Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jacques J. A. Fournier
@article{DBLP:journals/mam/MontoyaBMF23, author = {Maxime Montoya and Simone Bacles{-}Min and Anca Molnos and Jacques J. A. Fournier}, title = {Protecting integrated circuits against side-channel and fault attacks with dynamic encoding}, journal = {Microprocess. Microsystems}, volume = {97}, pages = {104761}, year = {2023}, url = {https://doi.org/10.1016/j.micpro.2023.104761}, doi = {10.1016/J.MICPRO.2023.104761}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/MontoyaBMF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/EscouteloupLFL21, author = {Mathieu Escouteloup and Ronan Lashermes and Jacques Fournier and Jean{-}Louis Lanet}, editor = {Vincent Grosso and Thomas P{\"{o}}ppelmann}, title = {Under the Dome: Preventing Hardware Timing Information Leakage}, booktitle = {Smart Card Research and Advanced Applications - 20th International Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13173}, pages = {233--253}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97348-3\_13}, doi = {10.1007/978-3-030-97348-3\_13}, timestamp = {Thu, 10 Mar 2022 15:30:57 +0100}, biburl = {https://dblp.org/rec/conf/cardis/EscouteloupLFL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JauvartMFG20, author = {Damien Jauvart and Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin}, title = {Improving side-channel attacks against pairing-based cryptography}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.1007/s13389-018-00201-3}, doi = {10.1007/S13389-018-00201-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JauvartMFG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/MontoyaBMF20, author = {Maxime Montoya and Simone Bacles{-}Min and Anca Molnos and Jacques J. A. Fournier}, title = {Dynamic encoding, a lightweight combined countermeasure against hardware attacks}, booktitle = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj, Slovenia, August 26-28, 2020}, pages = {185--192}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSD51259.2020.00039}, doi = {10.1109/DSD51259.2020.00039}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsd/MontoyaBMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/LoiseauLF20, author = {Antoine Loiseau and Maxime Lecomte and Jacques J. A. Fournier}, title = {Template Attacks against {ECC:} practical implementation against Curve25519}, booktitle = {2020 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2020, San Jose, CA, USA, December 7-11, 2020}, pages = {13--22}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/HOST45689.2020.9300261}, doi = {10.1109/HOST45689.2020.9300261}, timestamp = {Fri, 15 Jan 2021 14:54:19 +0100}, biburl = {https://dblp.org/rec/conf/host/LoiseauLF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/MontoyaHBMF19, author = {Maxime Montoya and Thomas Hiscock and Simone Bacles{-}Min and Anca Molnos and Jacques Fournier}, title = {Adaptive Masking: a Dynamic Trade-off between Energy Consumption and Hardware Security}, booktitle = {37th {IEEE} International Conference on Computer Design, {ICCD} 2019, Abu Dhabi, United Arab Emirates, November 17-20, 2019}, pages = {559--566}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCD46524.2019.00082}, doi = {10.1109/ICCD46524.2019.00082}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccd/MontoyaHBMF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdomnicaiMF19, author = {Alexandre Adomnicai and Laurent Masson and Jacques J. A. Fournier}, title = {Practical Algebraic Side-Channel Attacks Against {ACORN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2019}, url = {https://eprint.iacr.org/2019/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdomnicaiMF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/FournierGPT18, author = {Jacques Fournier and Josselin Garnier and George Papanicolaou and Chrysoula Tsogka}, editor = {Michael B. Matthews}, title = {Correlation-based imaging of fast moving objects using a sparse network of passive receivers}, booktitle = {52nd Asilomar Conference on Signals, Systems, and Computers, {ACSSC} 2018, Pacific Grove, CA, USA, October 28-31, 2018}, pages = {1618--1622}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ACSSC.2018.8645287}, doi = {10.1109/ACSSC.2018.8645287}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acssc/FournierGPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AdomnicaiFM18, author = {Alexandre Adomnicai and Jacques J. A. Fournier and Laurent Masson}, title = {Hardware Security Threats Against Bluetooth Mesh Networks}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433184}, doi = {10.1109/CNS.2018.8433184}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/AdomnicaiFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/MontoyaHBMF18, author = {Maxime Montoya and Thomas Hiscock and Simone Bacles{-}Min and Anca Molnos and Jacques J. A. Fournier}, title = {Energy-efficient Masking of the Trivium Stream Cipher}, booktitle = {25th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018}, pages = {393--396}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICECS.2018.8617892}, doi = {10.1109/ICECS.2018.8617892}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/MontoyaHBMF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/LoiseauF18, author = {Antoine Loiseau and Jacques J. A. Fournier}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Binary Edwards Curves for Intrinsically Secure {ECC} Implementations for the IoT}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {625--631}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006831506250631}, doi = {10.5220/0006831506250631}, timestamp = {Wed, 29 Aug 2018 15:17:20 +0200}, biburl = {https://dblp.org/rec/conf/icete/LoiseauF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AdomnicaiMF18, author = {Alexandre Adomnicai and Laurent Masson and Jacques J. A. Fournier}, editor = {Kwangsu Lee}, title = {Practical Algebraic Side-Channel Attacks Against {ACORN}}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {325--340}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_20}, doi = {10.1007/978-3-030-12146-4\_20}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AdomnicaiMF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LacCFS18, author = {Benjamin Lac and Anne Canteaut and Jacques J. A. Fournier and Renaud Sirdey}, title = {Thwarting Fault Attacks against Lightweight Cryptography using {SIMD} Instructions}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2018, 27-30 May 2018, Florence, Italy}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISCAS.2018.8351693}, doi = {10.1109/ISCAS.2018.8351693}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LacCFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MontoyaBMF18, author = {Maxime Montoya and Simone Bacles{-}Min and Anca Molnos and Jacques J. A. Fournier}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {{SWARD:} {A} Secure WAke-up RaDio against Denial-of-Service on IoT devices}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {190--195}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212488}, doi = {10.1145/3212480.3212488}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MontoyaBMF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdomnicaiFM18, author = {Alexandre Adomnicai and Jacques J. A. Fournier and Laurent Masson}, title = {Masking the Lightweight Authenticated Ciphers {ACORN} and Ascon in Software}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2018}, url = {https://eprint.iacr.org/2018/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdomnicaiFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamis/FournierGPT17, author = {Jacques Fournier and Josselin Garnier and George Papanicolaou and Chrysoula Tsogka}, title = {Matched-Filter and Correlation-Based Imaging for Fast Moving Objects Using a Sparse Network of Receivers}, journal = {{SIAM} J. Imaging Sci.}, volume = {10}, number = {4}, pages = {2165--2216}, year = {2017}, url = {https://doi.org/10.1137/17M112364X}, doi = {10.1137/17M112364X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamis/FournierGPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/LecomteFM17, author = {Maxime Lecomte and Jacques Fournier and Philippe Maurine}, title = {An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {25}, number = {12}, pages = {3317--3330}, year = {2017}, url = {https://doi.org/10.1109/TVLSI.2016.2627525}, doi = {10.1109/TVLSI.2016.2627525}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/LecomteFM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/LacCFS17, author = {Benjamin Lac and Anne Canteaut and Jacques Fournier and Renaud Sirdey}, editor = {Sylvain Guilley}, title = {{DFA} on LS-Designs with a Practical Implementation on {SCREAM}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {223--247}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_14}, doi = {10.1007/978-3-319-64647-3\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/LacCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/JauvartMFG17, author = {Damien Jauvart and Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin}, editor = {Mohammad S. Obaidat and Enrique Cabello}, title = {Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack}, booktitle = {E-Business and Telecommunications - 14th International Joint Conference, {ICETE} 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper}, series = {Communications in Computer and Information Science}, volume = {990}, pages = {150--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-11039-0\_8}, doi = {10.1007/978-3-030-11039-0\_8}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/JauvartMFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AdomnicaiFM17, author = {Alexandre Adomnicai and Jacques J. A. Fournier and Laurent Masson}, editor = {Arpita Patra and Nigel P. Smart}, title = {Bricklayer Attack: {A} Side-Channel Analysis on the ChaCha Quarter Round}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10698}, pages = {65--84}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71667-1\_4}, doi = {10.1007/978-3-319-71667-1\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AdomnicaiFM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JauvartFG17, author = {Damien Jauvart and Jacques J. A. Fournier and Louis Goubin}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {104--115}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006425501040115}, doi = {10.5220/0006425501040115}, timestamp = {Thu, 17 Aug 2017 18:31:18 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JauvartFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LacBCFS17, author = {Benjamin Lac and Marc Beunardeau and Anne Canteaut and Jacques Fournier and Renaud Sirdey}, title = {A First {DFA} on {PRIDE:} from Theory to Practice (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2017}, url = {http://eprint.iacr.org/2017/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LacBCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LacCFS17, author = {Benjamin Lac and Anne Canteaut and Jacques Fournier and Renaud Sirdey}, title = {{DFA} on LS-Designs with a Practical Implementation on {SCREAM} (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2017}, url = {http://eprint.iacr.org/2017/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LacCFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LacCFS17a, author = {Benjamin Lac and Anne Canteaut and Jacques J. A. Fournier and Renaud Sirdey}, title = {Thwarting Fault Attacks using the Internal Redundancy Countermeasure {(IRC)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {910}, year = {2017}, url = {http://eprint.iacr.org/2017/910}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LacCFS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdomnicaiFM17, author = {Alexandre Adomnicai and Jacques J. A. Fournier and Laurent Masson}, title = {Bricklayer Attack: {A} Side-Channel Analysis on the ChaCha Quarter Round}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2017}, url = {http://eprint.iacr.org/2017/1021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdomnicaiFM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/AbdellatifCFR16, author = {Karim M. Abdellatif and Christian Cornesse and Jacques J. A. Fournier and Bruno Robisson}, editor = {Vanderlei Bonato and Christos Bouganis and Marek Gorgon}, title = {New Partitioning Approach for Hardware Trojan Detection Using Side-Channel Measurements}, booktitle = {Applied Reconfigurable Computing - 12th International Symposium, {ARC} 2016, Mangaratiba, RJ, Brazil, March 22-24, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9625}, pages = {171--182}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30481-6\_14}, doi = {10.1007/978-3-319-30481-6\_14}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/AbdellatifCFR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/JauvartFMG16, author = {Damien Jauvart and Jacques J. A. Fournier and Nadia El Mrabet and Louis Goubin}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Jean{-}Louis Lanet and Axel Legay}, title = {Improving Side-Channel Attacks Against Pairing-Based Cryptography}, booktitle = {Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10158}, pages = {199--213}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54876-0\_16}, doi = {10.1007/978-3-319-54876-0\_16}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/crisis/JauvartFMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/LacBCFS16, author = {Benjamin Lac and Marc Beunardeau and Anne Canteaut and Jacques J. A. Fournier and Renaud Sirdey}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Jean{-}Louis Lanet and Axel Legay}, title = {A First {DFA} on {PRIDE:} From Theory to Practice}, booktitle = {Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10158}, pages = {214--238}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54876-0\_17}, doi = {10.1007/978-3-319-54876-0\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/LacBCFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LecomteFM16, author = {Maxime Lecomte and Jacques J. A. Fournier and Philippe Maurine}, editor = {Luca Fanucci and J{\"{u}}rgen Teich}, title = {On-chip fingerprinting of {IC} topology for integrity verification}, booktitle = {2016 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016}, pages = {133--138}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7459293/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/LecomteFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/LecomteFM16, author = {Maxime Lecomte and Jacques J. A. Fournier and Philippe Maurine}, editor = {William H. Robinson and Swarup Bhunia and Ryan Kastner}, title = {Granularity and detection capability of an adaptive embedded Hardware Trojan detection system}, booktitle = {2016 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016}, pages = {135--138}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HST.2016.7495571}, doi = {10.1109/HST.2016.7495571}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/LecomteFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MrabetFGL15, author = {Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin and Ronan Lashermes}, title = {A survey of fault attacks in pairing based cryptography}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {185--205}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0114-5}, doi = {10.1007/S12095-014-0114-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MrabetFGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/CourbonFLT15, author = {Franck Courbon and Jacques J. A. Fournier and Philippe Loubet{-}Moundi and Assia Tria}, title = {Combining Image Processing and Laser Fault Injections for Characterizing a Hardware {AES}}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {34}, number = {6}, pages = {928--936}, year = {2015}, url = {https://doi.org/10.1109/TCAD.2015.2391773}, doi = {10.1109/TCAD.2015.2391773}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/CourbonFLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/CourbonLFT15, author = {Franck Courbon and Philippe Loubet{-}Moundi and Jacques J. A. Fournier and Assia Tria}, editor = {Wolfgang Nebel and David Atienza}, title = {A high efficiency hardware trojan detection technique based on fast {SEM} imaging}, booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March 9-13, 2015}, pages = {788--793}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2755932}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/CourbonLFT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/CourbonLFT15, author = {Franck Courbon and Philippe Loubet{-}Moundi and Jacques J. A. Fournier and Assia Tria}, title = {{SEMBA:} {A} {SEM} based acquisition technique for fast invasive Hardware Trojan detection}, booktitle = {European Conference on Circuit Theory and Design, {ECCTD} 2015, Trondheim, Norway, August 24-26, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECCTD.2015.7300097}, doi = {10.1109/ECCTD.2015.7300097}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/CourbonLFT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/LecomteFM15, author = {Maxime Lecomte and Jacques J. A. Fournier and Philippe Maurine}, editor = {Michael H{\"{u}}bner and Maya B. Gokhale and Ren{\'{e}} Cumplido}, title = {Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection}, booktitle = {International Conference on ReConFigurable Computing and FPGAs, ReConFig 2015, Riviera Maya, Mexico, December 7-9, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ReConFig.2015.7393363}, doi = {10.1109/RECONFIG.2015.7393363}, timestamp = {Wed, 28 Apr 2021 16:06:54 +0200}, biburl = {https://dblp.org/rec/conf/reconfig/LecomteFM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LashermesFG15, author = {Ronan Lashermes and Jacques J. A. Fournier and Louis Goubin}, title = {Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2015}, url = {http://eprint.iacr.org/2015/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LashermesFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LecomteFM15, author = {Maxime Lecomte and Jacques Fournier and Philippe Maurine}, title = {Extraction of intrinsic structure for Hardware Trojan detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {912}, year = {2015}, url = {http://eprint.iacr.org/2015/912}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LecomteFM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/CourbonLFT14, author = {Franck Courbon and Philippe Loubet{-}Moundi and Jacques J. A. Fournier and Assia Tria}, editor = {Emmanuel Prouff}, title = {Adjusting Laser Injections for Fully Controlled Faults}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {229--242}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_16}, doi = {10.1007/978-3-319-10175-0\_16}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/CourbonLFT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/LashermesPMFG14, author = {Ronan Lashermes and Marie Paindavoine and Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin}, editor = {Assia Tria and Dooho Choi}, title = {Practical Validation of Several Fault Attacks against the Miller Algorithm}, booktitle = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2014, Busan, South Korea, September 23, 2014}, pages = {115--122}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FDTC.2014.21}, doi = {10.1109/FDTC.2014.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/LashermesPMFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CourbonLFT14, author = {Franck Courbon and Philippe Loubet{-}Moundi and Jacques J. A. Fournier and Assia Tria}, title = {Increasing the efficiency of laser fault injections using fast gate level reverse engineering}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {60--63}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855569}, doi = {10.1109/HST.2014.6855569}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CourbonLFT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MrabetFGL14, author = {Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin and Ronan Lashermes}, title = {A survey of Fault Attacks in Pairing Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {742}, year = {2014}, url = {http://eprint.iacr.org/2014/742}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MrabetFGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LashermesFG13, author = {Ronan Lashermes and Jacques J. A. Fournier and Louis Goubin}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {365--382}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_21}, doi = {10.1007/978-3-642-40349-1\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/LashermesFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recosoc/ExurvilleFDRT13, author = {Ingrid Exurville and Jacques J. A. Fournier and Jean{-}Max Dutertre and Bruno Robisson and Assia Tria}, title = {Practical measurements of data path delays for {IP} authentication {\&} integrity verification}, booktitle = {2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Darmstadt, Germany, July 10-12, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ReCoSoC.2013.6581551}, doi = {10.1109/RECOSOC.2013.6581551}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/recosoc/ExurvilleFDRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/MounierRFAT12, author = {Benjamin Mounier and Anne{-}Lise Ribotta and Jacques J. A. Fournier and Michel Agoyan and Assia Tria}, editor = {David Naccache}, title = {{EM} Probes Characterisation for Security Analysis}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {248--264}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_17}, doi = {10.1007/978-3-642-28368-0\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/MounierRFAT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/LashermesRDFRT12, author = {Ronan Lashermes and Guillaume Reymond and Jean{-}Max Dutertre and Jacques J. A. Fournier and Bruno Robisson and Assia Tria}, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {A {DFA} on {AES} Based on the Entropy of Error Distributions}, booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, pages = {34--43}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FDTC.2012.18}, doi = {10.1109/FDTC.2012.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/LashermesRDFRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiei/FournierRBRTDA11, author = {Jacques J. A. Fournier and Jean{-}Baptiste Rigaud and Sylvain Bouquet and Bruno Robisson and Assia Tria and Jean{-}Max Dutertre and Michel Agoyan}, title = {Design and characterisation of an {AES} chip embedding countermeasures}, journal = {Int. J. Intell. Eng. Informatics}, volume = {1}, number = {3/4}, pages = {328--347}, year = {2011}, url = {https://doi.org/10.1504/IJIEI.2011.044101}, doi = {10.1504/IJIEI.2011.044101}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiei/FournierRBRTDA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/Doulcier-VerdierDFRRT11, author = {Marion Doulcier{-}Verdier and Jean{-}Max Dutertre and Jacques J. A. Fournier and Jean{-}Baptiste Rigaud and Bruno Robisson and Assia Tria}, title = {A side-channel and fault-attack resistant {AES} circuit working on duplicated complemented values}, booktitle = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2011, Digest of Technical Papers, San Francisco, CA, USA, 20-24 February, 2011}, pages = {274--276}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISSCC.2011.5746316}, doi = {10.1109/ISSCC.2011.5746316}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isscc/Doulcier-VerdierDFRRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/AboulkassimiAFFRT11, author = {Driss Aboulkassimi and Michel Agoyan and Laurent Freund and Jacques J. A. Fournier and Bruno Robisson and Assia Tria}, title = {ElectroMagnetic analysis {(EMA)} of software {AES} on Java mobile phones}, booktitle = {2011 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WIFS.2011.6123131}, doi = {10.1109/WIFS.2011.6123131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/AboulkassimiAFFRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/FournierL10, author = {Jacques J. A. Fournier and Philippe Loubet{-}Moundi}, editor = {Luca Breveglieri and Marc Joye and Israel Koren and David Naccache and Ingrid Verbauwhede}, title = {Memory Address Scrambling Revealed Using Fault Attacks}, booktitle = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2010, Santa Barbara, California, USA, 21 August 2010}, pages = {30--36}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FDTC.2010.13}, doi = {10.1109/FDTC.2010.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/FournierL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/StaufferABFCMBR08, author = {Yves Stauffer and Yves Allemand and Mohamed Bouri and Jacques Fournier and Reymond Clavel and Patrick Metrailler and Roland Brodard and Fabienne Reynard}, title = {Pelvic motion measurement during over ground walking, analysis and implementation on the WalkTrainer reeducation device}, booktitle = {2008 {IEEE/RSJ} International Conference on Intelligent Robots and Systems, September 22-26, 2008, Acropolis Convention Center, Nice, France}, pages = {2362--2367}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IROS.2008.4650579}, doi = {10.1109/IROS.2008.4650579}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iros/StaufferABFCMBR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Fournier07, author = {Jacques Jean{-}Alain Michael Fournier}, title = {Vector microprocessors for cryptography}, school = {University of Cambridge, {UK}}, year = {2007}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613318}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Fournier07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/robio/StaufferRABFC07, author = {Yves Stauffer and Fabienne Reynard and Yves Allemand and Mohamed Bouri and Jacques Fournier and Reymond Clavel}, title = {Pelvic motion implementation on the WalkTrainer}, booktitle = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO} 2007, Sanya, China, 15-28 December 2007}, pages = {133--138}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ROBIO.2007.4522148}, doi = {10.1109/ROBIO.2007.4522148}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/robio/StaufferRABFC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/FournierT06, author = {Jacques J. A. Fournier and Michael Tunstall}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Cache Based Power Analysis Attacks on {AES}}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {17--28}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_2}, doi = {10.1007/11780656\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/FournierT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/OikonomakosFM06, author = {Petros Oikonomakos and Jacques J. A. Fournier and Simon W. Moore}, editor = {Josep Domingo{-}Ferrer and Joachim Posegga and Daniel Schreckling}, title = {Implementing Cryptography on {TFT} Technology for Secure Display Applications}, booktitle = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3928}, pages = {32--47}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11733447\_3}, doi = {10.1007/11733447\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/OikonomakosFM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/FournierM06, author = {Jacques J. A. Fournier and Simon W. Moore}, title = {Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography}, booktitle = {Ninth Euromicro Conference on Digital System Design: Architectures, Methods and Tools {(DSD} 2006), 30 August - 1 September 2006, Dubrovnik, Croatia}, pages = {439--446}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/DSD.2006.58}, doi = {10.1109/DSD.2006.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/FournierM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drmtics/FournierM05, author = {Jacques J. A. Fournier and Simon W. Moore}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {A Vector Approach to Cryptography Implementation}, booktitle = {Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, {DRMTICS} 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3919}, pages = {277--297}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11787952\_21}, doi = {10.1007/11787952\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/drmtics/FournierM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/MooreAMTF03, author = {Simon W. Moore and Ross J. Anderson and Robert D. Mullins and George S. Taylor and Jacques J. A. Fournier}, title = {Balanced self-checking asynchronous logic for smart card applications}, journal = {Microprocess. Microsystems}, volume = {27}, number = {9}, pages = {421--430}, year = {2003}, url = {https://doi.org/10.1016/S0141-9331(03)00092-9}, doi = {10.1016/S0141-9331(03)00092-9}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/MooreAMTF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FournierMLMT03, author = {Jacques J. A. Fournier and Simon W. Moore and Huiyun Li and Robert D. Mullins and George S. Taylor}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Security Evaluation of Asynchronous Circuits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {137--151}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_12}, doi = {10.1007/978-3-540-45238-6\_12}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/FournierMLMT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.