BibTeX records: Zakaria Najm

download as .bib file

@inproceedings{DBLP:conf/ctrsa/ChattopadhyayKL21,
  author       = {Anupam Chattopadhyay and
                  Mustafa Khairallah and
                  Ga{\"{e}}tan Leurent and
                  Zakaria Najm and
                  Thomas Peyrin and
                  Vesselin Velichkov},
  editor       = {Kenneth G. Paterson},
  title        = {On the Cost of {ASIC} Hardware Crackers: {A} {SHA-1} Case Study},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {657--681},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_27},
  doi          = {10.1007/978-3-030-75539-3\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChattopadhyayKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AdomnicaiNP20,
  author       = {Alexandre Adomnicai and
                  Zakaria Najm and
                  Thomas Peyrin},
  title        = {Fixslicing: {A} New {GIFT} Representation Fast Constant-Time Implementations
                  of {GIFT} and {GIFT-COFB} on {ARM} Cortex-M},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {402--427},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.402-427},
  doi          = {10.13154/TCHES.V2020.I3.402-427},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AdomnicaiNP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdomnicaiNP20,
  author       = {Alexandre Adomnicai and
                  Zakaria Najm and
                  Thomas Peyrin},
  title        = {Fixslicing: {A} New {GIFT} Representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdomnicaiNP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/RaviNBKGC19,
  author       = {Prasanna Ravi and
                  Zakaria Najm and
                  Shivam Bhasin and
                  Mustafa Khairallah and
                  Sourav Sen Gupta and
                  Anupam Chattopadhyay},
  title        = {Security is an architectural design constraint},
  journal      = {Microprocess. Microsystems},
  volume       = {68},
  pages        = {17--27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.micpro.2019.03.003},
  doi          = {10.1016/J.MICPRO.2019.03.003},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/RaviNBKGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KhairallahHNBBP19,
  author       = {Mustafa Khairallah and
                  Xiaolu Hou and
                  Zakaria Najm and
                  Jakub Breier and
                  Shivam Bhasin and
                  Thomas Peyrin},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {SoK: On {DFA} Vulnerabilities of Substitution-Permutation Networks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {403--414},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329810},
  doi          = {10.1145/3321705.3329810},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KhairallahHNBBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaviGCKNB19,
  author       = {Prasanna Ravi and
                  Sourav Sen Gupta and
                  Anupam Chattopadhyay and
                  Mustafa Khairallah and
                  Zakaria Najm and
                  Shivam Bhasin},
  title        = {Security is an Architectural Design Constraint},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/182},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RaviGCKNB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhairallahHNBBP19,
  author       = {Mustafa Khairallah and
                  Xiaolu Hou and
                  Zakaria Najm and
                  Jakub Breier and
                  Shivam Bhasin and
                  Thomas Peyrin},
  title        = {SoK : On {DFA} Vulnerabilities of Substitution-Permutation Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/387},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhairallahHNBBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/RoyBDGHMNN18,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Wei He and
                  Debdeep Mukhopadhyay and
                  Zakaria Najm and
                  Xuan Thuy Ngo},
  title        = {The Conflicted Usage of RLUTs for Security-Critical Applications on
                  {FPGA}},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {162--178},
  year         = {2018},
  url          = {https://doi.org/10.1007/s41635-018-0035-4},
  doi          = {10.1007/S41635-018-0035-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/RoyBDGHMNN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BruneauGNT18,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Yannick Teglia},
  title        = {Multivariate High-Order Attacks of Shuffled Tables Recomputation},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {2},
  pages        = {351--393},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9259-7},
  doi          = {10.1007/S00145-017-9259-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BruneauGNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apccas/NajmJJPB18,
  author       = {Zakaria Najm and
                  Dirmanto Jap and
                  Bernhard Jungk and
                  Stjepan Picek and
                  Shivam Bhasin},
  title        = {On Comparing Side-channel Properties of {AES} and ChaCha20 on Microcontrollers},
  booktitle    = {2018 {IEEE} Asia Pacific Conference on Circuits and Systems, {APCCAS}
                  2018, Chengdu, China, October 26-30, 2018},
  pages        = {552--555},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/APCCAS.2018.8605653},
  doi          = {10.1109/APCCAS.2018.8605653},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/apccas/NajmJJPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdsp/RaviJJNB18,
  author       = {Prasanna Ravi and
                  Bernhard Jungk and
                  Dirmanto Jap and
                  Zakaria Najm and
                  Shivam Bhasin},
  title        = {Feature Selection Methods for Non-Profiled Side-Channel Attacks on
                  {ECC}},
  booktitle    = {23rd {IEEE} International Conference on Digital Signal Processing,
                  {DSP} 2018, Shanghai, China, November 19-21, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDSP.2018.8631824},
  doi          = {10.1109/ICDSP.2018.8631824},
  timestamp    = {Mon, 31 Oct 2022 09:05:23 +0100},
  biburl       = {https://dblp.org/rec/conf/icdsp/RaviJJNB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/KhairallahNCP18,
  author       = {Mustafa Khairallah and
                  Zakaria Najm and
                  Anupam Chattopadhyay and
                  Thomas Peyrin},
  editor       = {Trevor N. Mudge and
                  Dionisios N. Pnevmatikatos},
  title        = {Crack me if you can: hardware acceleration bridging the gap between
                  practical and theoretical cryptanalysis?: a Survey},
  booktitle    = {Proceedings of the 18th International Conference on Embedded Computer
                  Systems: Architectures, Modeling, and Simulation, Pythagorion, Greece,
                  July 15-19, 2018},
  pages        = {167--172},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3229631.3239366},
  doi          = {10.1145/3229631.3239366},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/samos/KhairallahNCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/NajmFR18,
  author       = {Zakaria Najm and
                  Martha Johanna Sep{\'{u}}lveda Fl{\'{o}}rez and
                  Francesco Regazzoni},
  editor       = {Trevor N. Mudge and
                  Dionisios N. Pnevmatikatos},
  title        = {Session details: Security threats caused by novel technologies},
  booktitle    = {Proceedings of the 18th International Conference on Embedded Computer
                  Systems: Architectures, Modeling, and Simulation, Pythagorion, Greece,
                  July 15-19, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3306460},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/samos/NajmFR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DugardinGMNR17,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Martin Moreau and
                  Zakaria Najm and
                  Pablo Rauzy},
  title        = {Using modular extension to provably protect Edwards curves against
                  fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {321--330},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0167-4},
  doi          = {10.1007/S13389-017-0167-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/DugardinGMNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/NgoDGGMNB17,
  author       = {Xuan Thuy Ngo and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Tarik Graba and
                  Yves Mathieu and
                  Zakaria Najm and
                  Shivam Bhasin},
  title        = {Cryptographically Secure Shield for Security IPs Protection},
  journal      = {{IEEE} Trans. Computers},
  volume       = {66},
  number       = {2},
  pages        = {354--360},
  year         = {2017},
  url          = {https://doi.org/10.1109/TC.2016.2584041},
  doi          = {10.1109/TC.2016.2584041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/NgoDGGMNB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RauzyGN16,
  author       = {Pablo Rauzy and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Formally proved security of assembly code against power analysis -
                  {A} case study on balanced logic},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {201--216},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0105-2},
  doi          = {10.1007/S13389-015-0105-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RauzyGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NgoNBGD16,
  author       = {Xuan Thuy Ngo and
                  Zakaria Najm and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Method taking into account process dispersion to detect hardware Trojan
                  Horse by side-channel analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {239--247},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0129-2},
  doi          = {10.1007/S13389-016-0129-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NgoNBGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DugardinGDNR16,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Zakaria Najm and
                  Olivier Rioul},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_1},
  doi          = {10.1007/978-3-662-53140-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DugardinGDNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DugardinPNBDG16,
  author       = {Margaux Dugardin and
                  Louiza Papachristodoulou and
                  Zakaria Najm and
                  Lejla Batina and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Dismantling Real-World {ECC} with Horizontal and Vertical Template
                  Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  pages        = {88--108},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0\_6},
  doi          = {10.1007/978-3-319-43283-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/DugardinPNBDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/MiuraNHBNND16,
  author       = {Noriyuki Miura and
                  Zakaria Najm and
                  Wei He and
                  Shivam Bhasin and
                  Xuan Thuy Ngo and
                  Makoto Nagata and
                  Jean{-}Luc Danger},
  title        = {{PLL} to the rescue: a novel {EM} fault countermeasure},
  booktitle    = {Proceedings of the 53rd Annual Design Automation Conference, {DAC}
                  2016, Austin, TX, USA, June 5-9, 2016},
  pages        = {90:1--90:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897937.2898065},
  doi          = {10.1145/2897937.2898065},
  timestamp    = {Tue, 06 Nov 2018 16:58:19 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/MiuraNHBNND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DugardinGDNR16,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Zakaria Najm and
                  Olivier Rioul},
  title        = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
                  - Extended Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/597},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DugardinGDNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelgarricBBDDGH16,
  author       = {Pierre Belgarric and
                  Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Zakaria Najm and
                  Olivier Rioul},
  title        = {Time-Frequency Analysis for Second-Order Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BruneauGNT15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Yannick Teglia},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Multi-variate High-Order Attacks of Shuffled Tables Recomputation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {475--494},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_24},
  doi          = {10.1007/978-3-662-48324-4\_24},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BruneauGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NgoEBDGNRR15,
  author       = {Xuan Thuy Ngo and
                  Ingrid Exurville and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Jean{-}Baptiste Rigaud and
                  Bruno Robisson},
  editor       = {Wolfgang Nebel and
                  David Atienza},
  title        = {Hardware trojan detection by delay and electromagnetic measurements},
  booktitle    = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
                  Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
                  9-13, 2015},
  pages        = {782--787},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2755931},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/NgoEBDGNRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/NgoNBRDG15,
  author       = {Xuan Thuy Ngo and
                  Zakaria Najm and
                  Shivam Bhasin and
                  Debapriya Basu Roy and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Integrated Sensor: {A} Backdoor for Hardware Trojan Insertions?},
  booktitle    = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira,
                  Portugal, August 26-28, 2015},
  pages        = {415--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSD.2015.119},
  doi          = {10.1109/DSD.2015.119},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/NgoNBRDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/CarletDDGNNPT15,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Xuan Thuy Ngo and
                  Thibault Porteboeuf and
                  C{\'{e}}dric Tavernier},
  title        = {Optimized linear complementary codes implementation for hardware trojan
                  prevention},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim,
                  Norway, August 24-26, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECCTD.2015.7300075},
  doi          = {10.1109/ECCTD.2015.7300075},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/CarletDDGNNPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/NgoDGNE15,
  author       = {Xuan Thuy Ngo and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Olivier Emery},
  title        = {Hardware property checker for run-time Hardware Trojan detection},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim,
                  Norway, August 24-26, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECCTD.2015.7300085},
  doi          = {10.1109/ECCTD.2015.7300085},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/NgoDGNE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High precision fault injections on the instruction cache of ARMv7-M
                  architectures},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {62--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140238},
  doi          = {10.1109/HST.2015.7140238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/NgoBDGN15,
  author       = {Xuan Thuy Ngo and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Linear complementary dual code improvement to strengthen encoded circuit
                  against hardware Trojan horses},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages        = {82--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HST.2015.7140242},
  doi          = {10.1109/HST.2015.7140242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/NgoBDGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/RakotomalalaNND15,
  author       = {Henitsoa Rakotomalala and
                  Xuan Thuy Ngo and
                  Zakaria Najm and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Michael H{\"{u}}bner and
                  Maya B. Gokhale and
                  Ren{\'{e}} Cumplido},
  title        = {Private circuits {II} versus fault injection attacks},
  booktitle    = {International Conference on ReConFigurable Computing and FPGAs, ReConFig
                  2015, Riviera Maya, Mexico, December 7-9, 2015},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ReConFig.2015.7393338},
  doi          = {10.1109/RECONFIG.2015.7393338},
  timestamp    = {Wed, 28 Apr 2021 16:06:54 +0200},
  biburl       = {https://dblp.org/rec/conf/reconfig/RakotomalalaNND15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/RoyBGDMNN15,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Debdeep Mukhopadhyay and
                  Xuan Thuy Ngo and
                  Zakaria Najm},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Reconfigurable {LUT:} {A} Double Edged Sword for Security-Critical
                  Applications},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {248--268},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_15},
  doi          = {10.1007/978-3-319-24126-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/RoyBGDMNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RauzyGN15,
  author       = {Pablo Rauzy and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Formally Proved Security of Assembly Code Against Power Analysis:
                  {A} Case Study on Balanced Logic},
  journal      = {CoRR},
  volume       = {abs/1506.05285},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.05285},
  eprinttype    = {arXiv},
  eprint       = {1506.05285},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RauzyGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High Precision Fault Injections on the Instruction Cache of ARMv7-M
                  Architectures},
  journal      = {CoRR},
  volume       = {abs/1510.01537},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.01537},
  eprinttype    = {arXiv},
  eprint       = {1510.01537},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High Precision Fault Injections on the Instruction Cache of ARMv7-M
                  Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauGNT15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Yannick Teglia},
  title        = {Multi-Variate High-Order Attacks of Shuffled Tables Recomputation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {837},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/837},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RauzyMGN15,
  author       = {Pablo Rauzy and
                  Martin Moreau and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {A Generic Countermeasure Against Fault Injection Attacks on Asymmetric
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {882},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/882},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RauzyMGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DugardinPNBDGCT15,
  author       = {Margaux Dugardin and
                  Louiza Papachristodoulou and
                  Zakaria Najm and
                  Lejla Batina and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jean{-}Christophe Courr{\`{e}}ge and
                  Carine Therond},
  title        = {Dismantling real-world {ECC} with Horizontal and Vertical Template
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1001},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/NgoGBDN14,
  author       = {Xuan Thuy Ngo and
                  Sylvain Guilley and
                  Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Zakaria Najm},
  editor       = {Ting Yu and
                  Shengqi Yang},
  title        = {Encoding the state of integrated circuits: a proactive and reactive
                  protection against hardware Trojans horses},
  booktitle    = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS}
                  '14, New Delhi, India, October 17, 2014},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2668322.2668329},
  doi          = {10.1145/2668322.2668329},
  timestamp    = {Tue, 06 Nov 2018 11:07:42 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/NgoGBDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BhasinGDN14,
  author       = {Shivam Bhasin and
                  Tarik Graba and
                  Jean{-}Luc Danger and
                  Zakaria Najm},
  title        = {A look into {SIMON} from a side-channel perspective},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {56--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855568},
  doi          = {10.1109/HST.2014.6855568},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BhasinGDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/BhasinDGN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Side-channel leakage and trace compression using normalized inter-class
                  variance},
  booktitle    = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy,
                  Minneapolis, MN, USA, June 15, 2014},
  pages        = {7:1--7:9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611765.2611772},
  doi          = {10.1145/2611765.2611772},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BhasinBDGN14,
  author       = {Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  editor       = {Rajat Subhra Chakraborty and
                  Vashek Matyas and
                  Patrick Schaumont},
  title        = {Analysis and Improvements of the {DPA} Contest v4 Implementation},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                  Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8804},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12060-7\_14},
  doi          = {10.1007/978-3-319-12060-7\_14},
  timestamp    = {Mon, 15 Jun 2020 17:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/space/BhasinBDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinDGN14,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Side-Channel Leakage and Trace Compression using Normalized Inter-Class
                  Variance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1020},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/1020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinDGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BelgarricBBDDGHNR13,
  author       = {Pierre Belgarric and
                  Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Zakaria Najm and
                  Olivier Rioul},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Time-Frequency Analysis for Second-Order Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {108--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_8},
  doi          = {10.1007/978-3-319-08302-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BelgarricBBDDGHNR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/BhasinDGN13,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {A low-entropy first-degree secure provable masking scheme for resource-constrained
                  devices},
  booktitle    = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013,
                  Montreal, Quebec, Canada, September 29 - October 4, 2013},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2527317.2527324},
  doi          = {10.1145/2527317.2527324},
  timestamp    = {Tue, 06 Nov 2018 11:07:42 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/BhasinDGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/GuilleyMNSW13,
  author       = {Sylvain Guilley and
                  Damien Marion and
                  Zakaria Najm and
                  Youssef Souissi and
                  Antoine Wurcker},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Software Camouflage},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {122--139},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_8},
  doi          = {10.1007/978-3-319-05302-8\_8},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/GuilleyMNSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RauzyGN13,
  author       = {Pablo Rauzy and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Formally Proved Security of Assembly Code Against Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RauzyGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinDGN13,
  author       = {Shivam Bhasin and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {{NICV:} Normalized Inter-Class Variance for Detection of Side-Channel
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {717},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/717},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinDGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics