default search action
Sylvain Guilley
Person information
- affiliation: Télécom Paris, Paris, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j78]Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy:
Quantum-resistant Transport Layer Security. Comput. Commun. 213: 345-358 (2024) - [j77]Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Toward finding best linear codes for side-channel protections (extended version). J. Cryptogr. Eng. 14(1): 131-145 (2024) - [j76]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost. J. Cryptogr. Eng. 14(2): 223-240 (2024) - [j75]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Be My Guesses: The interplay between side-channel leakage metrics. Microprocess. Microsystems 107: 105045 (2024) - [j74]Wei Cheng, Jingdian Ming, Sylvain Guilley, Jean-Luc Danger:
Statistical Higher-Order Correlation Attacks Against Code-Based Masking. IEEE Trans. Computers 73(10): 2364-2377 (2024) - [j73]Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi:
DELFINES: Detecting Laser Fault Injection Attacks via Digital Sensors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(3): 774-787 (2024) - [j72]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking against SCA and FIA, with cost amortization. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 398-432 (2024) - [j71]Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On the Resiliency of Protected Masked S-Boxes Against Template Attack in the Presence of Temperature and Aging Misalignments. IEEE Trans. Very Large Scale Integr. Syst. 32(5): 911-924 (2024) - [c203]Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators. COSADE 2024: 177-196 - [c202]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Formal Security Proofs via Doeblin Coefficients: - Optimal Side-Channel Factorization from Noisy Leakage to Random Probing. CRYPTO (6) 2024: 389-426 - [c201]Sofiane Takarabt, Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:
Securing ISW Masking Scheme Against Glitches. DATE 2024: 1-2 - [c200]Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomas Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdenek Martinasek, Shivam Bhasin:
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation. ISVLSI 2024: 307-312 - [c199]Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Attacking Multi-Tenant FPGAs Without Manual Placement and Routing. ISVLSI 2024: 367-372 - [i77]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing. IACR Cryptol. ePrint Arch. 2024: 199 (2024) - [i76]Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomas Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdenek Martinasek, Shivam Bhasin:
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version). IACR Cryptol. ePrint Arch. 2024: 984 (2024) - 2023
- [j70]Chong Xiao, Ming Tang, Sylvain Guilley:
Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks. J. Syst. Archit. 139: 102877 (2023) - [j69]Ke Xu, Ming Tang, Han Wang, Sylvain Guilley:
Reverse-Engineering and Exploiting the Frontend Bus of Intel Processor. IEEE Trans. Computers 72(2): 360-373 (2023) - [j68]Arthur Beckers, Sylvain Guilley, Philippe Maurine, Colin O'Flynn, Stjepan Picek:
(Adversarial) Electromagnetic Disturbance in the Industry. IEEE Trans. Computers 72(2): 414-422 (2023) - [c198]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. COSADE 2023: 86-104 - [c197]Arnd Weber, Sylvain Guilley, René Rathfelder, Marc Stöttinger, Christoph Lüth, Maja Malenko, Torsten Grawunder, Steffen Reith, Armand Puccetti, Jean-Pierre Seifert, Norbert Herfurth, Hagen Sankowski, Gernot Heiser:
Verified Value Chains, Innovation and Competition. CSR 2023: 470-476 - [c196]Md Toufiq Hasan Anik, Hasin Ishraq Reefat, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Aging-Induced Failure Prognosis via Digital Sensors. ACM Great Lakes Symposium on VLSI 2023: 703-708 - [c195]Sofiane Takarabt, Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:
Security Order of Gate-Level Masking Schemes. HOST 2023: 57-67 - [c194]Javad Bahrami, Jean-Luc Danger, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:
Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks. ICICDT 2023: 10-15 - [c193]Sylvain Guilley:
Challenges in generating true random numbers considering the variety of corners, aging, and attacks. ICICDT 2023: xix - [c192]Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box to Threshold. INDOCRYPT (1) 2023: 48-67 - [c191]Lukas Vlasak, Antoine Bouvet, Sylvain Guilley:
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. INDOCRYPT (1) 2023: 329-349 - [c190]Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. ISIT 2023: 654-659 - [c189]Yi Liu, Julien Béguinot, Wei Cheng, Sylvain Guilley, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations. ITW 2023: 81-86 - [c188]Julien Béguinot, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul, Ville Yli-Mäyry:
Reliability of Ring Oscillator PUFs with Reduced Helper Data. IWSEC 2023: 36-56 - [c187]Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Special Session: Security Verification & Testing for SR-Latch TRNGs. VTS 2023: 1-10 - [i75]Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. CoRR abs/2305.06276 (2023) - [i74]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking to protect against both SCA and FIA. IACR Cryptol. ePrint Arch. 2023: 406 (2023) - [i73]Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box To Threshold. IACR Cryptol. ePrint Arch. 2023: 633 (2023) - [i72]Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomas Gerlich, Sylvain Guilley, Naina Gupta, Kai Hu, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdenek Martinasek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa:
BAKSHEESH: Similar Yet Different From GIFT. IACR Cryptol. ePrint Arch. 2023: 750 (2023) - [i71]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost. IACR Cryptol. ePrint Arch. 2023: 1746 (2023) - 2022
- [j67]Trevor Kroeger, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs. J. Electron. Test. 38(3): 261-277 (2022) - [j66]Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 311-325 (2022) - [j65]Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane:
Spectral approach to process the (multivariate) high-order template attack against any masking scheme. J. Cryptogr. Eng. 12(1): 75-93 (2022) - [j64]Farzad Niknia, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(5): 1276-1289 (2022) - [j63]Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu:
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 192-222 (2022) - [j62]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Side-Channel Expectation-Maximization Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 774-799 (2022) - [j61]Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. IEEE Trans. Inf. Forensics Secur. 17: 1624-1638 (2022) - [j60]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives. IEEE Trans. Very Large Scale Integr. Syst. 30(2): 187-200 (2022) - [c186]Amit Choudhari, Sylvain Guilley, Khaled Karray:
SpecDefender: Transient Execution Attack Defender using Performance Counters. ASHES@CCS 2022: 15-24 - [c185]Wei Cheng, Olivier Rioul, Yi Liu, Julien Béguinot, Sylvain Guilley:
Side-Channel Information Leakage of Code-Based Masked Implementations. CWIT 2022: 51-56 - [c184]Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Leakage Power Analysis in Different S-Box Masking Protection Schemes. DATE 2022: 1263-1268 - [c183]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel Attacks of Secure Chips. DSD 2022: 496-503 - [c182]Idris Rais-Ali, Antoine Bouvet, Sylvain Guilley:
Quantifying the Speed-Up Offered by Genetic Algorithms during Fault Injection Cartographies. FDTC 2022: 61-72 - [c181]Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi:
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors. HOST 2022: 97-100 - [c180]Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. ISIT 2022: 654-659 - [c179]Javad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis. SECRYPT 2022: 661-668 - [c178]Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley:
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature. SECRYPT 2022: 701-706 - [i70]Amit Choudhari, Sylvain Guilley, Khaled Karray:
CRYScanner: Finding cryptographic libraries misuse. IACR Cryptol. ePrint Arch. 2022: 29 (2022) - [i69]Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. IACR Cryptol. ePrint Arch. 2022: 461 (2022) - [i68]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. IACR Cryptol. ePrint Arch. 2022: 1738 (2022) - 2021
- [b2]Maamar Ouladj, Sylvain Guilley:
Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach. Springer 2021, ISBN 978-3-030-77221-5, pp. 1-160 - [j59]Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$. Cryptogr. Commun. 13(4): 527-542 (2021) - [j58]Md Toufiq Hasan Anik, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Reducing Aging Impacts in Digital Sensors via Run-Time Calibration. J. Electron. Test. 37(5): 653-673 (2021) - [j57]Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting faults in inner product masking scheme. J. Cryptogr. Eng. 11(2): 119-133 (2021) - [j56]Thomas Perianin, Sébastien Carré, Victor Dyseryn, Adrien Facon, Sylvain Guilley:
End-to-end automated cache-timing attack driven by machine learning. J. Cryptogr. Eng. 11(2): 135-146 (2021) - [j55]Margaux Dugardin, Werner Schindler, Sylvain Guilley:
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. J. Math. Cryptol. 15(1): 408-433 (2021) - [j54]Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Detecting Failures and Attacks via Digital Sensors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(7): 1315-1326 (2021) - [j53]Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 465-495 (2021) - [j52]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 57-87 (2021) - [j51]Claude Carlet, Éloi de Chérisey, Sylvain Guilley, Selçuk Kavut, Deng Tang:
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios. IEEE Trans. Inf. Forensics Secur. 16: 203-218 (2021) - [j50]Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by a Coding Theory Approach. IEEE Trans. Inf. Forensics Secur. 16: 220-235 (2021) - [j49]Yanbin Li, Zhe Liu, Sylvain Guilley, Ming Tang:
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack. IEEE Trans. Inf. Forensics Secur. 16: 4466-4481 (2021) - [c177]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - [c176]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks. COSADE 2021: 303-321 - [c175]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. DATE 2021: 1000-1005 - [c174]Md Toufiq Hasan Anik, Jean-Luc Danger, Omar Diankha, Mohammad Ebrahimabadi, Christoph Frisch, Sylvain Guilley, Naghmeh Karimi, Michael Pehl, Sofiane Takarabt:
Testing and Reliability Enhancement of Security Primitives. DFT 2021: 1-8 - [c173]Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin:
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. EuroS&P Workshops 2021: 96-102 - [c172]Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray, Laurent Sauvage, Yves Mathieu:
Formal Evaluation and Construction of Glitch-resistant Masked Functions. HOST 2021: 304-313 - [c171]Sylvain Guilley, Michel Le Rolland, Damien Quenson:
Implementing Secure Applications Thanks to an Integrated Secure Element. ICISSP 2021: 566-571 - [c170]Patrick Solé, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Bent Sequences over Hadamard Codes for Physically Unclonable Functions. ISIT 2021: 801-806 - [c169]Olivier Rioul, Wei Cheng, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. ISIT 2021: 2596-2601 - [c168]Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
On Conditional Alpha-Information and its Application to Side-Channel Analysis. ITW 2021: 1-6 - [c167]Patrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Linear Programming Bounds on the Kissing Number of q-ary Codes. ITW 2021: 1-5 - [i67]Olivier Rioul, Wei Cheng, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. CoRR abs/2102.02468 (2021) - [i66]Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
On Conditional α-Information and its Application to Side-Channel Analysis. CoRR abs/2105.07167 (2021) - [i65]Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. CoRR abs/2105.07436 (2021) - [i64]Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Cryptol. ePrint Arch. 2021: 363 (2021) - [i63]Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane:
Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme. IACR Cryptol. ePrint Arch. 2021: 941 (2021) - [i62]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. IACR Cryptol. ePrint Arch. 2021: 1028 (2021) - [i61]Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley:
Security evaluation against side-channel analysis at compilation time. IACR Cryptol. ePrint Arch. 2021: 1521 (2021) - 2020
- [j48]Alexander Schaub, Olivier Rioul, Jean-Luc Danger, Sylvain Guilley, Joseph Boutros:
Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem. Adv. Math. Commun. 14(3): 491-505 (2020) - [j47]Sylvain Guilley, Khaled Karray, Thomas Perianin, Ritu Ranjan Shrivastwa, Youssef Souissi, Sofiane Takarabt:
Side-Channel Evaluation Methodology on Software. Cryptogr. 4(4): 27 (2020) - [j46]Maamar Ouladj, Nadia El Mrabet, Sylvain Guilley, Philippe Guillot, Gilles Millérioux:
On the power of template attacks in highly multivariate context. J. Cryptogr. Eng. 10(4): 337-354 (2020) - [j45]Houda Ferradi, Rémi Géraud, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. J. Math. Cryptol. 14(1): 15-24 (2020) - [j44]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Lightweight Ciphers and Their Side-Channel Resilience. IEEE Trans. Computers 69(10): 1434-1448 (2020) - [j43]Fan Zhang, Bolin Yang, Xiaofei Dong, Sylvain Guilley, Zhe Liu, Wei He, Fangguo Zhang, Kui Ren:
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE. IEEE Trans. Computers 69(11): 1681-1693 (2020) - [c166]Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon:
Feasibility study of a camera-based PUF in a realistic scenario. ARES 2020: 31:1-31:6 - [c165]Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis with Few Encryptions. COSADE 2020: 3-24 - [c164]Maamar Ouladj, Sylvain Guilley, Emmanuel Prouff:
On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks. COSADE 2020: 147-172 - [c163]Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert, Baptiste Pecatte:
Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks. COSADE 2020: 254-274 - [c162]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. DATE 2020: 454-459 - [c161]Alexander Schaub, Jean-Luc Danger, Olivier Rioul, Sylvain Guilley:
The Big Picture of Delay-PUF Dependability. ECCTD 2020: 1-4 - [c160]Amir Alipour, Vincent Beroulle, Bertrand Cambou, Jean-Luc Danger, Giorgio Di Natale, David Hély, Sylvain Guilley, Naghmeh Karimi:
PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community. ETS 2020: 1-10 - [c159]Md Toufiq Hasan Anik, Rachit Saini, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Failure and Attack Detection by Digital Sensors. ETS 2020: 1-2 - [c158]Md Toufiq Hasan Anik, Mohammad Ebrahimabadi, Hamed Pirsiavash, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability. ICCD 2020: 506-509 - [c157]Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. ICICS 2020: 3-19 - [c156]Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. ITC 2020: 1-5 - [c155]Md Toufiq Hasan Anik, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
On the Effect of Aging on Digital Sensors. VLSID 2020: 189-194 - [i60]Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis With Few Encryptions. IACR Cryptol. ePrint Arch. 2020: 671 (2020) - [i59]Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by A Coding Theory Approach. IACR Cryptol. ePrint Arch. 2020: 692 (2020) - [i58]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2020: 876 (2020)
2010 – 2019
- 2019
- [j42]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Polynomial direct sum masking to protect against both SCA and FIA. J. Cryptogr. Eng. 9(3): 303-312 (2019) - [j41]Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley:
Exhaustive single bit fault analysis. A use case against Mbedtls and OpenSSL's protection on ARM and Intel CPU. Microprocess. Microsystems 71 (2019) - [j40]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [j39]Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 49-79 (2019) - [c154]