


Остановите войну!
for scientists:


default search action
Sylvain Guilley
Person information

- affiliation: Télécom Paris, Paris, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j69]Ke Xu
, Ming Tang
, Han Wang, Sylvain Guilley
:
Reverse-Engineering and Exploiting the Frontend Bus of Intel Processor. IEEE Trans. Computers 72(2): 360-373 (2023) - [j68]Arthur Beckers
, Sylvain Guilley
, Philippe Maurine
, Colin O'Flynn, Stjepan Picek
:
(Adversarial) Electromagnetic Disturbance in the Industry. IEEE Trans. Computers 72(2): 414-422 (2023) - [c187]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. COSADE 2023: 86-104 - [i72]Julien Béguinot, Yi Liu, Olivier Rioul, Wei Cheng, Sylvain Guilley:
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. CoRR abs/2305.06276 (2023) - [i71]Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking to protect against both SCA and FIA. IACR Cryptol. ePrint Arch. 2023: 406 (2023) - 2022
- [j67]Trevor Kroeger
, Wei Cheng, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs. J. Electron. Test. 38(3): 261-277 (2022) - [j66]Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 311-325 (2022) - [j65]Maamar Ouladj
, Sylvain Guilley
, Philippe Guillot, Farid Mokrane:
Spectral approach to process the (multivariate) high-order template attack against any masking scheme. J. Cryptogr. Eng. 12(1): 75-93 (2022) - [j64]Farzad Niknia
, Jean-Luc Danger
, Sylvain Guilley
, Naghmeh Karimi
:
Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(5): 1276-1289 (2022) - [j63]Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu:
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 192-222 (2022) - [j62]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Side-Channel Expectation-Maximization Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 774-799 (2022) - [j61]Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger
:
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks. IEEE Trans. Inf. Forensics Secur. 17: 1624-1638 (2022) - [j60]Trevor Kroeger
, Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger
, Naghmeh Karimi
:
Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives. IEEE Trans. Very Large Scale Integr. Syst. 30(2): 187-200 (2022) - [c186]Amit Choudhari, Sylvain Guilley, Khaled Karray:
SpecDefender: Transient Execution Attack Defender using Performance Counters. ASHES@CCS 2022: 15-24 - [c185]Wei Cheng, Olivier Rioul, Yi Liu, Julien Béguinot, Sylvain Guilley:
Side-Channel Information Leakage of Code-Based Masked Implementations. CWIT 2022: 51-56 - [c184]Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Leakage Power Analysis in Different S-Box Masking Protection Schemes. DATE 2022: 1263-1268 - [c183]Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel Attacks of Secure Chips. DSD 2022: 496-503 - [c182]Idris Rais-Ali, Antoine Bouvet
, Sylvain Guilley:
Quantifying the Speed-Up Offered by Genetic Algorithms during Fault Injection Cartographies. FDTC 2022: 61-72 - [c181]Mohammad Ebrahimabadi, Suhee Sanjana Mehjabin, Raphael Viera
, Sylvain Guilley, Jean-Luc Danger, Jean-Max Dutertre, Naghmeh Karimi:
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors. HOST 2022: 97-100 - [c180]Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. ISIT 2022: 654-659 - [c179]Javad Bahrami, Mohammad Ebrahimabadi, Sofiane Takarabt, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis. SECRYPT 2022: 661-668 - [c178]Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley:
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature. SECRYPT 2022: 701-706 - [i70]Amit Choudhari, Sylvain Guilley, Khaled Karray
:
CRYScanner: Finding cryptographic libraries misuse. IACR Cryptol. ePrint Arch. 2022: 29 (2022) - [i69]Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. IACR Cryptol. ePrint Arch. 2022: 461 (2022) - [i68]Julien Béguinot, Wei Cheng, Sylvain Guilley, Yi Liu, Loïc Masure, Olivier Rioul, François-Xavier Standaert:
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings. IACR Cryptol. ePrint Arch. 2022: 1738 (2022) - 2021
- [b2]Maamar Ouladj
, Sylvain Guilley:
Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach. Springer 2021, ISBN 978-3-030-77221-5, pp. 1-160 - [j59]Wei Cheng
, Sylvain Guilley
, Jean-Luc Danger:
Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$. Cryptogr. Commun. 13(4): 527-542 (2021) - [j58]Md Toufiq Hasan Anik
, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Reducing Aging Impacts in Digital Sensors via Run-Time Calibration. J. Electron. Test. 37(5): 653-673 (2021) - [j57]Wei Cheng
, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting faults in inner product masking scheme. J. Cryptogr. Eng. 11(2): 119-133 (2021) - [j56]Thomas Perianin
, Sébastien Carré, Victor Dyseryn, Adrien Facon, Sylvain Guilley:
End-to-end automated cache-timing attack driven by machine learning. J. Cryptogr. Eng. 11(2): 135-146 (2021) - [j55]Margaux Dugardin, Werner Schindler
, Sylvain Guilley:
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. J. Math. Cryptol. 15(1): 408-433 (2021) - [j54]Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley
, Naghmeh Karimi
:
Detecting Failures and Attacks via Digital Sensors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(7): 1315-1326 (2021) - [j53]Wei Cheng
, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 465-495 (2021) - [j52]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 57-87 (2021) - [j51]Claude Carlet
, Éloi de Chérisey, Sylvain Guilley
, Selçuk Kavut, Deng Tang
:
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios. IEEE Trans. Inf. Forensics Secur. 16: 203-218 (2021) - [j50]Wei Cheng
, Sylvain Guilley
, Claude Carlet
, Sihem Mesnager
, Jean-Luc Danger
:
Optimizing Inner Product Masking Scheme by a Coding Theory Approach. IEEE Trans. Inf. Forensics Secur. 16: 220-235 (2021) - [j49]Yanbin Li
, Zhe Liu
, Sylvain Guilley
, Ming Tang
:
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack. IEEE Trans. Inf. Forensics Secur. 16: 4466-4481 (2021) - [c177]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - [c176]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks. COSADE 2021: 303-321 - [c175]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. DATE 2021: 1000-1005 - [c174]Md Toufiq Hasan Anik, Jean-Luc Danger, Omar Diankha, Mohammad Ebrahimabadi, Christoph Frisch, Sylvain Guilley, Naghmeh Karimi, Michael Pehl, Sofiane Takarabt:
Testing and Reliability Enhancement of Security Primitives. DFT 2021: 1-8 - [c173]Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin:
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. EuroS&P Workshops 2021: 96-102 - [c172]Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray
, Laurent Sauvage, Yves Mathieu:
Formal Evaluation and Construction of Glitch-resistant Masked Functions. HOST 2021: 304-313 - [c171]Sylvain Guilley, Michel Le Rolland, Damien Quenson:
Implementing Secure Applications Thanks to an Integrated Secure Element. ICISSP 2021: 566-571 - [c170]Patrick Solé, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Bent Sequences over Hadamard Codes for Physically Unclonable Functions. ISIT 2021: 801-806 - [c169]Olivier Rioul, Wei Cheng, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. ISIT 2021: 2596-2601 - [c168]Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
On Conditional Alpha-Information and its Application to Side-Channel Analysis. ITW 2021: 1-6 - [c167]Patrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Linear Programming Bounds on the Kissing Number of q-ary Codes. ITW 2021: 1-5 - [i67]Olivier Rioul, Wei Cheng
, Sylvain Guilley:
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. CoRR abs/2102.02468 (2021) - [i66]Yi Liu, Wei Cheng
, Sylvain Guilley, Olivier Rioul:
On Conditional α-Information and its Application to Side-Channel Analysis. CoRR abs/2105.07167 (2021) - [i65]Wei Cheng
, Yi Liu, Sylvain Guilley, Olivier Rioul:
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. CoRR abs/2105.07436 (2021) - [i64]Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Cryptol. ePrint Arch. 2021: 363 (2021) - [i63]Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane:
Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme. IACR Cryptol. ePrint Arch. 2021: 941 (2021) - [i62]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. IACR Cryptol. ePrint Arch. 2021: 1028 (2021) - [i61]Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley:
Security evaluation against side-channel analysis at compilation time. IACR Cryptol. ePrint Arch. 2021: 1521 (2021) - 2020
- [j48]Alexander Schaub, Olivier Rioul, Jean-Luc Danger, Sylvain Guilley, Joseph Boutros:
Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem. Adv. Math. Commun. 14(3): 491-505 (2020) - [j47]Sylvain Guilley
, Khaled Karray
, Thomas Perianin, Ritu Ranjan Shrivastwa
, Youssef Souissi, Sofiane Takarabt:
Side-Channel Evaluation Methodology on Software. Cryptogr. 4(4): 27 (2020) - [j46]Maamar Ouladj
, Nadia El Mrabet, Sylvain Guilley, Philippe Guillot, Gilles Millérioux:
On the power of template attacks in highly multivariate context. J. Cryptogr. Eng. 10(4): 337-354 (2020) - [j45]Houda Ferradi, Rémi Géraud
, Sylvain Guilley, David Naccache, Mehdi Tibouchi:
Recovering Secrets From Prefix-Dependent Leakage. J. Math. Cryptol. 14(1): 15-24 (2020) - [j44]Annelie Heuser
, Stjepan Picek
, Sylvain Guilley
, Nele Mentens
:
Lightweight Ciphers and Their Side-Channel Resilience. IEEE Trans. Computers 69(10): 1434-1448 (2020) - [j43]Fan Zhang
, Bolin Yang
, Xiaofei Dong
, Sylvain Guilley
, Zhe Liu
, Wei He
, Fangguo Zhang
, Kui Ren
:
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE. IEEE Trans. Computers 69(11): 1681-1693 (2020) - [c166]Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon:
Feasibility study of a camera-based PUF in a realistic scenario. ARES 2020: 31:1-31:6 - [c165]Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis with Few Encryptions. COSADE 2020: 3-24 - [c164]Maamar Ouladj
, Sylvain Guilley, Emmanuel Prouff:
On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks. COSADE 2020: 147-172 - [c163]Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert, Baptiste Pecatte:
Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks. COSADE 2020: 254-274 - [c162]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. DATE 2020: 454-459 - [c161]Alexander Schaub, Jean-Luc Danger, Olivier Rioul, Sylvain Guilley:
The Big Picture of Delay-PUF Dependability. ECCTD 2020: 1-4 - [c160]Amir Alipour, Vincent Beroulle, Bertrand Cambou, Jean-Luc Danger, Giorgio Di Natale, David Hély, Sylvain Guilley, Naghmeh Karimi:
PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community. ETS 2020: 1-10 - [c159]Md Toufiq Hasan Anik, Rachit Saini, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Failure and Attack Detection by Digital Sensors. ETS 2020: 1-2 - [c158]Md Toufiq Hasan Anik, Mohammad Ebrahimabadi, Hamed Pirsiavash, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability. ICCD 2020: 506-509 - [c157]Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly:
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. ICICS 2020: 3-19 - [c156]Trevor Kroeger, Wei Cheng
, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. ITC 2020: 1-5 - [c155]Md Toufiq Hasan Anik, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi:
On the Effect of Aging on Digital Sensors. VLSID 2020: 189-194 - [i60]Sébastien Carré, Sylvain Guilley, Olivier Rioul:
Persistent Fault Analysis With Few Encryptions. IACR Cryptol. ePrint Arch. 2020: 671 (2020) - [i59]Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger:
Optimizing Inner Product Masking Scheme by A Coding Theory Approach. IACR Cryptol. ePrint Arch. 2020: 692 (2020) - [i58]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2020: 876 (2020)
2010 – 2019
- 2019
- [j42]Claude Carlet, Abderrahman Daif
, Sylvain Guilley, Cédric Tavernier:
Polynomial direct sum masking to protect against both SCA and FIA. J. Cryptogr. Eng. 9(3): 303-312 (2019) - [j41]Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley:
Exhaustive single bit fault analysis. A use case against Mbedtls and OpenSSL's protection on ARM and Intel CPU. Microprocess. Microsystems 71 (2019) - [j40]Debapriya Basu Roy
, Shivam Bhasin
, Sylvain Guilley, Annelie Heuser
, Sikhar Patranabis
, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [j39]Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 49-79 (2019) - [c154]Youssef Souissi, Adrien Facon, Sylvain Guilley:
Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level. C2SI 2019: 3-12 - [c153]Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage
, Youssef Souissi, Yves Mathieu:
Cache-Timing Attacks Still Threaten IoT Devices. C2SI 2019: 13-30 - [c152]Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:
Speed-up of SCA Attacks on 32-bit Multiplications. C2SI 2019: 31-39 - [c151]Sébastien Carré, Adrien Facon, Sylvain Guilley, Sofiane Takarabt, Alexander Schaub, Youssef Souissi:
Cache-Timing Attack Detection and Prevention - Application to Crypto Libs and PQC. COSADE 2019: 13-21 - [c150]Etienne Tehrani, Tarik Graba, Abdelmalek Si-Merabet, Sylvain Guilley, Jean-Luc Danger:
Classification of Lightweight Block Ciphers for Specific Processor Accelerated Implementations. ICECS 2019: 747-750 - [c149]Kazuhide Fukushima
, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. ICISSP 2019: 67-74 - [c148]Kazuhide Fukushima
, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device. ICISSP (Revised Selected Papers) 2019: 74-92 - [c147]Éloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware. ISIT 2019: 310-315 - [c146]Jean-Luc Danger, Sylvain Guilley, Alexander Schaub:
Two-Metric Helper Data for Highly Robust and Secure Delay PUFs. IWASI 2019: 184-188 - [c145]Sébastien Carré, Victor Dyseryn, Adrien Facon, Sylvain Guilley, Thomas Perianin:
End-to-end automated cache-timing attack driven by Machine Learning. PROOFS 2019: 1-16 - [c144]Wei Cheng
, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection. PROOFS 2019: 17-32 - [p6]Claude Carlet, Sylvain Guilley, Cem Güneri, Sihem Mesnager, Ferruh Özbudak:
Construction of Efficient Codes for High-Order Direct Sum Masking. Security and Privacy in the Internet of Things 2019: 108-128 - [p5]Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. Security and Privacy in the Internet of Things 2019: 148-166 - [e6]Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi:
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji. Lecture Notes in Computer Science 11445, Springer 2019, ISBN 978-3-030-16457-7 [contents] - [i57]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Profiling Side-channel Analysis in the Restricted Attacker Framework. IACR Cryptol. ePrint Arch. 2019: 168 (2019) - [i56]Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful. IACR Cryptol. ePrint Arch. 2019: 491 (2019) - [i55]Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:
Speed-up of SCA attacks on 32-bit multiplications. IACR Cryptol. ePrint Arch. 2019: 530 (2019) - [i54]Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger:
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection. IACR Cryptol. ePrint Arch. 2019: 919 (2019) - 2018
- [j38]Eloi de Chérisey
, Sylvain Guilley, Annelie Heuser, Olivier Rioul
:
On the optimality and practicability of mutual information analysis in some scenarios. Cryptogr. Commun. 10(1): 101-121 (2018) - [j37]Claude Carlet
, Sylvain Guilley
:
Statistical properties of side-channel and fault injection attacks using coding theory. Cryptogr. Commun. 10(5): 909-933 (2018) - [j36]Jean-Luc Danger, Youssef El Housni
, Adrien Facon, Cheikh Thiecoumba Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub:
On the Performance and Security of Multiplication in GF(2N). Cryptogr. 2(3): 25 (2018) - [j35]Naghmeh Karimi
, Jean-Luc Danger, Sylvain Guilley:
Impact of Aging on the Reliability of Delay PUFs. J. Electron. Test. 34(5): 571-586 (2018) - [j34]Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, Debdeep Mukhopadhyay, Zakaria Najm, Xuan Thuy Ngo:
The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. J. Hardw. Syst. Secur. 2(2): 162-178 (2018) - [j33]Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia:
Multivariate High-Order Attacks of Shuffled Tables Recomputation. J. Cryptol. 31(2): 351-393 (2018) - [c143]Eloi de Chérisey, Sylvain Guilley, Olivier Rioul:
Confused yet Successful: - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR. Inscrypt 2018: 533-553 - [c142]Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley:
OpenSSL Bellcore's Protection Helps Fault Attack. DSD 2018: 500-507 - [c141]Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, Abdelmalek Si-Merabet, Michaël Timbert:
CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity. DSD 2018: 529-536 - [c140]Alexander Schaub
, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul:
An Improved Analysis of Reliability and Entropy for Delay PUFs. DSD 2018: 553-560 - [c139]Antoine Bouvet
, Nicolas Bruneau, Adrien Facon
, Sylvain Guilley, Damien Marion:
Give me your binary, I'll tell you if it leaks. DTIS 2018: 1-4 - [c138]Sylvain Guilley, Youssef El Housni
:
Random Numbers Generation: Tests and Attacks. FDTC 2018: 49-54 - [c137]Naghmeh Karimi, Sylvain Guilley, Jean-Luc Danger:
Impact of Aging on Template Attacks. ACM Great Lakes Symposium on VLSI 2018: 455-458 - [c136]Kais Chibani, Adrien Facon, Sylvain Guilley, Youssef Souissi:
Technology-agnostic power optimization for AES block cipher. ICECS 2018: 397-400 - [c135]Naghmeh Karimi, Jean-Luc Danger, Sylvain Guilley:
On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis. IOLTS 2018: 281-286 - [c134]Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Alexander Schaub, Youssef Souissi:
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms. IVSW 2018: 7-12 - [c133]Sofiane Takarabt, Kais Chibani, Adrien Facon, Sylvain Guilley, Yves Mathieu, Laurent Sauvage, Youssef Souissi:
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification. IVSW 2018: 74-79 - [c132]Nicolas Bruneau, Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Soshi Hamaguchi, Yohei Hori, Yousung Kang, Alexander Schaub:
Development of the Unified Security Requirements of PUFs During the Standardization Process. SecITC 2018: 314-330 - [c131]Adrien Facon, Sylvain Guilley, Matthieu Lec'Hvien, Damien Marion, Thomas Perianin:
Binary Data Analysis for Source Code Leakage Assessment. SecITC 2018: 391-409 - [c130]Khaled Karray, Jean-Luc Danger,