Skip to Main content Skip to Navigation

Search by documents



...
hal-03323516v1  Conference papers
Patrick SoléYi LiuWei ChengSylvain GuilleyOlivier Rioul. Linear Programming Bounds on the Kissing Number of q-ary Codes
2021 IEEE Information Theory Workshop (ITW2021), Oct 2021, Kanazawa, Japan
...
hal-03323522v1  Conference papers
Yi LiuWei ChengSylvain GuilleyOlivier Rioul. On Conditional alpha-Information and its Application to Side-Channel Analysis
2021 IEEE Information Theory Workshop (ITW2021), Oct 2021, Kanazawa, Japan
...
hal-03328130v1  Conference papers
Wei ChengYi LiuSylvain GuilleyOlivier Rioul. Towards Finding Best Linear Codes for Side-Channel Protections
10th International Workshop on Security Proofs for Embedded Systems (PROOFS'2021), Sep 2021, Beijing, China
...
hal-03323533v1  Conference papers
Olivier RioulWei ChengSylvain Guilley. Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret
2021 IEEE International Symposium on Information Theory (ISIT'21), Jul 2021, Melbourne (virtual), Australia
...
tel-03272594v1  Theses
Xuecan Yang. Approximate computing for embedded machine learning
Electronics. Institut Polytechnique de Paris, 2021. English. ⟨NNT : 2021IPPAT005⟩
hal-03203607v1  Journal articles
Hervé ChabanneJean‐luc DangerLinda GuigaUlrich Kühne. Side channel attacks for architecture extraction of neural networks
CAAI Transactions on Intelligent Technologies, Institution of Engineering and Technology, 2021, 6 (1), pp.3-16. ⟨10.1049/cit2.12026⟩
...
hal-03084250v1  Conference papers
Sylvain GuilleyMichel Le RollandDamien Quenson. Implementing Secure Applications thanks to an Integrated Secure Element
7th International Conference on Information Systems Security and Privacy, INSTICC, Feb 2021, Vienne (en ligne), Austria
...
hal-02950165v1  Journal articles
Eloi de ChériseySylvain GuilleyOlivier RioulDarshana Jayasinghe. Information theoretic distinguishers for timing attacks with partial profiles: Solving the empty bin issue
Journal of Information Security, Scientific Research Publishing (SCIRP), 2021, Special issue on Cryptography and Encryption, 12 (1), ⟨10.4236/jis.2021.121001⟩
...
hal-02915674v1  Journal articles
Claude CarletEloi de ChériseySylvain GuilleySelçuk KavutDeng Tang. Intrinsic Resiliency of S-boxes Against Side-Channel Attacks -Best And Worst Scenarios
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2021, 16, pp.203-218. ⟨10.1109/TIFS.2020.3006399⟩
hal-03138811v1  Conference papers
Mohammad EbrahimabadiMd Toufiq Hasan AnikJean-Luc DangerSylvain GuilleyNaghmeh Karimi. Using Digital Sensors to Leverage Chips' Security
2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), Dec 2020, Washington, United States. pp.1-6, ⟨10.1109/PAINE49178.2020.9337730⟩
hal-03175561v1  Conference papers
Oualid TrabelsiLaurent SauvageJean-Luc Danger. Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller Instruction Buffer
2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Dec 2020, Kolkata, India. pp.1-6, ⟨10.1109/AsianHOST51057.2020.9358270⟩
hal-03021922v1  Conference papers
Julien BringerHervé ChabanneLinda Guiga. Premium Access to Convolutional Neural Networks
Crisis 2020, Nov 2020, Paris, France
hal-03021929v1  Conference papers
Hervé ChabanneEmmanuelle DottaxDenis Dumont. Augmented Voting Reality
CRISIS 2020, Nov 2020, Paris, France
hal-03138824v1  Conference papers
Trevor KroegerWei ChengSylvain GuilleyJean-Luc DangerNaghmeh Karimi. Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel
2020 IEEE International Test Conference (ITC), Nov 2020, Washington, United States. pp.1-5, ⟨10.1109/ITC44778.2020.9325241⟩
hal-02977542v1  Journal articles
Ville Yli-MayryRei UenoNoriyuki MiuraMakoto NagataShivam Bhasin et al.  Diffusional Side-channel Leakage from Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2020, pp.1-1. ⟨10.1109/TIFS.2020.3033441⟩
hal-03138833v1  Conference papers
Md Toufiq Hasan AnikMohammad EbrahimabadiHamed PirsiavashJean-Luc DangerSylvain Guilley et al.  On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability
2020 IEEE 38th International Conference on Computer Design (ICCD), Oct 2020, Hartford, United States. pp.506-509, ⟨10.1109/ICCD50377.2020.00091⟩
...
hal-02950171v1  Conference papers
Sébastien CarréSylvain GuilleyOlivier Rioul. Persistent Fault Analysis With Few Encryptions
International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2020), Oct 2020, Lugano, Switzerland
hal-03326381v1  Patents
Olivier RioulSylvain Guilley. SECRET KEY ESTIMATION METHODS AND DEVICES
France, Patent n° : US2020/0313845 A1. 2020
hal-03034855v1  Conference papers
Alexandre MenuJean-Max DutertreJean-Baptiste RigaudBrice ColombierPierre-Alain Moellic et al.  Single-bit Laser Fault Model in NOR Flash Memories: Analysis and Exploitation
2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), Sep 2020, Milan, Italy. pp.41-48, ⟨10.1109/FDTC51366.2020.00013⟩
...
hal-02932063v1  Conference papers
Alexander SchaubJean-Luc DangerOlivier RioulSylvain Guilley. The Big Picture of Delay-PUF Dependability
24th European Conference on Circuit Theory and Design (ECCTD), IEEE, Sep 2020, Sofia, Bulgaria
hal-03138855v1  Journal articles
Md Toufiq Hasan AnikJean-Luc DangerSylvain GuilleyNaghmeh Karimi. Detecting Failures and Attacks via Digital Sensors
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2020, pp.1-1. ⟨10.1109/TCAD.2020.3020921⟩
hal-02977544v1  Conference papers
Etienne TehraniTarik GrabaAbdelmalek Si MerabetJean-Luc Danger. RISC-V Extension for Lightweight Cryptography
2020 23rd Euromicro Conference on Digital System Design (DSD), Aug 2020, Kranj, Slovenia. pp.222-228, ⟨10.1109/DSD51259.2020.00045⟩
...
hal-02300795v1  Journal articles
Alexander SchaubOlivier RioulJean-Luc DangerSylvain GuilleyJoseph J. Boutros. Challenge Codes for Physically Unclonable Functions with Gaussian Delays: A Maximum Entropy Problem
Advances in Mathematics of Communications, AIMS, 2020, Special Issue: Latin American Week on Coding and Information, 14 (3), pp.491-505
hal-03034851v1  Conference papers
Md Toufiq Hasan AnikRachit SainiJean-Luc DangerSylvain GuilleyNaghmeh Karimi. Failure and Attack Detection by Digital Sensors
2020 IEEE European Test Symposium (ETS), May 2020, Tallinn, Estonia. pp.1-2, ⟨10.1109/ETS48528.2020.9131580⟩