Sylvain Guilley

From MaRDI portal
Person:259279

Available identifiers

zbMath Open guilley.sylvainMaRDI QIDQ259279

List of research outcomes





PublicationDate of PublicationType
Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing2024-12-13Paper
Mathematical foundations for side-channel analysis of cryptographic systems2024-11-08Paper
From substitution box to threshold2024-10-23Paper
Practical aspects of vertical side-channel analyses on HMAC-SHA-22024-10-23Paper
Improving side-channel attacks by exploiting substitution bpxes properties2024-09-18Paper
Cache-timing attack detection and prevention. Application to crypto libs and PQC2023-10-20Paper
Persistent fault analysis with few encryptions2022-12-16Paper
On the implementation efficiency of linear regression-based side-channel attacks2022-12-16Paper
Processor anchor to increase the robustness against fault injection and cyber attacks2022-12-16Paper
Side-Channel Analysis of Embedded Systems2022-08-11Paper
Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)2022-04-01Paper
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods2021-08-05Paper
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE2020-12-14Paper
Lightweight Ciphers and Their Side-Channel Resilience2020-10-02Paper
Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem2020-08-26Paper
Security Evaluation Against Side-Channel Analysis at Compilation Time2020-06-29Paper
Recovering secrets from prefix-dependent leakage2020-06-24Paper
Confused yet successful: theoretical comparison of distinguishers for monobit leakages in terms of confusion coefficient and SNR2019-10-31Paper
Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level2019-10-14Paper
Cache-timing attacks still threaten IoT devices2019-10-14Paper
Speed-up of SCA attacks on 32-bit multiplications2019-10-14Paper
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis2019-03-29Paper
Predictive aging of reliability of two delay PUFs2018-10-26Paper
Statistical properties of side-channel and fault injection attacks using coding theory2018-05-28Paper
Multivariate high-order attacks of shuffled tables recomputation2018-05-28Paper
Less is more: dimensionality reduction from a theoretical perspective2018-02-14Paper
Multi-variate high-order attacks of shuffled tables recomputation2018-02-14Paper
Correlated extra-reductions defeat blinded regular exponentiation2018-02-14Paper
On the optimality and practicability of mutual information analysis in some scenarios2018-01-29Paper
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks2017-08-08Paper
Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics2017-07-27Paper
Cryptographically Secure Shield for Security IPs Protection2017-06-08Paper
Codes for Side-Channel Attacks and Protections2017-06-01Paper
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions2017-05-16Paper
Higher-Order CIS Codes2017-05-16Paper
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations2017-02-01Paper
Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter2016-05-02Paper
Improving the Big Mac Attack on Elliptic Curve Cryptography2016-05-02Paper
Safe-Errors on SPA Protected Implementations with the Atomicity Technique2016-05-02Paper
Complementary dual codes for counter-measures to side-channel attacks2016-03-11Paper
A Theoretical Study of Kolmogorov-Smirnov Distinguishers2016-03-10Paper
A Key to Success2016-01-12Paper
Complementary Dual Codes for Counter-Measures to Side-Channel Attacks2016-01-07Paper
Analysis and Improvements of the DPA Contest v4 Implementation2015-09-18Paper
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction2015-09-18Paper
Good Is Not Good Enough2015-07-21Paper
Masks Will Fall Off2015-01-06Paper
Leakage squeezing: optimal implementation and security evaluation2014-09-17Paper
Leakage Squeezing of Order Two2014-08-20Paper
Detecting Hidden Leakages2014-07-07Paper
DRECON: DPA Resistant Encryption by Construction2014-06-24Paper
Optimal First-Order Masking with Linear and Non-linear Bijections2012-07-23Paper
A First-Order Leak-Free Masking Countermeasure2012-06-08Paper
Towards Different Flavors of Combined Side Channel Attacks2012-06-08Paper
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks2011-12-16Paper
First Principal Components Analysis: A New Side Channel Distinguisher2011-10-27Paper
Characterization of the Electromagnetic Side Channel in Frequency Domain2011-07-29Paper
Defeating Any Secret Cryptography with SCARE Attacks2010-08-31Paper
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator2010-05-04Paper
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks2010-03-16Paper

Research outcomes over time

This page was built for person: Sylvain Guilley