Accéder directement au contenu

Sylvain Guilley

340
Documents

Présentation

Sylvain Guilley is [CTO](http://www.secure-ic.com/membre/sylvain-guilley/) at [Secure-IC](https://www.secure-ic.com/), a company offering security for embedded systems. Sylvain is also professor at [TELECOM-ParisTech](https://perso.telecom-paristech.fr/guilley/), associate research at [École Normale Supérieure](https://www.ens-paris.fr/) (ENS), and adjunct professor at the Chinese Academy of Sciences (CAS). His research interests are trusted computing, cyber-physical security, secure prototyping in FPGA and ASIC, and formal / mathematical methods. Since 2012, he organizes the [PROOFS workshop](http://www.proofs-workshop.org/), which brings together researchers whose objective is to increase the trust in the security of embedded systems. Sylvain is also lead editor of international standards, such as [ISO/IEC 20897](https://www.iso.org/standard/76353.html) (Physically Unclonable Functions) and [ISO/IEC 20085](https://www.iso.org/fr/standard/70081.html) (Calibration of non-invasive testing tools). Sylvain has co-authored 250+ research papers and filed 40+ patents. He is member of the [IACR](https://www.iacr.org/cryptodb/data/author.php?authorkey=738), the IEEE and senior member of the [CryptArchi club](https://labh-curien.univ-st-etienne.fr/cryptarchi/members.html). He is alumni from [École Polytechnique](https://jorfsearch.steinertriples.fr/name/Sylvain%20Guilley), TELECOM-ParisTech and Paris 7 (Diderot) University ([HDR](https://tel.archives-ouvertes.fr/tel-00815544)).

Publications

Image document

Be my guesses: The interplay between side-channel leakage metrics

Julien Béguinot , Wei Cheng , Sylvain Guilley , Olivier Rioul
Microprocessors and Microsystems: Embedded Hardware Design , inPress
Article dans une revue hal-04136994v1

On the Resiliency of Protected Masked S-Boxes Against Template Attack in the Presence of Temperature and Aging Misalignments

Md Toufiq Hasan Anik , Jean-Luc Danger , Sylvain Guilley , Naghmeh Karimi
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2024, pp.1-14. ⟨10.1109/TVLSI.2024.3374257⟩
Article dans une revue hal-04518483v1
Image document

(Adversarial) Electromagnetic Disturbance in the Industry

Arthur Beckers , Sylvain Guilley , Philippe Maurine , Colin O'Flynn , Stjepan Picek
IEEE Transactions on Computers, 2023, 72 (2), pp.414-422. ⟨10.1109/TC.2022.3224373⟩
Article dans une revue hal-03874307v1

Construction of Highly Nonlinear 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity

Deng Tang , Claude Carlet , Xiaohu Tang , Zhengchun Zhou
IEEE Transactions on Information Theory, 2023, pp.1-1. ⟨10.1109/TIT.2017.2725918⟩
Article dans une revue hal-03966914v1

Simplicity conditions for binary orthogonal arrays

Claude Carlet , Rebeka Kiss , Gábor Nagy
Designs, Codes and Cryptography, 2023, 91 (1), pp.151-163. ⟨10.1007/s10623-022-01105-4⟩
Article dans une revue hal-03960664v1
Image document

Delfines: Detecting Laser Fault Injection Attacks Via Digital Sensors

Mohammad Ebrahimabadi , Suhee Sanjana Mehjabin , Raphael Viera , Sylvain Guilley , Jean-Luc Danger
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023, pp.1-1. ⟨10.1109/TCAD.2023.3322623⟩
Article dans une revue hal-04260842v1
Image document

Testing and reliability enhancement of security primitives: Methodology and experimental validation

Md Toufiq Hasan Anik , Jean-Luc Danger , Omar Diankha , Mohammad Ebrahimabadi , Christoph Frisch
Microelectronics Reliability, 2023, 147, pp.115055. ⟨10.1016/j.microrel.2023.115055⟩
Article dans une revue hal-04260803v1

A further study of quadratic APN permutations in dimension nine

Christof Beierle , Claude Carlet , Gregor Leander , Léo Perrin
Finite Fields and Their Applications, 2022, 81, pp.102049. ⟨10.1016/j.ffa.2022.102049⟩
Article dans une revue hal-03960915v1

Assessment and Mitigation of Power Side-Channel-Based Cross-PUF Attacks on Arbiter-PUFs and Their Derivatives

Trevor Kroeger , Wei Cheng , Sylvain Guilley , Jean-Luc Danger , Naghmeh Karimi
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2022, 30 (2), pp.187-200. ⟨10.1109/TVLSI.2021.3129141⟩
Article dans une revue hal-04261091v1

A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions

Claude Carlet , Pierrick Meaux
IEEE Transactions on Information Theory, 2022, 68 (5), pp.3404-3425. ⟨10.1109/TIT.2021.3139804⟩
Article dans une revue hal-03965436v1
Image document

Side-Channel Expectation-Maximization Attacks

Julien Béguinot , Wei Cheng , Sylvain Guilley , Olivier Rioul
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (4), pp.774-799. ⟨10.46586/tches.v2022.i4.774-799⟩
Article dans une revue hal-03718805v1

Cross-PUF Attacks: Targeting FPGA Implementation of Arbiter-PUFs

Trevor Kroeger , Wei Cheng , Jean-Luc Danger , Sylvain Guilley , Naghmeh Karimi
Journal of Electronic Testing: : Theory and Applications, 2022, 38 (3), pp.261-277. ⟨10.1007/s10836-022-06012-z⟩
Article dans une revue hal-04261062v1

On Efficient and Secure Code-based Masking: A Pragmatic Evaluation

Qianmei Wu , Wei Cheng , Sylvain Guilley , Fan Zhang , Wei Fu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, pp.192-222. ⟨10.46586/tches.v2022.i3.192-222⟩
Article dans une revue hal-03783747v1

On Two Fundamental Problems on APN Power Functions

Lilya Budaghyan , Marco Calderini , Claude Carlet , Diana Davidova , Nikolay Kaleyski
IEEE Transactions on Information Theory, 2022, 68 (5), pp.3389-3403. ⟨10.1109/TIT.2022.3147060⟩
Article dans une revue hal-03963041v1

A further study of quadratic APN permutations in dimension nine

Christof Beierle , Claude Carlet , Gregor Leander , Léo Perrin
Finite Fields and Their Applications, 2022, 81, pp.102049. ⟨10.1016/j.ffa.2022.102049⟩
Article dans une revue hal-03901618v1
Image document

Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks

Wei Cheng , Sylvain Guilley , Jean-Luc Danger
IEEE Transactions on Information Forensics and Security, inPress, 17, pp.1624-1638. ⟨10.1109/TIFS.2022.3167914⟩
Article dans une revue hal-03633061v1

On those multiplicative subgroups of $${\mathbb F}_{2^n}^*$$ which are Sidon sets and/or sum-free sets

Claude Carlet , Sihem Mesnager
Journal of Algebraic Combinatorics, 2022, 55 (1), pp.43-59. ⟨10.1007/s10801-020-00988-7⟩
Article dans une revue hal-03960675v1
Image document

Toward finding best linear codes for side-channel protections (extended version)

Wei Cheng , Yi Liu , Sylvain Guilley , Olivier Rioul
Journal of Cryptographic Engineering, 2022, ⟨10.1007/s13389-022-00305-x⟩
Article dans une revue hal-04136993v1

A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function

Claude Carlet
IEEE Transactions on Information Theory, 2022, 68 (2), pp.1355-1368. ⟨10.1109/TIT.2021.3126684⟩
Article dans une revue hal-03961483v1

Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$

Wei Cheng , Sylvain Guilley , Jean-Luc Danger
Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2021, ⟨10.1007/s12095-021-00483-1⟩
Article dans une revue hal-03212573v1

Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography

Claude Carlet , Sylvain Guilley , Sihem Mesnager
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, pp.57-87. ⟨10.46586/tches.v2021.i4.57-87⟩
Article dans une revue hal-03966512v1
Image document

Intrinsic Resiliency of S-boxes Against Side-Channel Attacks -Best And Worst Scenarios

Claude Carlet , Eloi de Chérisey , Sylvain Guilley , Selçuk Kavut , Deng Tang
IEEE Transactions on Information Forensics and Security, 2021, 16, pp.203-218. ⟨10.1109/TIFS.2020.3006399⟩
Article dans une revue hal-02915674v1

On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences

Claude Carlet
IEEE Transactions on Information Theory, 2021, 67 (10), pp.6926-6939. ⟨10.1109/TIT.2021.3081139⟩
Article dans une revue hal-03966525v1

Information Leakages in Code-based Masking: A Unified Quantification Approach

Wei Cheng , Sylvain Guilley , Claude Carlet , Jean-Luc Danger , Sihem Mesnager
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, pp.465-495. ⟨10.46586/tches.v2021.i3.465-495⟩
Article dans une revue hal-03299035v1

A direct proof of APN-ness of the Kasami functions

Claude Carlet , Kwang Ho Kim , Sihem Mesnager
Designs, Codes and Cryptography, 2021, 89 (3), pp.441-446. ⟨10.1007/s10623-020-00830-y⟩
Article dans une revue hal-03960643v1

Generalized isotopic shift construction for APN functions

Lilya Budaghyan , Marco Calderini , Claude Carlet , Robert Coulter , Irene Villa
Designs, Codes and Cryptography, 2021, 89 (1), pp.19-32. ⟨10.1007/s10623-020-00803-1⟩
Article dans une revue hal-03965452v1
Image document

Information theoretic distinguishers for timing attacks with partial profiles: Solving the empty bin issue

Eloi de Chérisey , Sylvain Guilley , Olivier Rioul , Darshana Jayasinghe
Journal of Information Security, 2021, Special issue on Cryptography and Encryption, 12 (1), ⟨10.4236/jis.2021.121001⟩
Article dans une revue hal-02950165v1

Relation between o-equivalence and EA-equivalence for Niho bent functions

Diana Davidova , Lilya Budaghyan , Claude Carlet , Tor Helleseth , Ferdinand Ihringer
Finite Fields and Their Applications, 2021, 72, pp.101834. ⟨10.1016/j.ffa.2021.101834⟩
Article dans une revue hal-03965458v1

Detecting faults in inner product masking scheme

Wei Cheng , Claude Carlet , Kouassi Goli , Jean-Luc Danger , Sylvain Guilley
Journal of Cryptographic Engineering, 2021, 11 (2), pp.119-133. ⟨10.1007/s13389-020-00227-6⟩
Article dans une revue hal-03966497v1

Information Leakages in Code-based Masking: A Unified Quantification Approach

Wei Cheng , Sylvain Guilley , Claude Carlet , Jean-Luc Danger , Sihem Mesnager
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, pp.465-495. ⟨10.46586/tches.v2021.i3.465-495⟩
Article dans une revue hal-03966505v1

Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions

Claude Carlet
IEEE Transactions on Information Theory, 2021, 67 (12), pp.8325-8334. ⟨10.1109/TIT.2021.3114958⟩
Article dans une revue hal-03966531v1

Reducing Aging Impacts in Digital Sensors via Run-Time Calibration

Md Toufiq Hasan Anik , Mohammad Ebrahimabadi , Jean-Luc Danger , Sylvain Guilley , Naghmeh Karimi
Journal of Electronic Testing: : Theory and Applications, 2021, 37 (5-6), pp.653-673. ⟨10.1007/s10836-021-05976-8⟩
Article dans une revue hal-04262872v1

Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips

Jean-Luc Danger , Farzad Niknia , Sylvain Guilley , Naghmeh Karimi
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, 41 (5), pp.1276 - 1289. ⟨10.1109/TCAD.2021.3088803⟩
Article dans une revue hal-03366273v1

Optimizing Inner Product Masking Scheme by a Coding Theory Approach

Wei Cheng , Sylvain Guilley , Claude Carlet , Sihem Mesnager , Jean-Luc Danger
IEEE Transactions on Information Forensics and Security, 2021, 16, pp.220-235. ⟨10.1109/TIFS.2020.3009609⟩
Article dans une revue hal-03966523v1

Recovering Secrets From Prefix-Dependent Leakage

Houda Ferradi , Rémi Géraud , Sylvain Guilley , David Naccache , Mehdi Tibouchi
Journal of Mathematical Cryptology, 2020, 14 (1), pp.15-24. ⟨10.1515/jmc-2015-0048⟩
Article dans une revue hal-03933723v1

Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions

Claude Carlet
IEEE Transactions on Information Theory, 2020, 66 (12), pp.7702-7716. ⟨10.1109/TIT.2020.3017494⟩
Article dans une revue hal-03966556v1
Image document

Challenge Codes for Physically Unclonable Functions with Gaussian Delays: A Maximum Entropy Problem

Alexander Schaub , Olivier Rioul , Jean-Luc Danger , Sylvain Guilley , Joseph J. Boutros
Advances in Mathematics of Communications, 2020, Special Issue: Latin American Week on Coding and Information, 14 (3), pp.491-505
Article dans une revue hal-02300795v1

Three parameters of Boolean functions related to their constancy on affine spaces

Claude Carlet , Serge Feukoua
Advances in Mathematics of Communications, 2020, 14 (4), pp.651-676. ⟨10.3934/amc.2020036⟩
Article dans une revue hal-03966542v1

On the Distance Between APN Functions

Lilya Budaghyan , Claude Carlet , Tor Helleseth , Nikolay Kaleyski
IEEE Transactions on Information Theory, 2020, 66 (9), pp.5742-5753. ⟨10.1109/TIT.2020.2983684⟩
Article dans une revue hal-03966552v1
Image document

Optimizing Inner Product Masking Scheme by A Coding Theory Approach

Wei Cheng , Sylvain Guilley , Claude Carlet , Sihem Mesnager , Jean-Luc Danger
IEEE Transactions on Information Forensics and Security, 2020, 16, pp.220-235. ⟨10.1109/TIFS.2020.3009609⟩
Article dans une revue hal-02919657v1
Image document

On the power of template attacks in highly multivariate context

Maamar Ouladj , Nadia El Mrabet , Sylvain Guilley , Philippe Guillot , Gilles Millérioux
Journal of Cryptographic Engineering, 2020, 10 (4), pp.337-354. ⟨10.1007/s13389-020-00239-2⟩
Article dans une revue hal-02935162v1
Image document

Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme

Maamar Ouladj , Sylvain Guilley , Philippe Guillot , Farid Mokrane
Journal of Cryptographic Engineering, 2020
Article dans une revue hal-03059619v1

Constructing APN Functions Through Isotopic Shifts

Lilya Budaghyan , Marco Calderini , Claude Carlet , Robert Coulter , Irene Villa
IEEE Transactions on Information Theory, 2020, 66 (8), pp.5299-5309. ⟨10.1109/TIT.2020.2974471⟩
Article dans une revue hal-03966547v1

Detecting Failures and Attacks via Digital Sensors

Md Toufiq Hasan Anik , Jean-Luc Danger , Sylvain Guilley , Naghmeh Karimi
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, pp.1-1. ⟨10.1109/TCAD.2020.3020921⟩
Article dans une revue hal-03138855v1

Handling Vectorial Functions by Means of Their Graph Indicators

Claude Carlet
IEEE Transactions on Information Theory, 2020, 66 (10), pp.6324-6339. ⟨10.1109/TIT.2020.2981524⟩
Article dans une revue hal-03966553v1
Image document

Detecting Faults in Inner Product Masking Scheme IPM-FD: IPM with Fault Detection

Wei Cheng , Claude Carlet , Kouassi Goli , Jean-Luc Danger , Sylvain Guilley
Journal of Cryptographic Engineering, 2020, ⟨10.1007/s13389-020-00227-6⟩
Article dans une revue hal-02915673v1

On $\sigma$ -LCD Codes

Claude Carlet , Sihem Mesnager , Chunming Tang , Yanfeng Qi
IEEE Transactions on Information Theory, 2019, 65 (3), pp.1694-1704. ⟨10.1109/TIT.2018.2873130⟩
Article dans une revue hal-03959011v1

Constructing infinite families of low differential uniformity (n, m)-functions with $$m>n/2$$ m > n / 2

Claude Carlet , Xi Chen , Longjiang Qu
Designs, Codes and Cryptography, 2019, 87 (7), pp.1577-1599. ⟨10.1007/s10623-018-0553-7⟩
Article dans une revue hal-03966896v1
Image document

CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis

Debapriya Basu Roy , Shivam Bhasin , Sylvain Guilley , Annelie Heuser , Sikhar Patranabis
IEEE Transactions on Computers, 2019, 68 (3), pp.347-361. ⟨10.1109/TC.2018.2875746⟩
Article dans une revue hal-02413209v1
Image document

Best information is most successful: Mutual information and success rate in side-channel analysis

Eloi de Chérisey , Sylvain Guilley , Olivier Rioul , Pablo Piantanida
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (2), pp.49-79. ⟨10.13154/tches.v2019.i2.49-79⟩
Article dans une revue hal-02287971v1

On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures

Claude Carlet
Designs, Codes and Cryptography, 2019, 87 (2-3), pp.203-224. ⟨10.1007/s10623-018-0512-3⟩
Article dans une revue hal-03966895v1

Polynomial direct sum masking to protect against both SCA and FIA

Claude Carlet , Abderrahman Daif , Sylvain Guilley , Cédric Tavernier
Journal of Cryptographic Engineering, 2019, 9 (3), pp.303-312. ⟨10.1007/s13389-018-0194-9⟩
Article dans une revue hal-03966897v1

On the Derivative Imbalance and Ambiguity of Functions

Shihui Fu , Xiutao Feng , Qiang Wang , Claude Carlet
IEEE Transactions on Information Theory, 2019, 65 (9), pp.5833-5845. ⟨10.1109/TIT.2019.2912196⟩
Article dans une revue hal-03966899v1
Image document

Exhaustive single bit fault analysis. A use case against Mbedtls and OpenSSL’s protection on ARM and Intel CPU

Sébastien Carré , Matthieu Desjardins , Adrien Facon , Sylvain Guilley
Microprocessors and Microsystems: Embedded Hardware Design , 2019, 71, pp.102860 -. ⟨10.1016/j.micpro.2019.102860⟩
Article dans une revue hal-03487204v1

Linear codes with small hulls in semi-primitive case

Sihem Mesnager , Claude Carlet , Chengju Li
Designs, Codes and Cryptography, 2019, 87 (12), pp.3063-3075. ⟨10.1007/s10623-019-00663-4⟩
Article dans une revue hal-03023235v1

On the nonlinearity of monotone Boolean functions

Claude Carlet
Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2018, 10 (6), pp.1051-1061. ⟨10.1007/s12095-017-0262-5⟩
Article dans une revue hal-03966903v1

Impact of Aging on the Reliability of Delay PUFs

Naghmeh Karimi , Jean-Luc Danger , Sylvain Guilley
Journal of Electronic Testing: : Theory and Applications, 2018, 34 (5), pp.571-586. ⟨10.1007/s10836-018-5745-6⟩
Article dans une revue hal-02287976v1

On Linear Complementary Pairs of Codes

Claude Carlet , Cem Guneri , Ferruh Ozbudak , Buket Ozkaya , Patrick Sole
IEEE Transactions on Information Theory, 2018, 64 (10), pp.6583-6589. ⟨10.1109/TIT.2018.2796125⟩
Article dans une revue hal-03966910v1

Constructing Low-Weight $d$ th-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform

Claude Carlet , Xi Chen
IEEE Transactions on Information Theory, 2018, 64 (4), pp.2969-2978. ⟨10.1109/TIT.2017.2785775⟩
Article dans une revue hal-03966906v1

A new concatenated type construction for LCD codes and isometry codes

Claude Carlet , Cem Güneri , Ferruh Özbudak , Patrick Solé
Discrete Mathematics, 2018, 341 (3), pp.830-835. ⟨10.1016/j.disc.2017.12.004⟩
Article dans une revue hal-03966904v1

On the Performance and Security of Multiplication in GF(2N)

Jean-Luc Danger , Youssef El Housni , Adrien Facon , Cheikh T. Gueye , Sylvain Guilley
Article dans une revue hal-02288010v1

On Linear Complementary Pairs of Codes

Claude Carlet , Cem Guneri , Ferruh Ozbudak , Buket Ozkaya , Patrick Sole
IEEE Transactions on Information Theory, 2018, 64 (10), pp.6583-6589. ⟨10.1109/TIT.2018.2796125⟩
Article dans une revue hal-04089281v1

The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA

Debapriya Basu Roy , Shivam Bhasin , Jean-Luc Danger , Sylvain Guilley , Wei He
Journal of Hardware and Systems Security, 2018, ⟨10.1007/s41635-018-0035-4⟩
Article dans une revue hal-02288011v1

On Linear Complementary Pairs of Codes

Claude Carlet , Cem Guneri , Ferruh Ozbudak , Buket Ozkaya , Patrick Sole
IEEE Transactions on Information Theory, 2018, 64 (10), pp.6583-6589. ⟨10.1109/TIT.2018.2796125⟩
Article dans une revue hal-04089276v1
Image document

On the optimality and practicability of mutual information analysis in some scenarios

Èloi de Chèrisey , Sylvain Guilley , Annelie Heuser , Olivier Rioul
Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2018, 10 (1), pp.101-121. ⟨10.1007/s12095-017-0241-x⟩
Article dans une revue hal-03750327v1

On Upper Bounds for Algebraic Degrees of APN Functions

Lilya Budaghyan , Claude Carlet , Tor Helleseth , Nian Li , Bo Sun
IEEE Transactions on Information Theory, 2018, 64 (6), pp.4399-4411. ⟨10.1109/TIT.2017.2757938⟩
Article dans une revue hal-03966907v1

Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform

Claude Carlet
IEEE Transactions on Information Theory, 2018, 64 (9), pp.6443-6453. ⟨10.1109/TIT.2017.2761392⟩
Article dans une revue hal-03966909v1

Euclidean and Hermitian LCD MDS codes

Claude Carlet , Sihem Mesnager , Chunming Tang , Yanfeng Qi
Designs, Codes and Cryptography, 2018, 86 (11), pp.2605-2618. ⟨10.1007/s10623-018-0463-8⟩
Article dans une revue hal-03958951v1

A new concatenated type construction for LCD codes and isometry codes

Claude Carlet , Cem Güneri , Ferruh Özbudak , Patrick Solé
Discrete Mathematics, 2018, 341 (3), pp.830-835. ⟨10.1016/j.disc.2017.12.004⟩
Article dans une revue hal-04089340v1

Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets

Claude Carlet
Finite Fields and Their Applications, 2018, 53, pp.226-253. ⟨10.1016/j.ffa.2018.06.007⟩
Article dans une revue hal-03966905v1

Linear Codes Over $\mathbb F_q$ Are Equivalent to LCD Codes for $q>3$

Claude Carlet , Sihem Mesnager , Chunming Tang , Yanfeng Qi , Ruud Pellikaan
IEEE Transactions on Information Theory, 2018, 64 (4), pp.3010-3017. ⟨10.1109/TIT.2018.2789347⟩
Article dans une revue hal-03958960v1

Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions

Yuwei Xu , Claude Carlet , Sihem Mesnager , Chuankun Wu
IEEE Transactions on Information Theory, 2018, 64 (1), pp.367-383. ⟨10.1109/TIT.2017.2750663⟩
Article dans une revue hal-03958972v1

Binary linear codes from vectorial boolean functions and their weight distribution

Deng Tang , Claude Carlet , Zhengchun Zhou
Discrete Mathematics, 2017, 340 (12), pp.3055-3072. ⟨10.1016/j.disc.2017.07.008⟩
Article dans une revue hal-03966913v1

Using modular extension to provably protect Edwards curves against fault attacks

Margaux Dugardin , Sylvain Guilley , Martin Moreau , Zakaria Najm , Pablo Rauzy
Journal of Cryptographic Engineering, 2017, vol. 7, nb. 4
Article dans une revue hal-03236725v1
Image document

Stochastic Collision Attack

Nicolas Bruneau , Claude Carlet , Sylvain Guilley , Annelie Heuser , Emmanuel Prouff
IEEE Transactions on Information Forensics and Security, 2017, 12 (9), pp.2090 - 2104. ⟨10.1109/TIFS.2017.2697401⟩
Article dans une revue hal-01629880v1

Three basic questions on Boolean functions

Claude Carlet , Serge Feukoua
Advances in Mathematics of Communications, 2017, 11 (4), pp.837-855. ⟨10.3934/amc.2017061⟩
Article dans une revue hal-03966912v1
Image document

Cryptographically Secure Shield for Security IPs Protection

Xuan-Thuy Ngo , Jean-Luc Danger , Sylvain Guilley , Tarik Graba , Yves Mathieu
IEEE Transactions on Computers, 2017, 66 (2), ⟨10.1109/TC.2016.2584041⟩
Article dans une revue hal-02287686v1

Template attack versus Bayes classifier

Stjepan Picek , Annelie Heuser , Sylvain Guilley
Journal of Cryptographic Engineering, 2017, 7 (4), pp.343-351. ⟨10.1007/s13389-017-0172-7⟩
Article dans une revue hal-01629884v1
Image document

Optimal side-channel attacks for multivariate leakages and multiple models

Nicolas Bruneau , Sylvain Guilley , Annelie Heuser , Marion Damien , Olivier Rioul
Journal of Cryptographic Engineering, 2017, 7 (4), pp.331-341. ⟨10.1007/s13389-017-0170-9⟩
Article dans une revue hal-01629885v1

Lightweight Ciphers and their Side-channel Resilience

Annelie Heuser , Stjepan Picek , Sylvain Guilley , Nele Mentens
IEEE Transactions on Computers, 2017, pp.1-16. ⟨10.1109/TC.2017.2757921⟩
Article dans une revue hal-01629886v1

Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter

Jean-Luc Danger , Sylvain Guilley , Thibault Porteboeuf , Florian Praden , Michaël Timbert
LNCS: the new codebreakers, 2016, 9100, pp.439-454. ⟨10.1007/978-3-662-49301-4_27⟩
Article dans une revue hal-02287333v1

Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis

Xuan-Thuy Ngo , Zakaria Najm , Shivam Bhasin , Sylvain Guilley , Jean-Luc Danger
Article dans une revue hal-02287501v1

Improving the Big Mac Attack on Elliptic Curve Cryptography

Jean-Luc Danger , Sylvain Guilley , Ph. Hoogvorst , Cédric Murdica , D. Naccache
LNCS : The new codebreakers, 2016, 9100, pp.374-386. ⟨10.1007/978-3-662-49301-4_23⟩
Article dans une revue hal-02287332v1
Image document

Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic

Pablo Rauzy , Sylvain Guilley , Zakaria Najm
Journal of Cryptographic Engineering, 2015, pp._. ⟨10.1007/s13389-015-0105-2⟩
Article dans une revue hal-01164591v1

Exploiting FPGA Block Memories for Protected Cryptographic Implementations

Shivam Bhasin , Jean-Luc Danger , Sylvain Guilley , Wei He
Article dans une revue hal-02287502v1

Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions

Yeow Meng Chee , Zouha Cherif , Jean-Luc Danger , Sylvain Guilley , Han Mao Kiah
IEEE Transactions on Information Theory, 2014, ⟨10.1109/TIT.2014.2359207⟩
Article dans une revue hal-02286947v1

Practical Improvements of Side-Channel Attacks on AES: Feedback from the 2nd DPA Contest

Christophe Clavier , Guillaume Duc , Jean-Luc Danger , Moulay Aziz Elaabid , Benoît Gérard
Journal of Cryptographic Engineering, 2014, 4 (4), pp.259-274. ⟨10.1007/s13389-014-0075-9⟩
Article dans une revue hal-02286726v1

Higher-order CIS codes

Claude Carlet , Finley Freibert , Sylvain Guilley , Michael Kiermaier , Jon-Lark Kim
IEEE Transactions on Information Theory, 2014, 60 (9), pp.5283-5295. ⟨10.1109/TIT.2014.2332468⟩
Article dans une revue hal-02286948v1

Leakage squeezing: Optimal implementation and security evaluation

Claude Carlet , Jean-Luc Danger , Sylvain Guilley , Houssem Maghrebi
Journal of Mathematical Cryptology, 2014, ⟨10.1515/jmc-2012-001⟩
Article dans une revue hal-02287061v1

Achieving side-channel high-order correlation immunity with leakage squeezing

Houssem Maghrebi , Claude Carlet , Jean-Luc Danger , Sylvain Guilley , Emmanuel Prouff
Article dans une revue hal-02286851v1
Image document

A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA

Pablo Rauzy , Sylvain Guilley
Journal of Cryptographic Engineering, 2013, pp.1-13. ⟨10.1007/s13389-013-0065-3⟩
Article dans une revue hal-00863914v2

Advanced Analysis of Faults Injected Through Conducted Intentional ElectroMagnetic Interferences

Laurent Sauvage , Jean-Luc Danger , Sylvain Guilley , Naofumi Homma , Yu-Ichi Hayashi
Transactions on Electromagnetic Compatibility, 2013
Article dans une revue hal-02286327v1

From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications

Sylvain Guilley , Shivam Bhasin , Annelie Heuser , Jean-Luc Danger
Article dans une revue hal-02286503v1

A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards

Jean-Luc Danger , Sylvain Guilley , Philippe Hoogvorst , Cédric Murdica , David Naccache
Journal of Cryptographic Engineering, 2013, 3 (4), pp.241-265. ⟨10.1007/s13389-013-0062-6⟩
Article dans une revue hal-00934333v1

Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions

Shivam Bhasin , Claude Carlet , Sylvain Guilley
IACR eprint archive, 2013
Article dans une revue hal-02286840v1
Image document

Portability of templates

M. Abdelaziz Elaabid , Sylvain Guilley
Journal of Cryptographic Engineering, 2012, 2 (1), pp.63-74. ⟨10.1007/s13389-012-0030-6⟩
Article dans une revue hal-03998169v1

A New Class of Codes for Boolean Masking of Cryptographic Computations

Claude Carlet , Philippe Gaborit , Jon-Lark Kim , Patrick Sole
IEEE Transactions on Information Theory, 2012, 58 (9), pp.6000-6011. ⟨10.1109/TIT.2012.2200651⟩
Article dans une revue hal-00913659v1

Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks

N. Selmane , Shivam Bhasin , Sylvain Guilley , Jean-Luc Danger
Information Security, IET, 2011, 5 (4), pp.181-190. ⟨10.1049/iet-ifs.2010.0238⟩
Article dans une revue hal-02286262v1
Image document

Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics

Sylvain Guilley , Laurent Sauvage , Florent Flament , Vinh-Nga Vong , Philippe Hoogvorst
IEEE Transactions on Computers, 2010, 59 (9), pp.1250-1263. ⟨10.1109/TC.2010.104⟩
Article dans une revue hal-02893100v1
Image document

Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks

Sylvain Guilley , Laurent Sauvage , Philippe Hoogvorst , Renaud Pacalet , Guido Marco Bertoni
IEEE Transactions on Computers, 2008, 57 (11), pp.1482-1497. ⟨10.1109/TC.2008.109⟩
Article dans une revue hal-02893103v1

Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors

Sylvain Guilley , Florent Flament , Philippe Hoogvorst , Renaud Pacalet , Yves Mathieu
IEEE Design & Test of Computers, 2007, 24 (6), pp.546-555. ⟨10.1109/MDT.2007.202⟩
Article dans une revue hal-02893104v1

A fast pipelined multi-mode DES architecture operating in IP representation

Sylvain Guilley , Philippe Hoogvorst , Renaud Pacalet
Systems Integration, 2007, 40 (4), pp.479-489. ⟨10.1016/j.vlsi.2006.06.004⟩
Article dans une revue hal-02893105v1

Construction of bent functions via Niho power functions

Philippe Gaborit , Hans Dobbertin , Gregor Leander , Anne Canteaut , Claude Carlet
Journal of Combinatorial Theory, Series A, 2006, 113, pp.779-798 (5)
Article dans une revue hal-00110513v1

Hyper-bent functions and cyclic codes

Philippe Gaborit , Claude Carlet
Journal of Combinatorial Theory, Series A, 2006, 113, pp.466-482, n°3
Article dans une revue hal-00077699v1
Image document

SoC security: a war against side-channels

Sylvain Guilley , Renaud Pacalet
Annals of Telecommunications - annales des télécommunications, 2004
Article dans une revue hal-02893115v1

A generic information-theoretic framework for evaluating the side-channel security of masked implementations

Olivier Rioul , Julien Béguinot , Yi Liu , Wei Cheng , Sylvain Guilley
19th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2023), Jun 2023, Cantabria, Spain
Communication dans un congrès hal-04136986v1
Image document

Maximal leakage of masked implementations using Mrs. Gerber's lemma for min-entropy

Julien Béguinot , Yi Liu , Olivier Rioul , Wei Cheng , Sylvain Guilley
IEEE International Symposium on Information Theory (ISIT 2023), IEEE, Jun 2023, Taipei, Taiwan
Communication dans un congrès hal-04136987v1

Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks

Javad Bahrami , Jean-Luc Danger , Mohammad Ebrahimabadi , Sylvain Guilley , Naghmeh Karimi
2023 International Conference on IC Design and Technology (ICICDT), Sep 2023, Tokyo, Japan. pp.10-15, ⟨10.1109/ICICDT59917.2023.10332319⟩
Communication dans un congrès hal-04518482v1
Image document

All you ever wanted to know about side-channel attacks and protections

Sylvain Guilley , Olivier Rioul
15e Forum International de la Cybersécurité (FIC 2023), Apr 2023, Lille, France
Communication dans un congrès hal-04136983v1

All you ever wanted to know about side-channel attacks and protections (and a forthcoming book)

Wei Cheng , Sylvain Guilley , Olivier Rioul
4th Free Silicon Conference (FSiC 2023), Jul 2023, Paris, France
Communication dans un congrès hal-04153811v1
Image document

Improved alpha-information bounds for higher-order masked cryptographic implementations

Yi Liu , Julien Béguinot , Wei Cheng , Sylvain Guilley , Loïc Masure
IEEE Information Theory Workshop (ITW 2023), IEEE, Apr 2023, Saint Malo, France
Communication dans un congrès hal-04136985v1
Image document

Reliability of ring oscillator PUFs with reduced helper data

Julien Béguinot , Wei Cheng , Jean-Luc Danger , Sylvain Guilley , Olivier Rioul
18th International Workshop on Security (IWSEC 2023), Aug 2023, Yokohama, Japan
Communication dans un congrès hal-04136988v1
Image document

Special Session: Security Verification & Testing for SR-Latch TRNGs

Javad Bahrami , Mohammad Ebrahimabadi , Jean-Luc Danger , Sylvain Guilley , Naghmeh Karimi
2023 IEEE 41st VLSI Test Symposium (VTS), Apr 2023, San Diego, United States. pp.1-10, ⟨10.1109/VTS56346.2023.10140057⟩
Communication dans un congrès hal-04260342v1
Image document

Aging-Induced Failure Prognosis via Digital Sensors

Md Toufiq Hasan Anik , Hasin Ishraq Reefat , Jean-Luc Danger , Sylvain Guilley , Naghmeh Karimi
GLSVLSI '23: Great Lakes Symposium on VLSI 2023, Jun 2023, Knoxville TN USA, United States. pp.703-708, ⟨10.1145/3583781.3590204⟩
Communication dans un congrès hal-04260871v1
Image document

Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings

Julien Béguinot , Wei Cheng , Sylvain Guilley , Yi Liu , Loïc Masure
14th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2023), Apr 2023, Munich, Germany. pp.86-104, ⟨10.1007/978-3-031-29497-6_5⟩
Communication dans un congrès hal-04136982v1
Image document

Be my guess: Guessing entropy vs. success rate for evaluating side-channel attacks of secure chips

Julien Béguinot , Wei Cheng , Sylvain Guilley , Olivier Rioul
25th Euromicro Conference on Digital System Design (DSD 2022), Aug 2022, Maspalomas, Gran Canaria, Spain
Communication dans un congrès hal-03718723v1
Image document

Attacking masked cryptographic implementations: Information-theoretic bounds

Wei Cheng , Yi Liu , Sylvain Guilley , Olivier Rioul
2022 IEEE International Symposium on Information Theory (ISIT 2022), Jun 2022, Espoo, Finland
Communication dans un congrès hal-03718713v1
Image document

SpecDefender: Transient Execution Attack Defender using Performance Counters

Amit Choudhari , Sylvain Guilley , Khaled Karray
Sixth Workshop on Attacks and Solutions in Hardware Security ( ASHES 2022 ), Nov 2022, Los Angeles, United States
Communication dans un congrès hal-03812717v2
Image document

Side-channel information leakage of code-based masked implementations

Wei Cheng , Olivier Rioul , Yi Liu , Julien Béguinot , Sylvain Guilley
17th Canadian Workshop on Information Theory (CWIT 2022), Jun 2022, Ottawa, Canada. ⟨10.1109/CWIT55308.2022.9817673⟩
Communication dans un congrès hal-03718708v1
Image document

An Embedded AI-Based Smart Intrusion Detection System for Edge-to-Cloud Systems

Ritu-Ranjan Shrivastwa , Zakaria Bouakka , Thomas Perianin , Fabrice Dislaire , Tristan Gaudron
Book cover Book cover International Conference on Cryptography, Codes and Cyber Security, Oct 2022, Casablanca, Morocco. pp.20-39, ⟨10.1007/978-3-031-23201-5_2⟩
Communication dans un congrès hal-03950150v1

Leakage Power Analysis in Different S-Box Masking Protection Schemes

Javad Bahrami , Mohammad Ebrahimabadi , Jean-Luc Danger , Sylvain Guilley , Naghmeh Karimi
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2022, Antwerp, Belgium. pp.1263-1268, ⟨10.23919/DATE54114.2022.9774763⟩
Communication dans un congrès hal-04261083v1
Image document

Identity-Based Encryption from the Tate Pairing on Genus Two Curves

Mohammed Zitouni , Sylvain Guilley , Farid Mokrane
11th International Workshop on Security Proofs for Embedded Systems (PROOFS 2022), Sep 2022, Leuven, Belgium
Communication dans un congrès hal-03780656v1

Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors

Mohammad Ebrahimabadi , Suhee Sanjana Mehjabin , Raphael Viera , Sylvain Guilley , Jean-Luc Danger
2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Jun 2022, McLean, United States. pp.97-100, ⟨10.1109/HOST54066.2022.9840318⟩
Communication dans un congrès hal-04261050v1

Evaluation of side-channel attacks using alpha-information

Yi Liu , Wei Cheng , Sylvain Guilley , Olivier Rioul
18th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2022), May 2022, Porquerolles, France
Communication dans un congrès hal-03718701v1

Unprofiled expectation-maximization attack

Julien Béguinot , Wei Cheng , Sylvain Guilley , Olivier Rioul
18th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2022), May 2022, Porquerolles, France
Communication dans un congrès hal-03718705v1

On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis

Javad Bahrami , Mohammad Ebrahimabadi , Sofiane Takarabt , Jean-Luc Danger , Sylvain Guilley
19th International Conference on Security and Cryptography, Jul 2022, Lisbon, Portugal. pp.661-668, ⟨10.5220/0011307600003283⟩
Communication dans un congrès hal-04261109v1
Image document

Cache-Timing Attack on the SEAL Homomorphic Encryption Library

Wei Cheng , Jean-Luc Danger , Sylvain Guilley , Fan Huang , Amina Bel Korchi
11th International Workshop on Security Proofs for Embedded Systems (PROOFS 2022), Sep 2022, Leuven, Belgium
Communication dans un congrès hal-03780506v1
Image document

Linear Programming Bounds on the Kissing Number of q-ary Codes

Patrick Solé , Yi Liu , Wei Cheng , Sylvain Guilley , Olivier Rioul
2021 IEEE Information Theory Workshop (ITW2021), Oct 2021, Kanazawa, Japan
Communication dans un congrès hal-03323516v1
Image document

Bent Sequences over Hadamard Codes for Physically Unclonable Functions

Patrick Solé , Wei Cheng , Sylvain Guilley , Olivier Rioul
2021 IEEE International Symposium on Information Theory (ISIT 2021), Jul 2021, Melbourne, Australia
Communication dans un congrès hal-03240109v1

Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks

Jean-Luc Danger , Trevor Kroeger , Wei Cheng , Sylvain Guilley , Nazhmeh Karimi
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), Feb 2021, Grenoble, France. pp.1000-1005, ⟨10.23919/DATE51398.2021.9474137⟩
Communication dans un congrès hal-03433804v1
Image document

Towards Finding Best Linear Codes for Side-Channel Protections

Wei Cheng , Yi Liu , Sylvain Guilley , Olivier Rioul
10th International Workshop on Security Proofs for Embedded Systems (PROOFS'2021), Sep 2021, Beijing, China
Communication dans un congrès hal-03328130v1
Image document

On Conditional alpha-Information and its Application to Side-Channel Analysis

Yi Liu , Wei Cheng , Sylvain Guilley , Olivier Rioul
2021 IEEE Information Theory Workshop (ITW2021), Oct 2021, Kanazawa, Japan
Communication dans un congrès hal-03323522v1
Image document

Highly Reliable PUFs for Embedded Systems, Protected Against Tampering

Jean-Luc Danger , Sylvain Guilley , Michael Pehl , Sophiane Senni , Youssef Souissi
INISCOM 2021 : International Conference on Industrial Networks and Intelligent Systems, Apr 2021, Hanoi (Vietnam), Vietnam. pp.167-184, ⟨10.1007/978-3-030-77424-0_14⟩
Communication dans un congrès hal-03783308v1
Image document

Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level

Quentin Forcioli , Jean-Luc Danger , Clémentine Maurice , Lilian Bossuet , Florent Bruguier
EuroS&PW 2021 - IEEE European Symposium on Security and Privacy Workshops, Sep 2021, Vienne, Austria. pp.96-102, ⟨10.1109/EuroSPW54576.2021.00017⟩
Communication dans un congrès hal-03353878v1

Testing and Reliability Enhancement of Security Primitives

Jean-Luc Danger , Toufiq Hasan Anik , Omar Diankha , Mohammad Ebrahimabadi , Christoph Frisch
2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Oct 2021, Athens, Greece. pp.1-8, ⟨10.1109/DFT52944.2021.9568297⟩
Communication dans un congrès hal-03433853v1
Image document

Formal Evaluation and Construction of Glitch-resistant Masked Functions

Sofiane Takarabt , Sylvain Guilley , Youssef Souissi , Khaled Karray , Laurent Sauvage
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2021, Dec 2021, Virtual, United States
Communication dans un congrès hal-03365025v1
Image document

Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret

Olivier Rioul , Wei Cheng , Sylvain Guilley
2021 IEEE International Symposium on Information Theory (ISIT'21), Jul 2021, Melbourne (virtual), Australia
Communication dans un congrès hal-03323533v1
Image document

Implementing Secure Applications thanks to an Integrated Secure Element

Sylvain Guilley , Michel Le Rolland , Damien Quenson
7th International Conference on Information Systems Security and Privacy, INSTICC, Feb 2021, Vienne (en ligne), Austria. pp.566-571, ⟨10.5220/0010298205660571⟩
Communication dans un congrès hal-03084250v3

Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations

Jean-Luc Danger , Wei Cheng , Sylvain Guilley , Naghmeh Karimi , Trevor Kroeger
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2020, Grenoble, France. pp.454-459, ⟨10.23919/DATE48585.2020.9116428⟩
Communication dans un congrès hal-02946697v1

Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks

Jean-Luc Danger , Adrien Facon , Sylvain Guilley , Karine Heydemann , Ulrich Kühne
Constructive Side-Channel Analysis and Secure Design. COSADE 2020, Apr 2020, Lugano, Switzerland. pp.254-274, ⟨10.1007/978-3-030-68773-1_12⟩
Communication dans un congrès hal-03138848v1

Failure and Attack Detection by Digital Sensors

Md Toufiq Hasan Anik , Rachit Saini , Jean-Luc Danger , Sylvain Guilley , Naghmeh Karimi
2020 IEEE European Test Symposium (ETS), May 2020, Tallinn, Estonia. pp.1-2, ⟨10.1109/ETS48528.2020.9131580⟩
Communication dans un congrès hal-03034851v1
Image document

Persistent Fault Analysis With Few Encryptions

Sébastien Carré , Sylvain Guilley , Olivier Rioul
International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2020), Oct 2020, Lugano, Switzerland
Communication dans un congrès hal-02950171v1

Using Digital Sensors to Leverage Chips' Security

Mohammad Ebrahimabadi , Md Toufiq Hasan Anik , Jean-Luc Danger , Sylvain Guilley , Naghmeh Karimi
2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), Dec 2020, Washington, United States. pp.1-6, ⟨10.1109/PAINE49178.2020.9337730⟩
Communication dans un congrès hal-03138811v1

On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability

Md Toufiq Hasan Anik , Mohammad Ebrahimabadi , Hamed Pirsiavash , Jean-Luc Danger , Sylvain Guilley
2020 IEEE 38th International Conference on Computer Design (ICCD), Oct 2020, Hartford, United States. pp.506-509, ⟨10.1109/ICCD50377.2020.00091⟩
Communication dans un congrès hal-03138833v1
Image document

On the Effect of Aging on Digital Sensors

Md Toufiq Hasan Anik , Sylvain Guilley , Jean-Luc Danger , Naghmeh Karimi
2020 33rd International Conference on VLSI Design and 2020 19th International Conference on Embedded Systems (VLSID), Jan 2020, Bangalore, India. pp.189-194, ⟨10.1109/VLSID49098.2020.00050⟩
Communication dans un congrès hal-03034857v1

Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel

Trevor Kroeger , Wei Cheng , Sylvain Guilley , Jean-Luc Danger , Naghmeh Karimi
2020 IEEE International Test Conference (ITC), Nov 2020, Washington, United States. pp.1-5, ⟨10.1109/ITC44778.2020.9325241⟩
Communication dans un congrès hal-03138824v1
Image document

PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community

Amir Ali Pour , Vincent Beroulle , Bertrand Cambou , Jean-Luc Danger , Giorgio Di Natale
IEEE European Test Symposium (ETS 2020), May 2020, Tallinn, Estonia. pp.1-10
Communication dans un congrès hal-02999226v1

Detection of Side-channel Lleakage Through Glitches Using an Automated Tool

Laurent Sauvage , Sofiane Takarabt , Youssef Souissi , Sylvain Guilley , Yves Mathieu
International Conference on Defense Systems: Architectures and Technologies (DAT’2020), Apr 2020, Constantine, Algeria
Communication dans un congrès hal-02951758v1
Image document

The Big Picture of Delay-PUF Dependability

Alexander Schaub , Jean-Luc Danger , Olivier Rioul , Sylvain Guilley
24th European Conference on Circuit Theory and Design (ECCTD), IEEE, Sep 2020, Sofia, Bulgaria
Communication dans un congrès hal-02932063v1

Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection

Wei Cheng , Claude Carlet , Kouassi Goli , Jean-Luc Danger , Sylvain Guilley
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, Aug 2019, atlanta, United States. pp.17, ⟨10.29007/fv2n⟩
Communication dans un congrès hal-03037597v1

Classification of Lightweight Block Ciphers for Specific Processor Accelerated Implementations

Etienne Tehrani , Tarik Graba , Abdelmalek Si Merabet , Sylvain Guilley , Jean-Luc Danger
2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS), Nov 2019, Genoa, Italy. pp.747-750, ⟨10.1109/ICECS46596.2019.8965156⟩
Communication dans un congrès hal-02517585v1

Speed-up of SCA Attacks on 32-bit Multiplications

Robert Nguyen , Adrien Facon , Sylvain Guilley , Guillaume Gautier , Safwan El Assad
International Conference on Codes, Cryptology And Information Security, Apr 2019, Rabat, Morocco. pp.31-39
Communication dans un congrès hal-02184594v1

Hardware Implementation of Lightweight Chaos-Based Stream Cipher

Guillaume Gautier , Maguy Le Glatin , Safwan El Assad , Wassim Hamidouche , Olivier Déforges
International Conference on Cyber-Technologies and Cyber-Systems, Sep 2019, Porto, Portugal. 5 p
Communication dans un congrès hal-02184571v1
Image document

An information-theoretic model for side-channel attacks in embedded hardware

Eloi De Cherisey , Sylvain Guilley , Olivier Rioul , Pablo Piantanida
2019 IEEE International Symposium on Information Theory (ISIT), Jul 2019, Paris, France. ⟨10.1109/ISIT.2019.8849763⟩
Communication dans un congrès hal-02300788v1

STAnalyzer: A simple static analysis tool for detecting cache-timing leakages

Alexander Schaub , Olivier Rioul , Sylvain Guilley
17th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2019), Jun 2019, Prague, Czech Republic
Communication dans un congrès hal-02300786v1
Image document

Cache-Timing Attacks Still Threaten IoT Devices

Sofiane Takarabt , Alexander Schaub , Adrien Facon , Sylvain Guilley , Laurent Sauvage
3rd International Conference on Codes, Cryptology, and Information Security (C2SI 2019), Apr 2019, Rabat, Morocco. pp.13-30, ⟨10.1007/978-3-030-16458-4_2⟩
Communication dans un congrès hal-02319488v1

Two-Metric Helper Data for Highly Robust and Secure Delay PUFs

Jean-Luc Danger , Sylvain Guilley , Alexander Schaub
2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI), Jun 2019, Otranto, Italy. pp.184-188, ⟨10.1109/IWASI.2019.8791249⟩
Communication dans un congrès hal-02302114v1

Pre-Silicon Embedded System Evaluation as new EDA for Security Verification

Sofiane Takarabt , Kais Chibani , Youssef Souissi , Laurent Sauvage , Sylvain Guilley
International Verification and Security Workshop (IVSW), Jun 2018, Platja d’Aro, Spain
Communication dans un congrès hal-02287930v1
Image document

Technology-agnostic power optimization for AES block cipher

Kais Chibani , Adrien Facon , Sylvain Guilley , Youssef Souissi
ICECS, Dec 2018, Bordeaux, France. pp.397-400, ⟨10.1109/ICECS.2018.8617921⟩
Communication dans un congrès hal-02915635v1

On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis.

Naghmeh Karimi , Sylvain Guilley , Jean-Luc Danger
IOLTS, Jul 2018, Platja d'Aro, Spain. ⟨10.1109/IOLTS.2018.8474089⟩
Communication dans un congrès hal-02288013v1
Image document

An improved analysis of reliability and entropy for delay PUFs

Alexander Schaub , Jean-Luc Danger , Sylvain Guilley , Olivier Rioul
Euromicro Conference on Digital System Design (DSD'18), Aug 2018, Prague, Czech Republic. ⟨10.1109/DSD.2018.00096⟩
Communication dans un congrès hal-02288537v1

Reliability and entropy of delay PUFs: A theoretical analysis

Alexander Schaub , Jean-Luc Danger , Sylvain Guilley , Olivier Rioul
16th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2018), Jun 2018, Lorient, France
Communication dans un congrès hal-02287933v1

CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity

Jean-Luc Danger , Adrien Facon , Sylvain Guilley , Karine Heydemann , Ulrich Kühne
2018 21st Euromicro Conference on Digital System Design (DSD), Aug 2018, Prague, Czech Republic. pp.529-536, ⟨10.1109/DSD.2018.00093⟩
Communication dans un congrès hal-01900361v1
Image document

Confused yet successful: Theoretical computation of distinguishers for monobit leakages in terms of confusion coefficient and SNR

Eloi De Cherisey , Sylvain Guilley , Olivier Rioul
14th International Conference on Information Security and Cryptology (Inscrypt 2018), Dec 2018, Fuzhou, China. ⟨10.1007/978-3-030-14234-6_28⟩
Communication dans un congrès hal-02300768v1
Image document

Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem

Alexander Schaub , Olivier Rioul , Joseph Boutros , Jean-Luc Danger , Sylvain Guilley
Latin American Workshop on Coding and Information, Jul 2018, Unicamp-Campinas, Brazil
Communication dans un congrès hal-02287965v1

Impact of Aging on Template Attacks

Naghmeh Karimi , Sylvain Guilley , Jean-Luc Danger
GLSVLSI, May 2018, Chicago, United States. pp.455-458, ⟨10.1145/3194554.3194638⟩
Communication dans un congrès hal-02412366v1

OpenSSL Bellcore's Protection Helps Fault Attack

Sebastien Carre , Matthieu Desjardins , Adrien Facon , Sylvain Guilley
2018 21st Euromicro Conference on Digital System Design (DSD), Aug 2018, Prague, France. pp.500-507, ⟨10.1109/DSD.2018.00089⟩
Communication dans un congrès hal-02317457v1
Image document

Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection

Moulay Abdelaziz Elaabid , Khaled Karray , Jean-Luc Danger , Sylvain Guilley
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.109-128, ⟨10.1007/978-3-030-20074-9_9⟩
Communication dans un congrès hal-02294610v1
Image document

Enhanced Software Implementation of a Chaos-Based Stream Cipher

Guillaume Gautier , Safwan El Assad , Olivier Déforges , Sylvain Guilley , Adrien Facon
SECURWARE 2018, Sep 2018, Venise, Italy. pp.128-133
Communication dans un congrès hal-02157298v1

Confusing information: How confusion improves side-channel analysis for monobit leakages

Eloi de Chérisey , Sylvain Guilley , Olivier Rioul
16th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2018), Jun 2018, Lorient, France
Communication dans un congrès hal-02287934v1

Formalism to assess the entropy and reliability of the loop-PUF

Jean-Luc Danger , Olivier Rioul , Sylvain Guilley , Alexander Schaub
15th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2017), Jun 2017, Smolenice, Slovakia
Communication dans un congrès hal-02287598v1
Image document

Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition

Sylvain Guilley , Annelie Heuser , Ming Tang , Olivier Rioul
Int. Conf. Information Technology and Communications Security (SECITC 2017), Jun 2017, Bucharest, Romania
Communication dans un congrès hal-01628679v1
Image document

Codes for Side-Channel Attacks and Protections

Sylvain Guilley , Annelie Heuser , Olivier Rioul
C2SI 2017 - International Conference on Codes, Cryptology, and Information Security, Apr 2017, Rabat, Morocco. pp.35-55, ⟨10.1007/978-3-319-55589-8_3⟩
Communication dans un congrès hal-01629876v1

Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow

Jean-Luc Danger , Sylvain Guilley , Philippe Nguyen , Robert Nguyen , Youssef Souissi
DATE, Dec 2017, lausanne, Switzerland. ⟨10.23919/DATE.2017.7927159⟩
Communication dans un congrès hal-02412314v1

Side-channel analysis and machine learning: A practical perspective

Stjepan Picek , Annelie Heuser , Alan Jovic , Simone Ludwig , Sylvain Guilley
International Joint Conference on Neural Networks (IJCNN), May 2017, Anchorage, United States
Communication dans un congrès hal-01628681v1

Impact of the switching activity on the aging of delay-PUFs

Naghmeh Karimi , Jean-Luc Danger , Florent Lozac'H , Sylvain Guilley
ETS, May 2017, Limassol, Greece. ⟨10.1109/ETS.2017.7968223⟩
Communication dans un congrès hal-02412489v1
Image document

Impacts of Technology Trends on Physical Attacks?

Philippe Maurine , Sylvain Guilley
COSADE 2017 - 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, Apr 2017, Paris, France. pp.190-206, ⟨10.1007/978-3-319-64647-3_12⟩
Communication dans un congrès lirmm-01690188v1
Image document

Correlated Extra-Reductions Defeat Blinded Regular Exponentiation

Margaux Dugardin , Sylvain Guilley , Jean-Luc Danger , Zakaria Najm , Olivier Rioul
18th International Conference on Cryptographic Hardware and Embedded Systems (CHES 2016), Aug 2016, Santa Barbara, CA, United States. pp.3-22, ⟨10.1007/978-3-662-53140-2⟩
Communication dans un congrès hal-03750287v1

Predictive Aging of Reliability of Two Delay PUFs

Naghmeh Karimi , Jean-Luc Danger , Florent Lozac'H , Sylvain Guilley
SPACE, Dec 2016, Hyderabad, India. ⟨10.1007/978-3-319-49445-6_12⟩
Communication dans un congrès hal-02412243v1

A challenge code for maximizing the entropy of PUF responses

Olivier Rioul , Patrick Solé , Sylvain Guilley , Jean-Luc Danger
Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France
Communication dans un congrès hal-02287330v1

Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes

Kazuhide Fukushima , Youssef Souissi , Seira Hidano , Robert Nguyen , Jean-Luc Danger
TrustCom-16, Aug 2016, Tianjin, China
Communication dans un congrès hal-02287456v1

Correlated Extra-Reductions Defeat Blinded Regular Exponentiation

Margaux Dugardin , Sylvain Guilley , Jean-Luc Danger , Zakaria Najm , Olivier Rioul
Cryptographic Hardware and Embedded Systems – CHES 2016, Aug 2016, Santa Barbara, United States. pp.Pages 3-22
Communication dans un congrès hal-01362463v1
Image document

On the Entropy of Physically Unclonable Functions

Olivier Rioul , Patrick Solé , Sylvain Guilley , Jean-Luc Danger
2016 IEEE International Symposium on Information Theory (ISIT'16), Jul 2016, Barcelona, Spain. ⟨10.1109/ISIT.2016.7541835⟩
Communication dans un congrès hal-02288459v1
Image document

PUFs: Standardization and Evaluation

Jean-Luc Danger , Sylvain Guilley , Philippe Nguyen , Olivier Rioul
2nd IEEE Workshop on Mobile System Technologies (MST 2016), Sep 2016, Milano, Italy. ⟨10.1109/MST.2016.11⟩
Communication dans un congrès hal-02288475v1

Dismantling Real-World ECC with Horizontal and Vertical Template Attacks

Margaux Dugardin , Papachristodoulou Louiza , Zakaria Najm , Lejla Batina , Jean-Luc Danger
Constructive Side-Channel Analysis and Secure Design - COSADE 2016, Apr 2016, Graz, Austria. pp 88-108
Communication dans un congrès hal-01362466v1

Defining perceived information based on Shannon’s communication theory

Eloi de Chérisey , Sylvain Guilley , Olivier Rioul , Annelie Heuser
Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France
Communication dans un congrès hal-02287329v1

Taylor expansion of maximum likelihood attacks, with application to masked and shuffled implementations

Sylvain Guilley , Nicolas Bruneau , Annelie Heuser , Olivier Rioul , François-Xavier Standaert
Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France
Communication dans un congrès hal-02287328v1
Image document

Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations

Nicolas Bruneau , Sylvain Guilley , Annelie Heuser , Olivier Rioul , François-Xavier Standaert
22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (AsiaCrypt 2016), Dec 2016, Hanoi, Vietnam. ⟨10.1007/978-3-662-53887-6_21⟩
Communication dans un congrès hal-02287426v1
Image document

Optimal side-channel attacks for multivariate leakages and multiple models

Nicolas Bruneau , Sylvain Guilley , Annelie Heuser , Marion Damien , Olivier Rioul
PROOFS 2016 Security Proofs for Embedded Systems, Aug 2016, Santa Barbara, United States. ⟨10.1007/s13389-017-0170-9⟩
Communication dans un congrès hal-02300060v1
Image document

On the optimality and practicability of mutual information analysis in some scenarios

Eloi De Cherisey , Sylvain Guilley , Annelie Heuser , Olivier Rioul
ArticCrypt 2016, Jul 2016, Longyearbyen, Svalbard, Norway
Communication dans un congrès hal-02300055v1
Image document

Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?

Annelie Heuser , Stjepan Picek , Sylvain Guilley , Nele Mentens
RFIDSec 2016: 12th Workshop on RFID and IoT Security, Nov 2016, Hong Kong, Hong Kong SAR China
Communication dans un congrès hal-01402238v1
Image document

Template attacks with partial profiles and Dirichlet priors: Application to timing attacks

Eloi De Cherisey , Sylvain Guilley , Olivier Rioul , Darshana Jayasinghe
Hardware and Architectural Support for Security and Privacy (HASP 2016), Jun 2016, Seoul, South Korea. ⟨10.1145/2948618.2948625⟩
Communication dans un congrès hal-02300026v1
Image document

Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks

Margaux Dugardin , Sylvain Guilley , Martin Moreau , Zakaria Najm , Pablo Rauzy
PROOFS: Security Proofs for Embedded Systems 2016, Aug 2016, San, United States
Communication dans un congrès hal-01362552v1
Image document

Inter-Class vs. Mutual Information as Side-Channel Distinguishers

Olivier Rioul , Annelie Heuser , Sylvain Guilley , Jean-Luc Danger
2016 IEEE International Symposium on Information Theory (ISIT'16), Jul 2016, Barcelona, Spain. ⟨10.1109/ISIT.2016.7541410⟩
Communication dans un congrès hal-02287308v1
Image document

Private Circuits II versus Fault Injection Attacks

Henitsoa Rakotomalala , Xuan Thuy Ngo , Zakaria Najm , Jean-Luc Danger , Sylvain Guilley
Reconfig 2015, Dec 2015, Mayan Riviera, Mexico
Communication dans un congrès hal-01240244v1
Image document

Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses

Xuan Thuy Ngo , Shivam Bhasin , Jean-Luc Danger , Sylvain Guilley , Zakaria Najm
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2015, May 2015, McLean, United States. ⟨10.1109/HST.2015.7140242⟩
Communication dans un congrès hal-01240228v1

On the optimality of mutual information analysis for discrete leakages

Eloi De Cherisey , Annelie Heuser , Sylvain Guilley , Olivier Rioul
13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium
Communication dans un congrès hal-02300011v1
Image document

Hardware property checker for run-time Hardware Trojan detection

Xuan Thuy Ngo , Jean-Luc Danger , Sylvain Guilley , Zakaria Najm , Olivier Emery
Euromicro Conference on Digital System Design (DSD) 2015, Aug 2015, Trondheim, Norway. ⟨10.1109/ECCTD.2015.7300085⟩
Communication dans un congrès hal-01240226v1
Image document

A Key to Success: Success Exponents for Side-Channel Distinguishers

Sylvain Guilley , Annelie Heuser , Olivier Rioul
16th International Conference on Cryptology in India (IndoCrypt 2015), Dec 2015, Bangalore, India. pp.270-290, ⟨10.1007/978-3-319-26617-6_15⟩
Communication dans un congrès hal-02287175v1
Image document

From theory to practice of private circuit: A cautionary note

Debapriya Basu Roy , Shivam Bhasin , Sylvain Guilley , Jean-Luc Danger , Debdeep Mukhopadhyay
33rd IEEE International Conference on Computer Design (ICCD), Oct 2015, New York, United States. ⟨10.1109/ICCD.2015.7357117⟩
Communication dans un congrès hal-02412245v2
Image document

Hardware Trojan Detection by Delay and Electromagnetic Measurements

X-T Ngo , I Exurville , S Bhasin , Jean-Luc Danger , S Guilley
Design, Automation and Test in Europe 2015, Mar 2015, Grenoble, France. ⟨10.7873/DATE.2015.1103⟩
Communication dans un congrès hal-01240239v1
Image document

Integrated Sensor: A Backdoor for Hardware Trojan Insertions?

Xuan Thuy Ngo , Zakaria Najm , Shivam Bhasin , Debapriya Basu , Jean-Luc Danger
Euromicro Conference on Digital System Design (DSD) 2015, Aug 2015, Funchal, Portugal. ⟨10.1109/DSD.2015.119⟩
Communication dans un congrès hal-01240221v1
Image document

Less is More - Dimensionality Reduction from a Theoretical Perspective

Nicolas Bruneau , Sylvain Guilley , Annelie Heuser , Marion Damien , Olivier Rioul
Cryptographic Hardware and Embedded Systems -- CHES 2015, Sep 2015, Saint-Malo, France. ⟨10.1007/978-3-662-48324-4_2⟩
Communication dans un congrès hal-01218072v1

Template Attacks, Optimal Distinguishers and the Perceived Information Metric

Sylvain Guilley , Annelie Heuser , Olivier Rioul , François-Xavier Standaert
13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium
Communication dans un congrès hal-02287176v1

When optimal means optimal: Finding optimal distinguishers from the mathematical theory of communication

Annelie Heuser , Olivier Rioul , Sylvain Guilley
12th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2014), Jun 2014, Annecy, France
Communication dans un congrès hal-02286940v1

DRECON: DPA Resistant Encryption by Construction

Suvadeep Hajra , Chester Rebeiro , Shivam Bhasin , Gaurav Bajaj , Sahil Sharma
Africacrypt, May 2014, Marrakech, Morocco. ⟨10.1007/978-3-319-06734-6_25⟩
Communication dans un congrès hal-02412067v1
Image document

Attacking suggest boxes in web applications over https using stochastic side-channel algorithms

Alexander Schaub , Emmanuel Schneider , Alexandros Hollender , Vinicius Calasans , Laurent Jolie
9th International Conference on Risks and Security of Internet and Systems (CRISIS 2014), Aug 2014, Trente, Italy. ⟨10.1007/978-3-319-17127-2_8⟩
Communication dans un congrès hal-02288408v1
Image document

Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security

Pablo Rauzy , Sylvain Guilley
Program Protection and Reverse Engineering Workshop 2014, Jan 2014, San Diego, CA, United States. pp.Article No. 2, ⟨10.1145/2556464.2556466⟩
Communication dans un congrès hal-00939473v2
Image document

A Pre-processing Composition for Secret Key Recovery on Android Smartphone

Yuto Nakano , Youssef Souissi , Robert Nguyen , Laurent Sauvage , Jean-Luc Danger
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.76-91, ⟨10.1007/978-3-662-43826-8_6⟩
Communication dans un congrès hal-01400921v1

Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding

Jean-Luc Danger , Sylvain Guilley , Florian Praden
PPREW, Jan 2014, San Diego, United States. ⟨10.1145/2556464.2556469⟩
Communication dans un congrès hal-02412068v1
Image document

Cryptographically secure shields

Jean-Michel Cioranesco , Jean-Luc Danger , Tarik Graba , Sylvain Guilley , Yves Mathieu
HOST 2014 - IEEE International Symposium on Hardware-Oriented Security and Trust, May 2014, Washington, United States. pp.25 - 31, ⟨10.1109/HST.2014.6855563⟩
Communication dans un congrès hal-01110463v1
Image document

Encoding the State of Integrated Circuits: a Proactive and Reactive Protection against Hardware Trojans Horses

Xuan Thuy Ngo , Sylvain Guilley , Shivam Bhasin , Jean-Luc Danger , Zakaria Najm
Workshop on Embedded Systems Security (WESS 2014), Oct 2014, New Delhi, India. ⟨10.1145/2668322.2668329⟩
Communication dans un congrès hal-01240242v1
Image document

Method Taking into Account Process Dispersions to Detect Hardware Trojan Horse by Side-Channel

Xuan Thuy Ngo , Zakaria Najm , Shivam Bhasin , Sylvain Guilley , Jean-Luc Danger
PROOFS: Security Proofs for Embedded Systems 2014, Sep 2014, BUSAN, South Korea
Communication dans un congrès hal-01240241v1
Image document

A theoretical study of Kolmogorov-Smirnov distinguishers: Side-channel analysis vs. differential cryptanalysis

Annelie Heuser , Olivier Rioul , Sylvain Guilley
Fifth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2014), Apr 2014, Paris, France. pp.9-28, ⟨10.1007/978-3-319-10175-0_2⟩
Communication dans un congrès hal-02286939v1
Image document

Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA

Pablo Rauzy , Sylvain Guilley
Fault Diagnosis and Tolerance in Cryptography, Sep 2014, Busan, South Korea. ⟨10.1109/FDTC.2014.17⟩
Communication dans un congrès hal-01071425v1

Boosting High-Order Correlation Attacks by Dimensionality Reduction

Nicolas Bruneau , Jean-Luc Danger , Sylvain Guilley , Annelie Heuser , Yannick Teglia
SPACE, Oct 2014, Pune, India. ⟨10.1007/978-3-319-12060-7_13⟩
Communication dans un congrès hal-02286958v1

Analysis and Improvements of the DPA Contest v4 Implementation

Shivam Bhasin , Nicolas Bruneau , Jean-Luc Danger , Sylvain Guilley , Zakaria Najm
SPACE, Oct 2014, Pune, India. ⟨10.1007/978-3-319-12060-7_14⟩
Communication dans un congrès hal-02288411v1

NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage

Shivam Bhasin , Jean-Luc Danger , Sylvain Guilley , Zakaria Najm
EMC, May 2014, Tokyo, Japan
Communication dans un congrès hal-02412040v1
Image document

Good is not good enough: Deriving optimal distinguishers from communication theory

Annelie Heuser , Olivier Rioul , Sylvain Guilley
16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. pp.55-74, ⟨10.1007/978-3-662-44709-3_4⟩
Communication dans un congrès hal-02286943v1

detecting hidden leakage

Amir Moradi , Sylvain Guilley , Annelie Heuser
ACNS, Jun 2014, lausanne, Switzerland
Communication dans un congrès hal-02412066v1
Image document

Orthogonal Direct Sum Masking

Julien Bringer , Claude Carlet , Hervé Chabanne , Sylvain Guilley , Houssem Maghrebi
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.40-56, ⟨10.1007/978-3-662-43826-8_4⟩
Communication dans un congrès hal-01400919v1

HCODE: Hardware-Enhanced Real-Time CFI

Michaël Timbert , Jean-Luc Danger , Sylvain Guilley , Thibault Porteboeuf , Florian Praden
PPREW@ACSAC 2014, Dec 2014, New Orleans, United States. ⟨10.1145/2689702.2689708⟩
Communication dans un congrès hal-01575947v1

Side-channel leakage and trace compression using normalized inter-class variance.

Shivam Bhasin , Jean-Luc Danger , Sylvain Guilley , Zakaria Najm
HASP, Jun 2014, Minneapolis, United States. ⟨10.1145/2611765.2611772⟩
Communication dans un congrès hal-02412117v1
Image document

Masks will fall off: Higher-order optimal distinguishers

Nicolas Bruneau , Sylvain Guilley , Annelie Heuser , Olivier Rioul
International Conference on the Theory and Application of Cryptology and Information Security (AsiaCrypt), Dec 2014, Kaoshiung, Taiwan. pp.344-365, ⟨10.1007/978-3-662-45608-8_19⟩
Communication dans un congrès hal-02287072v1

Fault Injection to Reverse Engineer pseudo-DES Cryptosystems

Hélène Le Bouder , Sylvain Guilley , Bruno Robisson , Assia Tria
Chip to cloud, Sep 2013, Nice, France
Communication dans un congrès emse-00907708v1

Fault Injection to Reverse Engineer DES-like Cryptosystems

Hélène Le Bouder , Guilley Sylvain , Bruno Robisson , Assia Tria
The Sixth International Symposium on Foundations & Practice of Security FPS'2013, Oct 2013, La Rochelle, France
Communication dans un congrès emse-00907674v1

Fault Injection to Reverse Engineer DES-Like Cryptosystems

Hélène Le Bouder , Sylvain Guilley , Bruno Robisson , Assia Tria
Chip to cloud security forum, Sep 2013, Nice, France
Communication dans un congrès cea-01094248v1

Software Camouflage

Sylvain Guilley , Marion Damien , Souissi Youssef , Antoine Wurcker
Foundations and Practice of Security -- FPS 2013, Oct 2013, La Rochelle, France
Communication dans un congrès hal-01218046v1
Image document

Fault Injection to Reverse Engineer DES-like Cryptosystems

Hélène Le Bouder , Sylvain Guilley , Bruno Robisson , Assia Tria
Foundations and Practice of Security - 6th International Symposium, FPS 2013, , 2013, La Rochelle, France
Communication dans un congrès hal-01818570v1
Image document

Side-Channel Indistinguishability

Claude Carlet , Sylvain Guilley
HASP, Jun 2013, Tel Aviv, Israel. pp.9:1-9:8, ⟨10.1145/2487726.2487735⟩
Communication dans un congrès hal-00826618v6

A Low-Entropy First-Degree Secure Provable Masking Scheme for Resource-Constrained Devices

Shivam Bhasin , Jean-Luc Danger , Sylvain Guilley , Zakaria Najm
WESS, Sep 2013, Montreal, Canada. ⟨10.1145/2527317.2527324⟩
Communication dans un congrès hal-02412039v1
Image document

Hardware Trojan Horses in Cryptographic IP Cores

Shivam Bhasin , Jean-Luc Danger , Sylvain Guilley , Xuan Thuy Ngo , Laurent Sauvage
FDTC (Fault Detection and Tolerance in Cryptography), Aug 2013, Santa Barbara, United States. pp.15-29, ⟨10.1109/FDTC.2013.15⟩
Communication dans un congrès hal-00855146v2
Image document

Time-frequency analysis for second-order attacks

Pierre Belgarric , Shivam Bhasin , Nicolas Bruneau , Jean-Luc Danger , Nicolas Debande
Smart Card Research and Advanced Application Conference (CARDIS 2013), Nov 2013, Berlin, Germany. pp.108-122, ⟨10.1007/978-3-319-08302-5_8⟩
Communication dans un congrès hal-02299996v1

Revealing the secrets of success: Theoretical efficiency of side-channel distinguishers

Annelie Heuser , Sylvain Guilley , Olivier Rioul
11th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2013), Jun 2013, Fréjus, France
Communication dans un congrès hal-02288378v1

Practical vs. theoretical evaluation of DPA and CPA

Annelie Heuser , Sylvain Guilley , Olivier Rioul
3rd International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers (CrossFyre'13), Jun 2013, KU Leuven, Belgium
Communication dans un congrès hal-02286734v1

Towards Different Flavors of Combined Side Channel Attacks

Youssef Souissi , Shivam Bhasin , Maxime Nassar , Sylvain Guilley , Jean-Luc Danger
CT-RSA, Feb 2012, San Francisco, United States. pp.245-259, ⟨10.1007/978-3-642-27954-6_16⟩
Communication dans un congrès hal-02288312v1

Low-Cost Countermeasure against RPA

Cedric Murdica , Jean-Luc Danger , Sylvain Guilley , Philippe Hoogvorst , David Naccache
CARDIS 2012, Nov 2012, Graz, Austria. pp.106-122
Communication dans un congrès hal-00799421v1

Wavelet Transform Based Pre-processing for Side Channel Analysis

Nicolas Debande , Youssef Souissi , Moulay Aziz Elaabid , Sylvain Guilley , Jean-Luc Danger
HASP, Dec 2012, Vancouver, Canada. ⟨10.1109/MICROW.2012.15⟩
Communication dans un congrès hal-02411932v1
Image document

An Easy-to-Design PUF based on a Single Oscillator: the Loop PUF

Zhoua Cherif Jouini , Jean-Luc Danger , Sylvain Guilley , Lilian Bossuet
15th Euromicro Conference on Digital System Design(DSD), Sep 2012, Cesme, Izmir, Turkey. 7 p
Communication dans un congrès hal-00753216v1

A Fault Model for Conducted Intentional ElectroMagnetic Interferences

Laurent Sauvage , Sylvain Guilley , Jean-Luc Danger , Naofumi Homma , Yu-Ichi Hayashi
EMC, Aug 2012, Pittsburgh, United States. pp.788-793, ⟨10.1109/ISEMC.2012.6351664⟩
Communication dans un congrès hal-02411875v1
Image document

Random Active Shield

Sébastien Briais , Jean-Michel Cioranesco , Jean-Luc Danger , Sylvain Guilley , David Naccache
Fault Diagnosis and Tolerance in Cryptography, Sep 2012, Leuven, Belgium. 11 p., ⟨10.1109/FDTC.2012.11⟩
Communication dans un congrès hal-00721569v2

From cryptography to hardware: analyzing embedded Xilinx BRAM for cryptographic applications

Shivam Bhasin , Sylvain Guilley , Jean-Luc Danger
HASP, Dec 2012, Vancouver, Canada. ⟨10.1109/MICROW.2012.11⟩
Communication dans un congrès hal-02411933v1
Image document

Comparison between Side-Channel Analysis Distinguishers

Houssem Maghrebi , Olivier Rioul , Sylvain Guilley , Jean-Luc Danger
14th International Conference on Information and Communications Security (ICICS'2012), Oct 2012, Hong Kong, China. pp.331-340, ⟨10.1007/978-3-642-34129-8_30⟩
Communication dans un congrès hal-02299929v1

Leakage Squeezing of Order Two

Claude Carlet , Jean-Luc Danger , Sylvain Guilley , Houssem Maghrebi
IndoCypt, Dec 2012, Kolkata, India. ⟨10.1007/978-3-642-34931-7_8⟩
Communication dans un congrès hal-02411906v1

A formal study of two physical countermeasures against side channel attacks

Briais Sébastien , Sylvain Guilley , Jean-Luc Danger
PROOFS, Sep 2012, Leuven, Belgium. ⟨10.1007/s13389-013-0054-6⟩
Communication dans un congrès hal-02286504v1

Register Leakage Masking Using Gray Code

Houssem Maghrebi , Emmanuel Prouff , Sylvain Guilley , Jean-Luc Danger
HOST, Jun 2012, San Francisco, United States. ⟨10.1109/HST.2012.6224316⟩
Communication dans un congrès hal-02411870v1

Same Values Power Analysis Using Special Points on Elliptic Curves

Cedric Murdica , Jean-Luc Danger , Sylvain Guilley , Philippe Hoogvorst , David Naccache
COSADE 2012 - Third International Workshop Constructive Side-Channel Analysis and Secure Design, May 2012, Darmstadt, Germany. pp.Cédric Murdica, ⟨10.1007/978-3-642-29912-4_14⟩
Communication dans un congrès hal-00686565v1

Some results about the distinction of side-channel distinguishers based on distributions

Houssem Maghrebi , Sylvain Guilley , Olivier Rioul , Jean-Luc Danger
10th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2012), Jun 2012, Saint-Etienne, France
Communication dans un congrès hal-02286359v1
Image document

System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion

Sylvain Guilley , Jean-Luc Danger , Robert Nguyen , Philippe Nguyen
ICISTM, Mar 2012, Grenoble, France. pp.433-438, ⟨10.1007/978-3-642-29166-1_41⟩
Communication dans un congrès hal-00701990v2
Image document

On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems

Youssef Souissi , Nicolas Debande , Sami Mekki , Sylvain Guilley , Ali Maalaoui
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.169-178, ⟨10.1007/978-3-642-30955-7_15⟩
Communication dans un congrès hal-01534305v1

3D Hardware Canaries

Sébastien Briais , Stéphane Caron , Jean-Michel Cioranesco , Jean-Luc Danger , Sylvain Guilley
CHES 2012 - 14th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2012, Leuven, Belgium. pp.1-22, ⟨10.1007/978-3-642-33027-8_1⟩
Communication dans un congrès hal-01111533v1

Optimal First-Order Masking with Linear and Non-Linear Bijections

Houssem Maghrebi , Sylvain Guilley , Claude Carlet , Jean-Luc Danger
AfricaCrypt, Jul 2012, Ifrane, Morocco. ⟨10.1007/978-3-642-31410-0_22⟩
Communication dans un congrès hal-02411869v1

A First-Order Leak-Free Masking Countermeasure

Houssem Maghrebi , Emmanuel Prouff , Sylvain Guilley , Jean-Luc Danger
CT-RSA, Feb 2012, San Francisco, CA, United States. pp.156-170, ⟨10.1007/978-3-642-27954-6_10⟩
Communication dans un congrès hal-02288316v1
Image document

RSM: a Small and Fast Countermeasure for AES, Secure against 1st and 2nd-order Zero-Offset SCAs

Maxime Antoine Alexandre Nassar , Youssef Souissi , Sylvain Guilley , Jean-Luc Danger
Design Automation and Test in Europe, Mar 2012, Desden, Germany. pp.1173-1178
Communication dans un congrès hal-00666337v1
Image document

Vade Mecum on Side-Channels Attacks and Countermeasures for the Designer and the Evaluator

Sylvain Guilley , Olivier Meynard , Maxime Nassar , Guillaume Duc , Philippe Hoogvorst
Design & Technology of Integrated Systems, Apr 2011, Athens, Greece. pp.6, ⟨10.1109/DTIS.2011.5941419⟩
Communication dans un congrès hal-00579020v2
Image document

Leakage Squeezing Countermeasure against High-Order Attacks

Houssem Maghrebi , Sylvain Guilley , Jean-Luc Danger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Communication dans un congrès hal-01573295v1
Image document

Formal Framework for the Evaluation of Waveform Resynchronization Algorithms

Sylvain Guilley , Karim Khalfallah , Victor Lomne , Jean-Luc Danger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩
Communication dans un congrès hal-01573296v1

A Multiresolution Time-Frequency Analysis Based Side Channel Attacks

Nicolas Debande , Youssef Souissi , Thanh-Ha Le , Sylvain Guilley , Jean-Luc Danger
WIFS Poster Session, Nov 2011, Iguacu Falls, Brazil
Communication dans un congrès hal-02411850v1
Image document

FIRE: fault injection for reverse engineering

Manuel San Pedro , Mate Soos , Sylvain Guilley
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.280-293, ⟨10.1007/978-3-642-21040-2_20⟩
Communication dans un congrès hal-00690868v1
Image document

Fault Injection Resilience

Sylvain Guilley , Laurent Sauvage , Jean-Luc Danger , Nidhal Selmane
Fault Diagnosis and Tolerance in Cryptography, Aug 2010, Santa Barbara, United States. pp.51-65, ⟨10.1109/FDTC.2010.15⟩
Communication dans un congrès hal-00482194v9
Image document

Entropy-based Power Attack

Houssem Maghrebi , Sylvain Guilley , Jean-Luc Danger , Florent Flament
Hardware-Oriented Security and Trust, Jun 2010, Anaheim, CA, United States. pp.1-6, ⟨10.1109/HST.2010.5513124⟩
Communication dans un congrès hal-00618482v2
Image document

Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks

Houssem Maghrebi , Jean-Luc Danger , Florent Flament , Sylvain Guilley , Laurent Sauvage
SCS, Nov 2009, Jerba, Tunisia. 6 p., ⟨10.1109/ICSCS.2009.5412597⟩
Communication dans un congrès hal-00425523v4
Image document

Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow

Shivam Bhasin , Jean-Luc Danger , Florent Flament , Tarik Graba , Sylvain Guilley
ReConFig, Dec 2009, Cancún, Mexico. pp.213 - 218, ⟨10.1109/ReConFig.2009.50⟩
Communication dans un congrès hal-00411843v3

Updates on the Potential of Clock-Less Logics to Strengthen Cryptographic Circuits against Side-Channel Attacks

Sylvain Guilley , Sumanta Chaudhuri , Laurent Sauvage , Jean-Luc Danger , Taha Beyrouthy
IEEE International Conference on Electronics and Systems (ICECS'09), Dec 2009, Hammamet, Tunisia. pp.351 - 354, ⟨10.1109/ICECS.2009.5411008⟩
Communication dans un congrès hal-00472064v1
Image document

Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints.

Laurent Sauvage , Sylvain Guilley , Jean-Luc Danger , Yves Mathieu , Maxime Nassar
Design, Automation & Test in Europe Conference & Exhibition, 2009. DATE '09., Apr 2009, NICE, France. pp.640-645
Communication dans un congrès hal-00325417v3
Image document

WDDL is Protected Against Setup Time Violation Attacks

Nidhal Selmane , Shivam Bhasin , Sylvain Guilley , Tarik Graba , Jean-Luc Danger
CHES, Sep 2009, Lausanne, Switzerland. pp.73-83, ⟨10.1109/FDTC.2009.40⟩
Communication dans un congrès hal-00410135v1
Image document

Area Optimization of Cryptographic Co-Processors Implemented in Dual-Rail with Precharge Positive Logic

Sylvain Guilley , Laurent Sauvage , Jean-Luc Danger , Philippe Hoogvorst
International Conference on Field Programmable Logic and Applications, Sep 2008, Heidelberg, Germany. pp.161-166, ⟨10.1109/FPL.2008.4629925⟩
Communication dans un congrès hal-00320425v2
Image document

Security Evaluation of a Balanced Quasi-Delay Insensitive Library (SecLib)

Sylvain Guilley , Florent Flament , Yves Mathieu , Renaud Pacalet
Conference on Design of Circuits and Integrated Systems, Nov 2008, Grenoble, France. 6 p., ISBN: 978-2-84813-124-5
Communication dans un congrès hal-00283405v5
Image document

Shall we trust WDDL?

Sylvain Guilley , Sumanta Chaudhuri , Laurent Sauvage , Tarik Graba , Jean-Luc Danger
Future of Trust in Computing, Jun 2008, Berlin, Germany. pp.208-215, ⟨10.1007/978-3-8348-9324-6_22⟩
Communication dans un congrès hal-00409024v1

Place-and-route impact on the security of DPL designs in FPGAs

Sylvain Guilley , Sumanta Chaudhuri , Laurent Sauvage , Tarik Graba , Jean-Luc Danger
2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), Jun 2008, Anaheim, United States. pp.26-32, ⟨10.1109/HST.2008.4559042⟩
Communication dans un congrès hal-04510621v1

A Secure Programmable Architecture with a Dedicated Tech-mapping Algorithm: Application to a Crypto-Processor

T. Beyrouthy , Laurent Fesquet , Alin Razafindraibe , S. Chaudhuri , S. Guilley
23rd International Conference on Design of Circuits and Integrated Systems (DCIS'08), Nov 2008, Grenoble, France. pp.session 3b3
Communication dans un congrès hal-00346734v1
Image document

Silicon-level Solutions to Counteract Passive and Active Attacks

Sylvain Guilley , Laurent Sauvage , Jean-Luc Danger , Nidhal Selmane , Renaud Pacalet
FDTC, Aug 2008, Washington, DC, United States. pp.3-17, ⟨10.1109/FDTC.2008.18⟩
Communication dans un congrès hal-00311431v1
Image document

Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs

Sylvain Guilley , Laurent Sauvage , Jean-Luc Danger , Tarik Graba , Yves Mathieu
Secure System Integration and Reliability Improvement, Jul 2008, Yokohama, Japan. pp.16-23, ⟨10.1109/SSIRI.2008.31⟩
Communication dans un congrès hal-00259153v5

Efficient tiling patterns for reconfigurable gate arrays

Sumanta Chaudhuri , Jean-Luc Danger , Philippe Hoogvorst , Sylvain Guilley
FPGA08: ACM/SIGDA International Symposium on Field Programmable Gate Arrays, Feb 2008, Monterey California USA, United States. pp.257-257, ⟨10.1145/1344671.1344709⟩
Communication dans un congrès hal-04510628v1

An 8x8 run-time reconfigurable FPGA embedded in a SoC

Sumanta Chaudhuri , Sylvain Guilley , Florent Flament , Philippe Hoogvorst , Jean-Luc Danger
DAC '08: The 45th Annual Design Automation Conference 2008, Jun 2008, Anaheim California, United States. pp.120-125, ⟨10.1145/1391469.1391500⟩
Communication dans un congrès hal-04510633v1

Improving Side-Channel Attacks by Exploiting Substitution Boxes Properties

Renaud Pacalet , Sylvain Guilley , Philippe Hoogvorst , Johannes Schmidt
International Conference on Boolean Functions: Cryptography and Applications (BFCA), May 2007, Paris, France
Communication dans un congrès hal-02893245v1

Efficient Modeling and Floorplanning of Embedded-FPGA Fabric

Sumanta Chaudhuri , Jean-Luc Danger , Sylvain Guilley
2007 International Conference on Field Programmable Logic and Applications, Aug 2007, Amsterdam, Netherlands. pp.665-669, ⟨10.1109/FPL.2007.4380741⟩
Communication dans un congrès hal-04510607v1

A Reconfigurable Cell for a Multi-Style Asynchronous FPGA

Philippe Hoogvorst , Sylvain Guilley , Alin Razafindraibe , Taha Beyrouthy , Laurent Fesquet
RecoSoC: Reconfigurable Communication-centric Systems-on-Chip, Jun 2007, Montpellier, France. pp.15-22
Communication dans un congrès hal-00222887v1
Image document

A Novel Asynchronous e-FPGA Architecture for Security Applications

Taha Beyrouthy , Alin Razafindraibe , Laurent Fesquet , Marc Renaudin , Sumanta Chaudhuri
ICFPT 2007 - IEEE International Conference on Field-Programmable Technology, Dec 2007, Kitakyusyu, Japan. pp.369-372, ⟨10.1109/FPT.2007.4439288⟩
Communication dans un congrès hal-04510604v1

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks

Frederik Armknecht , Claude Carlet , Philippe Gaborit , Simon Künzli , Willi Meier
EUROCRYPT 2006, May 2006, Saint Petersbourg, Russia. pp.147-164
Communication dans un congrès hal-00337016v1

FASE: An Open Run-Time Reconfigurable FPGA Architecture for Tamper-Resistant and Secure Embedded Systems

Sumanta Chaudhuri , Jean-Luc Danger , Sylvain Guilley , Philippe Hoogvorst
2006 IEEE International Conference on Reconfigurable Computing and FPGA's, Sep 2006, San Luis Potosi, France. pp.1-9, ⟨10.1109/RECONF.2006.307752⟩
Communication dans un congrès hal-04510600v1

The “Backend Duplication” Method

Sylvain Guilley , Philippe Hoogvorst , Yves Mathieu , Renaud Pacalet
Workshop on Cryptographic Hardware and Embedded Systems (CHES), Aug 2005, Edinburgh, United Kingdom. pp.383-397, ⟨10.1007/11545262_28⟩
Communication dans un congrès hal-02893271v1

On the construction of Boolean functions with a good algebraic immunity

Claude Carlet , Philippe Gaborit
Proceedings of the first International Workshop on Boolean Function and Applications, 2005, France. pp.1-12
Communication dans un congrès hal-00078748v1

Differential Power Analysis Model and Some Results

Sylvain Guilley , Philippe Hoogvorst , Renaud Pacalet
CARDIS, Aug 2004, Toulouse, France. pp.127-142, ⟨10.1007/1-4020-8147-2_9⟩
Communication dans un congrès hal-02893277v1

CMOS structures suitable for secured hardware

S. Guilley , P. Hoogvorst , Y. Mathieu , Renaud Pacalet , J. Provost
Design, Automation and Test in Europe Conference and Exhibition, Feb 2004, Paris, France. pp.1414-1415, ⟨10.1109/DATE.2004.1269113⟩
Communication dans un congrès hal-02893279v1

Side-Channel Security. How Much Are You Secure? Mrs. Gerber’s Lemma and Majorization

Julien Béguinot , Olivier Rioul , Sylvain Guilley , Wei Cheng , Yi Liu
Colloque de l'Institut Mines-Télécom, Risques & Cyber : Sécurité et Résilience, Apr 2023, Palaiseau, France. 2023
Poster de conférence hal-04136984v1
Image document

Rényi Entropy Estimation for Secure Silicon Fingerprints

Alexander Schaub , Olivier Rioul , Sylvain Guilley , Jean-Luc Danger , Joseph J Boutros
IEEE Information Theory and Applications Workshop (ITA 2020), Feb 2020, Sans Diego, United States. , 2020
Poster de conférence hal-02950211v1
Image document

Guessing a secret cryptographic key from side-channel leakages

Wei Cheng , Olivier Rioul , Sylvain Guilley
2019 IEEE European School of Information Theory (ESIT'19), Apr 2019, Sophia Antipolis, France. 2019
Poster de conférence hal-02300782v1
Image document

Optimal attacks for multivariate and multi-model side-channel leakages

Nicolas Bruneau , Sylvain Guilley , Annelie Heuser , Marion Damien , Olivier Rioul
18th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2016), Aug 2016, Santa Barbara, United States. Cryptographic Hardware and Embedded Systems – CHES 2016, 2016
Poster de conférence hal-02300058v1
Image document

Power and Electromagnetic Analysis for Template Attacks

Margaux Dugardin , Louiza Papachristodoulou , Zakaria Najm , Lejla Batina , Jean-Christophe Courrège
TRUDEVICE, Mar 2015, Grenoble, France. , 2015
Poster de conférence hal-01362457v1
Image document

On optimality of MIA for unknown leakage models and related new practical results

François Bailly , Sylvain Guilley , Annelie Heuser , Olivier Rioul
Lejla Batina; Matthew Robshaw. 16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. Springer, Lecture Notes in Computer Science, 8731, 2014, Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
Poster de conférence hal-02300004v1
Image document

Maximizing the success of a side-channel attack

Annelie Heuser , Sylvain Guilley , Olivier Rioul
3e colloque de l'Institut Mines-Télécom, Numérique: Grande échelle et complexité (Sécurité, sûreté, risques), Mar 2014, Paris, France. 2014
Poster de conférence hal-02299999v1
Image document

Success rate exponents for side-channel attacks

Sylvain Guilley , Annelie Heuser , Martial Ren , Olivier Rioul , Simon Sellem
16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea
Poster de conférence hal-02300002v1
Image document

Success metric: An all-in-one criterion for comparing side-channel distinguishers

Annelie Heuser , Sylvain Guilley , Olivier Rioul
Guido Bertoni; Jean-Sébastien Coron. 15th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2013), Aug 2013, Santa Barbara, CA, United States. Springer, Lecture Notes in Computer Science, 8086, Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings
Poster de conférence hal-02299990v1
Image document

Side-channel attacks

Annelie Heuser , Sylvain Guilley , Olivier Rioul
European Google Doctoral Fellowship Forum, Sep 2013, Zurich, Switzerland. 2013
Poster de conférence hal-02299991v1

Efficient tiling patterns for reconfigurable gate arrays

Sumanta Chaudhuri , Sylvain Guilley , Philippe Hoogvorst , Jean-Luc Danger
SLIP08: International Workshop on System Level Interconnect Prediction, Apr 2008, Newcastle United Kingdom, United Kingdom. ACM, pp.11-18, 2008, ⟨10.1145/1353610.1353613⟩
Poster de conférence hal-04510620v1
Image document

Kissing number of codes: A survey

Yi Liu , Wei Cheng , Olivier Rioul , Sylvain Guilley , Patrick Solé
VIASM. Coding Theory and applications (tentative title), Springer, inPress, Lecture Notes in Mathematics
Chapitre d'ouvrage hal-03718730v1
Image document

Side-channel Analysis of CRYSTALS-Kyber and A Novel Low-Cost Countermeasure

Meziane Hamoudi , Amina Bel Korchi , Sylvain Guilley , Sofiane Takarabt , Khaled Karray
Security and Privacy, 1497, Springer International Publishing, pp.30-46, 2021, Communications in Computer and Information Science, ⟨10.1007/978-3-030-90553-8_3⟩
Chapitre d'ouvrage hal-03925867v1
Image document

Multi-source Fault Injection Detection Using Machine Learning and Sensor Fusion

Ritu-Ranjan Shrivastwa , Sylvain Guilley , Jean-Luc Danger
Security and Privacy, 1497, Springer International Publishing, pp.93-107, 2021, Communications in Computer and Information Science, ⟨10.1007/978-3-030-90553-8_7⟩
Chapitre d'ouvrage hal-03433855v1

Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks

Jean-Luc Danger , Trevor Kroeger , Wei Cheng , Sylvain Guilley , Naghmeh Karimi
Constructive Side-Channel Analysis and Secure Design, 12910, Springer International Publishing, pp.303-321, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-89915-8_14⟩
Chapitre d'ouvrage hal-03433854v1
Image document

Towards a Black-Box Security Evaluation Framework

Mosabbah Mushir Ahmed , Youssef Souissi , Oualid Trabelsi , Sylvain Guilley , Antoine Bouvet
Security and Privacy Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings, 1497, Springer International Publishing, pp.79-92, 2021, Communications in Computer and Information Science, ⟨10.1007/978-3-030-90553-8_6⟩
Chapitre d'ouvrage hal-03788731v1
Image document

Post-layout Security Evaluation Methodology Against Probing Attacks

Sofiane Takarabt , Sylvain Guilley , Youssef Souissi , Laurent Sauvage , Yves Mathieu
Nguyen-Son Vo; Van-Phuc Hoang; Quoc-Tuan Vien. Industrial Networks and Intelligent Systems. 7th EAI International Conference, INISCOM 2021, Hanoi, Vietnam, April 22-23, 2021, Proceedings, 379, Springer International Publishing, pp.465-482, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 978-3-030-77423-3. ⟨10.1007/978-3-030-77424-0_37⟩
Chapitre d'ouvrage hal-03365004v1
Image document

First-Order Side-Channel Leakage Analysis of Masked but Asynchronous AES

Antoine Bouvet , Sylvain Guilley , Lukas Vlasak
Security and Privacy Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings, 1497, Springer International Publishing, pp.16-29, 2021, Communications in Computer and Information Science, ⟨10.1007/978-3-030-90553-8_2⟩
Chapitre d'ouvrage hal-03788732v1
Image document

Fault Analysis Assisted by Simulation

Kais Chibani , Adrien Facon , Sylvain Guilley , Damien Marion , Yves Mathieu
Jakub Breier; Xiaolu Hou; Shivam Bhasin. Automated Methods in Cryptographic Fault Analysis, Springer International Publishing, pp.263-277, 2019, 978-3-030-11332-2. ⟨10.1007/978-3-030-11333-9_12⟩
Chapitre d'ouvrage hal-02915671v1
Image document

Development of the Unified Security Requirements of PUFs During the Standardization Process

Nicolas Bruneau , Jean-Luc Danger , Adrien Facon , Sylvain Guilley , Soshi Hamaguchi
Innovative Security Solutions for Information Technology and Communications. 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers, LNCS (11359), Springer, pp.314-330, 2019, 978-3-030-12942-2. ⟨10.1007/978-3-030-12942-2_24⟩
Chapitre d'ouvrage hal-02265318v1

Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks

Sihem Mesnager , Claude Carlet , Sylvain Guilley
Security and Privacy in the Internet of Things, 2019
Chapitre d'ouvrage hal-03025857v1

Construction of Efficient Codes for High-Order Direct Sum Masking

Sihem Mesnager , Claude Carlet , Sylvain Guilley , Cem Guneri , Ferruh Özbudak
Security and Privacy in the Internet of Things: Challenges and Solutions, 27, IOS Press, pp.108-128, 2019, Ambient Intelligence and Smart Environments Series, 978-1-64368-052-1 (print) | 978-1-64368-053-8 (online)
Chapitre d'ouvrage hal-03025841v1
Image document

Cache-timing Attack Detection and Prevention Application to Crypto Libs and PQC

Sebastien Carre , Adrien Facon , Sylvain Guilley , Sofiane Takarabt , Alexander Schaub
Springer. Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedings, pp.13-21, 2019, ⟨10.1007/978-3-030-16350-1_2⟩
Chapitre d'ouvrage hal-02915644v1
Image document

Security Evaluation Against Side-Channel Analysis at Compilation Time

Nicolas Bruneau , Charles Christen , Jean-Luc Danger , Adrien Facon , Sylvain Guilley
Springer. Algebra, Codes and Cryptology (A2C), pp.129-148, 2019, ⟨10.1007/978-3-030-36237-9_8⟩
Chapitre d'ouvrage hal-02915643v1

Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks

Jean-Luc Danger , Khaled Karray , Sylvain Guilley , M. Abdelaziz Elaabid
Cyber-Physical Systems Security, Springer International Publishing, pp.219-254, 2018, ⟨10.1007/978-3-319-98935-8_11⟩
Chapitre d'ouvrage hal-03433710v1

Attack Tree Construction and Its Application to the Connected Vehicle

Jean-Luc Danger , Khaled Karray , Sylvain Guilley , M. Abdelaziz Elaabid
Cyber-Physical Systems Security, Springer International Publishing, pp.175-190, 2018, ⟨10.1007/978-3-319-98935-8_9⟩
Chapitre d'ouvrage hal-03433714v1

Physical Security Versus Masking Schemes

Jean-Luc Danger , Sylvain Guilley , Annelie Heuser , Axel Legay , Tang Ming
Cyber-Physical Systems Security, Springer International Publishing, pp.269-284, 2018, ⟨10.1007/978-3-319-98935-8_13⟩
Chapitre d'ouvrage hal-03433713v1

Physical attacks

Nadia El Mrabet , Louis Goubin , Jacques Jean-Alain Fournier , Damien Jauvart , Sylvain Guilley
Guide to pairing based cryptography, 2017, 9781498729505
Chapitre d'ouvrage hal-01579785v1
Image document

Information theoretic comparison of side-channel distinguishers: Inter-class distance, confusion, and success

Annelie Heuser , Olivier Rioul , Sylvain Guilley , Jean-Luc Danger
Bernard Candaele; Dimitrios Soudris; Iraklis Anagnostopoulos. Trusted Computing for European Embedded Systems, Springer, pp.187-225, 2015, 978-3-319-09419-9. ⟨10.1007/978-3-319-09420-5_10⟩
Chapitre d'ouvrage hal-02286944v1

17 : Global Fault on Cryptographic Circuits

Sylvain Guilley , Jean-Luc Danger
Fault Analysis in Cryptography, Springer, pp.295-312, 2012
Chapitre d'ouvrage hal-02286401v1
Image document

Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks

Shivam Bhasin , Sylvain Guilley , Laurent Sauvage , Jean-Luc Danger
Josef Pieprzyk. Topics in Cryptology - CT-RSA 2010. The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, 5985, Springer Berlin Heidelberg, pp.195-207, 2010, Lecture Notes in Computer Science, 978-3-642-11924-8. ⟨10.1007/978-3-642-11925-5_14⟩
Chapitre d'ouvrage hal-03766332v1

Vectorial Boolean Functions for Cryptography

Claude Carlet , Yves Crama , Peter L. Hammer
Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Cambridge University Press, pp.398-470, 2010, ⟨10.1017/cbo9780511780448.012⟩
Chapitre d'ouvrage hal-02060699v1

Physical Design of FPGA Interconnect to Prevent Information Leakage

Sumanta Chaudhuri , Sylvain Guilley , Philippe Hoogvorst , Jean-Luc Danger , Taha Beyrouthy
Woods, R.; Compton, K.; Bourganis, C.; Diniz, P.C. Reconfigurable Computing: Architecture, Tools, and Applications, 4943, Springer, pp.87-98, 2008, Lecture Notes in Computer Science, ⟨10.1007/978-3-540-78610-8_11⟩
Chapitre d'ouvrage hal-00299487v1

SECRET KEY ESTIMATION METHODS AND DEVICES

Olivier Rioul , Sylvain Guilley
France, Patent n° : US2020/0313845 A1. 2020
Brevet hal-03326381v1

METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICE

Sylvain Guilley , Annelie Heuser , Olivier Rioul
United States, Patent n° : US Patent 2017/0270307 A1. 2017
Brevet hal-03326375v1

SECRET KEY ESTIMATION METHODS AND DEVICES

Olivier Rioul , Sylvain Guilley
France, Patent n° : PCT/EP2017/057295. 2017
Brevet hal-03326378v1

SECRET KEY ESTIMATION METHODS AND DEVICES

Olivier Rioul , Sylvain Guilley
France, Patent n° : France N° 16305386.1. 2016
Brevet hal-03326377v1

METHODS AND DEVICES FOR ESTIMATING SECRET VALUES

Olivier Rioul , Sylvain Guilley
France, Patent n° : Europe N° 15306992.7. 2015
Brevet hal-03326376v1

METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICE

Sylvain Guilley , Annelie Heuser , Olivier Rioul
France, Patent n° : PCT/IB2014/003248. 2014
Brevet hal-03326373v1

Electronic component i.e. smart card, for use in secure module, has input/output interface, and filtering and partitioning module interacting with interface to control access to one peripheral of set of peripherals

Sébastien Briais , Jean-Luc Danger , Thibault Porteboeuf , Sylvain Guilley , Philippe Nguyen
France, Patent n° : FR20110062508. JLD:firewall. 2011
Brevet hal-02412549v1

Method for securing result of cryptographic calculations against attack by injection of faults in chip card in electronic component, involves providing discretionary value processed by processing unit for one of output values of blocks

Sylvain Guilley , Jean-Luc Danger
France, Patent n° : FR20110062509. JLD:resilience. 2011
Brevet hal-02412550v1
Image document

Protection des Accélérateurs Matériels de Cryptographie Symétrique

Sylvain Guilley
Cryptographie et sécurité [cs.CR]. Université Paris-Diderot - Paris VII, 2012
HDR tel-00815544v1