BibTeX records: Jacques J. A. Fournier

download as .bib file

@article{DBLP:journals/mam/MontoyaBMF23,
  author       = {Maxime Montoya and
                  Simone Bacles{-}Min and
                  Anca Molnos and
                  Jacques J. A. Fournier},
  title        = {Protecting integrated circuits against side-channel and fault attacks
                  with dynamic encoding},
  journal      = {Microprocess. Microsystems},
  volume       = {97},
  pages        = {104761},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.micpro.2023.104761},
  doi          = {10.1016/J.MICPRO.2023.104761},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/MontoyaBMF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/EscouteloupLFL21,
  author       = {Mathieu Escouteloup and
                  Ronan Lashermes and
                  Jacques Fournier and
                  Jean{-}Louis Lanet},
  editor       = {Vincent Grosso and
                  Thomas P{\"{o}}ppelmann},
  title        = {Under the Dome: Preventing Hardware Timing Information Leakage},
  booktitle    = {Smart Card Research and Advanced Applications - 20th International
                  Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12,
                  2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13173},
  pages        = {233--253},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97348-3\_13},
  doi          = {10.1007/978-3-030-97348-3\_13},
  timestamp    = {Thu, 10 Mar 2022 15:30:57 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/EscouteloupLFL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/JauvartMFG20,
  author       = {Damien Jauvart and
                  Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  title        = {Improving side-channel attacks against pairing-based cryptography},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {1--16},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-018-00201-3},
  doi          = {10.1007/S13389-018-00201-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/JauvartMFG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/MontoyaBMF20,
  author       = {Maxime Montoya and
                  Simone Bacles{-}Min and
                  Anca Molnos and
                  Jacques J. A. Fournier},
  title        = {Dynamic encoding, a lightweight combined countermeasure against hardware
                  attacks},
  booktitle    = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj,
                  Slovenia, August 26-28, 2020},
  pages        = {185--192},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSD51259.2020.00039},
  doi          = {10.1109/DSD51259.2020.00039},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsd/MontoyaBMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/LoiseauLF20,
  author       = {Antoine Loiseau and
                  Maxime Lecomte and
                  Jacques J. A. Fournier},
  title        = {Template Attacks against {ECC:} practical implementation against Curve25519},
  booktitle    = {2020 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2020, San Jose, CA, USA, December 7-11, 2020},
  pages        = {13--22},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/HOST45689.2020.9300261},
  doi          = {10.1109/HOST45689.2020.9300261},
  timestamp    = {Fri, 15 Jan 2021 14:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/host/LoiseauLF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/MontoyaHBMF19,
  author       = {Maxime Montoya and
                  Thomas Hiscock and
                  Simone Bacles{-}Min and
                  Anca Molnos and
                  Jacques Fournier},
  title        = {Adaptive Masking: a Dynamic Trade-off between Energy Consumption and
                  Hardware Security},
  booktitle    = {37th {IEEE} International Conference on Computer Design, {ICCD} 2019,
                  Abu Dhabi, United Arab Emirates, November 17-20, 2019},
  pages        = {559--566},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCD46524.2019.00082},
  doi          = {10.1109/ICCD46524.2019.00082},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccd/MontoyaHBMF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdomnicaiMF19,
  author       = {Alexandre Adomnicai and
                  Laurent Masson and
                  Jacques J. A. Fournier},
  title        = {Practical Algebraic Side-Channel Attacks Against {ACORN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdomnicaiMF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/FournierGPT18,
  author       = {Jacques Fournier and
                  Josselin Garnier and
                  George Papanicolaou and
                  Chrysoula Tsogka},
  editor       = {Michael B. Matthews},
  title        = {Correlation-based imaging of fast moving objects using a sparse network
                  of passive receivers},
  booktitle    = {52nd Asilomar Conference on Signals, Systems, and Computers, {ACSSC}
                  2018, Pacific Grove, CA, USA, October 28-31, 2018},
  pages        = {1618--1622},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACSSC.2018.8645287},
  doi          = {10.1109/ACSSC.2018.8645287},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/FournierGPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AdomnicaiFM18,
  author       = {Alexandre Adomnicai and
                  Jacques J. A. Fournier and
                  Laurent Masson},
  title        = {Hardware Security Threats Against Bluetooth Mesh Networks},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433184},
  doi          = {10.1109/CNS.2018.8433184},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AdomnicaiFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/MontoyaHBMF18,
  author       = {Maxime Montoya and
                  Thomas Hiscock and
                  Simone Bacles{-}Min and
                  Anca Molnos and
                  Jacques J. A. Fournier},
  title        = {Energy-efficient Masking of the Trivium Stream Cipher},
  booktitle    = {25th {IEEE} International Conference on Electronics, Circuits and
                  Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018},
  pages        = {393--396},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICECS.2018.8617892},
  doi          = {10.1109/ICECS.2018.8617892},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/MontoyaHBMF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/LoiseauF18,
  author       = {Antoine Loiseau and
                  Jacques J. A. Fournier},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Binary Edwards Curves for Intrinsically Secure {ECC} Implementations
                  for the IoT},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {625--631},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006831506250631},
  doi          = {10.5220/0006831506250631},
  timestamp    = {Wed, 29 Aug 2018 15:17:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/LoiseauF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AdomnicaiMF18,
  author       = {Alexandre Adomnicai and
                  Laurent Masson and
                  Jacques J. A. Fournier},
  editor       = {Kwangsu Lee},
  title        = {Practical Algebraic Side-Channel Attacks Against {ACORN}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {325--340},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_20},
  doi          = {10.1007/978-3-030-12146-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AdomnicaiMF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LacCFS18,
  author       = {Benjamin Lac and
                  Anne Canteaut and
                  Jacques J. A. Fournier and
                  Renaud Sirdey},
  title        = {Thwarting Fault Attacks against Lightweight Cryptography using {SIMD}
                  Instructions},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2018,
                  27-30 May 2018, Florence, Italy},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISCAS.2018.8351693},
  doi          = {10.1109/ISCAS.2018.8351693},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/LacCFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MontoyaBMF18,
  author       = {Maxime Montoya and
                  Simone Bacles{-}Min and
                  Anca Molnos and
                  Jacques J. A. Fournier},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {{SWARD:} {A} Secure WAke-up RaDio against Denial-of-Service on IoT
                  devices},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {190--195},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212488},
  doi          = {10.1145/3212480.3212488},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MontoyaBMF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdomnicaiFM18,
  author       = {Alexandre Adomnicai and
                  Jacques J. A. Fournier and
                  Laurent Masson},
  title        = {Masking the Lightweight Authenticated Ciphers {ACORN} and Ascon in
                  Software},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdomnicaiFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamis/FournierGPT17,
  author       = {Jacques Fournier and
                  Josselin Garnier and
                  George Papanicolaou and
                  Chrysoula Tsogka},
  title        = {Matched-Filter and Correlation-Based Imaging for Fast Moving Objects
                  Using a Sparse Network of Receivers},
  journal      = {{SIAM} J. Imaging Sci.},
  volume       = {10},
  number       = {4},
  pages        = {2165--2216},
  year         = {2017},
  url          = {https://doi.org/10.1137/17M112364X},
  doi          = {10.1137/17M112364X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamis/FournierGPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/LecomteFM17,
  author       = {Maxime Lecomte and
                  Jacques Fournier and
                  Philippe Maurine},
  title        = {An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit
                  Identification},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {25},
  number       = {12},
  pages        = {3317--3330},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVLSI.2016.2627525},
  doi          = {10.1109/TVLSI.2016.2627525},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/LecomteFM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/LacCFS17,
  author       = {Benjamin Lac and
                  Anne Canteaut and
                  Jacques Fournier and
                  Renaud Sirdey},
  editor       = {Sylvain Guilley},
  title        = {{DFA} on LS-Designs with a Practical Implementation on {SCREAM}},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {223--247},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_14},
  doi          = {10.1007/978-3-319-64647-3\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/LacCFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/JauvartMFG17,
  author       = {Damien Jauvart and
                  Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Resistance of the Point Randomisation Countermeasure for Pairings
                  Against Side-Channel Attack},
  booktitle    = {E-Business and Telecommunications - 14th International Joint Conference,
                  {ICETE} 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper},
  series       = {Communications in Computer and Information Science},
  volume       = {990},
  pages        = {150--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-11039-0\_8},
  doi          = {10.1007/978-3-030-11039-0\_8},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/JauvartMFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AdomnicaiFM17,
  author       = {Alexandre Adomnicai and
                  Jacques J. A. Fournier and
                  Laurent Masson},
  editor       = {Arpita Patra and
                  Nigel P. Smart},
  title        = {Bricklayer Attack: {A} Side-Channel Analysis on the ChaCha Quarter
                  Round},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference
                  on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10698},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71667-1\_4},
  doi          = {10.1007/978-3-319-71667-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AdomnicaiFM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JauvartFG17,
  author       = {Damien Jauvart and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {First Practical Side-channel Attack to Defeat Point Randomization
                  in Secure Implementations of Pairing-based Cryptography},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {104--115},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006425501040115},
  doi          = {10.5220/0006425501040115},
  timestamp    = {Thu, 17 Aug 2017 18:31:18 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JauvartFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LacBCFS17,
  author       = {Benjamin Lac and
                  Marc Beunardeau and
                  Anne Canteaut and
                  Jacques Fournier and
                  Renaud Sirdey},
  title        = {A First {DFA} on {PRIDE:} from Theory to Practice (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LacBCFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LacCFS17,
  author       = {Benjamin Lac and
                  Anne Canteaut and
                  Jacques Fournier and
                  Renaud Sirdey},
  title        = {{DFA} on LS-Designs with a Practical Implementation on {SCREAM} (extended
                  version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LacCFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LacCFS17a,
  author       = {Benjamin Lac and
                  Anne Canteaut and
                  Jacques J. A. Fournier and
                  Renaud Sirdey},
  title        = {Thwarting Fault Attacks using the Internal Redundancy Countermeasure
                  {(IRC)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {910},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/910},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LacCFS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdomnicaiFM17,
  author       = {Alexandre Adomnicai and
                  Jacques J. A. Fournier and
                  Laurent Masson},
  title        = {Bricklayer Attack: {A} Side-Channel Analysis on the ChaCha Quarter
                  Round},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdomnicaiFM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/AbdellatifCFR16,
  author       = {Karim M. Abdellatif and
                  Christian Cornesse and
                  Jacques J. A. Fournier and
                  Bruno Robisson},
  editor       = {Vanderlei Bonato and
                  Christos Bouganis and
                  Marek Gorgon},
  title        = {New Partitioning Approach for Hardware Trojan Detection Using Side-Channel
                  Measurements},
  booktitle    = {Applied Reconfigurable Computing - 12th International Symposium, {ARC}
                  2016, Mangaratiba, RJ, Brazil, March 22-24, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9625},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30481-6\_14},
  doi          = {10.1007/978-3-319-30481-6\_14},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/AbdellatifCFR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/JauvartFMG16,
  author       = {Damien Jauvart and
                  Jacques J. A. Fournier and
                  Nadia El Mrabet and
                  Louis Goubin},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  title        = {Improving Side-Channel Attacks Against Pairing-Based Cryptography},
  booktitle    = {Risks and Security of Internet and Systems - 11th International Conference,
                  CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10158},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54876-0\_16},
  doi          = {10.1007/978-3-319-54876-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/JauvartFMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/LacBCFS16,
  author       = {Benjamin Lac and
                  Marc Beunardeau and
                  Anne Canteaut and
                  Jacques J. A. Fournier and
                  Renaud Sirdey},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  title        = {A First {DFA} on {PRIDE:} From Theory to Practice},
  booktitle    = {Risks and Security of Internet and Systems - 11th International Conference,
                  CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10158},
  pages        = {214--238},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54876-0\_17},
  doi          = {10.1007/978-3-319-54876-0\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/LacBCFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/LecomteFM16,
  author       = {Maxime Lecomte and
                  Jacques J. A. Fournier and
                  Philippe Maurine},
  editor       = {Luca Fanucci and
                  J{\"{u}}rgen Teich},
  title        = {On-chip fingerprinting of {IC} topology for integrity verification},
  booktitle    = {2016 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016},
  pages        = {133--138},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7459293/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/LecomteFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/LecomteFM16,
  author       = {Maxime Lecomte and
                  Jacques J. A. Fournier and
                  Philippe Maurine},
  editor       = {William H. Robinson and
                  Swarup Bhunia and
                  Ryan Kastner},
  title        = {Granularity and detection capability of an adaptive embedded Hardware
                  Trojan detection system},
  booktitle    = {2016 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016},
  pages        = {135--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HST.2016.7495571},
  doi          = {10.1109/HST.2016.7495571},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/LecomteFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/MrabetFGL15,
  author       = {Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin and
                  Ronan Lashermes},
  title        = {A survey of fault attacks in pairing based cryptography},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {185--205},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0114-5},
  doi          = {10.1007/S12095-014-0114-5},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/MrabetFGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/CourbonFLT15,
  author       = {Franck Courbon and
                  Jacques J. A. Fournier and
                  Philippe Loubet{-}Moundi and
                  Assia Tria},
  title        = {Combining Image Processing and Laser Fault Injections for Characterizing
                  a Hardware {AES}},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {34},
  number       = {6},
  pages        = {928--936},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCAD.2015.2391773},
  doi          = {10.1109/TCAD.2015.2391773},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/CourbonFLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/CourbonLFT15,
  author       = {Franck Courbon and
                  Philippe Loubet{-}Moundi and
                  Jacques J. A. Fournier and
                  Assia Tria},
  editor       = {Wolfgang Nebel and
                  David Atienza},
  title        = {A high efficiency hardware trojan detection technique based on fast
                  {SEM} imaging},
  booktitle    = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
                  Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
                  9-13, 2015},
  pages        = {788--793},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2755932},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/CourbonLFT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/CourbonLFT15,
  author       = {Franck Courbon and
                  Philippe Loubet{-}Moundi and
                  Jacques J. A. Fournier and
                  Assia Tria},
  title        = {{SEMBA:} {A} {SEM} based acquisition technique for fast invasive Hardware
                  Trojan detection},
  booktitle    = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim,
                  Norway, August 24-26, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECCTD.2015.7300097},
  doi          = {10.1109/ECCTD.2015.7300097},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ecctd/CourbonLFT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/LecomteFM15,
  author       = {Maxime Lecomte and
                  Jacques J. A. Fournier and
                  Philippe Maurine},
  editor       = {Michael H{\"{u}}bner and
                  Maya B. Gokhale and
                  Ren{\'{e}} Cumplido},
  title        = {Thoroughly analyzing the use of ring oscillators for on-chip hardware
                  trojan detection},
  booktitle    = {International Conference on ReConFigurable Computing and FPGAs, ReConFig
                  2015, Riviera Maya, Mexico, December 7-9, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ReConFig.2015.7393363},
  doi          = {10.1109/RECONFIG.2015.7393363},
  timestamp    = {Wed, 28 Apr 2021 16:06:54 +0200},
  biburl       = {https://dblp.org/rec/conf/reconfig/LecomteFM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LashermesFG15,
  author       = {Ronan Lashermes and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  title        = {Inverting the Final exponentiation of Tate pairings on ordinary elliptic
                  curves using faults},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LashermesFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LecomteFM15,
  author       = {Maxime Lecomte and
                  Jacques Fournier and
                  Philippe Maurine},
  title        = {Extraction of intrinsic structure for Hardware Trojan detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {912},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/912},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LecomteFM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CourbonLFT14,
  author       = {Franck Courbon and
                  Philippe Loubet{-}Moundi and
                  Jacques J. A. Fournier and
                  Assia Tria},
  editor       = {Emmanuel Prouff},
  title        = {Adjusting Laser Injections for Fully Controlled Faults},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {229--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_16},
  doi          = {10.1007/978-3-319-10175-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/CourbonLFT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/LashermesPMFG14,
  author       = {Ronan Lashermes and
                  Marie Paindavoine and
                  Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Assia Tria and
                  Dooho Choi},
  title        = {Practical Validation of Several Fault Attacks against the Miller Algorithm},
  booktitle    = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2014, Busan, South Korea, September 23, 2014},
  pages        = {115--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FDTC.2014.21},
  doi          = {10.1109/FDTC.2014.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/LashermesPMFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CourbonLFT14,
  author       = {Franck Courbon and
                  Philippe Loubet{-}Moundi and
                  Jacques J. A. Fournier and
                  Assia Tria},
  title        = {Increasing the efficiency of laser fault injections using fast gate
                  level reverse engineering},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {60--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855569},
  doi          = {10.1109/HST.2014.6855569},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CourbonLFT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MrabetFGL14,
  author       = {Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin and
                  Ronan Lashermes},
  title        = {A survey of Fault Attacks in Pairing Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {742},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/742},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MrabetFGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LashermesFG13,
  author       = {Ronan Lashermes and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic
                  Curves Using Faults},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {365--382},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_21},
  doi          = {10.1007/978-3-642-40349-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LashermesFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recosoc/ExurvilleFDRT13,
  author       = {Ingrid Exurville and
                  Jacques J. A. Fournier and
                  Jean{-}Max Dutertre and
                  Bruno Robisson and
                  Assia Tria},
  title        = {Practical measurements of data path delays for {IP} authentication
                  {\&} integrity verification},
  booktitle    = {2013 8th International Workshop on Reconfigurable and Communication-Centric
                  Systems-on-Chip (ReCoSoC), Darmstadt, Germany, July 10-12, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ReCoSoC.2013.6581551},
  doi          = {10.1109/RECOSOC.2013.6581551},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/recosoc/ExurvilleFDRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/MounierRFAT12,
  author       = {Benjamin Mounier and
                  Anne{-}Lise Ribotta and
                  Jacques J. A. Fournier and
                  Michel Agoyan and
                  Assia Tria},
  editor       = {David Naccache},
  title        = {{EM} Probes Characterisation for Security Analysis},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {248--264},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_17},
  doi          = {10.1007/978-3-642-28368-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/MounierRFAT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/LashermesRDFRT12,
  author       = {Ronan Lashermes and
                  Guillaume Reymond and
                  Jean{-}Max Dutertre and
                  Jacques J. A. Fournier and
                  Bruno Robisson and
                  Assia Tria},
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {A {DFA} on {AES} Based on the Entropy of Error Distributions},
  booktitle    = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  pages        = {34--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FDTC.2012.18},
  doi          = {10.1109/FDTC.2012.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/LashermesRDFRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiei/FournierRBRTDA11,
  author       = {Jacques J. A. Fournier and
                  Jean{-}Baptiste Rigaud and
                  Sylvain Bouquet and
                  Bruno Robisson and
                  Assia Tria and
                  Jean{-}Max Dutertre and
                  Michel Agoyan},
  title        = {Design and characterisation of an {AES} chip embedding countermeasures},
  journal      = {Int. J. Intell. Eng. Informatics},
  volume       = {1},
  number       = {3/4},
  pages        = {328--347},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIEI.2011.044101},
  doi          = {10.1504/IJIEI.2011.044101},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijiei/FournierRBRTDA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/Doulcier-VerdierDFRRT11,
  author       = {Marion Doulcier{-}Verdier and
                  Jean{-}Max Dutertre and
                  Jacques J. A. Fournier and
                  Jean{-}Baptiste Rigaud and
                  Bruno Robisson and
                  Assia Tria},
  title        = {A side-channel and fault-attack resistant {AES} circuit working on
                  duplicated complemented values},
  booktitle    = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2011,
                  Digest of Technical Papers, San Francisco, CA, USA, 20-24 February,
                  2011},
  pages        = {274--276},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISSCC.2011.5746316},
  doi          = {10.1109/ISSCC.2011.5746316},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isscc/Doulcier-VerdierDFRRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/AboulkassimiAFFRT11,
  author       = {Driss Aboulkassimi and
                  Michel Agoyan and
                  Laurent Freund and
                  Jacques J. A. Fournier and
                  Bruno Robisson and
                  Assia Tria},
  title        = {ElectroMagnetic analysis {(EMA)} of software {AES} on Java mobile
                  phones},
  booktitle    = {2011 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WIFS.2011.6123131},
  doi          = {10.1109/WIFS.2011.6123131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/AboulkassimiAFFRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/FournierL10,
  author       = {Jacques J. A. Fournier and
                  Philippe Loubet{-}Moundi},
  editor       = {Luca Breveglieri and
                  Marc Joye and
                  Israel Koren and
                  David Naccache and
                  Ingrid Verbauwhede},
  title        = {Memory Address Scrambling Revealed Using Fault Attacks},
  booktitle    = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2010, Santa Barbara, California, USA, 21 August 2010},
  pages        = {30--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FDTC.2010.13},
  doi          = {10.1109/FDTC.2010.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/FournierL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/StaufferABFCMBR08,
  author       = {Yves Stauffer and
                  Yves Allemand and
                  Mohamed Bouri and
                  Jacques Fournier and
                  Reymond Clavel and
                  Patrick Metrailler and
                  Roland Brodard and
                  Fabienne Reynard},
  title        = {Pelvic motion measurement during over ground walking, analysis and
                  implementation on the WalkTrainer reeducation device},
  booktitle    = {2008 {IEEE/RSJ} International Conference on Intelligent Robots and
                  Systems, September 22-26, 2008, Acropolis Convention Center, Nice,
                  France},
  pages        = {2362--2367},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IROS.2008.4650579},
  doi          = {10.1109/IROS.2008.4650579},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iros/StaufferABFCMBR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Fournier07,
  author       = {Jacques Jean{-}Alain Michael Fournier},
  title        = {Vector microprocessors for cryptography},
  school       = {University of Cambridge, {UK}},
  year         = {2007},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613318},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Fournier07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/robio/StaufferRABFC07,
  author       = {Yves Stauffer and
                  Fabienne Reynard and
                  Yves Allemand and
                  Mohamed Bouri and
                  Jacques Fournier and
                  Reymond Clavel},
  title        = {Pelvic motion implementation on the WalkTrainer},
  booktitle    = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO}
                  2007, Sanya, China, 15-28 December 2007},
  pages        = {133--138},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ROBIO.2007.4522148},
  doi          = {10.1109/ROBIO.2007.4522148},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/robio/StaufferRABFC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FournierT06,
  author       = {Jacques J. A. Fournier and
                  Michael Tunstall},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Cache Based Power Analysis Attacks on {AES}},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_2},
  doi          = {10.1007/11780656\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FournierT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/OikonomakosFM06,
  author       = {Petros Oikonomakos and
                  Jacques J. A. Fournier and
                  Simon W. Moore},
  editor       = {Josep Domingo{-}Ferrer and
                  Joachim Posegga and
                  Daniel Schreckling},
  title        = {Implementing Cryptography on {TFT} Technology for Secure Display Applications},
  booktitle    = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3928},
  pages        = {32--47},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11733447\_3},
  doi          = {10.1007/11733447\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/OikonomakosFM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/FournierM06,
  author       = {Jacques J. A. Fournier and
                  Simon W. Moore},
  title        = {Hardware-Software Codesign of a Vector Co-processor for Public Key
                  Cryptography},
  booktitle    = {Ninth Euromicro Conference on Digital System Design: Architectures,
                  Methods and Tools {(DSD} 2006), 30 August - 1 September 2006, Dubrovnik,
                  Croatia},
  pages        = {439--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/DSD.2006.58},
  doi          = {10.1109/DSD.2006.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/FournierM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drmtics/FournierM05,
  author       = {Jacques J. A. Fournier and
                  Simon W. Moore},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {A Vector Approach to Cryptography Implementation},
  booktitle    = {Digital Rights Management: Technologies, Issues, Challenges and Systems,
                  First International Conference, {DRMTICS} 2005, Sydney, Australia,
                  October 31 - November 2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3919},
  pages        = {277--297},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11787952\_21},
  doi          = {10.1007/11787952\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/drmtics/FournierM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/MooreAMTF03,
  author       = {Simon W. Moore and
                  Ross J. Anderson and
                  Robert D. Mullins and
                  George S. Taylor and
                  Jacques J. A. Fournier},
  title        = {Balanced self-checking asynchronous logic for smart card applications},
  journal      = {Microprocess. Microsystems},
  volume       = {27},
  number       = {9},
  pages        = {421--430},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0141-9331(03)00092-9},
  doi          = {10.1016/S0141-9331(03)00092-9},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/MooreAMTF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FournierMLMT03,
  author       = {Jacques J. A. Fournier and
                  Simon W. Moore and
                  Huiyun Li and
                  Robert D. Mullins and
                  George S. Taylor},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Security Evaluation of Asynchronous Circuits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {137--151},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_12},
  doi          = {10.1007/978-3-540-45238-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FournierMLMT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics