Folgen
Sylvain GUILLEY
Sylvain GUILLEY
TELECOM-ParisTech
Bestätigte E-Mail-Adresse bei secure-ic.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Complementary dual codes for counter-measures to side-channel attacks.
C Carlet, S Guilley
Adv. Math. Commun. 10 (1), 131-150, 2016
2272016
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs
M Nassar, Y Souissi, S Guilley, JL Danger
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012
2132012
Practical setup time violation attacks on AES
N Selmane, S Guilley, JL Danger
2008 Seventh European Dependable Computing Conference, 91-96, 2008
2002008
Complementary Dual Codes for Counter-Measures to Side-Channel Attacks.
C Carlet, S Guilley
ICMCTA, 97-105, 2014
1832014
Hardware Trojan horses in cryptographic IP cores
S Bhasin, JL Danger, S Guilley, XT Ngo, L Sauvage
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 15-29, 2013
1662013
Orthogonal direct sum masking: A smartcard friendly computation paradigm in a code, with builtin protection against side-channel and fault attacks
J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi
IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014
1452014
Differential power analysis model and some results
S Guilley, P Hoogvorst, R Pacalet
Smart Card Research and Advanced Applications VI: IFIP 18th World Computer …, 2004
1432004
Good is not good enough: Deriving optimal distinguishers from communication theory
A Heuser, O Rioul, S Guilley
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
1372014
High speed true random number generator based on open loop structures in FPGAs
JL Danger, S Guilley, P Hoogvorst
Microelectronics journal 40 (11), 1650-1656, 2009
1352009
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
1302017
NICV: normalized inter-class variance for detection of side-channel leakage
S Bhasin, JL Danger, S Guilley, Z Najm
2014 International Symposium on Electromagnetic Compatibility, Tokyo, 310-313, 2014
1152014
BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation
M Nassar, S Bhasin, JL Danger, G Duc, S Guilley
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010
1132010
Best information is most successful
E De Chérisey, S Guilley, O Rioul, P Piantanida
Cryptology ePrint Archive, 2019
1022019
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses
XT Ngo, S Bhasin, JL Danger, S Guilley, Z Najm
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
982015
An easy-to-design PUF based on a single oscillator: The loop PUF
Z Cherif, JL Danger, S Guilley, L Bossuet
2012 15th Euromicro Conference on Digital System Design, 156-162, 2012
982012
The “Backend Duplication” Method: A Leakage-Proof Place-and-Route Strategy for ASICs
S Guilley, P Hoogvorst, Y Mathieu, R Pacalet
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
852005
WDDL is protected against setup time violation attacks
N Selmane, S Bhasin, S Guilley, T Graba, JL Danger
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 73-83, 2009
812009
Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module
L Sauvage, S Guilley, Y Mathieu
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2 (1), 1-24, 2009
812009
CMOS structures suitable for secured hardware
S Guilley, P Hoogvorst, Y Mathieu, R Pacalet, J Provost
Proceedings Design, Automation and Test in Europe Conference and Exhibition …, 2004
802004
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
772017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20