- 65
- 10
- 4
- 2
- 1
Olivier Rioul
82
Documents
Identifiants chercheurs
- rioul
- 0000-0002-8681-8916
- Google Scholar : https://scholar.google.fr/citations?user=X_mSE9IAAAAJ
Présentation
Titres
- Polytechnicien, Ingénieur Général (5e échelon) du Corps des Mines.
- Doctorat (PhD), Habilitation à Diriger les Recherches (HDR).
- Qualifié Professeur des Universités, sections CNU 26 et 61.
- Chevalier de l’Ordre des Palmes Académiques.
- Professeur chargé de cours à l’Ecole Polytechnique, Dépt. de Maths Appliquées.
- Professeur (1re classe) à Télécom ParisTech, LTCI CNRS, Dépt. Comelec.
Missions
- Chargé de mission au Concours Commun Mines-Ponts, Responsable scientifique d’épreuves de mathématiques et observateur d’oral.
- Correspondant du Groupe LIESSE (formation continue pour les professeurs de classes préparatoires scientifiques).
- Ex-responsable du groupe d’enseignement-recherche « Communications Numériques ».
- Ex-ingénieur de recherche à France Télécom (CNET).
Publications
- Théorie de l’information et du codage, Hermes-Science, 286 pages.
- Théorie des Probabilités, Hermes-Science, 364 pages.
- 3 chapitres de livre, 15+ articles de revue, 80+ articles de conférences, 3 brevets.
- h-index > 20, g-index > 77, un article cité +3000 fois, 8 articles cités +100 fois.
Enseignement
- Télécom ParisTech, Analyse, Probabilités, Théorie de l’information, Codage correcteur d’erreurs, Communications numériques, Analyse temps-fréquence.
- École Polytechnique, Probabilités, Statistiques, Traitement du Signal.
- ENSTA ParisTech, Codage de source et de canal.
- Supélec, Théorie de l’information.
- ENS Cachan, Théorie des ondelettes.
- ISAE (Supaéro), ESME-Sudria, Université Paris-Sud 11, Université P. & M. Curie.
Recherche
- Théorie de l’estimation et de l’information, inégalités entropiques, régions de capacité de canaux gaussiens à interférence.
- Analyse par canaux cachés, distingueurs optimaux, contremesures.
- Psychologie expérimentale, analyse mathématique de la loi de Fitts.
- Codage source-canal conjoint, compression binaire robuste aux erreurs de transmission, optimisation taux-distorsion conjointe, codes BCH réels pour le débruitage d’images.
- Théorie des ondelettes, distributions temps-échelle, conception d’ondelettes régulières et de schémas de subdivision, algorithmes rapides.
- Compression d’images, codage en sous-bandes adaptatif et traitement aux bords, critère de norme infinie pour les images biomédicales.
Publications
- 5
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 82
- 32
- 23
- 19
- 11
- 11
- 6
- 6
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 79
- 74
- 16
- 7
- 2
- 2
- 2
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 8
- 6
- 5
- 4
- 6
- 7
- 14
- 6
- 9
- 5
- 2
|
Kissing number of codes: A surveyVIASM. Coding Theory and applications (tentative title), Springer, inPress, Lecture Notes in Mathematics
Chapitre d'ouvrage
hal-03718730v1
|
|
Information theoretic comparison of side-channel distinguishers: Inter-class distance, confusion, and successBernard Candaele; Dimitrios Soudris; Iraklis Anagnostopoulos. Trusted Computing for European Embedded Systems, Springer, pp.187-225, 2015, 978-3-319-09419-9. ⟨10.1007/978-3-319-09420-5_10⟩
Chapitre d'ouvrage
hal-02286944v1
|
|
Be my guesses: The interplay between side-channel leakage metricsMicroprocessors and Microsystems: Embedded Hardware Design , inPress
Article dans une revue
hal-04136994v1
|
|
Side-Channel Expectation-Maximization AttacksIACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (4), pp.774-799. ⟨10.46586/tches.v2022.i4.774-799⟩
Article dans une revue
hal-03718805v1
|
|
Toward finding best linear codes for side-channel protections (extended version)Journal of Cryptographic Engineering, 2022, ⟨10.1007/s13389-022-00305-x⟩
Article dans une revue
hal-04136993v1
|
|
Information theoretic distinguishers for timing attacks with partial profiles: Solving the empty bin issueJournal of Information Security, 2021, Special issue on Cryptography and Encryption, 12 (1), ⟨10.4236/jis.2021.121001⟩
Article dans une revue
hal-02950165v1
|
|
Challenge Codes for Physically Unclonable Functions with Gaussian Delays: A Maximum Entropy ProblemAdvances in Mathematics of Communications, 2020, Special Issue: Latin American Week on Coding and Information, 14 (3), pp.491-505
Article dans une revue
hal-02300795v1
|
|
Best information is most successful: Mutual information and success rate in side-channel analysisIACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (2), pp.49-79. ⟨10.13154/tches.v2019.i2.49-79⟩
Article dans une revue
hal-02287971v1
|
|
On the optimality and practicability of mutual information analysis in some scenariosCryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 2018, 10 (1), pp.101-121. ⟨10.1007/s12095-017-0241-x⟩
Article dans une revue
hal-03750327v1
|
|
Optimal side-channel attacks for multivariate leakages and multiple modelsJournal of Cryptographic Engineering, 2017, 7 (4), pp.331-341. ⟨10.1007/s13389-017-0170-9⟩
Article dans une revue
hal-01629885v1
|
|
Stochastic Collision AttackIEEE Transactions on Information Forensics and Security, 2017, 12 (9), pp.2090 - 2104. ⟨10.1109/TIFS.2017.2697401⟩
Article dans une revue
hal-01629880v1
|
All you ever wanted to know about side-channel attacks and protections (and a forthcoming book)4th Free Silicon Conference (FSiC 2023), Jul 2023, Paris, France
Communication dans un congrès
hal-04153811v1
|
|
|
All you ever wanted to know about side-channel attacks and protections15e Forum International de la Cybersécurité (FIC 2023), Apr 2023, Lille, France
Communication dans un congrès
hal-04136983v1
|
|
Reliability of ring oscillator PUFs with reduced helper data18th International Workshop on Security (IWSEC 2023), Aug 2023, Yokohama, Japan
Communication dans un congrès
hal-04136988v1
|
|
Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings14th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2023), Apr 2023, Munich, Germany. pp.86-104, ⟨10.1007/978-3-031-29497-6_5⟩
Communication dans un congrès
hal-04136982v1
|
|
Maximal leakage of masked implementations using Mrs. Gerber's lemma for min-entropyIEEE International Symposium on Information Theory (ISIT 2023), IEEE, Jun 2023, Taipei, Taiwan
Communication dans un congrès
hal-04136987v1
|
|
Improved alpha-information bounds for higher-order masked cryptographic implementationsIEEE Information Theory Workshop (ITW 2023), IEEE, Apr 2023, Saint Malo, France
Communication dans un congrès
hal-04136985v1
|
A generic information-theoretic framework for evaluating the side-channel security of masked implementations19th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2023), Jun 2023, Cantabria, Spain
Communication dans un congrès
hal-04136986v1
|
|
Unprofiled expectation-maximization attack18th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2022), May 2022, Porquerolles, France
Communication dans un congrès
hal-03718705v1
|
|
|
Side-channel information leakage of code-based masked implementations17th Canadian Workshop on Information Theory (CWIT 2022), Jun 2022, Ottawa, Canada. ⟨10.1109/CWIT55308.2022.9817673⟩
Communication dans un congrès
hal-03718708v1
|
|
Cache-Timing Attack on the SEAL Homomorphic Encryption Library11th International Workshop on Security Proofs for Embedded Systems (PROOFS 2022), Sep 2022, Leuven, Belgium
Communication dans un congrès
hal-03780506v1
|
|
Be my guess: Guessing entropy vs. success rate for evaluating side-channel attacks of secure chips25th Euromicro Conference on Digital System Design (DSD 2022), Aug 2022, Maspalomas, Gran Canaria, Spain
Communication dans un congrès
hal-03718723v1
|
|
Attacking masked cryptographic implementations: Information-theoretic bounds2022 IEEE International Symposium on Information Theory (ISIT 2022), Jun 2022, Espoo, Finland
Communication dans un congrès
hal-03718713v1
|
Evaluation of side-channel attacks using alpha-information18th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2022), May 2022, Porquerolles, France
Communication dans un congrès
hal-03718701v1
|
|
|
Towards Finding Best Linear Codes for Side-Channel Protections10th International Workshop on Security Proofs for Embedded Systems (PROOFS'2021), Sep 2021, Beijing, China
Communication dans un congrès
hal-03328130v1
|
|
On Conditional alpha-Information and its Application to Side-Channel Analysis2021 IEEE Information Theory Workshop (ITW2021), Oct 2021, Kanazawa, Japan
Communication dans un congrès
hal-03323522v1
|
|
Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret2021 IEEE International Symposium on Information Theory (ISIT'21), Jul 2021, Melbourne (virtual), Australia
Communication dans un congrès
hal-03323533v1
|
|
Linear Programming Bounds on the Kissing Number of q-ary Codes2021 IEEE Information Theory Workshop (ITW2021), Oct 2021, Kanazawa, Japan
Communication dans un congrès
hal-03323516v1
|
|
Bent Sequences over Hadamard Codes for Physically Unclonable Functions2021 IEEE International Symposium on Information Theory (ISIT 2021), Jul 2021, Melbourne, Australia
Communication dans un congrès
hal-03240109v1
|
|
The Big Picture of Delay-PUF Dependability24th European Conference on Circuit Theory and Design (ECCTD), IEEE, Sep 2020, Sofia, Bulgaria
Communication dans un congrès
hal-02932063v1
|
|
Persistent Fault Analysis With Few EncryptionsInternational Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2020), Oct 2020, Lugano, Switzerland
Communication dans un congrès
hal-02950171v1
|
|
An information-theoretic model for side-channel attacks in embedded hardware2019 IEEE International Symposium on Information Theory (ISIT), Jul 2019, Paris, France. ⟨10.1109/ISIT.2019.8849763⟩
Communication dans un congrès
hal-02300788v1
|
STAnalyzer: A simple static analysis tool for detecting cache-timing leakages17th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2019), Jun 2019, Prague, Czech Republic
Communication dans un congrès
hal-02300786v1
|
|
|
Confused yet successful: Theoretical computation of distinguishers for monobit leakages in terms of confusion coefficient and SNR14th International Conference on Information Security and Cryptology (Inscrypt 2018), Dec 2018, Fuzhou, China. ⟨10.1007/978-3-030-14234-6_28⟩
Communication dans un congrès
hal-02300768v1
|
|
An improved analysis of reliability and entropy for delay PUFsEuromicro Conference on Digital System Design (DSD'18), Aug 2018, Prague, Czech Republic. ⟨10.1109/DSD.2018.00096⟩
Communication dans un congrès
hal-02288537v1
|
Reliability and entropy of delay PUFs: A theoretical analysis16th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2018), Jun 2018, Lorient, France
Communication dans un congrès
hal-02287933v1
|
|
Confusing information: How confusion improves side-channel analysis for monobit leakages16th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2018), Jun 2018, Lorient, France
Communication dans un congrès
hal-02287934v1
|
|
|
Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problemLatin American Workshop on Coding and Information, Jul 2018, Unicamp-Campinas, Brazil
Communication dans un congrès
hal-02287965v1
|
|
Codes for Side-Channel Attacks and ProtectionsC2SI 2017 - International Conference on Codes, Cryptology, and Information Security, Apr 2017, Rabat, Morocco. pp.35-55, ⟨10.1007/978-3-319-55589-8_3⟩
Communication dans un congrès
hal-01629876v1
|
|
Stochastic Side-Channel Leakage Analysis via Orthonormal DecompositionInt. Conf. Information Technology and Communications Security (SECITC 2017), Jun 2017, Bucharest, Romania
Communication dans un congrès
hal-01628679v1
|
Formalism to assess the entropy and reliability of the loop-PUF15th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2017), Jun 2017, Smolenice, Slovakia
Communication dans un congrès
hal-02287598v1
|
|
|
Template attacks with partial profiles and Dirichlet priors: Application to timing attacksHardware and Architectural Support for Security and Privacy (HASP 2016), Jun 2016, Seoul, South Korea. ⟨10.1145/2948618.2948625⟩
Communication dans un congrès
hal-02300026v1
|
|
PUFs: Standardization and Evaluation2nd IEEE Workshop on Mobile System Technologies (MST 2016), Sep 2016, Milano, Italy. ⟨10.1109/MST.2016.11⟩
Communication dans un congrès
hal-02288475v1
|
|
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (AsiaCrypt 2016), Dec 2016, Hanoi, Vietnam. ⟨10.1007/978-3-662-53887-6_21⟩
Communication dans un congrès
hal-02287426v1
|
Taylor expansion of maximum likelihood attacks, with application to masked and shuffled implementationsCryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France
Communication dans un congrès
hal-02287328v1
|
|
Defining perceived information based on Shannon’s communication theoryCryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France
Communication dans un congrès
hal-02287329v1
|
|
Correlated Extra-Reductions Defeat Blinded Regular ExponentiationCryptographic Hardware and Embedded Systems – CHES 2016, Aug 2016, Santa Barbara, United States. pp.Pages 3-22
Communication dans un congrès
hal-01362463v1
|
|
|
On the Entropy of Physically Unclonable Functions2016 IEEE International Symposium on Information Theory (ISIT'16), Jul 2016, Barcelona, Spain. ⟨10.1109/ISIT.2016.7541835⟩
Communication dans un congrès
hal-02288459v1
|
|
Inter-Class vs. Mutual Information as Side-Channel Distinguishers2016 IEEE International Symposium on Information Theory (ISIT'16), Jul 2016, Barcelona, Spain. ⟨10.1109/ISIT.2016.7541410⟩
Communication dans un congrès
hal-02287308v1
|
A challenge code for maximizing the entropy of PUF responsesCryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France
Communication dans un congrès
hal-02287330v1
|
|
|
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation18th International Conference on Cryptographic Hardware and Embedded Systems (CHES 2016), Aug 2016, Santa Barbara, CA, United States. pp.3-22, ⟨10.1007/978-3-662-53140-2⟩
Communication dans un congrès
hal-03750287v1
|
|
Optimal side-channel attacks for multivariate leakages and multiple modelsPROOFS 2016 Security Proofs for Embedded Systems, Aug 2016, Santa Barbara, United States. ⟨10.1007/s13389-017-0170-9⟩
Communication dans un congrès
hal-02300060v1
|
|
On the optimality and practicability of mutual information analysis in some scenariosArticCrypt 2016, Jul 2016, Longyearbyen, Svalbard, Norway
Communication dans un congrès
hal-02300055v1
|
|
A Key to Success: Success Exponents for Side-Channel Distinguishers16th International Conference on Cryptology in India (IndoCrypt 2015), Dec 2015, Bangalore, India. pp.270-290, ⟨10.1007/978-3-319-26617-6_15⟩
Communication dans un congrès
hal-02287175v1
|
|
Less is More - Dimensionality Reduction from a Theoretical PerspectiveCryptographic Hardware and Embedded Systems -- CHES 2015, Sep 2015, Saint-Malo, France. ⟨10.1007/978-3-662-48324-4_2⟩
Communication dans un congrès
hal-01218072v1
|
Template Attacks, Optimal Distinguishers and the Perceived Information Metric13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium
Communication dans un congrès
hal-02287176v1
|
|
On the optimality of mutual information analysis for discrete leakages13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium
Communication dans un congrès
hal-02300011v1
|
|
|
Good is not good enough: Deriving optimal distinguishers from communication theory16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. pp.55-74, ⟨10.1007/978-3-662-44709-3_4⟩
Communication dans un congrès
hal-02286943v1
|
|
A theoretical study of Kolmogorov-Smirnov distinguishers: Side-channel analysis vs. differential cryptanalysisFifth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2014), Apr 2014, Paris, France. pp.9-28, ⟨10.1007/978-3-319-10175-0_2⟩
Communication dans un congrès
hal-02286939v1
|
|
Masks will fall off: Higher-order optimal distinguishersInternational Conference on the Theory and Application of Cryptology and Information Security (AsiaCrypt), Dec 2014, Kaoshiung, Taiwan. pp.344-365, ⟨10.1007/978-3-662-45608-8_19⟩
Communication dans un congrès
hal-02287072v1
|
|
Attacking suggest boxes in web applications over https using stochastic side-channel algorithms9th International Conference on Risks and Security of Internet and Systems (CRISIS 2014), Aug 2014, Trente, Italy. ⟨10.1007/978-3-319-17127-2_8⟩
Communication dans un congrès
hal-02288408v1
|
When optimal means optimal: Finding optimal distinguishers from the mathematical theory of communication12th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2014), Jun 2014, Annecy, France
Communication dans un congrès
hal-02286940v1
|
|
Revealing the secrets of success: Theoretical efficiency of side-channel distinguishers11th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2013), Jun 2013, Fréjus, France
Communication dans un congrès
hal-02288378v1
|
|
Practical vs. theoretical evaluation of DPA and CPA3rd International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers (CrossFyre'13), Jun 2013, KU Leuven, Belgium
Communication dans un congrès
hal-02286734v1
|
|
|
Time-frequency analysis for second-order attacksSmart Card Research and Advanced Application Conference (CARDIS 2013), Nov 2013, Berlin, Germany. pp.108-122, ⟨10.1007/978-3-319-08302-5_8⟩
Communication dans un congrès
hal-02299996v1
|
|
Comparison between Side-Channel Analysis Distinguishers14th International Conference on Information and Communications Security (ICICS'2012), Oct 2012, Hong Kong, China. pp.331-340, ⟨10.1007/978-3-642-34129-8_30⟩
Communication dans un congrès
hal-02299929v1
|
Some results about the distinction of side-channel distinguishers based on distributions10th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2012), Jun 2012, Saint-Etienne, France
Communication dans un congrès
hal-02286359v1
|
SECRET KEY ESTIMATION METHODS AND DEVICESFrance, Patent n° : US2020/0313845 A1. 2020
Brevet
hal-03326381v1
|
|
SECRET KEY ESTIMATION METHODS AND DEVICESFrance, Patent n° : PCT/EP2017/057295. 2017
Brevet
hal-03326378v1
|
|
METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICEUnited States, Patent n° : US Patent 2017/0270307 A1. 2017
Brevet
hal-03326375v1
|
|
SECRET KEY ESTIMATION METHODS AND DEVICESFrance, Patent n° : France N° 16305386.1. 2016
Brevet
hal-03326377v1
|
|
METHODS AND DEVICES FOR ESTIMATING SECRET VALUESFrance, Patent n° : Europe N° 15306992.7. 2015
Brevet
hal-03326376v1
|
|
METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICEFrance, Patent n° : PCT/IB2014/003248. 2014
Brevet
hal-03326373v1
|
Side-Channel Security. How Much Are You Secure? Mrs. Gerber’s Lemma and MajorizationColloque de l'Institut Mines-Télécom, Risques & Cyber : Sécurité et Résilience, Apr 2023, Palaiseau, France. 2023
Poster de conférence
hal-04136984v1
|
|
|
Rényi Entropy Estimation for Secure Silicon FingerprintsIEEE Information Theory and Applications Workshop (ITA 2020), Feb 2020, Sans Diego, United States. , 2020
Poster de conférence
hal-02950211v1
|
|
Guessing a secret cryptographic key from side-channel leakages2019 IEEE European School of Information Theory (ESIT'19), Apr 2019, Sophia Antipolis, France. 2019
Poster de conférence
hal-02300782v1
|
|
Optimal attacks for multivariate and multi-model side-channel leakages18th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2016), Aug 2016, Santa Barbara, United States. Cryptographic Hardware and Embedded Systems – CHES 2016, 2016
Poster de conférence
hal-02300058v1
|
|
Maximizing the success of a side-channel attack3e colloque de l'Institut Mines-Télécom, Numérique: Grande échelle et complexité (Sécurité, sûreté, risques), Mar 2014, Paris, France. 2014
Poster de conférence
hal-02299999v1
|
|
On optimality of MIA for unknown leakage models and related new practical resultsLejla Batina; Matthew Robshaw. 16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. Springer, Lecture Notes in Computer Science, 8731, 2014, Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings
Poster de conférence
hal-02300004v1
|
|
Success rate exponents for side-channel attacks16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea
Poster de conférence
hal-02300002v1
|
|
Side-channel attacksEuropean Google Doctoral Fellowship Forum, Sep 2013, Zurich, Switzerland. 2013
Poster de conférence
hal-02299991v1
|
|
Success metric: An all-in-one criterion for comparing side-channel distinguishersGuido Bertoni; Jean-Sébastien Coron. 15th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2013), Aug 2013, Santa Barbara, CA, United States. Springer, Lecture Notes in Computer Science, 8086, Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings
Poster de conférence
hal-02299990v1
|