


Остановите войну!
for scientists:


default search action
Sylvain Guilley
Person information

- affiliation: Télécom Paris, Paris, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j70]Chong Xiao, Ming Tang
, Sylvain Guilley:
Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks. J. Syst. Archit. 139: 102877 (2023) - [j69]Ke Xu
, Ming Tang
, Han Wang, Sylvain Guilley
:
Reverse-Engineering and Exploiting the Frontend Bus of Intel Processor. IEEE Trans. Computers 72(2): 360-373 (2023) - [j68]Arthur Beckers
, Sylvain Guilley
, Philippe Maurine
, Colin O'Flynn, Stjepan Picek
:
(Adversarial) Electromagnetic Disturbance in the Industry. IEEE Trans. Computers 72(2): 414-422 (2023) - [c194]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. COSADE 2023: 86-104 - [c193]Arnd Weber, Sylvain Guilley, René Rathfelder, Marc Stöttinger, Christoph Lüth, Maja Malenko, Torsten Grawunder, Steffen Reith, Armand Puccetti, Jean-Pierre Seifert, Norbert Herfurth, Hagen Sankowski, Gernot Heiser:
Verified Value Chains, Innovation and Competition. CSR 2023: 470-476 - [c192]Md Toufiq Hasan Anik
, Hasin Ishraq Reefat
, Jean-Luc Danger
, Sylvain Guilley
, Naghmeh Karimi
:
Aging-Induced Failure Prognosis via Digital Sensors. ACM Great Lakes Symposium on VLSI 2023: 703-708 - [c191]Sofiane Takarabt, Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:
Security Order of Gate-Level Masking Schemes. HOST 2023: 57-67 - [c190]Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. ISIT 2023: 654-659 - [c189]Yi Liu, Julien Béguinot, Wei Cheng, Sylvain Guilley, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations. ITW 2023: 81-86 - [c188]Julien Béguinot
, Wei Cheng
, Jean-Luc Danger
, Sylvain Guilley
, Olivier Rioul
, Ville Yli-Mäyry
:
Reliability of Ring Oscillator PUFs with Reduced Helper Data. IWSEC 2023: 36-56 - [c187]Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Special Session: Security Verification & Testing for SR-Latch TRNGs. VTS 2023: 1-10 - [i74]Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. CoRR abs/2305.06276 (2023) - [i73]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking to protect against both SCA and FIA. IACR Cryptol. ePrint Arch. 2023: 406 (2023) - [i72]Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box To Threshold. IACR Cryptol. ePrint Arch. 2023: 633 (2023) - [i71]Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomas Gerlich, Sylvain Guilley, Naina Gupta, Kai Hu, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdenek Martinasek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa:
BAKSHEESH: Similar Yet Different From GIFT. IACR Cryptol. ePrint Arch. 2023: 750 (2023) - 2022
- [j67]Trevor Kroeger
, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs. J. Electron. Test. 38(3): 261-277 (2022) - [j66]Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 311-325 (2022) - [j65]Maamar Ouladj
, Sylvain Guilley
, Philippe Guillot, Farid Mokrane:
Spectral approach to process the (multivariate) high-order template attack against any masking scheme. J. Cryptogr. Eng. 12(1): 75-93 (2022) - [j64]Farzad Niknia
, Jean-Luc Danger
, Sylvain Guilley
, Naghmeh Karimi
:
Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(5): 1276-1289 (2022) - [j63]Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu:
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 192-222 (2022) - [j62]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Side-Channel Expectation-Maximization Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 774-799 (2022) - [j61]Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger
:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. IEEE Trans. Inf. Forensics Secur. 17: 1624-1638 (2022) - [j60]Trevor Kroeger
, Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger
, Naghmeh Karimi
:
Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives. IEEE Trans. Very Large Scale Integr. Syst. 30(2): 187-200 (2022) - [c186]Amit Choudhari, Sylvain Guilley, Khaled Karray:
SpecDefender: Transient Execution Attack Defender using Performance Counters. ASHES@CCS 2022: 15-24 - [c185]Wei Cheng, Olivier Rioul, Yi Liu, Julien Béguinot, Sylvain Guilley:
Side-Channel Information Leakage of Code-Based Masked Implementations. CWIT 2022: 51-56 - [c184]Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Leakage Power Analysis in Different S-Box Masking Protection Schemes. DATE 2022: 1263-1268 - [c183]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel Attacks of Secure Chips. DSD 2022: 496-503 - [c182]Idris Rais-Ali, Antoine Bouvet
, Sylvain Guilley:
Quantifying the Speed-Up Offered by Genetic Algorithms during Fault Injection Cartographies. FDTC 2022: 61-72 - [c181]Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera
, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi:
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors. HOST 2022: 97-100 - [c180]Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. ISIT 2022: 654-659 - [c179]Javad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis. SECRYPT 2022: 661-668 - [c178]Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley:
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature. SECRYPT 2022: 701-706 - [i70]Amit Choudhari, Sylvain Guilley, Khaled Karray
:
CRYScanner: Finding cryptographic libraries misuse. IACR Cryptol. ePrint Arch. 2022: 29 (2022) - [i69]Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. IACR Cryptol. ePrint Arch. 2022: 461 (2022) - [i68]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. IACR Cryptol. ePrint Arch. 2022: 1738 (2022) - 2021
- [b2]Maamar Ouladj
, Sylvain Guilley:
Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach. Springer 2021, ISBN 978-3-030-77221-5, pp. 1-160 - [j59]Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger:
Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$. Cryptogr. Commun. 13(4): 527-542 (2021) - [j58]Md Toufiq Hasan Anik
, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Reducing Aging Impacts in Digital Sensors via Run-Time Calibration. J. Electron. Test. 37(5): 653-673 (2021) - [j57]Wei Cheng
, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting faults in inner product masking scheme. J. Cryptogr. Eng. 11(2): 119-133 (2021) - [j56]Thomas Perianin
, Sébastien Carré, Victor Dyseryn, Adrien Facon, Sylvain Guilley:
End-to-end automated cache-timing attack driven by machine learning. J. Cryptogr. Eng. 11(2): 135-146 (2021) - [j55]Margaux Dugardin, Werner Schindler
, Sylvain Guilley:
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. J. Math. Cryptol. 15(1): 408-433 (2021) - [j54]Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley
, Naghmeh Karimi
:
Detecting Failures and Attacks via Digital Sensors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(7): 1315-1326 (2021) - [j53]Wei Cheng
, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 465-495 (2021) - [j52]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 57-87 (2021) - [j51]Claude Carlet
, Éloi de Chérisey, Sylvain Guilley
, Selçuk Kavut, Deng Tang
:
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios. IEEE Trans. Inf. Forensics Secur. 16: 203-218 (2021) - [j50]Wei Cheng
, Sylvain Guilley
, Claude Carlet
, Sihem Mesnager
, Jean-Luc Danger
:
Optimizing Inner Product Masking Scheme by a Coding Theory Approach. IEEE Trans. Inf. Forensics Secur. 16: 220-235 (2021) - [j49]Yanbin Li
, Zhe Liu
, Sylvain Guilley
, Ming Tang
:
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack. IEEE Trans. Inf. Forensics Secur. 16: 4466-4481 (2021) - [c177]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - [c176]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks. COSADE 2021: 303-321 - [c175]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. DATE 2021: 1000-1005 - [c174]Md Toufiq Hasan Anik, Jean-Luc Danger, Omar Diankha, Mohammad Ebrahimabadi, Christoph Frisch, Sylvain Guilley, Naghmeh Karimi, Michael Pehl, Sofiane Takarabt:
Testing and Reliability Enhancement of Security Primitives. DFT 2021: 1-8 - [c173]Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin:
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. EuroS&P Workshops 2021: 96-102 - [c172]Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray
, Laurent Sauvage, Yves Mathieu:
Formal Evaluation and Construction of Glitch-resistant Masked Functions. HOST 2021: 304-313 - [c171]Sylvain Guilley, Michel Le Rolland, Damien Quenson:
Implementing Secure Applications Thanks to an Integrated Secure Element. ICISSP 2021: 566-571 - [c170]Patrick Solé, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Bent Sequences over Hadamard Codes for Physically Unclonable Functions. ISIT 2021: 801-806 - [c169]Olivier Rioul, Wei Cheng, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. ISIT 2021: 2596-2601 - [c168]Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
On Conditional Alpha-Information and its Application to Side-Channel Analysis. ITW 2021: 1-6 - [c167]Patrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Linear Programming Bounds on the Kissing Number of q-ary Codes. ITW 2021: 1-5 - [i67]Olivier Rioul, Wei Cheng
, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. CoRR abs/2102.02468 (2021) - [i66]Yi Liu, Wei Cheng
, Sylvain Guilley, Olivier Rioul:
On Conditional α-Information and its Application to Side-Channel Analysis. CoRR abs/2105.07167 (2021) - [i65]Wei Cheng
, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. CoRR abs/2105.07436 (2021) - [i64]Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Cryptol. ePrint Arch. 2021: 363 (2021) - [i63]Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane:
Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme. IACR Cryptol. ePrint Arch. 2021: 941 (2021) - [i62]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. IACR Cryptol. ePrint Arch. 2021: 1028 (2021) - [i61]Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley:
Security evaluation against side-channel analysis at compilation time. IACR Cryptol. ePrint Arch. 2021: 1521 (2021) - 2020
- [j48]Alexander Schaub, Olivier Rioul, Jean-Luc Danger, Sylvain Guilley, Joseph Boutros:
Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem. Adv. Math. Commun. 14(3): 491-505 (2020) - [j47]Sylvain Guilley
, Khaled Karray
, Thomas Perianin, Ritu Ranjan Shrivastwa
, Youssef Souissi, Sofiane Takarabt:
Side-Channel Evaluation Methodology on Software. Cryptogr. 4(4): 27 (2020) - [j46]Maamar Ouladj
, Nadia El Mrabet, Sylvain Guilley, Philippe Guillot, Gilles Millérioux:
On the power of template attacks in highly multivariate context. J. Cryptogr. Eng. 10(4): 337-354 (2020) - [j45]Houda Ferradi, Rémi Géraud
, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. J. Math. Cryptol. 14(1): 15-24 (2020) - [j44]Annelie Heuser
, Stjepan Picek
, Sylvain Guilley
, Nele Mentens
:
Lightweight Ciphers and Their Side-Channel Resilience. IEEE Trans. Computers 69(10): 1434-1448 (2020) - [j43]Fan Zhang
, Bolin Yang
, Xiaofei Dong
, Sylvain Guilley
, Zhe Liu
, Wei He
, Fangguo Zhang
, Kui Ren
:
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE. IEEE Trans. Computers 69(11): 1681-1693 (2020) - [c166]Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon:
Feasibility study of a camera-based PUF in a realistic scenario. ARES 2020: 31:1-31:6 - [c165]Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis with Few Encryptions. COSADE 2020: 3-24 - [c164]Maamar Ouladj
, Sylvain Guilley, Emmanuel Prouff:
On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks. COSADE 2020: 147-172 - [c163]Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert, Baptiste Pecatte:
Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks. COSADE 2020: 254-274 - [c162]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. DATE 2020: 454-459 - [c161]Alexander Schaub, Jean-Luc Danger, Olivier Rioul, Sylvain Guilley:
The Big Picture of Delay-PUF Dependability. ECCTD 2020: 1-4 - [c160]Amir Alipour, Vincent Beroulle, Bertrand Cambou, Jean-Luc Danger, Giorgio Di Natale, David Hély, Sylvain Guilley, Naghmeh Karimi:
PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community. ETS 2020: 1-10 - [c159]Md Toufiq Hasan Anik, Rachit Saini, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Failure and Attack Detection by Digital Sensors. ETS 2020: 1-2 - [c158]Md Toufiq Hasan Anik, Mohammad Ebrahimabadi, Hamed Pirsiavash, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability. ICCD 2020: 506-509 - [c157]Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. ICICS 2020: 3-19 - [c156]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. ITC 2020: 1-5 - [c155]Md Toufiq Hasan Anik, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
On the Effect of Aging on Digital Sensors. VLSID 2020: 189-194 - [i60]Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis With Few Encryptions. IACR Cryptol. ePrint Arch. 2020: 671 (2020) - [i59]Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by A Coding Theory Approach. IACR Cryptol. ePrint Arch. 2020: 692 (2020) - [i58]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2020: 876 (2020)
2010 – 2019
- 2019
- [j42]Claude Carlet, Abderrahman Daif
, Sylvain Guilley, Cédric Tavernier:
Polynomial direct sum masking to protect against both SCA and FIA. J. Cryptogr. Eng. 9(3): 303-312 (2019) - [j41]Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley:
Exhaustive single bit fault analysis. A use case against Mbedtls and OpenSSL's protection on ARM and Intel CPU. Microprocess. Microsystems 71 (2019) - [j40]Debapriya Basu Roy
, Shivam Bhasin
, Sylvain Guilley, Annelie Heuser
, Sikhar Patranabis
, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [j39]Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 49-79 (2019) - [c154]Youssef Souissi, Adrien Facon, Sylvain Guilley:
Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level. C2SI 2019: 3-12 - [c153]Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage
, Youssef Souissi, Yves Mathieu:
Cache-Timing Attacks Still Threaten IoT Devices. C2SI 2019: 13-30 - [c152]Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:
Speed-up of SCA Attacks on 32-bit Multiplications. C2SI 2019: 31-39 - [c151]Sébastien Carré, Adrien Facon, Sylvain Guilley, Sofiane Takarabt, Alexander Schaub, Youssef Souissi:
Cache-Timing Attack Detection and Prevention - Application to Crypto Libs and PQC. COSADE 2019: 13-21 - [c150]Etienne Tehrani, Tarik Graba, Abdelmalek Si-Merabet, Sylvain Guilley, Jean-Luc Danger:
Classification of Lightweight Block Ciphers for Specific Processor Accelerated Implementations. ICECS 2019: 747-750 - [c149]Kazuhide Fukushima
, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. ICISSP 2019: 67-74 - [c148]Kazuhide Fukushima
, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device. ICISSP (Revised Selected Papers) 2019: 74-92 - [c147]Éloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware. ISIT 2019: 310-315 - [c146]Jean-Luc Danger, Sylvain Guilley, Alexander Schaub:
Two-Metric Helper Data for Highly Robust and Secure Delay PUFs. IWASI 2019: 184-188 - [c145]Sébastien Carré, Victor Dyseryn, Adrien Facon, Sylvain Guilley, Thomas Perianin:
End-to-end automated cache-timing attack driven by Machine Learning. PROOFS 2019: 1-16 - [c144]Wei Cheng
, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection. PROOFS 2019: 17-32 - [p6]Claude Carlet, Sylvain Guilley, Cem Güneri, Sihem Mesnager, Ferruh Özbudak:
Construction of Efficient Codes for High-Order Direct Sum Masking. Security and Privacy in the Internet of Things 2019: 108-128 - [p5]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. Security and Privacy in the Internet of Things 2019: 148-166 - [e6]Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi:
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji. Lecture Notes in Computer Science 11445, Springer 2019, ISBN 978-3-030-16457-7 [contents] - [i57]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Profiling Side-channel Analysis in the Restricted Attacker Framework. IACR Cryptol. ePrint Arch. 2019: 168 (2019) - [i56]Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful. IACR Cryptol. ePrint Arch. 2019: 491 (2019) - [i55]Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:
Speed-up of SCA attacks on 32-bit multiplications. IACR Cryptol. ePrint Arch. 2019: 530 (2019) - [i54]Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger:
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection. IACR Cryptol. ePrint Arch. 2019: 919 (2019) - 2018
- [j38]Eloi de Chérisey
, Sylvain Guilley, Annelie Heuser, Olivier Rioul
:
On the optimality and practicability of mutual information analysis in some scenarios. Cryptogr. Commun. 10(1): 101-121 (2018) - [j37]Claude Carlet
, Sylvain Guilley
:
Statistical properties of side-channel and fault injection attacks using coding theory. Cryptogr. Commun. 10(5): 909-933 (2018) - [j36]Jean-Luc Danger, Youssef El Housni
, Adrien Facon, Cheikh Thiecoumba Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub:
On the Performance and Security of Multiplication in GF(2N). Cryptogr. 2(3): 25 (2018) - [j35]Naghmeh Karimi
, Jean-Luc Danger, Sylvain Guilley:
Impact of Aging on the Reliability of Delay PUFs. J. Electron. Test. 34(5): 571-586 (2018) - [j34]