default search action
Youssef Souissi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2011
- [b1]Youssef Souissi:
Optimization methods for side channel attacks. (Méthodes optimisant l'analyse des cryptoprocesseurs sur les canaux cachés). Télécom ParisTech, France, 2011
Journal Articles
- 2020
- [j1]Sylvain Guilley, Khaled Karray, Thomas Perianin, Ritu Ranjan Shrivastwa, Youssef Souissi, Sofiane Takarabt:
Side-Channel Evaluation Methodology on Software. Cryptogr. 4(4): 27 (2020)
Conference and Workshop Papers
- 2021
- [c22]Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray, Laurent Sauvage, Yves Mathieu:
Formal Evaluation and Construction of Glitch-resistant Masked Functions. HOST 2021: 304-313 - 2019
- [c21]Youssef Souissi, Adrien Facon, Sylvain Guilley:
Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level. C2SI 2019: 3-12 - [c20]Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi, Yves Mathieu:
Cache-Timing Attacks Still Threaten IoT Devices. C2SI 2019: 13-30 - [c19]Sébastien Carré, Adrien Facon, Sylvain Guilley, Sofiane Takarabt, Alexander Schaub, Youssef Souissi:
Cache-Timing Attack Detection and Prevention - Application to Crypto Libs and PQC. COSADE 2019: 13-21 - 2018
- [c18]Kais Chibani, Adrien Facon, Sylvain Guilley, Youssef Souissi:
Technology-agnostic power optimization for AES block cipher. ICECS 2018: 397-400 - [c17]Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Alexander Schaub, Youssef Souissi:
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms. IVSW 2018: 7-12 - [c16]Sofiane Takarabt, Kais Chibani, Adrien Facon, Sylvain Guilley, Yves Mathieu, Laurent Sauvage, Youssef Souissi:
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification. IVSW 2018: 74-79 - 2017
- [c15]Jean-Luc Danger, Sylvain Guilley, Philippe Nguyen, Robert Nguyen, Youssef Souissi:
Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow. DATE 2017: 1129-1134 - 2016
- [c14]Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage:
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology. Trustcom/BigDataSE/ISPA 2016: 201-207 - 2014
- [c13]Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Youssef Souissi:
High-order timing attacks. CS2@HiPEAC 2014: 7-12 - [c12]Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake:
A Pre-processing Composition for Secret Key Recovery on Android Smartphone. WISTP 2014: 76-91 - 2013
- [c11]Sylvain Guilley, Damien Marion, Zakaria Najm, Youssef Souissi, Antoine Wurcker:
Software Camouflage. FPS 2013: 122-139 - 2012
- [c10]Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger:
Towards Different Flavors of Combined Side Channel Attacks. CT-RSA 2012: 245-259 - [c9]Maxime Nassar, Youssef Souissi, Sylvain Guilley, Jean-Luc Danger:
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs. DATE 2012: 1173-1178 - [c8]Nicolas Debande, Youssef Souissi, M. Abdelaziz Elaabid, Sylvain Guilley, Jean-Luc Danger:
Wavelet transform based pre-processing for side channel analysis. MICRO Workshops 2012: 32-38 - [c7]Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger:
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems. WISTP 2012: 169-178 - 2011
- [c6]Youssef Souissi, Jean-Luc Danger, Sylvain Guilley, Shivam Bhasin, Maxime Nassar:
Embedded systems security: An evaluation methodology against Side Channel Attacks. DASIP 2011: 230-237 - [c5]Maxime Nassar, Youssef Souissi, Sylvain Guilley, Jean-Luc Danger:
"Rank Correction": A New Side-Channel Approach for Secret Key Recovery. InfoSecHiComNet 2011: 128-143 - [c4]Shivam Bhasin, Sylvain Guilley, Youssef Souissi, Tarik Graba, Jean-Luc Danger:
Efficient Dual-Rail Implementations in FPGA Using Block RAMs. ReConFig 2011: 261-267 - [c3]Nicolas Debande, Youssef Souissi, Maxime Nassar, Sylvain Guilley, Thanh-Ha Le, Jean-Luc Danger:
"Re-synchronization by moments": An efficient solution to align Side-Channel traces. WIFS 2011: 1-6 - 2010
- [c2]Youssef Souissi, Sylvain Guilley, Jean-Luc Danger, Sami Mekki, Guillaume Duc:
Improvement of power analysis attacks using Kalman filter. ICASSP 2010: 1778-1781 - [c1]Youssef Souissi, Maxime Nassar, Sylvain Guilley, Jean-Luc Danger, Florent Flament:
First Principal Components Analysis: A New Side Channel Distinguisher. ICISC 2010: 407-419
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint