Security, Privacy, and Applied Cryptography Engineering: Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings
Year of Publication 2013
Get full text
Conference Proceeding
Side-channel analysis and machine learning: A practical perspective
Picek, Stjepan, Heuser, Annelie, Jovic, Alan, Ludwig, Simone A., Guilley, Sylvain, Jakobovic, Domagoj, Mentens, Nele
Published in 2017 International Joint Conference on Neural Networks (IJCNN) (01.05.2017)
Published in 2017 International Joint Conference on Neural Networks (IJCNN) (01.05.2017)
Get full text
Conference Proceeding
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
Clavier, Christophe, Danger, Jean-Luc, Duc, Guillaume, Elaabid, M. Abdelaziz, Gérard, Benoît, Guilley, Sylvain, Heuser, Annelie, Kasper, Michael, Li, Yang, Lomné, Victor, Nakatsu, Daisuke, Ohta, Kazuo, Sakiyama, Kazuo, Sauvage, Laurent, Schindler, Werner, Stöttinger, Marc, Veyrat-Charvillon, Nicolas, Walle, Matthieu, Wurcker, Antoine
Published in Journal of cryptographic engineering (01.11.2014)
Published in Journal of cryptographic engineering (01.11.2014)
Get full text
Journal Article
A Pre-processing Composition for Secret Key Recovery on Android Smartphone
Nakano, Yuto, Souissi, Youssef, Nguyen, Robert, Sauvage, Laurent, Danger, Jean-Luc, Guilley, Sylvain, Kiyomoto, Shinsaku, Miyake, Yutaka
Published in Information Security Theory and Practice. Securing the Internet of Things (2014)
Published in Information Security Theory and Practice. Securing the Internet of Things (2014)
Get full text
Book Chapter
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA
Rauzy, Pablo, Guilley, Sylvain
Published in 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (01.09.2014)
Published in 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (01.09.2014)
Get full text
Conference Proceeding
Security Order of Gate-Level Masking Schemes
Takarabt, Sofiane, Bahrami, Javad, Ebrahimabadi, Mohammad, Guilley, Sylvain, Karimi, Naghmeh
Published in 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (01.05.2023)
Published in 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (01.05.2023)
Get full text
Conference Proceeding
CRYScanner: Finding cryptographic libraries misuse
Choudhari, Amit, Guilley, Sylvain, Karray, Khaled
Published in 2021 8th NAFOSTED Conference on Information and Computer Science (NICS) (21.12.2021)
Published in 2021 8th NAFOSTED Conference on Information and Computer Science (NICS) (21.12.2021)
Get full text
Conference Proceeding
Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy
Beguinot, Julien, Liu, Yi, Rioul, Olivier, Cheng, Wei, Guilley, Sylvain
Published in 2023 IEEE International Symposium on Information Theory (ISIT) (25.06.2023)
Published in 2023 IEEE International Symposium on Information Theory (ISIT) (25.06.2023)
Get full text
Conference Proceeding
Use of Simulators for Side-Channel Analysis
Veshchikov, Nikita, Guilley, Sylvain
Published in 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01.04.2017)
Published in 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (01.04.2017)
Get full text
Conference Proceeding