Development of the Unified Security Requirements of PUFs During the Standardization Process
Bruneau, Nicolas, Danger, Jean-Luc, Facon, Adrien, Guilley, Sylvain, Hamaguchi, Soshi, Hori, Yohei, Kang, Yousung, Schaub, Alexander
Published in Innovative Security Solutions for Information Technology and Communications (2019)
Published in Innovative Security Solutions for Information Technology and Communications (2019)
Get full text
Book Chapter
Optimal side-channel attacks for multivariate leakages and multiple models
Bruneau, Nicolas, Guilley, Sylvain, Heuser, Annelie, Marion, Damien, Rioul, Olivier
Published in Journal of cryptographic engineering (01.11.2017)
Published in Journal of cryptographic engineering (01.11.2017)
Get full text
Journal Article
Best Information is Most Successful
Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida
Published in IACR transactions on cryptographic hardware and embedded systems (01.02.2019)
Published in IACR transactions on cryptographic hardware and embedded systems (01.02.2019)
Get full text
Journal Article
Using modular extension to provably protect Edwards curves against fault attacks
Dugardin, Margaux, Guilley, Sylvain, Moreau, Martin, Najm, Zakaria, Rauzy, Pablo
Published in Journal of cryptographic engineering (01.11.2017)
Published in Journal of cryptographic engineering (01.11.2017)
Get full text
Journal Article
On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability
Hasan Anik, Md Toufiq, Ebrahimabadi, Mohammad, Pirsiavash, Hamed, Danger, Jean-Luc, Guilley, Sylvain, Karimi, Naghmeh
Published in 2020 IEEE 38th International Conference on Computer Design (ICCD) (01.10.2020)
Published in 2020 IEEE 38th International Conference on Computer Design (ICCD) (01.10.2020)
Get full text
Conference Proceeding
WDDL is Protected against Setup Time Violation Attacks
Selmane, N., Bhasin, S., Guilley, S., Graba, T., Danger, J.-L.
Published in 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (01.09.2009)
Published in 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) (01.09.2009)
Get full text
Conference Proceeding
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions
Yeow Meng Chee, Cherif, Zouha, Danger, Jean-Luc, Guilley, Sylvain, Han Mao Kiah, Jon-Lark Kim, Sole, Patrick, Xiande Zhang
Published in IEEE transactions on information theory (01.11.2014)
Published in IEEE transactions on information theory (01.11.2014)
Get full text
Journal Article
Detecting Hidden Leakages
Moradi, Amir, Guilley, Sylvain, Heuser, Annelie
Published in Applied Cryptography and Network Security (2014)
Published in Applied Cryptography and Network Security (2014)
Get full text
Book Chapter
Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics
Guilley, Sylvain, Sauvage, Laurent, Flament, Florent, Vinh-Nga Vong, Hoogvorst, Philippe, Pacalet, Renaud
Published in IEEE transactions on computers (01.09.2010)
Published in IEEE transactions on computers (01.09.2010)
Get full text
Journal Article