volume       = {1},
  number       = {4},
  pages        = {245--256},
  year         = {2009},
  url          = {https://doi.org/10.4236/wsn.2009.14031},
  doi          = {10.4236/WSN.2009.14031},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wsn/MekkiDM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/SauvageGDMN09,
  author       = {Laurent Sauvage and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Yves Mathieu and
                  Maxime Nassar},
  editor       = {Luca Benini and
                  Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller},
  title        = {Successful attack on an FPGA-based {WDDL} {DES} cryptoprocessor without
                  place and route constraints},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2009, Nice, France,
                  April 20-24, 2009},
  pages        = {640--645},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/DATE.2009.5090745},
  doi          = {10.1109/DATE.2009.5090745},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/SauvageGDMN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/SelmaneBGGD09,
  author       = {Nidhal Selmane and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Tarik Graba and
                  Jean{-}Luc Danger},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {{WDDL} is Protected against Setup Time Violation Attacks},
  booktitle    = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  pages        = {73--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FDTC.2009.40},
  doi          = {10.1109/FDTC.2009.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/SelmaneBGGD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BhasinDGS09,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Nidhal Selmane},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Security Evaluation of Different {AES} Implementations Against Practical
                  Setup Time Violation Attacks in FPGAs},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings},
  pages        = {15--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HST.2009.5225057},
  doi          = {10.1109/HST.2009.5225057},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BhasinDGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/GuilleyCSDBF09,
  author       = {Sylvain Guilley and
                  Sumanta Chaudhuri and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Taha Beyrouthy and
                  Laurent Fesquet},
  title        = {Updates on the potential of clock-less logics to strengthen cryptographic
                  circuits against side-channel attacks},
  booktitle    = {16th {IEEE} International Conference on Electronics, Circuits, and
                  Systems, {ICECS} 2009, Yasmine Hammamet, Tunisia, 13-19 December,
                  2009},
  pages        = {351--354},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICECS.2009.5411008},
  doi          = {10.1109/ICECS.2009.5411008},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/GuilleyCSDBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/BringerCD09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Jean{-}Luc Danger},
  editor       = {Viktor K. Prasanna and
                  Lionel Torres and
                  Ren{\'{e}} Cumplido},
  title        = {Protecting the {NOEKEON} Cipher against {SCARE} Attacks in FPGAs by
                  Using Dynamic Implementations},
  booktitle    = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  pages        = {183--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ReConFig.2009.19},
  doi          = {10.1109/RECONFIG.2009.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/BringerCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/BhasinDFGGMNSS09,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Florent Flament and
                  Tarik Graba and
                  Sylvain Guilley and
                  Yves Mathieu and
                  Maxime Nassar and
                  Laurent Sauvage and
                  Nidhal Selmane},
  editor       = {Viktor K. Prasanna and
                  Lionel Torres and
                  Ren{\'{e}} Cumplido},
  title        = {Combined {SCA} and {DFA} Countermeasures Integrable in a {FPGA} Design
                  Flow},
  booktitle    = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  pages        = {213--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ReConFig.2009.50},
  doi          = {10.1109/RECONFIG.2009.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/BhasinDFGGMNSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/SauvageNGFDM09,
  author       = {Laurent Sauvage and
                  Maxime Nassar and
                  Sylvain Guilley and
                  Florent Flament and
                  Jean{-}Luc Danger and
                  Yves Mathieu},
  editor       = {Viktor K. Prasanna and
                  Lionel Torres and
                  Ren{\'{e}} Cumplido},
  title        = {{DPL} on Stratix {II} {FPGA:} What to Expect?},
  booktitle    = {ReConFig'09: 2009 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings},
  pages        = {243--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ReConFig.2009.58},
  doi          = {10.1109/RECONFIG.2009.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/SauvageNGFDM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD09,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Jean{-}Luc Danger},
  title        = {Protecting the {NOEKEON} Cipher Against {SCARE} Attacks in FPGAs by
                  using Dynamic Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/ChaudhuriGHDBRFR08,
  author       = {Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  Jean{-}Luc Danger and
                  Taha Beyrouthy and
                  Alin Razafindraibe and
                  Laurent Fesquet and
                  Marc Renaudin},
  editor       = {Roger F. Woods and
                  Katherine Compton and
                  Christos{-}Savvas Bouganis and
                  Pedro C. Diniz},
  title        = {Physical Design of {FPGA} Interconnect to Prevent Information Leakage},
  booktitle    = {Reconfigurable Computing: Architectures, Tools and Applications, 4th
                  International Workshop, {ARC} 2008, London, UK, March 26-28, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4943},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78610-8\_11},
  doi          = {10.1007/978-3-540-78610-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/ChaudhuriGHDBRFR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/ChaudhuriGFHD08,
  author       = {Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Florent Flament and
                  Philippe Hoogvorst and
                  Jean{-}Luc Danger},
  editor       = {Limor Fix},
  title        = {An 8x8 run-time reconfigurable {FPGA} embedded in a SoC},
  booktitle    = {Proceedings of the 45th Design Automation Conference, {DAC} 2008,
                  Anaheim, CA, USA, June 8-13, 2008},
  pages        = {120--125},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1391469.1391500},
  doi          = {10.1145/1391469.1391500},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/ChaudhuriGFHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/SelmaneGD08,
  author       = {Nidhal Selmane and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Practical Setup Time Violation Attacks on {AES}},
  booktitle    = {Seventh European Dependable Computing Conference, {EDCC-7} 2008, Kaunas,
                  Lithuania, 7-9 May 2008},
  pages        = {91--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EDCC-7.2008.11},
  doi          = {10.1109/EDCC-7.2008.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/SelmaneGD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/GuilleySDSP08,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Nidhal Selmane and
                  Renaud Pacalet},
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Silicon-level Solutions to Counteract Passive and Active Attacks},
  booktitle    = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FDTC.2008.18},
  doi          = {10.1109/FDTC.2008.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/GuilleySDSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/ChaudhuriDHG08,
  author       = {Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Philippe Hoogvorst and
                  Sylvain Guilley},
  editor       = {Mike Hutton and
                  Paul Chow},
  title        = {Efficient tiling patterns for reconfigurable gate arrays},
  booktitle    = {Proceedings of the {ACM/SIGDA} 16th International Symposium on Field
                  Programmable Gate Arrays, {FPGA} 2008, Monterey, California, USA,
                  February 24-26, 2008},
  pages        = {257},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1344671.1344709},
  doi          = {10.1145/1344671.1344709},
  timestamp    = {Tue, 06 Nov 2018 16:58:23 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/ChaudhuriDHG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/GuilleySDH08,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Philippe Hoogvorst},
  title        = {Area optimization of cryptographic co-processors implemented in dual-rail
                  with precharge positive logic},
  booktitle    = {{FPL} 2008, International Conference on Field Programmable Logic and
                  Applications, Heidelberg, Germany, 8-10 September 2008},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/FPL.2008.4629925},
  doi          = {10.1109/FPL.2008.4629925},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/GuilleySDH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuilleyCDSHNGV08,
  author       = {Sylvain Guilley and
                  Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Laurent Sauvage and
                  Philippe Hoogvorst and
                  Maxime Nassar and
                  Tarik Graba and
                  Vinh{-}Nga Vong},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Place-and-Route Impact on the Security of {DPL} Designs in FPGAs},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2008, Anaheim, CA, USA, June 9, 2008. Proceedings},
  pages        = {26--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HST.2008.4559042},
  doi          = {10.1109/HST.2008.4559042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GuilleyCDSHNGV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iswcs/MekkiDMB08,
  author       = {Sami Mekki and
                  Jean{-}Luc Danger and
                  Benoit Miscopein and
                  Joseph J. Boutros},
  title        = {{EM} channel estimation in a low-cost {UWB} receiver based on energy
                  detection},
  booktitle    = {Proceedings of the 2008 5th International Symposium on Wireless Communication
                  Systems, {ISWCS} 2008, 21-24 October 2008, Reykjav{\'{\i}}k,
                  Iceland},
  pages        = {214--218},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISWCS.2008.4726049},
  doi          = {10.1109/ISWCS.2008.4726049},
  timestamp    = {Fri, 07 May 2021 15:32:09 +0200},
  biburl       = {https://dblp.org/rec/conf/iswcs/MekkiDMB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/KhelilHGDS08,
  author       = {Farouk Khelil and
                  Mohamed Hamdi and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Nidhal Selmane},
  editor       = {Akshai Aggarwal and
                  Mohamad Badra and
                  Fabio Massacci},
  title        = {Fault Analysis Attack on an {FPGA} {AES} Implementation},
  booktitle    = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility
                  and Security, November 5-7, 2008, Tangier, Morocco},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NTMS.2008.ECP.45},
  doi          = {10.1109/NTMS.2008.ECP.45},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/KhelilHGDS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/slip/ChaudhuriGHD08,
  author       = {Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  Jean{-}Luc Danger},
  editor       = {Ion I. Mandoiu and
                  Andrew A. Kennings},
  title        = {Efficient tiling patterns for reconfigurable gate arrays},
  booktitle    = {The Tenth International Workshop on System-Level Interconnect Prediction
                  {(SLIP} 2008), Newcastle, UK, April 5-8, 2008, Proceedings},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1353610.1353613},
  doi          = {10.1145/1353610.1353613},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/slip/ChaudhuriGHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GuilleySDGM08,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Tarik Graba and
                  Yves Mathieu},
  title        = {Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic
                  Applications in FPGAs},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {16--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.31},
  doi          = {10.1109/SSIRI.2008.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/GuilleySDGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/MekkiDMSB08,
  author       = {Sami Mekki and
                  Jean{-}Luc Danger and
                  Benoit Miscopein and
                  Jean Schwoerer and
                  Joseph Jean Boutros},
  title        = {Probabilistic Equalizer for Ultra-Wideband Energy Detection},
  booktitle    = {Proceedings of the 67th {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2008, 11-14 May 2008, Singapore},
  pages        = {1108--1112},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/VETECS.2008.235},
  doi          = {10.1109/VETECS.2008.235},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/MekkiDMSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0809-3942,
  author       = {Philippe Hoogvorst and
                  Sylvain Guilley and
                  Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Taha Beyrouthy and
                  Laurent Fesquet},
  title        = {A Reconfigurable Programmable Logic Block for a Multi-Style Asynchronous
                  {FPGA} resistant to Side-Channel Attacks},
  journal      = {CoRR},
  volume       = {abs/0809.3942},
  year         = {2008},
  url          = {http://arxiv.org/abs/0809.3942},
  eprinttype    = {arXiv},
  eprint       = {0809.3942},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0809-3942.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/GuilloudBTD07,
  author       = {Fr{\'{e}}d{\'{e}}ric Guilloud and
                  Emmanuel Boutillon and
                  Jacky Tousch and
                  Jean{-}Luc Danger},
  title        = {Generic Description and Synthesis of {LDPC} Decoders},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {55},
  number       = {11},
  pages        = {2084--2091},
  year         = {2007},
  url          = {https://doi.org/10.1109/TCOMM.2007.908517},
  doi          = {10.1109/TCOMM.2007.908517},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/GuilloudBTD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/ChaudhuriDG07,
  author       = {Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Koen Bertels and
                  Walid A. Najjar and
                  Arjan J. van Genderen and
                  Stamatis Vassiliadis},
  title        = {Efficient Modeling and Floorplanning of Embedded-FPGA Fabric},
  booktitle    = {{FPL} 2007, International Conference on Field Programmable Logic and
                  Applications, Amsterdam, The Netherlands, 27-29 August 2007},
  pages        = {665--669},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/FPL.2007.4380741},
  doi          = {10.1109/FPL.2007.4380741},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/ChaudhuriDG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/BeyrouthyRFRCGDH07,
  author       = {Taha Beyrouthy and
                  Alin Razafindraibe and
                  Laurent Fesquet and
                  Marc Renaudin and
                  Sumanta Chaudhuri and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Philippe Hoogvorst},
  editor       = {Hideharu Amano and
                  Andy Ye and
                  Takeshi Ikenaga},
  title        = {A Novel Asynchronous e-FPGA Architecture for Security Applications},
  booktitle    = {2007 International Conference on Field-Programmable Technology, {ICFPT}
                  2007, Kitakyushu, Japan, December 12-14, 2007},
  pages        = {369--372},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/FPT.2007.4439288},
  doi          = {10.1109/FPT.2007.4439288},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fpt/BeyrouthyRFRCGDH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rivf/XuSDGBGM07,
  author       = {Qing Xu and
                  M. B. C. Silva and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Patrick Bellot and
                  Philippe Gallion and
                  Francisco Mendieta},
  title        = {Towards Quantum Key Distribution System using Homodyne Detection with
                  Differential Time-Multiplexed Reference},
  booktitle    = {2007 {IEEE} International Conference on Research, Innovation and Vision
                  for the Future in Computing {\&} Communication Technologies, {RIVF}
                  2007, Hanoi, Vietnam, 5-9 March 2007},
  pages        = {158--165},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/RIVF.2007.369151},
  doi          = {10.1109/RIVF.2007.369151},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rivf/XuSDGBGM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/KrikidisDN06,
  author       = {Ioannis Krikidis and
                  Jean{-}Luc Danger and
                  Lirida A. B. Naviner},
  title        = {An iterative reconfigurability approach for {WCDMA} high-data-rate
                  communications},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {13},
  number       = {3},
  pages        = {8--14},
  year         = {2006},
  url          = {https://doi.org/10.1109/MWC.2006.1700065},
  doi          = {10.1109/MWC.2006.1700065},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/KrikidisDN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/ChaudhuriDGH06,
  author       = {Sumanta Chaudhuri and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst},
  editor       = {Ren{\'{e}} Cumplido{-}Parra and
                  C{\'{e}}sar Torres{-}Huitzil and
                  Andr{\'{e}}s D. Garc{\'{\i}}a},
  title        = {{FASE:} An Open Run-Time Reconfigurable {FPGA} Architecture for Tamper-Resistant
                  and Secure Embedded Systems},
  booktitle    = {2006 {IEEE} International Conference on Reconfigurable Computing and
                  FPGA's, ReConFig 2006, San Luis Potosi, Mexico, September 20-22, 2006},
  pages        = {47--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/RECONF.2006.307752},
  doi          = {10.1109/RECONF.2006.307752},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/ChaudhuriDGH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/SouzaKNDBN05,
  author       = {Daniel C. de Souza and
                  Ioannis Krikidis and
                  Lirida A. B. Naviner and
                  Jean{-}Luc Danger and
                  M. A. de Barros and
                  B. G. A. Neto},
  title        = {Heterogeneous implementation of a rake receiver for {DS-CDMA} communication
                  systems},
  booktitle    = {12th {IEEE} International Conference on Electronics, Circuits, and
                  Systems, {ICECS} 2005, Gammarth, Tunisia, December 11-14, 2005},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICECS.2005.4633551},
  doi          = {10.1109/ICECS.2005.4633551},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/SouzaKNDBN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/KrikidisDN05,
  author       = {Ioannis Krikidis and
                  Jean{-}Luc Danger and
                  Lirida A. B. Naviner},
  title        = {Reconfigurable Implementation Issues of a Detection Scheme for {DS-CDMA}
                  High Data Rate Connections},
  booktitle    = {Proceedings of the {IEEE} 16th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, Berlin, Germany, September
                  11-14, 2005},
  pages        = {695--699},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/PIMRC.2005.1651525},
  doi          = {10.1109/PIMRC.2005.1651525},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/KrikidisDN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/KrikidisDN04,
  author       = {Ioannis Krikidis and
                  Jean{-}Luc Danger and
                  Lirida A. B. Naviner},
  title        = {A finger configuration algorithm for a reconfigurable Rake receiver},
  booktitle    = {2004 {IEEE} Wireless Communications and Networking Conference , {WCNC}
                  2004, Atlanta, Georgia, USA, 21-25 March 2004},
  pages        = {311--315},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/WCNC.2004.1311563},
  doi          = {10.1109/WCNC.2004.1311563},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/KrikidisDN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GuilloudBD02,
  author       = {Fr{\'{e}}d{\'{e}}ric Guilloud and
                  Emmanuel Boutillon and
                  Jean{-}Luc Danger},
  title        = {Bit error rate calculation for a multiband non-coherent on-off keying
                  demodulation},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2002, April
                  28 - May 2, 2002, New York City, NY, {USA}},
  pages        = {202--206},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICC.2002.996845},
  doi          = {10.1109/ICC.2002.996845},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GuilloudBD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/GarciaDB00,
  author       = {Andr{\'{e}}s D. Garc{\'{\i}}a and
                  Jean{-}Luc Danger and
                  Wayne P. Burleson},
  editor       = {Steve Trimberger and
                  Scott Hauck},
  title        = {Low power digital design in FPGAs (poster abstract): a study of pipeline
                  architectures implemented in a {FPGA} using a low supply voltage to
                  reduce power consumption},
  booktitle    = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable
                  Gate Arrays, {FPGA} 2000, Monterey, CA, USA, February 10-11, 2000},
  pages        = {220},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/329166.329220},
  doi          = {10.1145/329166.329220},
  timestamp    = {Tue, 06 Nov 2018 16:58:22 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/GarciaDB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/DangerGBL00,
  author       = {Jean{-}Luc Danger and
                  Adel Ghazel and
                  Emmanuel Boutillon and
                  H{\'{e}}di Laamari},
  title        = {Efficient {FPGA} implementation of Gaussian noise generator for communication
                  channel emulation},
  booktitle    = {Proceedings of the 2000 7th {IEEE} International Conference on Electronics,
                  Circuits and Systems, {ICECS} 2000, Jounieh, Lebanon, December 17-20,
                  2000},
  pages        = {366--369},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICECS.2000.911557},
  doi          = {10.1109/ICECS.2000.911557},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/DangerGBL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/GarciaBD00,
  author       = {Andr{\'{e}}s D. Garc{\'{\i}}a and
                  Wayne P. Burleson and
                  Jean{-}Luc Danger},
  title        = {Low power digital design in FPGAs: a study of pipeline architectures
                  implemented in a {FPGA} using a low supply voltage to reduce power
                  consumption},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2000,
                  Emerging Technologies for the 21st Century, Geneva, Switzerland, 28-31
                  May 2000, Proceedings},
  pages        = {561--564},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ISCAS.2000.857496},
  doi          = {10.1109/ISCAS.2000.857496},
  timestamp    = {Fri, 13 Aug 2021 09:26:01 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/GarciaBD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/NavinerDL99,
  author       = {Lirida A. B. Naviner and
                  Jean{-}Luc Danger and
                  C. Laurent},
  editor       = {Sinan Kaptanoglu and
                  Steve Trimberger},
  title        = {High-Performance Low-Cost Implementation of Two-Dimensional {DCT}
                  Processor nn {FPGA}},
  booktitle    = {Proceedings of the 1999 {ACM/SIGDA} Seventh International Symposium
                  on Field Programmable Gate Arrays, {FPGA} 1999, Monterey, CA, USA,
                  February 21-23, 1999},
  pages        = {249},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/296399.296514},
  doi          = {10.1145/296399.296514},
  timestamp    = {Tue, 06 Nov 2018 16:58:22 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/NavinerDL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/GarciaBD99,
  author       = {Andr{\'{e}}s D. Garc{\'{\i}}a and
                  Wayne P. Burleson and
                  Jean{-}Luc Danger},
  editor       = {Patrick Lysaght and
                  James Irvine and
                  Reiner W. Hartenstein},
  title        = {Power Modelling in Field Programmable Gate Arrays {(FPGA)}},
  booktitle    = {Field-Programmable Logic and Applications, 9th International Workshop,
                  FPL'99, Glasgow, UK, August 30 - September 1, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1673},
  pages        = {396--404},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48302-1\_44},
  doi          = {10.1007/978-3-540-48302-1\_44},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/GarciaBD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics