Follow
Nicolas Veyrat-Charvillon
Nicolas Veyrat-Charvillon
Ubisoft Annecy
Verified email at ubisoft.com
Title
Cited by
Cited by
Year
Mutual information analysis: a comprehensive study
L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ...
Journal of Cryptology 24 (2), 269-291, 2011
2812011
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
International Conference on the Theory and Application of Cryptology and …, 2010
2052010
A formal study of power variability issues and side-channel attacks for nanoscale devices
M Renauld, FX Standaert, N Veyrat-Charvillon, D Kamel, D Flandre
Annual International Conference on the Theory and Applications of …, 2011
1962011
Shuffling against side-channel attacks: A comprehensive study with cautionary note
N Veyrat-Charvillon, M Medwed, S Kerckhof, FX Standaert
International Conference on the Theory and Application of Cryptology and …, 2012
1842012
Algebraic side-channel attacks on the AES: Why time also matters in DPA
M Renauld, FX Standaert, N Veyrat-Charvillon
International Workshop on Cryptographic Hardware and Embedded Systems, 97-111, 2009
1772009
Mutual information analysis: how, when and why?
N Veyrat-Charvillon, FX Standaert
International Workshop on Cryptographic Hardware and Embedded Systems, 429-443, 2009
1762009
An optimal key enumeration algorithm and its application to side-channel attacks
N Veyrat-Charvillon, B Gérard, M Renauld, FX Standaert
International Conference on Selected Areas in Cryptography, 390-406, 2012
1702012
Security evaluations beyond computing power
N Veyrat-Charvillon, B Gérard, FX Standaert
Annual International Conference on the Theory and Applications of …, 2013
1092013
How to certify the leakage of a chip?
F Durvaux, FX Standaert, N Veyrat-Charvillon
Annual International Conference on the Theory and Applications of …, 2014
1072014
Soft analytical side-channel attacks
N Veyrat-Charvillon, B Gérard, FX Standaert
International Conference on the Theory and Application of Cryptology and …, 2014
1052014
Compact FPGA implementations of the five SHA-3 finalists
S Kerckhof, F Durvaux, N Veyrat-Charvillon, F Regazzoni, GM Dormale, ...
International Conference on Smart Card Research and Advanced Applications …, 2011
782011
Multi-mode operator for SHA-2 hash functions
R Glabb, L Imbert, G Jullien, A Tisserand, N Veyrat-Charvillon
journal of systems architecture 53 (2-3), 127-138, 2007
632007
Generic side-channel distinguishers: Improvements and limitations
N Veyrat-Charvillon, FX Standaert
Annual Cryptology Conference, 354-372, 2011
512011
Efficient removal of random delays from embedded software implementations using hidden markov models
F Durvaux, M Renauld, FX Standaert, L Oldeneel tot Oldenzeel, ...
International Conference on Smart Card Research and Advanced Applications …, 2012
502012
Efficient selection of time samples for higher-order DPA with projection pursuits
F Durvaux, FX Standaert, N Veyrat-Charvillon, JB Mairy, Y Deville
International Workshop on Constructive Side-Channel Analysis and Secure …, 2015
392015
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4 (4), 259-274, 2014
382014
Adaptive chosen-message side-channel attacks
N Veyrat-Charvillon, FX Standaert
International Conference on Applied Cryptography and Network Security, 186-199, 2010
322010
Improving the Rules of the DPA Contest
FX Standaert, P Bulens, G de Meulenaer, N Veyrat-Charvillon
Cryptology EPrint Archive, 2008
272008
Carry prediction and selection for truncated multiplication
R Michard, A Tisserand, N Veyrat-Charvillon
2006 IEEE Workshop on Signal Processing Systems Design and Implementation …, 2006
272006
Cryptanalysis of the ches 2009/2010 random delay countermeasure
F Durvaux, M Renauld, FX Standaert, LO tot Oldenzeel, ...
Cryptology ePrint Archive, 2012
172012
The system can't perform the operation now. Try again later.
Articles 1–20