The following pages link to Sylvain Guilley (Q259279):
Displaying 50 items.
- Complementary dual codes for counter-measures to side-channel attacks (Q259280) (← links)
- On the optimality and practicability of mutual information analysis in some scenarios (Q680928) (← links)
- Leakage squeezing: optimal implementation and security evaluation (Q742019) (← links)
- Less is more: dimensionality reduction from a theoretical perspective (Q1695844) (← links)
- Multi-variate high-order attacks of shuffled tables recomputation (Q1695900) (← links)
- Correlated extra-reductions defeat blinded regular exponentiation (Q1695961) (← links)
- Statistical properties of side-channel and fault injection attacks using coding theory (Q1749798) (← links)
- Multivariate high-order attacks of shuffled tables recomputation (Q1753166) (← links)
- Predictive aging of reliability of two delay PUFs (Q1989632) (← links)
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods (Q2048183) (← links)
- Persistent fault analysis with few encryptions (Q2106677) (← links)
- On the implementation efficiency of linear regression-based side-channel attacks (Q2106690) (← links)
- Processor anchor to increase the robustness against fault injection and cyber attacks (Q2106705) (← links)
- Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) (Q2120987) (← links)
- Recovering secrets from prefix-dependent leakage (Q2191199) (← links)
- Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem (Q2194513) (← links)
- Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level (Q2327168) (← links)
- Cache-timing attacks still threaten IoT devices (Q2327171) (← links)
- Speed-up of SCA attacks on 32-bit multiplications (Q2327172) (← links)
- Confused yet successful: theoretical comparison of distinguishers for monobit leakages in terms of confusion coefficient and SNR (Q2331985) (← links)
- A Theoretical Study of Kolmogorov-Smirnov Distinguishers (Q2794562) (← links)
- Improving the Big Mac Attack on Elliptic Curve Cryptography (Q2803645) (← links)
- Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter (Q2803655) (← links)
- Safe-Errors on SPA Protected Implementations with the Atomicity Technique (Q2803660) (← links)
- Leakage Squeezing of Order Two (Q2876927) (← links)
- A First-Order Leak-Free Masking Countermeasure (Q2890002) (← links)
- Towards Different Flavors of Combined Side Channel Attacks (Q2890011) (← links)
- Optimal First-Order Masking with Linear and Non-linear Bijections (Q2900634) (← links)
- Masks Will Fall Off (Q2936617) (← links)
- Boosting Higher-Order Correlation Attacks by Dimensionality Reduction (Q2946987) (← links)
- Analysis and Improvements of the DPA Contest v4 Implementation (Q2946988) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions (Q2983346) (← links)
- Higher-Order CIS Codes (Q2986146) (← links)
- Cryptographically Secure Shield for Security IPs Protection (Q2989522) (← links)
- Characterization of the Electromagnetic Side Channel in Frequency Domain (Q3019951) (← links)
- First Principal Components Analysis: A New Side Channel Distinguisher (Q3095005) (← links)
- Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks (Q3104720) (← links)
- Security Evaluation Against Side-Channel Analysis at Compilation Time (Q3294874) (← links)
- A Key to Success (Q3460181) (← links)
- Complementary Dual Codes for Counter-Measures to Side-Channel Attacks (Q3460453) (← links)
- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator (Q3558316) (← links)
- Defeating Any Secret Cryptography with SCARE Attacks (Q3584988) (← links)
- CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis (Q4630050) (← links)
- Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks (Q4975068) (← links)
- DRECON: DPA Resistant Encryption by Construction (Q4981782) (← links)
- Side-Channel Analysis of Embedded Systems (Q5095942) (← links)
- Lightweight Ciphers and Their Side-Channel Resilience (Q5126070) (← links)
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE (Q5140193) (← links)
- Detecting Hidden Leakages (Q5168549) (← links)