- 28
- 6
- 2
- 1
Christophe Clavier
37
Documents
Identifiants chercheurs
- christophe-clavier
- IdRef : 146458176
- 0000-0002-0767-3684
- VIAF : 193035689
Présentation
Publications
- 10
- 8
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 26
- 7
- 2
- 1
- 1
- 1
- 2
- 2
- 2
- 1
- 2
- 2
- 3
- 3
- 2
- 4
- 2
- 2
- 4
- 2
- 1
- 2
- 1
Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacksCryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2015, Volume 7 (Issue 1)
Article dans une revue
hal-01218086v1
|
|
Practical Improvements of Side-Channel Attacks on AES: Feedback from the 2nd DPA ContestJournal of Cryptographic Engineering, 2014, 4 (4), pp.259-274. ⟨10.1007/s13389-014-0075-9⟩
Article dans une revue
hal-02286726v1
|
SCATTER: A New Dimension in Side-ChannelCOSADE 2018, Apr 2018, Singapour, Singapore. pp.135-152, ⟨10.1007/978-3-319-89641-0_8⟩
Communication dans un congrès
hal-02486847v1
|
|
Quadrivariate Improved Blind Side-Channel Analysis on Boolean Masked AESCOSADE 2018, Apr 2018, Singapour, Singapore. pp.153-167, ⟨10.1007/978-3-319-89641-0_9⟩
Communication dans un congrès
hal-02486906v1
|
|
Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of LeakagesCHES 2017, Sep 2017, Taipei, Taiwan. pp.24-44, ⟨10.1007/978-3-319-66787-4_2⟩
Communication dans un congrès
hal-02486917v1
|
|
Simple Power Analysis on AES Key Expansion RevisitedCryptographic Hardware and Embedded Systems -- CHES 2014, Sep 2014, Busan, South Korea
Communication dans un congrès
hal-01218060v1
|
|
Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis4th International Workshop, COSADE, Mar 2013, Paris, France. pp.80-98, ⟨10.1007/978-3-642-40026-1_6⟩
Communication dans un congrès
hal-00947628v1
|
|
Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis14th International Conference on Cryptology in India, Dec 2013, Mumbai, India. pp.116-135, ⟨10.1007/978-3-319-03515-4_8⟩
Communication dans un congrès
hal-00947642v1
|
|
Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault Analysis10th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013, Aug 2013, Santa-Barbara, California, United States. pp.119-128, ⟨10.1109/FDTC.2013.16⟩
Communication dans un congrès
hal-00947634v1
|
|
ROSETTA for Single Trace AnalysisIndocrypt 2012, Dec 2012, Kolkata, India. pp.140-155, ⟨10.1007/978-3-642-34931-7_9⟩
Communication dans un congrès
hal-00776817v1
|
|
Generating Provable Primes Efficiently on Embedded Devices15th International Conference on Practice and Theory in Public Key Cryptography,, May 2012, Darmstadt, Germany. pp.372-389, ⟨10.1007/978-3-642-30057-8_22⟩
Communication dans un congrès
hal-00947663v1
|
|
|
Square Always Exponentiation12th International Conference on Cryptology in India - INDOCRYPT 2011, Dec 2011, Chennai, India. pp.40-57, ⟨10.1007/978-3-642-25578-6_5⟩
Communication dans un congrès
inria-00633545v1
|
|
Improved Collision-Correlation Power Analysis on First Order Protected AESWorkshop on Cryptographic Hardware and Embedded Systems - CHES 2011, Sep 2011, Nara, Japan. pp.49-62, ⟨10.1007/978-3-642-23951-9_4⟩
Communication dans un congrès
inria-00633527v1
|
New Families of ECM Curves for Cunningham Numbers9th International Symposium, ANTS-IX, Jul 2010, Nancy, France. pp.96-109, ⟨10.1007/978-3-642-14518-6_11⟩
Communication dans un congrès
hal-00947685v1
|
|
|
Horizontal Correlation Analysis on ExponentiationTwelfth International Conference on Information and Communications Security, Universitat Politècnica de Catalunya, Dec 2010, Barcelona, Spain
Communication dans un congrès
inria-00540384v1
|
Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis2010 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Aug 2010, Santa Barbara, France. pp.10-19, ⟨10.1109/FDTC.2010.17⟩
Communication dans un congrès
hal-02486972v1
|
|
How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash FunctionsProvSec 2008, Oct 2008, Shanghai, China. pp.241-253, ⟨10.1007/978-3-540-88733-1_17⟩
Communication dans un congrès
hal-02486997v1
|
|
Fault Analysis Study of IDEACT-RSA 2008, Apr 2008, San Francisco, United States. pp.274-287, ⟨10.1007/978-3-540-79263-5_17⟩
Communication dans un congrès
hal-02486990v1
|
|
Secret External Encodings Do Not Prevent Transient Fault AnalysisCHES 2007, Sep 2007, Vienna, Austria. pp.181-194, ⟨10.1007/978-3-540-74735-2_13⟩
Communication dans un congrès
hal-02487002v1
|
|
On the Implementation of a Fast Prime Generation AlgorithmCHES 2007, Sep 2007, Vienna, Austria. pp.443-449, ⟨10.1007/978-3-540-74735-2_30⟩
Communication dans un congrès
hal-02487006v1
|
|
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM AlgorithmICISS 2007, Dec 2007, Delhi, India. pp.143-155, ⟨10.1007/978-3-540-77086-2_11⟩
Communication dans un congrès
hal-02487009v1
|
|
Why One Should Also Secure RSA Public Key ElementsCHES 2006, Oct 2006, Yokohama, Japan. pp.324-338, ⟨10.1007/11894063_26⟩
Communication dans un congrès
hal-02487012v1
|
|
Fault Analysis of DPA-Resistant AlgorithmsFDTC 2006, Oct 2006, Yokohama, Japan. pp.223-236, ⟨10.1007/11889700_20⟩
Communication dans un congrès
hal-02487018v1
|
|
Correlation Power Analysis with a Leakage ModelCHES 2004, Aug 2004, Cambridge, United States. pp.16-29, ⟨10.1007/978-3-540-28632-5_2⟩
Communication dans un congrès
hal-02487026v1
|
|
Cryptanalysis of RSA Signatures with Fixed-Pattern PaddingCRYPTO 2001, Aug 2001, Santa Barbara, United States. pp.433-439, ⟨10.1007/3-540-44647-8_25⟩
Communication dans un congrès
hal-02487054v1
|
|
Universal Exponentiation Algorithm A First Step towards Provable SPA-ResistanceCHES 2001, May 2001, Paris, France. pp.300-308, ⟨10.1007/3-540-44709-1_25⟩
Communication dans un congrès
hal-02487050v1
|
|
Differential Power Analysis in the Presence of Hardware CountermeasuresCHES 2000, Aug 2000, Worcester, United States. pp.252-263, ⟨10.1007/3-540-44499-8_20⟩
Communication dans un congrès
hal-02487059v1
|
A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption StandardThe New Codebreakers, pp.355-373, 2016, ⟨10.1007/978-3-662-49301-4_22⟩
Chapitre d'ouvrage
hal-02486930v1
|
|
Attacking Block CiphersMarc Joye, Michael Tunstall. Fault Analysis in Cryptography, Springer Berlin Heidelberg, pp.19-35, 2012, Information Security and Cryptography, Print : 978-3-642-29655-0, Online : 978-3-642-29656-7. ⟨10.1007/978-3-642-29656-7_2⟩
Chapitre d'ouvrage
hal-00947669v1
|
|
Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes[Research Report] 2019/1379, IACR Cryptology ePrint Archive. 2019
Rapport
hal-02486894v1
|
|
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm[Research Report] IACR Cryptology ePrint Archive. 2019
Rapport
hal-02486888v1
|
|
SCATTER : A New Dimension in Side-Channel[Research Report] 2017/706, IACR Cryptology ePrint Archive. 2017
Rapport
hal-02486924v1
|
|
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule[Research Report] 2015/877, IACR Cryptology ePrint Archive. 2015
Rapport
hal-02486939v1
|
|
Horizontal Correlation Analysis on Exponentiation[Research Report] 2010/394, IACR Cryptology ePrint Archive. 2010
Rapport
hal-02486982v1
|
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers[Research Report] 2009/299, IACR Cryptology ePrint Archive. 2009
Rapport
hal-00771272v1
|
|
De la sécurité physique des crypto-systèmes embarquésCryptographie et sécurité [cs.CR]. Université de Versailles Saint-Quentin-en-Yvelines, 2007. Français. ⟨NNT : ⟩
Thèse
tel-02487098v1
|