Sylvain Guilley

From MaRDI portal
(Redirected from Person:259279)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Constructing optimal linear codes for code-based masking schemes of higher-orders (edit)
Designs, Codes and Cryptography
2026-03-31Paper
Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing2024-12-13Paper
Mathematical foundations for side-channel analysis of cryptographic systems2024-11-08Paper
From substitution box to threshold2024-10-23Paper
Practical aspects of vertical side-channel analyses on HMAC-SHA-22024-10-23Paper
Improving side-channel attacks by exploiting substitution bpxes properties2024-09-18Paper
Cache-timing attack detection and prevention. Application to crypto libs and PQC
Constructive Side-Channel Analysis and Secure Design
2023-10-20Paper
Persistent fault analysis with few encryptions2022-12-16Paper
On the implementation efficiency of linear regression-based side-channel attacks2022-12-16Paper
Processor anchor to increase the robustness against fault injection and cyber attacks2022-12-16Paper
Side-channel analysis of embedded systems. An efficient algorithmic approach2022-08-11Paper
Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \)
Cryptography and Communications
2022-04-01Paper
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
Journal of Mathematical Cryptology
2021-08-05Paper
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
IEEE Transactions on Computers
2020-12-14Paper
Lightweight Ciphers and Their Side-Channel Resilience
IEEE Transactions on Computers
2020-10-02Paper
Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem
Advances in Mathematics of Communications
2020-08-26Paper
Security evaluation against side-channel analysis at compilation time
Algebra, Codes and Cryptology
2020-06-29Paper
Recovering secrets from prefix-dependent leakage
Journal of Mathematical Cryptology
2020-06-24Paper
Confused yet successful: theoretical comparison of distinguishers for monobit leakages in terms of confusion coefficient and SNR2019-10-31Paper
Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level2019-10-14Paper
Cache-timing attacks still threaten IoT devices2019-10-14Paper
Speed-up of SCA attacks on 32-bit multiplications2019-10-14Paper
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis
IEEE Transactions on Computers
2019-03-29Paper
Predictive aging of reliability of two delay PUFs2018-10-26Paper
Statistical properties of side-channel and fault injection attacks using coding theory
Cryptography and Communications
2018-05-28Paper
Multivariate high-order attacks of shuffled tables recomputation
Journal of Cryptology
2018-05-28Paper
Less is more: dimensionality reduction from a theoretical perspective2018-02-14Paper
Multi-variate high-order attacks of shuffled tables recomputation2018-02-14Paper
Correlated extra-reductions defeat blinded regular exponentiation2018-02-14Paper
On the optimality and practicability of mutual information analysis in some scenarios
Cryptography and Communications
2018-01-29Paper
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks
IEEE Transactions on Computers
2017-08-08Paper
Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics
IEEE Transactions on Computers
2017-07-27Paper
Cryptographically Secure Shield for Security IPs Protection
IEEE Transactions on Computers
2017-06-08Paper
Codes for side-channel attacks and protections
Codes, Cryptology and Information Security
2017-06-01Paper
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions
IEEE Transactions on Information Theory
2017-05-16Paper
Higher-Order CIS Codes
IEEE Transactions on Information Theory
2017-05-16Paper
Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Hardware-enforced protection against buffer overflow using masked program counter
The New Codebreakers
2016-05-02Paper
Improving the Big Mac attack on elliptic curve cryptography
The New Codebreakers
2016-05-02Paper
Safe-errors on SPA protected implementations with the atomicity technique
The New Codebreakers
2016-05-02Paper
Complementary dual codes for counter-measures to side-channel attacks
Advances in Mathematics of Communications
2016-03-11Paper
A theoretical study of Kolmogorov-Smirnov distinguishers
Constructive Side-Channel Analysis and Secure Design
2016-03-10Paper
A key to success. Success exponents for side-channel distinguishers
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Complementary dual codes for counter-measures to side-channel attacks
Coding Theory and Applications
2016-01-07Paper
Analysis and improvements of the DPA contest v4 implementation
Security, Privacy, and Applied Cryptography Engineering
2015-09-18Paper
Boosting higher-order correlation attacks by dimensionality reduction
Security, Privacy, and Applied Cryptography Engineering
2015-09-18Paper
Good is not good enough. Deriving optimal distinguishers from communication theory
Advanced Information Systems Engineering
2015-07-21Paper
Masks will fall off. Higher-order optimal distinguishers
Lecture Notes in Computer Science
2015-01-06Paper
Leakage squeezing: optimal implementation and security evaluation
Journal of Mathematical Cryptology
2014-09-17Paper
Leakage squeezing of order two
Lecture Notes in Computer Science
2014-08-20Paper
Detecting hidden leakages
Applied Cryptography and Network Security
2014-07-07Paper
DRECON: DPA resistant encryption by construction
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Optimal First-Order Masking with Linear and Non-linear Bijections
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
A first-order leak-free masking countermeasure
Lecture Notes in Computer Science
2012-06-08Paper
Towards different flavors of combined side channel attacks
Lecture Notes in Computer Science
2012-06-08Paper
Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks
Lecture Notes in Computer Science
2011-12-16Paper
First principal components analysis: a new side channel distinguisher
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Characterization of the electromagnetic side channel in frequency domain
Information Security and Cryptology
2011-07-29Paper
Defeating any secret cryptography with SCARE attacks
Lecture Notes in Computer Science
2010-08-31Paper
Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper


Research outcomes over time


This page was built for person: Sylvain Guilley