Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zakaria Najm
@inproceedings{DBLP:conf/ctrsa/ChattopadhyayKL21, author = {Anupam Chattopadhyay and Mustafa Khairallah and Ga{\"{e}}tan Leurent and Zakaria Najm and Thomas Peyrin and Vesselin Velichkov}, editor = {Kenneth G. Paterson}, title = {On the Cost of {ASIC} Hardware Crackers: {A} {SHA-1} Case Study}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {657--681}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_27}, doi = {10.1007/978-3-030-75539-3\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/ChattopadhyayKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AdomnicaiNP20, author = {Alexandre Adomnicai and Zakaria Najm and Thomas Peyrin}, title = {Fixslicing: {A} New {GIFT} Representation Fast Constant-Time Implementations of {GIFT} and {GIFT-COFB} on {ARM} Cortex-M}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {402--427}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.402-427}, doi = {10.13154/TCHES.V2020.I3.402-427}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AdomnicaiNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdomnicaiNP20, author = {Alexandre Adomnicai and Zakaria Najm and Thomas Peyrin}, title = {Fixslicing: {A} New {GIFT} Representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2020}, url = {https://eprint.iacr.org/2020/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdomnicaiNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/RaviNBKGC19, author = {Prasanna Ravi and Zakaria Najm and Shivam Bhasin and Mustafa Khairallah and Sourav Sen Gupta and Anupam Chattopadhyay}, title = {Security is an architectural design constraint}, journal = {Microprocess. Microsystems}, volume = {68}, pages = {17--27}, year = {2019}, url = {https://doi.org/10.1016/j.micpro.2019.03.003}, doi = {10.1016/J.MICPRO.2019.03.003}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/RaviNBKGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KhairallahHNBBP19, author = {Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {SoK: On {DFA} Vulnerabilities of Substitution-Permutation Networks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {403--414}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329810}, doi = {10.1145/3321705.3329810}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KhairallahHNBBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaviGCKNB19, author = {Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Mustafa Khairallah and Zakaria Najm and Shivam Bhasin}, title = {Security is an Architectural Design Constraint}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2019}, url = {https://eprint.iacr.org/2019/182}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RaviGCKNB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhairallahHNBBP19, author = {Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin}, title = {SoK : On {DFA} Vulnerabilities of Substitution-Permutation Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {387}, year = {2019}, url = {https://eprint.iacr.org/2019/387}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhairallahHNBBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/RoyBDGHMNN18, author = {Debapriya Basu Roy and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Wei He and Debdeep Mukhopadhyay and Zakaria Najm and Xuan Thuy Ngo}, title = {The Conflicted Usage of RLUTs for Security-Critical Applications on {FPGA}}, journal = {J. Hardw. Syst. Secur.}, volume = {2}, number = {2}, pages = {162--178}, year = {2018}, url = {https://doi.org/10.1007/s41635-018-0035-4}, doi = {10.1007/S41635-018-0035-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/RoyBDGHMNN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BruneauGNT18, author = {Nicolas Bruneau and Sylvain Guilley and Zakaria Najm and Yannick Teglia}, title = {Multivariate High-Order Attacks of Shuffled Tables Recomputation}, journal = {J. Cryptol.}, volume = {31}, number = {2}, pages = {351--393}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9259-7}, doi = {10.1007/S00145-017-9259-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BruneauGNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apccas/NajmJJPB18, author = {Zakaria Najm and Dirmanto Jap and Bernhard Jungk and Stjepan Picek and Shivam Bhasin}, title = {On Comparing Side-channel Properties of {AES} and ChaCha20 on Microcontrollers}, booktitle = {2018 {IEEE} Asia Pacific Conference on Circuits and Systems, {APCCAS} 2018, Chengdu, China, October 26-30, 2018}, pages = {552--555}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/APCCAS.2018.8605653}, doi = {10.1109/APCCAS.2018.8605653}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/apccas/NajmJJPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdsp/RaviJJNB18, author = {Prasanna Ravi and Bernhard Jungk and Dirmanto Jap and Zakaria Najm and Shivam Bhasin}, title = {Feature Selection Methods for Non-Profiled Side-Channel Attacks on {ECC}}, booktitle = {23rd {IEEE} International Conference on Digital Signal Processing, {DSP} 2018, Shanghai, China, November 19-21, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICDSP.2018.8631824}, doi = {10.1109/ICDSP.2018.8631824}, timestamp = {Mon, 31 Oct 2022 09:05:23 +0100}, biburl = {https://dblp.org/rec/conf/icdsp/RaviJJNB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/KhairallahNCP18, author = {Mustafa Khairallah and Zakaria Najm and Anupam Chattopadhyay and Thomas Peyrin}, editor = {Trevor N. Mudge and Dionisios N. Pnevmatikatos}, title = {Crack me if you can: hardware acceleration bridging the gap between practical and theoretical cryptanalysis?: a Survey}, booktitle = {Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, Pythagorion, Greece, July 15-19, 2018}, pages = {167--172}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3229631.3239366}, doi = {10.1145/3229631.3239366}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/samos/KhairallahNCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/NajmFR18, author = {Zakaria Najm and Martha Johanna Sep{\'{u}}lveda Fl{\'{o}}rez and Francesco Regazzoni}, editor = {Trevor N. Mudge and Dionisios N. Pnevmatikatos}, title = {Session details: Security threats caused by novel technologies}, booktitle = {Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, Pythagorion, Greece, July 15-19, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3306460}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/samos/NajmFR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DugardinGMNR17, author = {Margaux Dugardin and Sylvain Guilley and Martin Moreau and Zakaria Najm and Pablo Rauzy}, title = {Using modular extension to provably protect Edwards curves against fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {321--330}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0167-4}, doi = {10.1007/S13389-017-0167-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/DugardinGMNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/NgoDGGMNB17, author = {Xuan Thuy Ngo and Jean{-}Luc Danger and Sylvain Guilley and Tarik Graba and Yves Mathieu and Zakaria Najm and Shivam Bhasin}, title = {Cryptographically Secure Shield for Security IPs Protection}, journal = {{IEEE} Trans. Computers}, volume = {66}, number = {2}, pages = {354--360}, year = {2017}, url = {https://doi.org/10.1109/TC.2016.2584041}, doi = {10.1109/TC.2016.2584041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/NgoDGGMNB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RauzyGN16, author = {Pablo Rauzy and Sylvain Guilley and Zakaria Najm}, title = {Formally proved security of assembly code against power analysis - {A} case study on balanced logic}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {201--216}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0105-2}, doi = {10.1007/S13389-015-0105-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RauzyGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NgoNBGD16, author = {Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger}, title = {Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {239--247}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0129-2}, doi = {10.1007/S13389-016-0129-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NgoNBGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DugardinGDNR16, author = {Margaux Dugardin and Sylvain Guilley and Jean{-}Luc Danger and Zakaria Najm and Olivier Rioul}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {3--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_1}, doi = {10.1007/978-3-662-53140-2\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/DugardinGDNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DugardinPNBDG16, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Dismantling Real-World {ECC} with Horizontal and Vertical Template Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, pages = {88--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0\_6}, doi = {10.1007/978-3-319-43283-0\_6}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/DugardinPNBDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/MiuraNHBNND16, author = {Noriyuki Miura and Zakaria Najm and Wei He and Shivam Bhasin and Xuan Thuy Ngo and Makoto Nagata and Jean{-}Luc Danger}, title = {{PLL} to the rescue: a novel {EM} fault countermeasure}, booktitle = {Proceedings of the 53rd Annual Design Automation Conference, {DAC} 2016, Austin, TX, USA, June 5-9, 2016}, pages = {90:1--90:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897937.2898065}, doi = {10.1145/2897937.2898065}, timestamp = {Tue, 06 Nov 2018 16:58:19 +0100}, biburl = {https://dblp.org/rec/conf/dac/MiuraNHBNND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DugardinGDNR16, author = {Margaux Dugardin and Sylvain Guilley and Jean{-}Luc Danger and Zakaria Najm and Olivier Rioul}, title = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2016}, url = {http://eprint.iacr.org/2016/597}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DugardinGDNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelgarricBBDDGH16, author = {Pierre Belgarric and Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Annelie Heuser and Zakaria Najm and Olivier Rioul}, title = {Time-Frequency Analysis for Second-Order Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2016}, url = {http://eprint.iacr.org/2016/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BruneauGNT15, author = {Nicolas Bruneau and Sylvain Guilley and Zakaria Najm and Yannick Teglia}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Multi-variate High-Order Attacks of Shuffled Tables Recomputation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {475--494}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_24}, doi = {10.1007/978-3-662-48324-4\_24}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BruneauGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NgoEBDGNRR15, author = {Xuan Thuy Ngo and Ingrid Exurville and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Jean{-}Baptiste Rigaud and Bruno Robisson}, editor = {Wolfgang Nebel and David Atienza}, title = {Hardware trojan detection by delay and electromagnetic measurements}, booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March 9-13, 2015}, pages = {782--787}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2755931}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/NgoEBDGNRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/NgoNBRDG15, author = {Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and Debapriya Basu Roy and Jean{-}Luc Danger and Sylvain Guilley}, title = {Integrated Sensor: {A} Backdoor for Hardware Trojan Insertions?}, booktitle = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira, Portugal, August 26-28, 2015}, pages = {415--422}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSD.2015.119}, doi = {10.1109/DSD.2015.119}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/NgoNBRDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/CarletDDGNNPT15, author = {Claude Carlet and Abderrahman Daif and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Xuan Thuy Ngo and Thibault Porteboeuf and C{\'{e}}dric Tavernier}, title = {Optimized linear complementary codes implementation for hardware trojan prevention}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim, Norway, August 24-26, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECCTD.2015.7300075}, doi = {10.1109/ECCTD.2015.7300075}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/CarletDDGNNPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/NgoDGNE15, author = {Xuan Thuy Ngo and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm and Olivier Emery}, title = {Hardware property checker for run-time Hardware Trojan detection}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim, Norway, August 24-26, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECCTD.2015.7300085}, doi = {10.1109/ECCTD.2015.7300085}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/NgoDGNE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High precision fault injections on the instruction cache of ARMv7-M architectures}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {62--67}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140238}, doi = {10.1109/HST.2015.7140238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/NgoBDGN15, author = {Xuan Thuy Ngo and Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {82--87}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140242}, doi = {10.1109/HST.2015.7140242}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/NgoBDGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/RakotomalalaNND15, author = {Henitsoa Rakotomalala and Xuan Thuy Ngo and Zakaria Najm and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Michael H{\"{u}}bner and Maya B. Gokhale and Ren{\'{e}} Cumplido}, title = {Private circuits {II} versus fault injection attacks}, booktitle = {International Conference on ReConFigurable Computing and FPGAs, ReConFig 2015, Riviera Maya, Mexico, December 7-9, 2015}, pages = {1--9}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ReConFig.2015.7393338}, doi = {10.1109/RECONFIG.2015.7393338}, timestamp = {Wed, 28 Apr 2021 16:06:54 +0200}, biburl = {https://dblp.org/rec/conf/reconfig/RakotomalalaNND15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/RoyBGDMNN15, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger and Debdeep Mukhopadhyay and Xuan Thuy Ngo and Zakaria Najm}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Reconfigurable {LUT:} {A} Double Edged Sword for Security-Critical Applications}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {248--268}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_15}, doi = {10.1007/978-3-319-24126-5\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/RoyBGDMNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RauzyGN15, author = {Pablo Rauzy and Sylvain Guilley and Zakaria Najm}, title = {Formally Proved Security of Assembly Code Against Power Analysis: {A} Case Study on Balanced Logic}, journal = {CoRR}, volume = {abs/1506.05285}, year = {2015}, url = {http://arxiv.org/abs/1506.05285}, eprinttype = {arXiv}, eprint = {1506.05285}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RauzyGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures}, journal = {CoRR}, volume = {abs/1510.01537}, year = {2015}, url = {http://arxiv.org/abs/1510.01537}, eprinttype = {arXiv}, eprint = {1510.01537}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2015}, url = {http://eprint.iacr.org/2015/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauGNT15, author = {Nicolas Bruneau and Sylvain Guilley and Zakaria Najm and Yannick Teglia}, title = {Multi-Variate High-Order Attacks of Shuffled Tables Recomputation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {837}, year = {2015}, url = {http://eprint.iacr.org/2015/837}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RauzyMGN15, author = {Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm}, title = {A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {882}, year = {2015}, url = {http://eprint.iacr.org/2015/882}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RauzyMGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DugardinPNBDGCT15, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean{-}Luc Danger and Sylvain Guilley and Jean{-}Christophe Courr{\`{e}}ge and Carine Therond}, title = {Dismantling real-world {ECC} with Horizontal and Vertical Template Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1001}, year = {2015}, url = {http://eprint.iacr.org/2015/1001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/NgoGBDN14, author = {Xuan Thuy Ngo and Sylvain Guilley and Shivam Bhasin and Jean{-}Luc Danger and Zakaria Najm}, editor = {Ting Yu and Shengqi Yang}, title = {Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses}, booktitle = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS} '14, New Delhi, India, October 17, 2014}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2668322.2668329}, doi = {10.1145/2668322.2668329}, timestamp = {Tue, 06 Nov 2018 11:07:42 +0100}, biburl = {https://dblp.org/rec/conf/cases/NgoGBDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BhasinGDN14, author = {Shivam Bhasin and Tarik Graba and Jean{-}Luc Danger and Zakaria Najm}, title = {A look into {SIMON} from a side-channel perspective}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {56--59}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855568}, doi = {10.1109/HST.2014.6855568}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BhasinGDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/BhasinDGN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, editor = {Ruby B. Lee and Weidong Shi}, title = {Side-channel leakage and trace compression using normalized inter-class variance}, booktitle = {{HASP} 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014}, pages = {7:1--7:9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2611765.2611772}, doi = {10.1145/2611765.2611772}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/BhasinDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BhasinBDGN14, author = {Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, editor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont}, title = {Analysis and Improvements of the {DPA} Contest v4 Implementation}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {201--218}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_14}, doi = {10.1007/978-3-319-12060-7\_14}, timestamp = {Mon, 15 Jun 2020 17:10:47 +0200}, biburl = {https://dblp.org/rec/conf/space/BhasinBDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinDGN14, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1020}, year = {2014}, url = {http://eprint.iacr.org/2014/1020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinDGN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BelgarricBBDDGHNR13, author = {Pierre Belgarric and Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Annelie Heuser and Zakaria Najm and Olivier Rioul}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Time-Frequency Analysis for Second-Order Attacks}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {108--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_8}, doi = {10.1007/978-3-319-08302-5\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BelgarricBBDDGHNR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/BhasinDGN13, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {A low-entropy first-degree secure provable masking scheme for resource-constrained devices}, booktitle = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013, Montreal, Quebec, Canada, September 29 - October 4, 2013}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2527317.2527324}, doi = {10.1145/2527317.2527324}, timestamp = {Tue, 06 Nov 2018 11:07:42 +0100}, biburl = {https://dblp.org/rec/conf/cases/BhasinDGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/GuilleyMNSW13, author = {Sylvain Guilley and Damien Marion and Zakaria Najm and Youssef Souissi and Antoine Wurcker}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Software Camouflage}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {122--139}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_8}, doi = {10.1007/978-3-319-05302-8\_8}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/GuilleyMNSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RauzyGN13, author = {Pablo Rauzy and Sylvain Guilley and Zakaria Najm}, title = {Formally Proved Security of Assembly Code Against Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2013}, url = {http://eprint.iacr.org/2013/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RauzyGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhasinDGN13, author = {Shivam Bhasin and Jean{-}Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {{NICV:} Normalized Inter-Class Variance for Detection of Side-Channel Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {717}, year = {2013}, url = {http://eprint.iacr.org/2013/717}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhasinDGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.