- 29
- 2
- 1
Olivier Rioul
32
Documents
Identifiants chercheurs
- rioul
- 0000-0002-8681-8916
- Google Scholar : https://scholar.google.fr/citations?user=X_mSE9IAAAAJ
Présentation
Titres
- Polytechnicien, Ingénieur Général (5e échelon) du Corps des Mines.
- Doctorat (PhD), Habilitation à Diriger les Recherches (HDR).
- Qualifié Professeur des Universités, sections CNU 26 et 61.
- Chevalier de l’Ordre des Palmes Académiques.
- Professeur chargé de cours à l’Ecole Polytechnique, Dépt. de Maths Appliquées.
- Professeur (1re classe) à Télécom ParisTech, LTCI CNRS, Dépt. Comelec.
Missions
- Chargé de mission au Concours Commun Mines-Ponts, Responsable scientifique d’épreuves de mathématiques et observateur d’oral.
- Correspondant du Groupe LIESSE (formation continue pour les professeurs de classes préparatoires scientifiques).
- Ex-responsable du groupe d’enseignement-recherche « Communications Numériques ».
- Ex-ingénieur de recherche à France Télécom (CNET).
Publications
- Théorie de l’information et du codage, Hermes-Science, 286 pages.
- Théorie des Probabilités, Hermes-Science, 364 pages.
- 3 chapitres de livre, 15+ articles de revue, 80+ articles de conférences, 3 brevets.
- h-index > 20, g-index > 77, un article cité +3000 fois, 8 articles cités +100 fois.
Enseignement
- Télécom ParisTech, Analyse, Probabilités, Théorie de l’information, Codage correcteur d’erreurs, Communications numériques, Analyse temps-fréquence.
- École Polytechnique, Probabilités, Statistiques, Traitement du Signal.
- ENSTA ParisTech, Codage de source et de canal.
- Supélec, Théorie de l’information.
- ENS Cachan, Théorie des ondelettes.
- ISAE (Supaéro), ESME-Sudria, Université Paris-Sud 11, Université P. & M. Curie.
Recherche
- Théorie de l’estimation et de l’information, inégalités entropiques, régions de capacité de canaux gaussiens à interférence.
- Analyse par canaux cachés, distingueurs optimaux, contremesures.
- Psychologie expérimentale, analyse mathématique de la loi de Fitts.
- Codage source-canal conjoint, compression binaire robuste aux erreurs de transmission, optimisation taux-distorsion conjointe, codes BCH réels pour le débruitage d’images.
- Théorie des ondelettes, distributions temps-échelle, conception d’ondelettes régulières et de schémas de subdivision, algorithmes rapides.
- Compression d’images, codage en sous-bandes adaptatif et traitement aux bords, critère de norme infinie pour les images biomédicales.
Publications
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 32
- 32
- 6
- 4
- 3
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 31
- 27
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 7
- 5
- 9
- 5
|
Information theoretic comparison of side-channel distinguishers: Inter-class distance, confusion, and successBernard Candaele; Dimitrios Soudris; Iraklis Anagnostopoulos. Trusted Computing for European Embedded Systems, Springer, pp.187-225, 2015, 978-3-319-09419-9. ⟨10.1007/978-3-319-09420-5_10⟩
Chapitre d'ouvrage
hal-02286944v1
|
|
On the optimality and practicability of mutual information analysis in some scenariosCryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2018, 10 (1), pp.101-121. ⟨10.1007/s12095-017-0241-x⟩
Article dans une revue
hal-03750327v1
|
|
Stochastic Collision AttackIEEE Transactions on Information Forensics and Security, 2017, 12 (9), pp.2090 - 2104. ⟨10.1109/TIFS.2017.2697401⟩
Article dans une revue
hal-01629880v1
|
|
Optimal side-channel attacks for multivariate leakages and multiple modelsJournal of Cryptographic Engineering, 2017, 7 (4), pp.331-341. ⟨10.1007/s13389-017-0170-9⟩
Article dans une revue
hal-01629885v1
|
|
Stochastic Side-Channel Leakage Analysis via Orthonormal DecompositionInt. Conf. Information Technology and Communications Security (SECITC 2017), Jun 2017, Bucharest, Romania
Communication dans un congrès
hal-01628679v1
|
|
Codes for Side-Channel Attacks and ProtectionsC2SI 2017 - International Conference on Codes, Cryptology, and Information Security, Apr 2017, Rabat, Morocco. pp.35-55, ⟨10.1007/978-3-319-55589-8_3⟩
Communication dans un congrès
hal-01629876v1
|
|
Inter-Class vs. Mutual Information as Side-Channel Distinguishers2016 IEEE International Symposium on Information Theory (ISIT'16), Jul 2016, Barcelona, Spain. ⟨10.1109/ISIT.2016.7541410⟩
Communication dans un congrès
hal-02287308v1
|
|
Optimal side-channel attacks for multivariate leakages and multiple modelsPROOFS 2016 Security Proofs for Embedded Systems, Aug 2016, Santa Barbara, United States. ⟨10.1007/s13389-017-0170-9⟩
Communication dans un congrès
hal-02300060v1
|
|
On the optimality and practicability of mutual information analysis in some scenariosArticCrypt 2016, Jul 2016, Longyearbyen, Svalbard, Norway
Communication dans un congrès
hal-02300055v1
|
|
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (AsiaCrypt 2016), Dec 2016, Hanoi, Vietnam. ⟨10.1007/978-3-662-53887-6_21⟩
Communication dans un congrès
hal-02287426v1
|
Taylor expansion of maximum likelihood attacks, with application to masked and shuffled implementationsCryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France
Communication dans un congrès
hal-02287328v1
|
|
Defining perceived information based on Shannon’s communication theoryCryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France
Communication dans un congrès
hal-02287329v1
|
|
|
Less is More - Dimensionality Reduction from a Theoretical PerspectiveCryptographic Hardware and Embedded Systems -- CHES 2015, Sep 2015, Saint-Malo, France. ⟨10.1007/978-3-662-48324-4_2⟩
Communication dans un congrès
hal-01218072v1
|
Template Attacks, Optimal Distinguishers and the Perceived Information Metric13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium
Communication dans un congrès
hal-02287176v1
|
|
|
A Key to Success: Success Exponents for Side-Channel Distinguishers16th International Conference on Cryptology in India (IndoCrypt 2015), Dec 2015, Bangalore, India. pp.270-290, ⟨10.1007/978-3-319-26617-6_15⟩
Communication dans un congrès
hal-02287175v1
|
On the optimality of mutual information analysis for discrete leakages13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium
Communication dans un congrès
hal-02300011v1
|
|
|
Attacking suggest boxes in web applications over https using stochastic side-channel algorithms9th International Conference on Risks and Security of Internet and Systems (CRISIS 2014), Aug 2014, Trente, Italy. ⟨10.1007/978-3-319-17127-2_8⟩
Communication dans un congrès
hal-02288408v1
|
|
Masks will fall off: Higher-order optimal distinguishersInternational Conference on the Theory and Application of Cryptology and Information Security (AsiaCrypt), Dec 2014, Kaoshiung, Taiwan. pp.344-365, ⟨10.1007/978-3-662-45608-8_19⟩
Communication dans un congrès
hal-02287072v1
|
When optimal means optimal: Finding optimal distinguishers from the mathematical theory of communication12th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2014), Jun 2014, Annecy, France
Communication dans un congrès
hal-02286940v1
|
|
|
Good is not good enough: Deriving optimal distinguishers from communication theory16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. pp.55-74, ⟨10.1007/978-3-662-44709-3_4⟩
Communication dans un congrès
hal-02286943v1
|
|
A theoretical study of Kolmogorov-Smirnov distinguishers: Side-channel analysis vs. differential cryptanalysisFifth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2014), Apr 2014, Paris, France. pp.9-28, ⟨10.1007/978-3-319-10175-0_2⟩
Communication dans un congrès
hal-02286939v1
|
Revealing the secrets of success: Theoretical efficiency of side-channel distinguishers11th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2013), Jun 2013, Fréjus, France
Communication dans un congrès
hal-02288378v1
|
|
Practical vs. theoretical evaluation of DPA and CPA3rd International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers (CrossFyre'13), Jun 2013, KU Leuven, Belgium
Communication dans un congrès
hal-02286734v1
|
|
|
Time-frequency analysis for second-order attacksSmart Card Research and Advanced Application Conference (CARDIS 2013), Nov 2013, Berlin, Germany. pp.108-122, ⟨10.1007/978-3-319-08302-5_8⟩
Communication dans un congrès
hal-02299996v1
|
METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICEUnited States, Patent n° : US Patent 2017/0270307 A1. 2017
Brevet
hal-03326375v1
|
|
METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICEFrance, Patent n° : PCT/IB2014/003248. 2014
Brevet
hal-03326373v1
|
|
Optimal attacks for multivariate and multi-model side-channel leakages18th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2016), Aug 2016, Santa Barbara, United States. Cryptographic Hardware and Embedded Systems – CHES 2016, 2016
Poster de conférence
hal-02300058v1
|
|
Maximizing the success of a side-channel attack3e colloque de l'Institut Mines-Télécom, Numérique: Grande échelle et complexité (Sécurité, sûreté, risques), Mar 2014, Paris, France. 2014
Poster de conférence
hal-02299999v1
|
|
On optimality of MIA for unknown leakage models and related new practical resultsLejla Batina; Matthew Robshaw. 16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. Springer, Lecture Notes in Computer Science, 8731, 2014, Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
Poster de conférence
hal-02300004v1
|
|
Success rate exponents for side-channel attacks16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea
Poster de conférence
hal-02300002v1
|
|
Success metric: An all-in-one criterion for comparing side-channel distinguishersGuido Bertoni; Jean-Sébastien Coron. 15th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2013), Aug 2013, Santa Barbara, CA, United States. Springer, Lecture Notes in Computer Science, 8086, Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings
Poster de conférence
hal-02299990v1
|
|
Side-channel attacksEuropean Google Doctoral Fellowship Forum, Sep 2013, Zurich, Switzerland. 2013
Poster de conférence
hal-02299991v1
|