Skip to Main content
Number of documents

208

Curiculum vitae


Sylvain Guilley is CTO at Secure-IC, a company offering security for embedded systems.
Sylvain is also professor at TELECOM-ParisTech, associate research at École Normale Supérieure (ENS), and adjunct professor at the Chinese Academy of Sciences (CAS).
His research interests are trusted computing, cyber-physical security, secure prototyping in FPGA and ASIC, and formal / mathematical methods.
Since 2012, he organizes the PROOFS workshop, which brings together researchers whose objective is to increase the trust in the security of embedded systems.
Sylvain is also lead editor of international standards, such as ISO/IEC 20897 (Physically Unclonable Functions) and ISO/IEC 20085 (Calibration of non-invasive testing tools).
Sylvain has co-authored 250+ research papers and filed 40+ patents.
He is member of the IACR, the IEEE and senior member of the CryptArchi club.
He is alumni from École Polytechnique, TELECOM-ParisTech and Paris 7 (Diderot) University (HDR).


Journal articles41 documents

  • Claude Carlet, Eloi de Chérisey, Sylvain Guilley, Selçuk Kavut, Deng Tang. Intrinsic Resiliency of S-boxes Against Side-Channel Attacks -Best And Worst Scenarios. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2021, 16, pp.203-218. ⟨10.1109/TIFS.2020.3006399⟩. ⟨hal-02915674⟩
  • Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley. Detecting Faults in Inner Product Masking Scheme IPM-FD: IPM with Fault Detection. Journal of Cryptographic Engineering, Springer, 2020, ⟨10.1007/s13389-020-00227-6⟩. ⟨hal-02915673⟩
  • Wei Cheng, Sylvain Guilley, Claude Carlet, Sihem Mesnager, Jean-Luc Danger. Optimizing Inner Product Masking Scheme by A Coding Theory Approach. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2020, 16, pp.220-235. ⟨10.1109/TIFS.2020.3009609⟩. ⟨hal-02919657⟩
  • Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi. Detecting Failures and Attacks via Digital Sensors. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2020, pp.1-1. ⟨10.1109/TCAD.2020.3020921⟩. ⟨hal-03138855⟩
  • Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Darshana Jayasinghe. Information theoretic distinguishers for timing attacks with partial profiles: Solving the empty bin issue. Journal of Information Security, Scientific Research Publishing (SCIRP), In press, Special issue on Cryptography and Encryption. ⟨hal-02950165⟩
  • Alexander Schaub, Olivier Rioul, Jean-Luc Danger, Sylvain Guilley, Joseph Boutros. Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem. Advances in Mathematics of Communications, AIMS, 2020, ⟨10.3934/amc.2020060⟩. ⟨hal-02946481⟩
  • Maamar Ouladj, Nadia El Mrabet, Sylvain Guilley, Philippe Guillot, Gilles Millérioux. On the power of template attacks in highly multivariate context. Journal of Cryptographic Engineering, Springer, 2020, 10 (4), pp.337-354. ⟨10.1007/s13389-020-00239-2⟩. ⟨hal-02935162⟩
  • Debapriya Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, et al.. CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2019, 68 (3), pp.347-361. ⟨10.1109/TC.2018.2875746⟩. ⟨hal-02413209⟩
  • Alexander Schaub, Olivier Rioul, Jean-Luc Danger, Sylvain Guilley, Joseph J. Boutros. Challenge Codes for Physically Unclonable Functions with Gaussian Delays: A Maximum Entropy Problem. Advances in Mathematics of Communications, AIMS, In press. ⟨hal-02300795⟩
  • Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida. Best information is most successful: Mutual information and success rate in side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, IACR, 2019, 2019 (2), pp.49-79. ⟨10.13154/tches.v2019.i2.49-79⟩. ⟨hal-02287971⟩
  • Naghmeh Karimi, Jean-Luc Danger, Sylvain Guilley. Impact of Aging on the Reliability of Delay PUFs. Journal of Electronic Testing, 2018, 34 (5), pp.571-586. ⟨10.1007/s10836-018-5745-6⟩. ⟨hal-02287976⟩
  • Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, et al.. The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. Journal of Hardware and Systems Security, 2018, ⟨10.1007/s41635-018-0035-4⟩. ⟨hal-02288011⟩
  • Èloi de Chèrisey, Sylvain Guilley, Annelie Heuser, Olivier Rioul. On the optimality and practicability of mutual information analysis in some scenarios. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , Springer, 2018, 10 (1), pp.101-121. ⟨10.1007/s12095-017-0241-x⟩. ⟨hal-01645127⟩
  • Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, et al.. On the Performance and Security of Multiplication in GF(2N). Cryptography, 2018, ⟨10.3390/cryptography2030025⟩. ⟨hal-02288010⟩
  • Xuan-Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Tarik Graba, Yves Mathieu, et al.. Cryptographically Secure Shield for Security IPs Protection. IEEE Transcation on Computers, 2017, 66 (2). ⟨hal-02287686⟩
  • Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens. Lightweight Ciphers and their Side-channel Resilience. IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2017, pp.1-16. ⟨10.1109/TC.2017.2757921⟩. ⟨hal-01629886⟩
  • Bruneau Nicolas, Sylvain Guilley, Annelie Heuser, Marion Damien, Olivier Rioul. Optimal side-channel attacks for multivariate leakages and multiple models. Journal of Cryptographic Engineering, Springer, 2017, 7 (4), pp.331-341. ⟨10.1007/s13389-017-0170-9⟩. ⟨hal-01629885⟩
  • Stjepan Picek, Annelie Heuser, Sylvain Guilley. Template attack versus Bayes classifier. Journal of Cryptographic Engineering, Springer, 2017, 7 (4), pp.343-351. ⟨10.1007/s13389-017-0172-7⟩. ⟨hal-01629884⟩
  • Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul. Optimal Side-Channel Attacks for Multivariate Leakages and Multiple Models. Journal of Cryptographic Engineering, 2017, 7 (4), pp.331-341. ⟨hal-02287606⟩
  • Bruneau Nicolas, Claude Carlet, Sylvain Guilley, Annelie Heuser, Emmanuel Prouff, et al.. Stochastic Collision Attack. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2017, 12 (9), pp.2090 - 2104. ⟨10.1109/TIFS.2017.2697401⟩. ⟨hal-01629880⟩
  • Xuan-Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. JCEN, 2016, ⟨10.1007/s13389-016-0129-2⟩. ⟨hal-02287501⟩
  • Jean-Luc Danger, Sylvain Guilley, Ph. Hoogvorst, Cédric Murdica, D. Naccache. Improving the Big Mac Attack on Elliptic Curve Cryptography. LNCS : The new codebreakers, 2016, 9100, pp.374-386. ⟨10.1007/978-3-662-49301-4_23⟩. ⟨hal-02287332⟩
  • Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden, Michaël Timbert. Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter. LNCS: the new codebreakers, 2016, pp.439-454. ⟨10.1007/978-3-662-49301-4_27⟩. ⟨hal-02287333⟩
  • Pablo Rauzy, Sylvain Guilley, Zakaria Najm. Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic. Journal of Cryptographic Engineering, Springer, 2015, pp._. ⟨10.1007/s13389-015-0105-2⟩. ⟨hal-01164591⟩
  • Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He. Exploiting FPGA Block Memories for Protected Cryptographic Implementations. TRETS, 2015, ⟨10.1145/2629552⟩. ⟨hal-02287502⟩
  • Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi. Leakage squeezing: Optimal implementation and security evaluation. Journal of Mathematical Cryptology, De Gruyter, 2014, ⟨10.1515/jmc-2012-001⟩. ⟨hal-02287061⟩
  • Houssem Maghrebi, Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Emmanuel Prouff. Achieving side-channel high-order correlation immunity with leakage squeezing. JCEN, 2014, ⟨10.1007/s13389-013-0067-1⟩. ⟨hal-02286851⟩
  • Claude Carlet, Finley Freibert, Sylvain Guilley, Michael Kiermaier, Jon-Lark Kim, et al.. Higher-order CIS codes. IEEE Transactions on Information Theory, 2014, 60 (9), pp.5283-5295. ⟨10.1109/TIT.2014.2332468⟩. ⟨hal-02286948⟩
  • Christophe Clavier, Guillaume Duc, Jean-Luc Danger, Moulay Aziz Elaabid, Benoît Gérard, et al.. Practical Improvements of Side-Channel Attacks on AES: Feedback from the 2nd DPA Contest. Journal of Cryptographic Engineering, 2014, 4 (4), pp.259-274. ⟨10.1007/s13389-014-0075-9⟩. ⟨hal-02286726⟩
  • Yeow Meng Chee, Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, Han Mao Kiah, et al.. Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions. IEEE Transactions in Information Theory, 2014, ⟨10.1109/TIT.2014.2359207⟩. ⟨hal-02286947⟩
  • Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards. Journal of Cryptographic Engineering, Springer, 2013, 3 (4), pp.241-265. ⟨10.1007/s13389-013-0062-6⟩. ⟨hal-00934333⟩
  • Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Naofumi Homma, Yu-Ichi Hayashi. Advanced Analysis of Faults Injected Through Conducted Intentional ElectroMagnetic Interferences. Transactions on Electromagnetic Compatibility, 2013. ⟨hal-02286327⟩
  • Pablo Rauzy, Sylvain Guilley. A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA. Journal of Cryptographic Engineering, Springer, 2013, pp.1-13. ⟨10.1007/s13389-013-0065-3⟩. ⟨hal-00863914v2⟩
  • Shivam Bhasin, Claude Carlet, Sylvain Guilley. Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions. IACR eprint archive, 2013. ⟨hal-02286840⟩
  • Sylvain Guilley, Shivam Bhasin, Annelie Heuser, Jean-Luc Danger. From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications. JCEN, 2013, ⟨10.1007/s13389-013-0048-4⟩. ⟨hal-02286503⟩
  • N. Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks. Information Security, IET, 2011, 5 (4), pp.181-190. ⟨10.1049/iet-ifs.2010.0238⟩. ⟨hal-02286262⟩
  • Sylvain Guilley, Laurent Sauvage, Florent Flament, Vinh-Nga Vong, Philippe Hoogvorst, et al.. Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics. IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2010, 59 (9), pp.1250-1263. ⟨10.1109/TC.2010.104⟩. ⟨hal-02893100⟩
  • Sylvain Guilley, Laurent Sauvage, Philippe Hoogvorst, Renaud Pacalet, Guido Marco Bertoni, et al.. Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks. IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2008, 57 (11), pp.1482-1497. ⟨10.1109/TC.2008.109⟩. ⟨hal-02893103⟩
  • Sylvain Guilley, Philippe Hoogvorst, Renaud Pacalet. A fast pipelined multi-mode DES architecture operating in IP representation. Systems Integration, Cahners Publishing Company, 2007, 40 (4), pp.479-489. ⟨10.1016/j.vlsi.2006.06.004⟩. ⟨hal-02893105⟩
  • Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu. Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. IEEE Design & Test of Computers, Institute of Electrical and Electronics Engineers, 2007, 24 (6), pp.546-555. ⟨10.1109/MDT.2007.202⟩. ⟨hal-02893104⟩
  • Sylvain Guilley, Renaud Pacalet. SoC security: a war against side-channels. Annals of Telecommunications - annales des télécommunications, Springer, 2004. ⟨hal-02893115⟩

Conference papers135 documents

  • Patrick Solé, Wei Cheng, Sylvain Guilley, Olivier Rioul. Bent Sequences over Hadamard Codes for Physically Unclonable Functions. ISIT 2021, Jul 2021, Melbourne, Australia. ⟨hal-03240109⟩
  • Sylvain Guilley, Michel Le Rolland, Damien Quenson. Implementing Secure Applications thanks to an Integrated Secure Element. 7th International Conference on Information Systems Security and Privacy, INSTICC, Feb 2021, Vienne (en ligne), Austria. pp.566-571, ⟨10.5220/0010298205660571⟩. ⟨hal-03084250v3⟩
  • Jean-Luc Danger, Wei Cheng, Sylvain Guilley, Naghmeh Karimi, Trevor Kroeger. Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2020, Grenoble, France. pp.454-459, ⟨10.23919/DATE48585.2020.9116428⟩. ⟨hal-02946697⟩
  • Md Toufiq Hasan Anik, Rachit Saini, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi. Failure and Attack Detection by Digital Sensors. 2020 IEEE European Test Symposium (ETS), May 2020, Tallinn, Estonia. pp.1-2, ⟨10.1109/ETS48528.2020.9131580⟩. ⟨hal-03034851⟩
  • Laurent Sauvage, Sofiane Takarabt, Youssef Souissi, Sylvain Guilley, Yves Mathieu. Detection of Side-channel Lleakage Through Glitches Using an Automated Tool. International Conference on Defense Systems: Architectures and Technologies (DAT’2020), Apr 2020, Constantine, Algeria. ⟨hal-02951758⟩
  • Md Toufiq Hasan Anik, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi. On the Effect of Aging on Digital Sensors. 2020 33rd International Conference on VLSI Design and 2020 19th International Conference on Embedded Systems (VLSID), Jan 2020, Bangalore, India. pp.189-194, ⟨10.1109/VLSID49098.2020.00050⟩. ⟨hal-03034857⟩
  • Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi. Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. 2020 IEEE International Test Conference (ITC), Nov 2020, Washington, United States. pp.1-5, ⟨10.1109/ITC44778.2020.9325241⟩. ⟨hal-03138824⟩
  • Md Toufiq Hasan Anik, Mohammad Ebrahimabadi, Hamed Pirsiavash, Jean-Luc Danger, Sylvain Guilley, et al.. On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability. 2020 IEEE 38th International Conference on Computer Design (ICCD), Oct 2020, Hartford, United States. pp.506-509, ⟨10.1109/ICCD50377.2020.00091⟩. ⟨hal-03138833⟩
  • Mohammad Ebrahimabadi, Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi. Using Digital Sensors to Leverage Chips' Security. 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), Dec 2020, Washington, United States. pp.1-6, ⟨10.1109/PAINE49178.2020.9337730⟩. ⟨hal-03138811⟩
  • Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, et al.. Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks. Constructive Side-Channel Analysis and Secure Design. COSADE 2020, Apr 2020, Lugano, Switzerland. pp.254-274, ⟨10.1007/978-3-030-68773-1_12⟩. ⟨hal-03138848⟩
  • Alexander Schaub, Jean-Luc Danger, Olivier Rioul, Sylvain Guilley. The Big Picture of Delay-PUF Dependability. 24th European Conference on Circuit Theory and Design (ECCTD), IEEE, Sep 2020, Sofia, Bulgaria. ⟨hal-02932063⟩
  • Sébastien Carré, Sylvain Guilley, Olivier Rioul. Persistent Fault Analysis With Few Encryptions. International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2020), Oct 2020, Lugano, Switzerland. ⟨hal-02950171⟩
  • Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage, et al.. Cache-Timing Attacks Still Threaten IoT Devices. 3rd International Conference on Codes, Cryptology, and Information Security (C2SI 2019), Apr 2019, Rabat, Morocco. pp.13-30, ⟨10.1007/978-3-030-16458-4_2⟩. ⟨hal-02319488⟩
  • Guillaume Gautier, Maguy Le Glatin, Safwan El Assad, Wassim Hamidouche, Olivier Déforges, et al.. Hardware Implementation of Lightweight Chaos-Based Stream Cipher. International Conference on Cyber-Technologies and Cyber-Systems, Sep 2019, Porto, Portugal. 5 p. ⟨hal-02184571⟩
  • Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad. Speed-up of SCA Attacks on 32-bit Multiplications. International Conference on Codes, Cryptology And Information Security, Apr 2019, Rabat, Morocco. pp.31-39. ⟨hal-02184594⟩
  • Jean-Luc Danger, Sylvain Guilley, Alexander Schaub. Two-Metric Helper Data for Highly Robust and Secure Delay PUFs. 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI), Jun 2019, Otranto, Italy. pp.184-188, ⟨10.1109/IWASI.2019.8791249⟩. ⟨hal-02302114⟩
  • Etienne Tehrani, Tarik Graba, Abdelmalek Si Merabet, Sylvain Guilley, Jean-Luc Danger. Classification of Lightweight Block Ciphers for Specific Processor Accelerated Implementations. 2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS), Nov 2019, Genoa, Italy. pp.747-750, ⟨10.1109/ICECS46596.2019.8965156⟩. ⟨hal-02517585⟩
  • Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley. Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection. Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, Aug 2019, atlanta, United States. pp.17, ⟨10.29007/fv2n⟩. ⟨hal-03037597⟩
  • Alexander Schaub, Sylvain Guilley, Olivier Rioul. STAnalyzer: A simple static analysis tool for detecting cache-timing leakages. 17th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2019), Jun 2019, Prague, Czech Republic. ⟨hal-02300786⟩
  • Eloi De Cherisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida. An information-theoretic model for side-channel attacks in embedded hardware. 2019 IEEE International Symposium on Information Theory (ISIT 2019), Jul 2019, Paris, France. ⟨hal-02300788⟩
  • Guillaume Gautier, Safwan Assad, Olivier Déforges, Sylvain Guilley, Adrien Facon, et al.. Enhanced Software Implementation of a Chaos-Based Stream Cipher. SECURWARE 2018, Sep 2018, Venise, Italy. pp.128-133. ⟨hal-02157298⟩
  • Sebastien Carre, Matthieu Desjardins, Adrien Facon, Sylvain Guilley. OpenSSL Bellcore's Protection Helps Fault Attack. 2018 21st Euromicro Conference on Digital System Design (DSD), Aug 2018, Prague, France. pp.500-507, ⟨10.1109/DSD.2018.00089⟩. ⟨hal-02317457⟩
  • Kais Chibani, Adrien Facon, Sylvain Guilley, Youssef Souissi. Technology-agnostic power optimization for AES block cipher. ICECS, Dec 2018, Bordeaux, France. pp.397-400, ⟨10.1109/ICECS.2018.8617921⟩. ⟨hal-02915635⟩
  • Naghmeh Karimi, Sylvain Guilley, Jean-Luc Danger. On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis.. IOLTS, Jul 2018, Platja d'Aro, Spain. ⟨10.1109/IOLTS.2018.8474089⟩. ⟨hal-02288013⟩
  • Naghmeh Karimi, Sylvain Guilley, Jean-Luc Danger. Impact of Aging on Template Attacks. GLSVLSI, May 2018, Chicago, United States. pp.455-458, ⟨10.1145/3194554.3194638⟩. ⟨hal-02412366⟩
  • Sofiane Takarabt, Kais Chibani, Youssef Souissi, Laurent Sauvage, Sylvain Guilley, et al.. Pre-Silicon Embedded System Evaluation as new EDA for Security Verification. International Verification and Security Workshop (IVSW), Jun 2018, Platja d’Aro, Spain. ⟨hal-02287930⟩
  • Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, et al.. CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity. 2018 21st Euromicro Conference on Digital System Design (DSD), Aug 2018, Prague, Czech Republic. pp.529-536, ⟨10.1109/DSD.2018.00093⟩. ⟨hal-01900361⟩
  • Moulay Elaabid, Khaled Karray, Jean-Luc Danger, Sylvain Guilley. Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection. 12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.109-128, ⟨10.1007/978-3-030-20074-9_9⟩. ⟨hal-02294610⟩
  • Alexander Schaub, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul. An improved analysis of reliability and entropy for delay PUFs. Euromicro Conference on Digital System Design (DSD'18), Aug 2018, Prague, Czech Republic. ⟨hal-02288537⟩
  • Alexander Schaub, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul. Reliability and entropy of delay PUFs: A theoretical analysis. 16th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2018), Jun 2018, Lorient, France. ⟨hal-02287933⟩
  • Alexander Schaub, Olivier Rioul, Joseph Boutros, Jean-Luc Danger, Sylvain Guilley. Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem. Latin American Workshop on Coding and Information, Jul 2018, Unicamp-Campinas, Brazil. ⟨hal-02287965⟩
  • Eloi De Cherisey, Sylvain Guilley, Olivier Rioul. Confused yet successful: Theoretical computation of distinguishers for monobit leakages in terms of confusion coefficient and SNR. 14th International Conference on Information Security and Cryptology (Inscrypt 2018), Dec 2018, Fuzhou, China. ⟨hal-02300768⟩
  • Eloi de Chérisey, Sylvain Guilley, Olivier Rioul. Confusing information: How confusion improves side-channel analysis for monobit leakages. 16th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2018), Jun 2018, Lorient, France. ⟨hal-02287934⟩
  • Philippe Maurine, Sylvain Guilley. Impacts of Technology Trends on Physical Attacks?. COSADE: Constructive Side-Channel Analysis and Secure Design, Apr 2017, Paris, France. pp.190-206, ⟨10.1007/978-3-319-64647-3_12⟩. ⟨lirmm-01690188⟩
  • Sylvain Guilley, Annelie Heuser, Olivier Rioul. Codes for Side-Channel Attacks and Protections. C2SI 2017 - International Conference on Codes, Cryptology, and Information Security, Apr 2017, Rabat, Morocco. pp.35-55, ⟨10.1007/978-3-319-55589-8_3⟩. ⟨hal-01629876⟩
  • Jean-Luc Danger, Sylvain Guilley, Philippe Nguyen, Robert Nguyen, Youssef Souissi. Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow. DATE, Dec 2017, lausanne, Switzerland. ⟨10.23919/DATE.2017.7927159⟩. ⟨hal-02412314⟩
  • Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'H, Sylvain Guilley. Impact of the switching activity on the aging of delay-PUFs. ETS, May 2017, Limassol, Greece. ⟨10.1109/ETS.2017.7968223⟩. ⟨hal-02412489⟩
  • Jean-Luc Danger, Olivier Rioul, Sylvain Guilley, Alexander Schaub. Formalism to assess the entropy and reliability of the loop-PUF. 15th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2017), Jun 2017, Smolenice, Slovakia. ⟨hal-02287598⟩
  • Stjepan Picek, Annelie Heuser, Alan Jovic, Simone Ludwig, Sylvain Guilley, et al.. Side-channel analysis and machine learning: A practical perspective. International Joint Conference on Neural Networks (IJCNN), May 2017, Anchorage, United States. ⟨hal-01628681⟩
  • Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy. Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks. PROOFS: Security Proofs for Embedded Systems 2016, Aug 2016, San, United States. ⟨hal-01362552⟩
  • Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'H, Sylvain Guilley. Predictive Aging of Reliability of Two Delay PUFs. SPACE, Dec 2016, Hyderabad, India. ⟨10.1007/978-3-319-49445-6_12⟩. ⟨hal-02412243⟩
  • Margaux Dugardin, Papachristodoulou Louiza, Zakaria Najm, Lejla Batina, Jean-Luc Danger, et al.. Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. Constructive Side-Channel Analysis and Secure Design - COSADE 2016, Apr 2016, Graz, Austria. pp 88-108. ⟨hal-01362466⟩
  • Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul. Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. Cryptographic Hardware and Embedded Systems – CHES 2016, Aug 2016, Santa Barbara, United States. pp.Pages 3-22. ⟨hal-01362463⟩
  • Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens. Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?. RFIDSec 2016: 12th Workshop on RFID and IoT Security, Nov 2016, Hong Kong, Hong Kong SAR China. ⟨hal-01402238⟩
  • Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, et al.. Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes. TrustCom-16, Aug 2016, Tianjin, China. ⟨hal-02287456⟩
  • Jean-Luc Danger, Sylvain Guilley, Philippe Nguyen, Olivier Rioul. PUFs: Standardization and Evaluation. 2nd IEEE Workshop on Mobile System Technologies (MST 2016), Sep 2016, Milano, Italy. ⟨hal-02288475⟩
  • Olivier Rioul, Patrick Solé, Sylvain Guilley, Jean-Luc Danger. On the Entropy of Physically Unclonable Functions. 2016 IEEE International Symposium on Information Theory (ISIT'16), Jul 2016, Barcelona, Spain. ⟨hal-02288459⟩
  • Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Annelie Heuser. Defining perceived information based on Shannon’s communication theory. Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France. ⟨hal-02287329⟩
  • Olivier Rioul, Annelie Heuser, Sylvain Guilley, Jean-Luc Danger. Inter-Class vs. Mutual Information as Side-Channel Distinguishers. 2016 IEEE International Symposium on Information Theory (ISIT'16), Jul 2016, Barcelona, Spain. ⟨hal-02287308⟩
  • Olivier Rioul, Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, François-Xavier Standaert. Taylor expansion of maximum likelihood attacks, with application to masked and shuffled implementations. Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France. ⟨hal-02287328⟩
  • Olivier Rioul, Patrick Solé, Sylvain Guilley, Jean-Luc Danger. A challenge code for maximizing the entropy of PUF responses. Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France. ⟨hal-02287330⟩
  • Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-Xavier Standaert, et al.. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (AsiaCrypt 2016), Dec 2016, Hanoi, Vietnam. ⟨hal-02287426⟩
  • Eloi De Cherisey, Sylvain Guilley, Annelie Heuser, Olivier Rioul. On the optimality and practicability of mutual information analysis in some scenarios. ArticCrypt 2016, Jul 2016, Longyearbyen, Svalbard, Norway. ⟨hal-02300055⟩
  • Eloi De Cherisey, Sylvain Guilley, Olivier Rioul, Darshana Jayasinghe. Template attacks with partial profiles and Dirichlet priors: Application to timing attacks. Hardware and Architectural Support for Security and Privacy (HASP 2016), Jun 2016, Seoul, South Korea. ⟨hal-02300026⟩
  • Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Marion Damien, Olivier Rioul. Optimal side-channel attacks for multivariate leakages and multiple models. PROOFS 2016 Security Proofs for Embedded Systems, Aug 2016, Santa Barbara, United States. ⟨hal-02300060⟩
  • Henitsoa Rakotomalala, Xuan Thuy Ngo, Zakaria Najm, Jean-Luc Danger, Sylvain Guilley. Private Circuits II versus Fault Injection Attacks. Reconfig 2015, Dec 2015, Mayan Riviera, Mexico. ⟨hal-01240244⟩
  • Xuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Olivier Emery. Hardware property checker for run-time Hardware Trojan detection. Euromicro Conference on Digital System Design (DSD) 2015, Aug 2015, Trondheim, Norway. ⟨10.1109/ECCTD.2015.7300085⟩. ⟨hal-01240226⟩
  • Xuan Thuy Ngo, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2015, May 2015, McLean, United States. ⟨10.1109/HST.2015.7140242⟩. ⟨hal-01240228⟩
  • Bruneau Nicolas, Sylvain Guilley, Annelie Heuser, Marion Damien, Olivier Rioul. Less is More - Dimensionality Reduction from a Theoretical Perspective. Cryptographic Hardware and Embedded Systems -- CHES 2015, Sep 2015, Saint-Malo, France. ⟨hal-01218072⟩
  • Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay. From theory to practice of private circuit: A cautionary note. ICCD, Oct 2015, New York, United States. ⟨10.1109/ICCD.2015.7357117⟩. ⟨hal-02412245⟩
  • Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Debapriya Basu, Jean-Luc Danger, et al.. Integrated Sensor: A Backdoor for Hardware Trojan Insertions?. Euromicro Conference on Digital System Design (DSD) 2015, Aug 2015, Funchal, Portugal. ⟨10.1109/DSD.2015.119⟩. ⟨hal-01240221⟩
  • Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul. Less is more: Dimensionality reduction from a theoretical perspective. 17th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015), Sep 2015, Saint-Malo, France. ⟨hal-02287177⟩
  • Eloi De Cherisey, Annelie Heuser, Sylvain Guilley, Olivier Rioul. On the optimality of mutual information analysis for discrete leakages. 13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium. ⟨hal-02300011⟩
  • Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-Xavier Standaert. Template Attacks, Optimal Distinguishers and the Perceived Information Metric. 13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium. ⟨hal-02287176⟩
  • Eloi de Chérisey, Annelie Heuser, Sylvain Guilley, Olivier Rioul. A Key to Success: Success Exponents for Side-Channel Distinguishers. 16th International Conference on Cryptology in India (IndoCrypt 2015), Dec 2015, Bangalore, India. pp.270-290. ⟨hal-02287175⟩
  • Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, et al.. A Pre-processing Composition for Secret Key Recovery on Android Smartphone. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.76-91, ⟨10.1007/978-3-662-43826-8_6⟩. ⟨hal-01400921⟩
  • Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi. Orthogonal Direct Sum Masking. 8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.40-56, ⟨10.1007/978-3-662-43826-8_4⟩. ⟨hal-01400919⟩
  • Pablo Rauzy, Sylvain Guilley. Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA. Fault Diagnosis and Tolerance in Cryptography, Sep 2014, Busan, South Korea. ⟨10.1109/FDTC.2014.17⟩. ⟨hal-01071425⟩
  • Pablo Rauzy, Sylvain Guilley. Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security. Program Protection and Reverse Engineering Workshop 2014, Jan 2014, San Diego, CA, United States. pp.Article No. 2, ⟨10.1145/2556464.2556466⟩. ⟨hal-00939473v2⟩
  • Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. EMC, May 2014, Tokyo, Japan. ⟨hal-02412040⟩
  • Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. Analysis and Improvements of the DPA Contest v4 Implementation. SPACE, Oct 2014, Pune, India. ⟨10.1007/978-3-319-12060-7_14⟩. ⟨hal-02288411⟩
  • Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. Side-channel leakage and trace compression using normalized inter-class variance.. HASP, Jun 2014, Minneapolis, United States. ⟨10.1145/2611765.2611772⟩. ⟨hal-02412117⟩
  • Michaël Timbert, Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden. HCODE: Hardware-Enhanced Real-Time CFI. PPREW@ACSAC 2014, Dec 2014, New Orleans, United States. ⟨10.1145/2689702.2689708⟩. ⟨hal-01575947⟩
  • Xuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, Zakaria Najm. Encoding the State of Integrated Circuits: a Proactive and Reactive Protection against Hardware Trojans Horses. Workshop on Embedded Systems Security (WESS 2014), Oct 2014, New Delhi, India. ⟨10.1145/2668322.2668329⟩. ⟨hal-01240242⟩
  • Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, et al.. DRECON: DPA Resistant Encryption by Construction. Africacrypt, May 2014, Marrakech, Morocco. ⟨10.1007/978-3-319-06734-6_25⟩. ⟨hal-02412067⟩
  • Jean-Luc Danger, Sylvain Guilley, Florian Praden. Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding. PPREW, Jan 2014, San Diego, United States. ⟨10.1145/2556464.2556469⟩. ⟨hal-02412068⟩
  • Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. Method Taking into Account Process Dispersions to Detect Hardware Trojan Horse by Side-Channel. PROOFS: Security Proofs for Embedded Systems 2014, Sep 2014, BUSAN, South Korea. ⟨hal-01240241⟩
  • Jean-Michel Cioranesco, Jean-Luc Danger, Tarik Graba, Sylvain Guilley, Yves Mathieu, et al.. Cryptographically secure shields. HOST 2014 - IEEE International Symposium on Hardware-Oriented Security and Trust, May 2014, Washington, United States. pp.25 - 31, ⟨10.1109/HST.2014.6855563⟩. ⟨hal-01110463⟩
  • Annelie Heuser, Olivier Rioul, Sylvain Guilley. When optimal means optimal: Finding optimal distinguishers from the mathematical theory of communication. 12th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2014), Jun 2014, Annecy, France. ⟨hal-02286940⟩
  • Annelie Heuser, Olivier Rioul, Sylvain Guilley. A theoretical study of Kolmogorov-Smirnov distinguishers: Side-channel analysis vs. differential cryptanalysis. Fifth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2014), Apr 2014, Paris, France. pp.9-28. ⟨hal-02286939⟩
  • Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, et al.. Attacking suggest boxes in web applications over https using stochastic side-channel algorithms. 9th International Conference on Risks and Security of Internet and Systems (CRISIS 2014), Aug 2014, Trente, Italy. ⟨hal-02288408⟩
  • Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul. Masks will fall off: Higher-order optimal distinguishers. International Conference on the Theory and Application of Cryptology and Information Security (AsiaCrypt), Dec 2014, Kaoshiung, Taiwan. pp.344-365. ⟨hal-02287072⟩
  • Annelie Heuser, Olivier Rioul, Sylvain Guilley. Good is not good enough: Deriving optimal distinguishers from communication theory. 16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. pp.55-74. ⟨hal-02286943⟩
  • Amir Moradi, Sylvain Guilley, Annelie Heuser. detecting hidden leakage. ACNS, Jun 2014, lausanne, Switzerland. ⟨hal-02412066⟩
  • Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia. Boosting High-Order Correlation Attacks by Dimensionality Reduction. SPACE, Oct 2014, Pune, India. ⟨10.1007/978-3-319-12060-7_13⟩. ⟨hal-02286958⟩
  • Hélène Le Bouder, Guilley Sylvain, Bruno Robisson, Assia Tria. Fault Injection to Reverse Engineer DES-like Cryptosystems. The Sixth International Symposium on Foundations & Practice of Security FPS'2013, Oct 2013, La Rochelle, France. ⟨emse-00907674⟩
  • Claude Carlet, Sylvain Guilley. Side-Channel Indistinguishability. HASP, Jun 2013, Tel Aviv, Israel. pp.9:1-9:8, ⟨10.1145/2487726.2487735⟩. ⟨hal-00826618v6⟩
  • Sylvain Guilley, Marion Damien, Souissi Youssef, Antoine Wurcker. Software Camouflage. Foundations and Practice of Security -- FPS 2013, Oct 2013, La Rochelle, France. ⟨hal-01218046⟩
  • Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. A Low-Entropy First-Degree Secure Provable Masking Scheme for Resource-Constrained Devices. WESS, Sep 2013, Montreal, Canada. ⟨10.1145/2527317.2527324⟩. ⟨hal-02412039⟩
  • Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria. Fault Injection to Reverse Engineer DES-Like Cryptosystems. Chip to cloud security forum, Sep 2013, Nice, France. ⟨cea-01094248⟩
  • Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria. Fault Injection to Reverse Engineer pseudo-DES Cryptosystems. Chip to cloud, Sep 2013, Nice, France. ⟨emse-00907708⟩
  • Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage. Hardware Trojan Horses in Cryptographic IP Cores. FDTC (Fault Detection and Tolerance in Cryptography), Aug 2013, Santa Barbara, United States. pp.15-29, ⟨10.1109/FDTC.2013.15⟩. ⟨hal-00855146v2⟩
  • Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria. Fault Injection to Reverse Engineer DES-like Cryptosystems. Foundations and Practice of Security - 6th International Symposium, FPS 2013, , 2013, La Rochelle, France. ⟨hal-01818570⟩
  • Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, et al.. Time-frequency analysis for second-order attacks. Smart Card Research and Advanced Application Conference (CARDIS 2013), Nov 2013, Berlin, Germany. pp.108-122. ⟨hal-02299996⟩
  • Annelie Heuser, Sylvain Guilley, Olivier Rioul. Practical vs. theoretical evaluation of DPA and CPA. 3rd International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers (CrossFyre'13), Jun 2013, KU Leuven, Belgium. ⟨hal-02286734⟩
  • Annelie Heuser, Sylvain Guilley, Olivier Rioul. Revealing the secrets of success: Theoretical efficiency of side-channel distinguishers. 11th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2013), Jun 2013, Fréjus, France. ⟨hal-02288378⟩
  • Sébastien Briais, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, David Naccache, et al.. Random Active Shield. Fault Diagnosis and Tolerance in Cryptography, Sep 2012, Leuven, Belgium. 11 p., ⟨10.1109/FDTC.2012.11⟩. ⟨hal-00721569v2⟩
  • Sylvain Guilley, Jean-Luc Danger, Robert Nguyen, Philippe Nguyen. System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion. ICISTM, Mar 2012, Grenoble, France. pp.433-438, ⟨10.1007/978-3-642-29166-1_41⟩. ⟨hal-00701990v2⟩
  • Nicolas Debande, Youssef Souissi, Moulay Aziz Elaabid, Sylvain Guilley, Jean-Luc Danger. Wavelet Transform Based Pre-processing for Side Channel Analysis. HASP, Dec 2012, Vancouver, Canada. ⟨10.1109/MICROW.2012.15⟩. ⟨hal-02411932⟩
  • Houssem Maghrebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger. Optimal First-Order Masking with Linear and Non-Linear Bijections. AfricaCrypt, Jul 2012, Ifrane, Morocco. ⟨10.1007/978-3-642-31410-0_22⟩. ⟨hal-02411869⟩
  • Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. From cryptography to hardware: analyzing embedded Xilinx BRAM for cryptographic applications. HASP, Dec 2012, Vancouver, Canada. ⟨10.1109/MICROW.2012.11⟩. ⟨hal-02411933⟩
  • Briais Sébastien, Sylvain Guilley, Jean-Luc Danger. A formal study of two physical countermeasures against side channel attacks. PROOFS, Sep 2012, Leuven, Belgium. ⟨10.1007/s13389-013-0054-6⟩. ⟨hal-02286504⟩
  • Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger. Register Leakage Masking Using Gray Code. HOST, Jun 2012, San Francisco, United States. ⟨10.1109/HST.2012.6224316⟩. ⟨hal-02411870⟩
  • Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger. A First-Order Leak-Free Masking Countermeasure. CT-RSA, Feb 2012, San Francisco, CA, United States. pp.156-170, ⟨10.1007/978-3-642-27954-6_10⟩. ⟨hal-02288316⟩
  • Youssef Souissi, Shivam Bhasin, Maxime Nassar, Sylvain Guilley, Jean-Luc Danger. Towards Different Flavors of Combined Side Channel Attacks. CT-RSA, Feb 2012, San Francisco, United States. pp.245-259, ⟨10.1007/978-3-642-27954-6_16⟩. ⟨hal-02288312⟩
  • Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi. Leakage Squeezing of Order Two. IndoCypt, Dec 2012, Kolkata, India. ⟨10.1007/978-3-642-34931-7_8⟩. ⟨hal-02411906⟩
  • Zhoua Cherif Jouini, Jean-Luc Danger, Sylvain Guilley, Lilian Bossuet. An Easy-to-Design PUF based on a Single Oscillator: the Loop PUF. 15th Euromicro Conference on Digital System Design(DSD), Sep 2012, Cesme, Izmir, Turkey. 7 p. ⟨hal-00753216⟩
  • Maxime Nassar, Youssef Souissi, Sylvain Guilley, Jean-Luc Danger. RSM: a Small and Fast Countermeasure for AES, Secure against 1st and 2nd-order Zero-Offset SCAs. Design Automation and Test in Europe, Mar 2012, Desden, Germany. pp.1173-1178. ⟨hal-00666337⟩
  • Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, et al.. On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems. 6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.169-178, ⟨10.1007/978-3-642-30955-7_15⟩. ⟨hal-01534305⟩
  • Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Naofumi Homma, Yu-Ichi Hayashi. A Fault Model for Conducted Intentional ElectroMagnetic Interferences. EMC, Aug 2012, Pittsburgh, United States. pp.788-793, ⟨10.1109/ISEMC.2012.6351664⟩. ⟨hal-02411875⟩
  • Cedric Murdica, Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, David Naccache. Low-Cost Countermeasure against RPA. CARDIS 2012, Nov 2012, Graz, Austria. pp.106-122. ⟨hal-00799421⟩
  • Cedric Murdica, Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, David Naccache. Same Values Power Analysis Using Special Points on Elliptic Curves. COSADE 2012 - Third International Workshop Constructive Side-Channel Analysis and Secure Design, May 2012, Darmstadt, Germany. pp.Cédric Murdica, ⟨10.1007/978-3-642-29912-4_14⟩. ⟨hal-00686565⟩
  • Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guilley, et al.. 3D Hardware Canaries. CHES 2012 - 14th International Workshop Cryptographic Hardware and Embedded Systems, Sep 2012, Leuven, Belgium. pp.1-22, ⟨10.1007/978-3-642-33027-8_1⟩. ⟨hal-01111533⟩
  • Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger. Comparison between Side-Channel Analysis Distinguishers. 14th International Conference on Information and Communications Security (ICICS'2012), Oct 2012, Hong Kong, China. pp.331-340. ⟨hal-02299929⟩
  • Houssem Maghrebi, Sylvain Guilley, Olivier Rioul, Jean-Luc Danger. Some results about the distinction of side-channel distinguishers based on distributions. 10th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2012), Jun 2012, Saint-Etienne, France. ⟨hal-02286359⟩
  • Sylvain Guilley, Olivier Meynard, Maxime Nassar, Guillaume Duc, Philippe Hoogvorst, et al.. Vade Mecum on Side-Channels Attacks and Countermeasures for the Designer and the Evaluator. Design & Technology of Integrated Systems, Apr 2011, Athens, Greece. pp.6, ⟨10.1109/DTIS.2011.5941419⟩. ⟨hal-00579020v2⟩
  • Sylvain Guilley, Karim Khalfallah, Victor Lomne, Jean-Luc Danger. Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. 5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩. ⟨hal-01573296⟩
  • Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger. Leakage Squeezing Countermeasure against High-Order Attacks. 5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩. ⟨hal-01573295⟩
  • Nicolas Debande, Youssef Souissi, Thanh-Ha Le, Sylvain Guilley, Jean-Luc Danger. A Multiresolution Time-Frequency Analysis Based Side Channel Attacks. WIFS Poster Session, Nov 2011, Iguacu Falls, Brazil. ⟨hal-02411850⟩
  • Manuel San Pedro, Mate Soos, Sylvain Guilley. FIRE: fault injection for reverse engineering. 5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.280-293, ⟨10.1007/978-3-642-21040-2_20⟩. ⟨hal-00690868⟩
  • Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament. Entropy-based Power Attack. Hardware-Oriented Security and Trust, Jun 2010, Anaheim, CA, United States. pp.1-6, ⟨10.1109/HST.2010.5513124⟩. ⟨hal-00618482v2⟩
  • Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane. Fault Injection Resilience. Fault Diagnosis and Tolerance in Cryptography, Aug 2010, Santa Barbara, United States. pp.51-65, ⟨10.1109/FDTC.2010.15⟩. ⟨hal-00482194v9⟩
  • Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Tarik Graba, Jean-Luc Danger. WDDL is Protected Against Setup Time Violation Attacks. CHES, Sep 2009, Lausanne, Switzerland. pp.73-83, ⟨10.1109/FDTC.2009.40⟩. ⟨hal-00410135⟩
  • Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Yves Mathieu, Maxime Nassar. Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints.. Design, Automation & Test in Europe Conference & Exhibition, 2009. DATE '09., Apr 2009, NICE, France. pp.640-645. ⟨hal-00325417v3⟩
  • Houssem Maghrebi, Jean-Luc Danger, Florent Flament, Sylvain Guilley, Laurent Sauvage. Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks. SCS, Nov 2009, Jerba, Tunisia. 6 p., ⟨10.1109/ICSCS.2009.5412597⟩. ⟨hal-00425523v4⟩
  • Shivam Bhasin, Jean-Luc Danger, Florent Flament, Tarik Graba, Sylvain Guilley, et al.. Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow. ReConFig, Dec 2009, Cancún, Mexico. pp.213 - 218, ⟨10.1109/ReConFig.2009.50⟩. ⟨hal-00411843v3⟩
  • Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet. Silicon-level Solutions to Counteract Passive and Active Attacks. FDTC, Aug 2008, Washington, DC, United States. pp.3-17, ⟨10.1109/FDTC.2008.18⟩. ⟨hal-00311431⟩
  • Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Philippe Hoogvorst. Area Optimization of Cryptographic Co-Processors Implemented in Dual-Rail with Precharge Positive Logic. International Conference on Field Programmable Logic and Applications, Sep 2008, Heidelberg, Germany. pp.161-166, ⟨10.1109/FPL.2008.4629925⟩. ⟨hal-00320425v2⟩
  • Sylvain Guilley, Sumanta Chaudhuri, Laurent Sauvage, Tarik Graba, Jean-Luc Danger, et al.. Shall we trust WDDL?. Future of Trust in Computing, Jun 2008, Berlin, Germany. pp.208-215, ⟨10.1007/978-3-8348-9324-6_22⟩. ⟨hal-00409024⟩
  • Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Tarik Graba, Yves Mathieu. Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs. Secure System Integration and Reliability Improvement, Jul 2008, Yokohama, Japan. pp.16-23, ⟨10.1109/SSIRI.2008.31⟩. ⟨hal-00259153v5⟩
  • Sylvain Guilley, Florent Flament, Yves Mathieu, Renaud Pacalet. Security Evaluation of a Balanced Quasi-Delay Insensitive Library (SecLib). Conference on Design of Circuits and Integrated Systems, Nov 2008, Grenoble, France. 6 p., ISBN: 978-2-84813-124-5. ⟨hal-00283405v5⟩
  • Philippe Hoogvorst, Sylvain Guilley, Alin Razafindraibe, Taha Beyrouthy, Laurent Fesquet. A Reconfigurable Cell for a Multi-Style Asynchronous FPGA. RecoSoC: Reconfigurable Communication-centric Systems-on-Chip, Jun 2007, Montpellier, France. pp.15-22. ⟨hal-00222887⟩
  • Renaud Pacalet, Sylvain Guilley, Philippe Hoogvorst, Johannes Schmidt. Improving Side-Channel Attacks by Exploiting Substitution Boxes Properties. International Conference on Boolean Functions: Cryptography and Applications (BFCA), May 2007, Paris, France. ⟨hal-02893245⟩
  • Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet. The “Backend Duplication” Method: A Leakage-Proof Place-and-Route Strategy for ASICs. Workshop on Cryptographic Hardware and Embedded Systems (CHES), Aug 2005, Edinburgh, United Kingdom. pp.383-397, ⟨10.1007/11545262_28⟩. ⟨hal-02893271⟩
  • Sylvain Guilley, Philippe Hoogvorst, Renaud Pacalet. Differential Power Analysis Model and Some Results. CARDIS, Aug 2004, Toulouse, France. pp.127-142, ⟨10.1007/1-4020-8147-2_9⟩. ⟨hal-02893277⟩

Poster communications9 documents

  • Alexander Schaub, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger, Joseph Boutros. Rényi Entropy Estimation for Secure Silicon Fingerprints. IEEE Information Theory and Applications Workshop (ITA 2020), Feb 2020, Sans Diego, United States. 2020. ⟨hal-02950211⟩
  • Wei Cheng, Olivier Rioul, Sylvain Guilley. Guessing a secret cryptographic key from side-channel leakages. 2019 IEEE European School of Information Theory (ESIT'19), Apr 2019, Sophia Antipolis, France. 2019. ⟨hal-02300782⟩
  • Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Marion Damien, Olivier Rioul. Optimal attacks for multivariate and multi-model side-channel leakages. 18th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2016), Aug 2016, Santa Barbara, United States. 2016. ⟨hal-02300058⟩
  • Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Christophe Courrège, et al.. Power and Electromagnetic Analysis for Template Attacks. TRUDEVICE, Mar 2015, Grenoble, France. 2015. ⟨hal-01362457⟩
  • Annelie Heuser, Sylvain Guilley, Olivier Rioul. Maximizing the success of a side-channel attack. 3e colloque de l'Institut Mines-Télécom, Numérique: Grande échelle et complexité (Sécurité, sûreté, risques), Mar 2014, Paris, France. 2014. ⟨hal-02299999⟩
  • François Bailly, Sylvain Guilley, Annelie Heuser, Olivier Rioul. On optimality of MIA for unknown leakage models and related new practical results. 16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. 2014. ⟨hal-02300004⟩
  • Sylvain Guilley, Annelie Heuser, Martial Ren, Olivier Rioul, Simon Sellem. Success rate exponents for side-channel attacks. 16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. ⟨hal-02300002⟩
  • Annelie Heuser, Sylvain Guilley, Olivier Rioul. Side-channel attacks. European Google Doctoral Fellowship Forum, Sep 2013, Zurich, Switzerland. 2013. ⟨hal-02299991⟩
  • Annelie Heuser, Sylvain Guilley, Olivier Rioul. Success metric: An all-in-one criterion for comparing side-channel distinguishers. 15th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2013), Aug 2013, Santa Barbara, United States. 2013. ⟨hal-02299990⟩

Book sections11 documents

  • Nicolas Bruneau, Charles Christen, Jean-Luc Danger, Adrien Facon, Sylvain Guilley. Security Evaluation Against Side-Channel Analysis at Compilation Time. Springer. Algebra, Codes and Cryptology (A2C), pp.129-148, 2019, ⟨10.1007/978-3-030-36237-9_8⟩. ⟨hal-02915643⟩
  • Sihem Mesnager, Claude Carlet, Sylvain Guilley, Cem Guneri, Ferruh Özbudak. Construction of Efficient Codes for High-Order Direct Sum Masking. Security and Privacy in the Internet of Things: Challenges and Solutions, 27, IOS Press, pp.108-128, 2019, Ambient Intelligence and Smart Environments Series, 978-1-64368-052-1 (print) | 978-1-64368-053-8 (online). ⟨hal-03025841⟩
  • Sihem Mesnager, Claude Carlet, Sylvain Guilley. Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. Security and Privacy in the Internet of Things, 2019. ⟨hal-03025857⟩
  • Kais Chibani, Adrien Facon, Sylvain Guilley, Damien Marion, Yves Mathieu, et al.. Fault Analysis Assisted by Simulation. Jakub Breier; Xiaolu Hou; Shivam Bhasin. Automated Methods in Cryptographic Fault Analysis, Springer International Publishing, pp.263-277, 2019, 978-3-030-11332-2. ⟨10.1007/978-3-030-11333-9_12⟩. ⟨hal-02915671⟩
  • Sebastien Carre, Adrien Facon, Sylvain Guilley, Sofiane Takarabt, Alexander Schaub, et al.. Cache-timing Attack Detection and Prevention Application to Crypto Libs and PQC. Springer. Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedings, pp.13-21, 2019, ⟨10.1007/978-3-030-16350-1_2⟩. ⟨hal-02915644⟩
  • Nicolas Bruneau, Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Soshi Hamaguchi, et al.. Development of the Unified Security Requirements of PUFs During the Standardization Process. Innovative Security Solutions for Information Technology and Communications. 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers, LNCS (11359), Springer, pp.314-330, 2019, 978-3-030-12942-2. ⟨10.1007/978-3-030-12942-2_24⟩. ⟨hal-02265318⟩
  • Sylvain Guilley, Annelie Heuser, Ming Tang, Olivier Rioul. Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition. Innovative Security Solutions for Information Technology and Communications. SecITC 2017, 2017, 978-3-319-69283-8. ⟨hal-01628679⟩
  • Nadia El Mrabet, Louis Goubin, Jacques Jean-Alain Fournier, Damien Jauvart, Sylvain Guilley, et al.. Physical attacks. Guide to pairing based cryptography, 2017, 9781498729505. ⟨hal-01579785⟩
  • Annelie Heuser, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger. Information theoretic comparison of side-channel distinguishers: Inter-class distance, confusion, and success. Trusted Computing for European Embedded Systems, Springer, pp.187-225, 2014. ⟨hal-02286944⟩
  • Sylvain Guilley, Jean-Luc Danger. 17 : Global Fault on Cryptographic Circuits. Fault Analysis in Cryptography, Springer, pp.295-312, 2012. ⟨hal-02286401⟩
  • Sumanta Chaudhuri, Sylvain Guilley, Philippe Hoogvorst, Jean-Luc Danger, Taha Beyrouthy, et al.. Physical Design of FPGA Interconnect to Prevent Information Leakage. Woods, R.; Compton, K.; Bourganis, C.; Diniz, P.C. Reconfigurable Computing: Architecture, Tools, and Applications, 4943, Springer, pp.87-98, 2008, Lecture Notes in Computer Science, ⟨10.1007/978-3-540-78610-8_11⟩. ⟨hal-00299487⟩

Directions of work or proceedings2 documents

  • Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi. Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. 2019, 978-3-030-16457-7. ⟨10.1007/978-3-030-16458-4⟩. ⟨hal-02321059⟩
  • Luca Breveglieri, Sylvain Guilley, Israel Koren, David Naccache, Junko Takahashi. 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography. 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC, Sep 2011, Nara, Japan. IEEE, 2011. ⟨hal-01110262⟩

Patents2 documents

  • Sébastien Briais, Jean-Luc Danger, Thibault Porteboeuf, Sylvain Guilley, Philippe Nguyen. Electronic component i.e. smart card, for use in secure module, has input/output interface, and filtering and partitioning module interacting with interface to control access to one peripheral of set of peripherals. France, Patent n° : FR20110062508. JLD:firewall. 2011. ⟨hal-02412549⟩
  • Sylvain Guilley, Jean-Luc Danger. Method for securing result of cryptographic calculations against attack by injection of faults in chip card in electronic component, involves providing discretionary value processed by processing unit for one of output values of blocks. France, Patent n° : FR20110062509. JLD:resilience. 2011. ⟨hal-02412550⟩

Other publications1 document

  • Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens. Side-channel Analysis of Lightweight Ciphers: Current Status and Future Directions. 2016. ⟨hal-01407264⟩

Preprints, Working Papers, ...3 documents

  • Jean-Luc Danger, Sylvain Guilley, Shivam Bhasin, Maxime Nassar, Laurent Sauvage. Overview of Dual Rail with Precharge Logic Styles to Thwart Implementation-Level Attacks on Hardware Cryptoprocessors. 2009. ⟨hal-00431261⟩
  • Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Yves Mathieu, Maxime Nassar. Successful Attack on an FPGA-based Automatically Placed and Routed WDDL+ Crypto Processor.. 2008. ⟨hal-00339858⟩
  • Laurent Sauvage, Sylvain Guilley, Yves Mathieu. ElectroMagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack of a Cryptographic Module. 2008. ⟨hal-00319164⟩

Reports2 documents

  • Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. Dynamic Countermeasure Against the Zero Power Analysis. [Research Report] IACR Cryptology ePrint Archive 2013: 764 (2013), 2013. ⟨hal-00934336⟩
  • Sylvain Guilley. Evaluation de différentes structures en transistors des portes " C-Element ". 2004. ⟨hal-00707987⟩

Theses1 document

  • Sylvain Guilley. Contre-mesures géométriques aux attaques exploitant les canaux cachés. domain_other. Télécom ParisTech, 2007. English. ⟨pastel-00002562⟩

Habilitation à diriger des recherches1 document

  • Sylvain Guilley. Protection des Accélérateurs Matériels de Cryptographie Symétrique. Cryptographie et sécurité [cs.CR]. Université Paris-Diderot - Paris VII, 2012. ⟨tel-00815544⟩