CSDA

Department of Institut Polytechnique de Paris

Group ssh

ssh (Secure and Safe Hardware)

LTCI, Telecom Paris

Themes: digital trust

The team’s research themes are on the architecture and methods required to design effective embedded systems with strong constraints such as security and reliability.
Part of the group is associated with the ICE department of IP Paris

Contact person: Jean Luc Danger, https://www.telecom-paris.fr/jean-luc-danger?l=en

Web site: https://www.telecom-paris.fr/en/research/laboratories/information-processing-and-communication-laboratory-ltci/research-teams/secure-safe-hardware

Journal articles

2022

ref_biblio
Maxime Ayrault, Ulrich Kühne, Etienne Borde. Finding Optimal Moving Target Defense Strategies: A Resilience Booster for Connected Cars. Information, MDPI, 2022, 13 (5), pp.242. ⟨10.3390/info13050242⟩. ⟨hal-03670106⟩
Accès au bibtex
BibTex
ref_biblio
Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul. Side-Channel Expectation-Maximization Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems, IACR, In press, 2022 (4). ⟨hal-03718805⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03718805/file/202206beguinotchengguilleyrioul.pdf BibTex
ref_biblio
Wei Cheng, Sylvain Guilley, Jean-Luc Danger. Information Leakage in Code-based Masking: A Systematic Evaluation by Higher-Order Attacks. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, In press, ⟨10.1109/TIFS.2022.3167914⟩. ⟨hal-03633061⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03633061/file/21_attack_cbm_tifs_clean.pdf BibTex
ref_biblio
Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu. On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Transactions on Cryptographic Hardware and Embedded Systems, IACR, 2022, pp.192-222. ⟨10.46586/tches.v2022.i3.192-222⟩. ⟨hal-03783747⟩
Accès au bibtex
BibTex

2021

ref_biblio
Claude Carlet, Eloi de Chérisey, Sylvain Guilley, Selçuk Kavut, Deng Tang. Intrinsic Resiliency of S-boxes Against Side-Channel Attacks -Best And Worst Scenarios. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2021, 16, pp.203-218. ⟨10.1109/TIFS.2020.3006399⟩. ⟨hal-02915674⟩
Accès au texte intégral et bibtex
https://hal-cnrs.archives-ouvertes.fr/hal-02915674/file/TIFS_sbox_v8_final.pdf BibTex
ref_biblio
Hervé Chabanne, Jean‐luc Danger, Linda Guiga, Ulrich Kühne. Side channel attacks for architecture extraction of neural networks. CAAI Transactions on Intelligent Technologies, Institution of Engineering and Technology, 2021, 6 (1), pp.3-16. ⟨10.1049/cit2.12026⟩. ⟨hal-03203607⟩
Accès au bibtex
BibTex
ref_biblio
Wei Cheng, Sylvain Guilley, Jean-Luc Danger. Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$. Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , Springer, 2021, ⟨10.1007/s12095-021-00483-1⟩. ⟨hal-03212573⟩
Accès au bibtex
BibTex
ref_biblio
Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager. Information Leakages in Code-based Masking: A Unified Quantification Approach. IACR Transactions on Cryptographic Hardware and Embedded Systems, IACR, 2021, pp.465-495. ⟨10.46586/tches.v2021.i3.465-495⟩. ⟨hal-03299035⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Farzad Niknia, Sylvain Guilley, Naghmeh Karimi. Aging Effects on Template Attacks Launched on Dual-Rail Protected Chips. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2021, pp.1-1. ⟨10.1109/TCAD.2021.3088803⟩. ⟨hal-03366273⟩
Accès au bibtex
BibTex

2020

ref_biblio
Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi. Detecting Failures and Attacks via Digital Sensors. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2020, pp.1-1. ⟨10.1109/TCAD.2020.3020921⟩. ⟨hal-03138855⟩
Accès au bibtex
BibTex
ref_biblio
Nilson Maciel, Elaine Marques, Naviner Lirida, Yongliang Zhou, Hao Cai. Magnetic Tunnel Junction Applications. Sensors, MDPI, 2020, 20 (1), pp.121. ⟨10.3390/s20010121⟩. ⟨hal-02941339⟩
Accès au bibtex
BibTex
ref_biblio
Maamar Ouladj, Nadia El Mrabet, Sylvain Guilley, Philippe Guillot, Gilles Millérioux. On the power of template attacks in highly multivariate context. Journal of Cryptographic Engineering, Springer, 2020, 10 (4), pp.337-354. ⟨10.1007/s13389-020-00239-2⟩. ⟨hal-02935162⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-02935162/file/templateattacks.pdf BibTex
ref_biblio
Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane. Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme. Journal of Cryptographic Engineering, Springer, 2020. ⟨hal-03059619⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03059619/file/H-O-template_attaque_twocolumn.pdf BibTex
ref_biblio
Alexander Schaub, Olivier Rioul, Jean-Luc Danger, Sylvain Guilley, Joseph J. Boutros. Challenge Codes for Physically Unclonable Functions with Gaussian Delays: A Maximum Entropy Problem. Advances in Mathematics of Communications, AIMS, 2020, Special Issue: Latin American Week on Coding and Information, 14 (3), pp.491-505. ⟨hal-02300795⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300795/file/201910schaubriouldangerguilleyboutros.pdf BibTex
ref_biblio
Rei Ueno, Naofumi Homma, Sumio Morioka, Noriyuki Miura, Kohei Matsuda, et al.. High Throughput/Gate AES Hardware Architectures Based on Datapath Compression. IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2020, 69 (4), pp.534-548. ⟨10.1109/TC.2019.2957355⟩. ⟨hal-02517649⟩
Accès au bibtex
BibTex
ref_biblio
Ville Yli-Mayry, Rei Ueno, Noriyuki Miura, Makoto Nagata, Shivam Bhasin, et al.. Diffusional Side-channel Leakage from Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2020, pp.1-1. ⟨10.1109/TIFS.2020.3033441⟩. ⟨hal-02977542⟩
Accès au bibtex
BibTex
ref_biblio
Y. Zhou, H. Cai, M. Zhang, L.A.B. Naviner, J. Yang. A novel BIST for monitoring aging/temperature by self-triggered scheme to improve the reliability of STT-MRAM. Microelectronics Reliability, Elsevier, 2020, 114, pp.113735 -. ⟨10.1016/j.microrel.2020.113735⟩. ⟨hal-03493058⟩
Accès au bibtex
BibTex

2019

ref_biblio
Fábio Batagin Armelin, Lírida Alves de Barros Naviner, Roberto D’amore. Soft-Error Vulnerability Estimation Approach Based on the SET Susceptibility of Each Gate. Electronics, Penton Publishing Inc., 2019, 8 (7), pp.749. ⟨10.3390/electronics8070749⟩. ⟨hal-02941341⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Xinning Liu, Weiwei Shan, et al.. Addressing Failure and Aging Degradation in MRAM/MeRAM-on-FDSOI Integration. IEEE Transactions on Circuits and Systems I: Regular Papers, IEEE, 2019, 66 (1), pp.239-250. ⟨10.1109/TCSI.2018.2854277⟩. ⟨hal-02942486⟩
Accès au bibtex
BibTex
ref_biblio
Sébastien Carré, Matthieu Desjardins, Adrien Facon, Sylvain Guilley. Exhaustive single bit fault analysis. A use case against Mbedtls and OpenSSL’s protection on ARM and Intel CPU. Microprocessors and Microsystems: Embedded Hardware Design , Elsevier, 2019, 71, pp.102860 -. ⟨10.1016/j.micpro.2019.102860⟩. ⟨hal-03487204⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-03487204/file/S0141933118305143.pdf BibTex
ref_biblio
Elaine Crespo Marques, Nilson Maciel, Lirida Naviner, Hao Cai, Jun Yang. A Review of Sparse Recovery Algorithms. IEEE Access, IEEE, 2019, 7, pp.1300-1322. ⟨10.1109/ACCESS.2018.2886471⟩. ⟨hal-02942487⟩
Accès au bibtex
BibTex
ref_biblio
Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida. Best information is most successful: Mutual information and success rate in side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, IACR, 2019, 2019 (2), pp.49-79. ⟨10.13154/tches.v2019.i2.49-79⟩. ⟨hal-02287971⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02287971/file/best_information_piantanida_ccby.pdf BibTex
ref_biblio
Nilson Maciel, Elaine Crespo Marques, Lirida Alves de Barros Naviner, Hao Cai, Jun Yang. Voltage-Controlled Magnetic Anisotropy MeRAM Bit-Cell over Event Transient Effects. Journal of Low Power Electronics Applications, 2019, 9 (2), pp.1-14. ⟨10.3390/jlpea9020015⟩. ⟨hal-02288058⟩
Accès au bibtex
BibTex
ref_biblio
N. Maciel, E. C. Marques, L. A.B. Naviner, H. Cai, J. Yang. Reliability analysis of NAND-like spintronic memory. Microelectronics Reliability, Elsevier, 2019, 100-101, pp.113332. ⟨10.1016/j.microrel.2019.06.024⟩. ⟨hal-02941340⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-02941340/file/S0026271419304962.pdf BibTex

2018

ref_biblio
Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, et al.. The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. Journal of Hardware and Systems Security, 2018, ⟨10.1007/s41635-018-0035-4⟩. ⟨hal-02288011⟩
Accès au bibtex
BibTex
ref_biblio
Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer. Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures. Transactions on Data Privacy, IIIA-CSIC, 2018, 11 (2), pp.111-137. ⟨hal-01939841⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-01939841/file/TDP2018.pdf BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Weisheng Zhao. Exploring Hybrid STT-MTJ/CMOS Energy Solution in Near/Sub-Threshold Regime. IEEE Transactions on Magnetics, Institute of Electrical and Electronics Engineers, 2018, 54 (2), pp.1-9. ⟨hal-02287861⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, et al.. On the Performance and Security of Multiplication in GF(2N). Cryptography, 2018, ⟨10.3390/cryptography2030025⟩. ⟨hal-02288010⟩
Accès au bibtex
BibTex
ref_biblio
Naghmeh Karimi, Jean-Luc Danger, Sylvain Guilley. Impact of Aging on the Reliability of Delay PUFs. Journal of Electronic Testing: : Theory and Applications, Springer Verlag, 2018, 34 (5), pp.571-586. ⟨10.1007/s10836-018-5745-6⟩. ⟨hal-02287976⟩
Accès au bibtex
BibTex
ref_biblio
Nilson Maciel, Elaine Crespo Marques, Lirida Alves de Barros Naviner, Hao Cai. Single-event transient effects on dynamic comparator in 28nm FDSOI CMOS technology. Microelectronics Reliability, Elsevier, 2018, 88-90, pp.965-968. ⟨hal-02287982⟩
Accès au bibtex
BibTex
ref_biblio
Ming Tang, Pengbo Wang, Xiaoqi Ma, Wenjie Chang, Huanguo Zhang, et al.. An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. IEEE-TIFS, 2018, ⟨10.1109/TIFS.2018.2837644⟩. ⟨hal-02288012⟩
Accès au bibtex
BibTex
ref_biblio
Chien-Yi Wang, Shirin Saeedi Bidokhti, Michèle Wigger. Improved Converses and Gap-Results for Coded Caching,. IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2018, 64 (3), pp.1957-1976. ⟨hal-02287708⟩
Accès au bibtex
BibTex

2017

ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Weisheng Zhao. Robust Ultra-Low Power Non-Volatile Logic-in-Memory Circuits in FD-SOI Technology. IEEE Transactions on Circuits and Systems I: Regular Papers, IEEE, 2017, 64 (4), pp.847-857. ⟨hal-02287638⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, Wang Kang, You Wang, Lirida Alves de Barros Naviner, Jun Yang, et al.. High Performance MRAM with Spin-Transfer-Torque and Voltage-Controlled Magnetic Anisotropy Effects. Applied Sciences, MDPI, 2017, 7 (9), 929 (13 p.). ⟨10.3390/app7090929⟩. ⟨hal-02287690⟩
Accès au bibtex
BibTex
ref_biblio
Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy. Using modular extension to provably protect Edwards curves against fault attacks. Journal of Cryptographic Engineering, Springer, 2017, vol. 7, nb. 4. ⟨hal-03236725⟩
Accès au bibtex
BibTex
ref_biblio
Xuan-Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Tarik Graba, Yves Mathieu, et al.. Cryptographically Secure Shield for Security IPs Protection. IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2017, 66 (2). ⟨hal-02287686⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Slimani, Karim Benkalaia, Lirida Alves de Barros Naviner. Analysis of Ageing effects on ARTIX7 XILINX FPGA (article) Author. Microelectronics Reliabilit Journal, 2017. ⟨hal-02287639⟩
Accès au bibtex
BibTex
ref_biblio
Francisco Veirano, Lirida Alves de Barros Naviner, Fernando Silveira. Optimal Asymmetrical Back Plane Biasing for Energy Efficient Digital Circuits in 28 nm UTBB FD-SOI. Integration, the VLSI Journal, 2017. ⟨hal-02287634⟩
Accès au bibtex
BibTex
ref_biblio
Francisco Veirano, Lirida Alves de Barros Naviner, Fernando Silveira. Optimum NMOS/PMOS Imbalance for Energy Efficient Digital Circuits. IEEE Transactions on Circuits and Systems I: Regular Papers, IEEE, 2017. ⟨hal-02287635⟩
Accès au bibtex
BibTex
ref_biblio
You Wang, Hao Cai, Lirida Alves de Barros Naviner, Weisheng Zhao. A Non-Monte-Carlo Methodology for Variability Analysis of Magnetic Tunnel Junction-Based Circuits. IEEE Transactions on Magnetics, Institute of Electrical and Electronics Engineers, 2017, 53 (3), pp.1-6. ⟨10.1109/TMAG.2016.2638913⟩. ⟨hal-02287631⟩
Accès au bibtex
BibTex
ref_biblio
Weisheng Zhao, You Wang, Lirida Alves de Barros Naviner. Failure Analysis in Magnetic Tunnel Junction Nanopillar with Interfacial Perpendicular Magnetic Anisotropy. Materials Science Journal, 2017, 9 (41), pp.1-17. ⟨hal-02287641⟩
Accès au bibtex
BibTex

2016

ref_biblio
Paulo Butzen, Mariem Slimani, You Wang, Hao Cai, Lirida Alves de Barros Naviner. Reliable majority voter based on spin transfer torque magnetic tunnel junction device. IEEE Electronics Letters, 2016, 52 (1), pp.47-49. ⟨hal-02287642⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Weisheng Zhao. Breakdown Analysis of Magnetic Flip-flop With 28nm UTBB FDSOI Technology. IEEE Transactions on Device and Materials Reliability, Institute of Electrical and Electronics Engineers, 2016, 16 (3), pp.376-383. ⟨hal-02287471⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Weisheng Zhao. Low Power Magnetic Flip-Flop Optimization With FDSOI Technology Boost. IEEE Transactions on Magnetics, Institute of Electrical and Electronics Engineers, 2016, 52 (8), pp.1-7. ⟨hal-02287472⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, Kaikai Liu, Lirida Alves de Barros Naviner, You Wang, Mariem Slimani, et al.. Efficient reliability evaluation methodologies for combinational circuits. Microelectronics Reliability, Elsevier, 2016, 64. ⟨hal-02287474⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Ph. Hoogvorst, Cédric Murdica, D. Naccache. Improving the Big Mac Attack on Elliptic Curve Cryptography. LNCS : The new codebreakers, 2016, 9100, pp.374-386. ⟨10.1007/978-3-662-49301-4_23⟩. ⟨hal-02287332⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden, Michaël Timbert. Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter. LNCS: the new codebreakers, 2016, pp.439-454. ⟨10.1007/978-3-662-49301-4_27⟩. ⟨hal-02287333⟩
Accès au bibtex
BibTex
ref_biblio
Han Le Duc, D. M. Nguyen, Chadi Jabbour, Tarik Graba, Patricia Desgreys, et al.. All-Digital Calibration of Timing Skews for TIADCs Using The Polyphase Decomposition. IEEE Transactions on Circuits and Systems II: Express Briefs, Institute of Electrical and Electronics Engineers, 2016, 63 (1), pp.99-103. ⟨hal-01271601⟩
Accès au bibtex
BibTex
ref_biblio
Xuan-Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. JCEN, 2016, ⟨10.1007/s13389-016-0129-2⟩. ⟨hal-02287501⟩
Accès au bibtex
BibTex
ref_biblio
Laurent Sauvage, Tarik Graba, Thibault Porteboeuf. Multi-Level Formal Analysis, A New Direction for Fault Injection Attack?. Journal of Cryptographic Engineering, 2016. ⟨hal-02287457⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Slimani, Lirida Alves de Barros Naviner, You Wang, Hao Cai. Reliability analysis of hybrid spin transfer torque magnetic tunnel junction/CMOS majority voters. Microelectronics Reliability, Elsevier, 2016, C (64), pp.48-53. ⟨hal-02287469⟩
Accès au bibtex
BibTex

2015

ref_biblio
Ting An, Kaikai Liu, Hao Cai, Lirida Alves de Barros Naviner. Accurate Reliability Analysis of Concurrent Checking Circuits Employing An Efficient Analytical Method. Microelectronics Reliability, Elsevier, 2015, 55 (3-4), pp.696-703. ⟨hal-01122423⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Mariem Slimani, Hao Cai, Lirida Alves de Barros Naviner. A dual-rail compact defect-tolerant multiplexer. Microelectronics Reliability, Elsevier, 2015, 55, pp.662-670. ⟨hal-01128326⟩
Accès au bibtex
BibTex
ref_biblio
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He. Exploiting FPGA Block Memories for Protected Cryptographic Implementations. TRETS, 2015, ⟨10.1145/2629552⟩. ⟨hal-02287502⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Weisheng Zhao. Ultra wide voltage range consideration of reliability-aware STT magnetic flip-flop in 28nm FDSOI technology. Microelectronics Reliability, Elsevier, 2015. ⟨hal-02287224⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, You Wang, Weisheng Zhao, Lirida Alves de Barros Naviner. Multiplexing Sense Amplifier Based Magnetic Flip Flop in 28nm FDSOI Technology. IEEE Transactions on Nanotechnology, Institute of Electrical and Electronics Engineers, 2015, 14 (4). ⟨hal-02287225⟩
Accès au bibtex
BibTex
ref_biblio
Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, et al.. A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, IEEE, 2015, ⟨10.1109/TVLSI.2014.2339892⟩. ⟨hal-02287186⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Slimani, Arwa Ben Dhia, Lirida Alves de Barros Naviner. A Novel Analytical Method for Defect Tolerance Assessment. Microelectronics Reliability, Elsevier, 2015, 55, pp.1285-1289. ⟨hal-01216729⟩
Accès au bibtex
BibTex

2014

ref_biblio
Claude Carlet, Finley Freibert, Sylvain Guilley, Michael Kiermaier, Jon-Lark Kim, et al.. Higher-order CIS codes. IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2014, 60 (9), pp.5283-5295. ⟨10.1109/TIT.2014.2332468⟩. ⟨hal-02286948⟩
Accès au bibtex
BibTex
ref_biblio
Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi. Leakage squeezing: Optimal implementation and security evaluation. Journal of Mathematical Cryptology, De Gruyter, 2014, ⟨10.1515/jmc-2012-001⟩. ⟨hal-02287061⟩
Accès au bibtex
BibTex
ref_biblio
Yeow Meng Chee, Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, Han Mao Kiah, et al.. Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions. IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2014, ⟨10.1109/TIT.2014.2359207⟩. ⟨hal-02286947⟩
Accès au bibtex
BibTex
ref_biblio
Christophe Clavier, Guillaume Duc, Jean-Luc Danger, Moulay Aziz Elaabid, Benoît Gérard, et al.. Practical Improvements of Side-Channel Attacks on AES: Feedback from the 2nd DPA Contest. Journal of Cryptographic Engineering, 2014, 4 (4), pp.259-274. ⟨10.1007/s13389-014-0075-9⟩. ⟨hal-02286726⟩
Accès au bibtex
BibTex
ref_biblio
Houssem Maghrebi, Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Emmanuel Prouff. Achieving side-channel high-order correlation immunity with leakage squeezing. JCEN, 2014, ⟨10.1007/s13389-013-0067-1⟩. ⟨hal-02286851⟩
Accès au bibtex
BibTex

2013

ref_biblio
Arwa Ben Dhia, Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Habib Mehrez, Philippe Matherat. A defect-tolerant area-efficient multiplexer for basic blocks in SRAM-based FPGAs. Microelectronics Reliability, Elsevier, 2013, pp.1189-1193. ⟨hal-01062109⟩
Accès au bibtex
BibTex
ref_biblio
Shivam Bhasin, Claude Carlet, Sylvain Guilley. Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions. IACR eprint archive, 2013. ⟨hal-02286840⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Guilley, Shivam Bhasin, Annelie Heuser, Jean-Luc Danger. From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications. JCEN, 2013, ⟨10.1007/s13389-013-0048-4⟩. ⟨hal-02286503⟩
Accès au bibtex
BibTex
ref_biblio
Yu-Ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, et al.. Analysis of Electromagnetic Information Leakage from Cryptographic Devices with Different Physical Structures. IEEE Transactions on Electromagnetic Compatibility, Institute of Electrical and Electronics Engineers, 2013, 55 (3), pp.571-580. ⟨hal-02286819⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Arwa Ben Dhia, Lirida Alves de Barros Naviner, J. F. Naviner. SNaP: a Novel Hybrid Method for Circuit Reliability Assessment Under Multiple Faults. Microelectronics Reliability, Elsevier, 2013, pp.1230-1234. ⟨hal-01062108⟩
Accès au bibtex
BibTex
ref_biblio
Pablo Rauzy, Sylvain Guilley. A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA. Journal of Cryptographic Engineering, Springer, 2013, pp.1-13. ⟨10.1007/s13389-013-0065-3⟩. ⟨hal-00863914v2⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-00863914/file/proofs_jcen.pdf BibTex
ref_biblio
Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Naofumi Homma, Yu-Ichi Hayashi. Advanced Analysis of Faults Injected Through Conducted Intentional ElectroMagnetic Interferences. Transactions on Electromagnetic Compatibility, 2013. ⟨hal-02286327⟩
Accès au bibtex
BibTex

2012

ref_biblio
Hao Cai, J. F. Naviner, H. Petit. A Hierarchical Reliability Simulation Methodology for AMS Integrated Circuits and Systems. Journal of Low Power Electronics, 2012, 8 (5). ⟨hal-02286422⟩
Accès au bibtex
BibTex

2011

ref_biblio
N. Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks. Information Security, IET, 2011, 5 (4), pp.181-190. ⟨10.1049/iet-ifs.2010.0238⟩. ⟨hal-02286262⟩
Accès au bibtex
BibTex

2004

ref_biblio
Sylvain Guilley, Renaud Pacalet. SoC security: a war against side-channels. Annals of Telecommunications - annales des télécommunications, Springer, 2004. ⟨hal-02893115⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02893115/file/10.1.1.106.5114.pdf.pdf BibTex

Conference papers

2022

ref_biblio
Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul. Unprofiled expectation-maximization attack. 18th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2022), May 2022, Porquerolles, France. ⟨hal-03718705⟩
Accès au bibtex
BibTex
ref_biblio
Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul. Be my guess: Guessing entropy vs. success rate for evaluating side-channel attacks of secure chips. 25th Euromicro Conference on Digital System Design (DSD 2022), Aug 2022, Maspalomas, Gran Canaria, Spain. ⟨hal-03718723⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03718723/file/202207beguinotchengguilleyrioul.pdf BibTex
ref_biblio
Wei Cheng, Olivier Rioul, Yi Liu, Julien Béguinot, Sylvain Guilley. Side-channel information leakage of code-based masked implementations. 17th Canadian Workshop on Information Theory (CWIT 2022), Jun 2022, Ottawa, Canada. ⟨10.1109/CWIT55308.2022.9817673⟩. ⟨hal-03718708⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03718708/file/202204chengrioulliubeguinotguilley.pdf BibTex
ref_biblio
Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul. Attacking masked cryptographic implementations: Information-theoretic bounds. 2022 IEEE International Symposium on Information Theory (ISIT 2022), Jun 2022, Espoo, Finland. ⟨hal-03718713⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03718713/file/202204chengliuguilleyrioul1.pdf BibTex
ref_biblio
Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul. Evaluation of side-channel attacks using alpha-information. 18th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2022), May 2022, Porquerolles, France. ⟨hal-03718701⟩
Accès au bibtex
BibTex
ref_biblio
Etienne Tehrani, Tarik Graba, Abdelmalek Si Merabet, Jean-Luc Danger. RISC-V Extension for Lightweight Cryptography, Protection against SCA. Workshop on Practical Hardware Innovations in Security Implementation and Characterization (PHISIC 2022), May 2022, Gardanne, France. ⟨hal-03752972⟩
Accès au bibtex
BibTex

2021

ref_biblio
Natasha Alkhatib, Jean-Luc Danger, Hadi Ghauch. SOME/IP Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks. IEEE IEMCON 2021, Oct 2021, Vancouver, Canada. ⟨hal-03372353⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-03372353/file/someip_rnn_canada%20%282%29.pdf BibTex
ref_biblio
Maxime Ayrault, Etienne Borde, Ulrich Kühne, Jean Leneutre. Moving Target Defense Strategy in Critical Embedded Systems: A Game-theoretic Approach. 2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2021, Perth, Australia. pp.27-36, ⟨10.1109/PRDC53464.2021.00014⟩. ⟨hal-03758375⟩
Accès au bibtex
BibTex
ref_biblio
Hervé Chabanne, Jean-Luc Danger, Linda Guiga, Ulrich Kühne. Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks. Applied Cryptography and Network Security (ACNS), Jun 2021, Kamakura, Japan. pp.363-392, ⟨10.1007/978-3-030-78372-3_14⟩. ⟨hal-03332204⟩
Accès au bibtex
BibTex
ref_biblio
Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul. Towards Finding Best Linear Codes for Side-Channel Protections. 10th International Workshop on Security Proofs for Embedded Systems (PROOFS'2021), Sep 2021, Beijing, China. ⟨hal-03328130⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03328130/file/202109chengliuguilleyrioul.pdf BibTex
ref_biblio
Jean-Luc Danger, Toufiq Hasan Anik, Omar Diankha, Mohammad Ebrahimabadi, Christoph Frisch, et al.. Testing and Reliability Enhancement of Security Primitives. 2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Oct 2021, Athens, Greece. pp.1-8, ⟨10.1109/DFT52944.2021.9568297⟩. ⟨hal-03433853⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Trevor Kroeger, Wei Cheng, Sylvain Guilley, Nazhmeh Karimi. Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks. 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), Feb 2021, Grenoble, France. pp.1000-1005, ⟨10.23919/DATE51398.2021.9474137⟩. ⟨hal-03433804⟩
Accès au bibtex
BibTex
ref_biblio
Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, et al.. Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. EuroS&PW 2021 - IEEE European Symposium on Security and Privacy Workshops, Sep 2021, Vienne, Austria. pp.96-102, ⟨10.1109/EuroSPW54576.2021.00017⟩. ⟨hal-03353878⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-03353878/file/silm21_forcioli.pdf BibTex
ref_biblio
Sylvain Guilley, Michel Le Rolland, Damien Quenson. Implementing Secure Applications thanks to an Integrated Secure Element. 7th International Conference on Information Systems Security and Privacy, INSTICC, Feb 2021, Vienne (en ligne), Austria. pp.566-571, ⟨10.5220/0010298205660571⟩. ⟨hal-03084250v3⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03084250/file/20_ICISSP.pdf BibTex
ref_biblio
Ameer Hamza, Maria Mushtaq, Muhammad Khurram Bhatti, David Novo, Florent Bruguier, et al.. Diminisher: A Linux Kernel based Countermeasure for TAA Vulnerability. CPS4CIP 2021 - 2nd International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, Oct 2021, virtual event, Germany. pp.477-495, ⟨10.1007/978-3-030-95484-0_28⟩. ⟨hal-03372868⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-03372868/file/CPS4CIP_2021_paper_3.pdf BibTex
ref_biblio
Vanthanh Khuat, Jean-Luc Danger, Jean-Max Dutertre. Laser Fault Injection in a 32-bit Microcontroller: from the Flash Interface to the Execution Pipeline. 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), Sep 2021, Milan, Italy. pp.74-85, ⟨10.1109/FDTC53659.2021.00020⟩. ⟨hal-03433817⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03433817/file/2021_SAMD21_Laser_induced_pipe_line_fault.pdf BibTex
ref_biblio
Vanthanh Khuat, Jean-Max Dutertre, Jean-Luc Danger. Analysis of a Laser-induced Instructions Replay Fault Model in a 32-bit Microcontroller. 2021 24th Euromicro Conference on Digital System Design (DSD), Sep 2021, Palermo, Italy. pp.363-370, ⟨10.1109/DSD53832.2021.00061⟩. ⟨hal-03433816⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03433816/file/2021_SAMD21_Laser_induced_replay.pdf BibTex
ref_biblio
Vanthanh Khuat, Oualid Trabelsi, Laurent Sauvage, Jean-Luc Danger. Multiple and Reproducible Fault Models on Micro-Controller using Electromagnetic Fault Injection. 2021 JOINT IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, SIGNAL & POWER INTEGRITY, AND EMC EUROPE, Jul 2021, Virtuel, France. ⟨10.1109/EMC/SI/PI/EMCEurope52599.2021.9559288⟩. ⟨hal-03365013⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03365013/file/2021_SAMD21_MultiFault_paper%20%281%29.pdf BibTex
ref_biblio
Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul. On Conditional alpha-Information and its Application to Side-Channel Analysis: On Conditional α-Information and its Application to Side-Channel Analysis. 2021 IEEE Information Theory Workshop (ITW2021), Oct 2021, Kanazawa, Japan. ⟨hal-03323522⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03323522/file/202109liuchengguilleyrioul.pdf BibTex
ref_biblio
Olivier Rioul, Wei Cheng, Sylvain Guilley. Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret. 2021 IEEE International Symposium on Information Theory (ISIT'21), Jul 2021, Melbourne (virtual), Australia. ⟨hal-03323533⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03323533/file/202102rioulchengguilley.pdf BibTex
ref_biblio
Patrick Solé, Yi Liu, Wei Cheng, Sylvain Guilley, Olivier Rioul. Linear Programming Bounds on the Kissing Number of q-ary Codes. 2021 IEEE Information Theory Workshop (ITW2021), Oct 2021, Kanazawa, Japan. ⟨hal-03323516⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03323516/file/202109soleliuchengguilleyrioul.pdf BibTex
ref_biblio
Patrick Solé, Wei Cheng, Sylvain Guilley, Olivier Rioul. Bent Sequences over Hadamard Codes for Physically Unclonable Functions. 2021 IEEE International Symposium on Information Theory (ISIT 2021), Jul 2021, Melbourne, Australia. ⟨hal-03240109⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-03240109/file/21_isit_entropy_puf.pdf BibTex
ref_biblio
Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Laurent Sauvage, Yves Mathieu, et al.. Formal Evaluation and Construction of Glitch-resistant Masked Functions. HOST, Dec 2021, Virtual, United States. ⟨hal-03365025⟩
Accès au bibtex
BibTex
ref_biblio
Etienne Tehrani, Tarik Graba, Abdelmalek Si Merabet, Jean-Luc Danger. RSM Protection of the PRESENT Lightweight Cipher as a RISC-V Extension. 2021 24th Euromicro Conference on Digital System Design (DSD), Sep 2021, Palermo, Italy. pp.325-332, ⟨10.1109/DSD53832.2021.00056⟩. ⟨hal-03376955⟩
Accès au bibtex
BibTex

2020

ref_biblio
Amir Ali Pour, Vincent Beroulle, Bertrand Cambou, Jean-Luc Danger, Giorgio Di Natale, et al.. PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community. IEEE European Test Symposium (ETS 2020), May 2020, Tallinn, Estonia. pp.1-10. ⟨hal-02999226⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-02999226/file/ETS2020_PUF.pdf BibTex
ref_biblio
Md Toufiq Hasan Anik, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi. On the Effect of Aging on Digital Sensors. 2020 33rd International Conference on VLSI Design and 2020 19th International Conference on Embedded Systems (VLSID), Jan 2020, Bangalore, India. pp.189-194, ⟨10.1109/VLSID49098.2020.00050⟩. ⟨hal-03034857⟩
Accès au bibtex
BibTex
ref_biblio
Md Toufiq Hasan Anik, Rachit Saini, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi. Failure and Attack Detection by Digital Sensors. 2020 IEEE European Test Symposium (ETS), May 2020, Tallinn, Estonia. pp.1-2, ⟨10.1109/ETS48528.2020.9131580⟩. ⟨hal-03034851⟩
Accès au bibtex
BibTex
ref_biblio
Julien Bringer, Hervé Chabanne, Linda Guiga. Premium Access to Convolutional Neural Networks. Crisis 2020, Nov 2020, Paris, France. ⟨hal-03021922⟩
Accès au bibtex
BibTex
ref_biblio
Hervé Chabanne, Emmanuelle Dottax, Denis Dumont. Augmented Voting Reality. CRISIS 2020, Nov 2020, Paris, France. ⟨hal-03021929⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, et al.. Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks. Constructive Side-Channel Analysis and Secure Design. COSADE 2020, Apr 2020, Lugano, Switzerland. pp.254-274, ⟨10.1007/978-3-030-68773-1_12⟩. ⟨hal-03138848⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Wei Cheng, Sylvain Guilley, Naghmeh Karimi, Trevor Kroeger. Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations. 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2020, Grenoble, France. pp.454-459, ⟨10.23919/DATE48585.2020.9116428⟩. ⟨hal-02946697⟩
Accès au bibtex
BibTex
ref_biblio
Mohammad Ebrahimabadi, Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi. Using Digital Sensors to Leverage Chips' Security. 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), Dec 2020, Washington, United States. pp.1-6, ⟨10.1109/PAINE49178.2020.9337730⟩. ⟨hal-03138811⟩
Accès au bibtex
BibTex
ref_biblio
Linda Guiga, A. W. Roscoe. Neural Network Security: Hiding {CNN} Parameters with Guided Grad-CAM. ICISSP, Feb 2020, Valetta, Malta. ⟨hal-03023640⟩
Accès au bibtex
BibTex
ref_biblio
Md Toufiq Hasan Anik, Mohammad Ebrahimabadi, Hamed Pirsiavash, Jean-Luc Danger, Sylvain Guilley, et al.. On-Chip Voltage and Temperature Digital Sensor for Security, Reliability, and Portability. 2020 IEEE 38th International Conference on Computer Design (ICCD), Oct 2020, Hartford, United States. pp.506-509, ⟨10.1109/ICCD50377.2020.00091⟩. ⟨hal-03138833⟩
Accès au bibtex
BibTex
ref_biblio
Trevor Kroeger, Wei Cheng, Sylvain Guilley, Jean-Luc Danger, Naghmeh Karimi. Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel. 2020 IEEE International Test Conference (ITC), Nov 2020, Washington, United States. pp.1-5, ⟨10.1109/ITC44778.2020.9325241⟩. ⟨hal-03138824⟩
Accès au bibtex
BibTex
ref_biblio
Alexandre Menu, Jean-Max Dutertre, Jean-Baptiste Rigaud, Brice Colombier, Pierre-Alain Moellic, et al.. Single-bit Laser Fault Model in NOR Flash Memories: Analysis and Exploitation. 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), Sep 2020, Milan, Italy. pp.41-48, ⟨10.1109/FDTC51366.2020.00013⟩. ⟨hal-03034855⟩
Accès au bibtex
BibTex
ref_biblio
Laurent Sauvage, Sofiane Takarabt, Youssef Souissi, Sylvain Guilley, Yves Mathieu. Detection of Side-channel Lleakage Through Glitches Using an Automated Tool. International Conference on Defense Systems: Architectures and Technologies (DAT’2020), Apr 2020, Constantine, Algeria. ⟨hal-02951758⟩
Accès au bibtex
BibTex
ref_biblio
Alexander Schaub, Jean-Luc Danger, Olivier Rioul, Sylvain Guilley. The Big Picture of Delay-PUF Dependability. 24th European Conference on Circuit Theory and Design (ECCTD), IEEE, Sep 2020, Sofia, Bulgaria. ⟨hal-02932063⟩
Accès au texte intégral et bibtex
https://hal-cnrs.archives-ouvertes.fr/hal-02932063/file/article_puf_big_picture.pdf BibTex
ref_biblio
Etienne Tehrani, Tarik Graba, Abdelmalek Si Merabet, Jean-Luc Danger. RISC-V Extension for Lightweight Cryptography. 2020 23rd Euromicro Conference on Digital System Design (DSD), Aug 2020, Kranj, Slovenia. pp.222-228, ⟨10.1109/DSD51259.2020.00045⟩. ⟨hal-02977544⟩
Accès au bibtex
BibTex
ref_biblio
Oualid Trabelsi, Laurent Sauvage, Jean-Luc Danger. Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller Instruction Buffer. 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Dec 2020, Kolkata, India. pp.1-6, ⟨10.1109/AsianHOST51057.2020.9358270⟩. ⟨hal-03175561⟩
Accès au bibtex
BibTex

2019

ref_biblio
Daniel Augot, Hervé Chabanne, William George. Practical Solutions to Save Bitcoins Applied to an Identity System Proposal. ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, Czech Republic. pp.511-518, ⟨10.5220/0007443905110518⟩. ⟨hal-02347238⟩
Accès au bibtex
BibTex
ref_biblio
Sahar Berro, Ludovic Apvrille, Guillaume Duc. Optimizing System Architecture Cost and Security Countermeasures. Sixth International Workshop on Graphical Models for Security (GamSec 2019), Jun 2019, Hoboken, NJ, United States. ⟨hal-02337448⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02337448/file/gramsec19paper10.pdf BibTex
ref_biblio
Hervé Chabanne, Emmanuelle Dottax, Franck Rondepierre. Smart-card Deployment of an Electronic Voting Protocol. 5th International Conference on Information Systems Security and Privacy, Feb 2019, Prague, France. pp.503-510, ⟨10.5220/0007443805030510⟩. ⟨hal-02347255⟩
Accès au bibtex
BibTex
ref_biblio
Wei Cheng, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley. Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection. Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, Aug 2019, atlanta, United States. pp.17, ⟨10.29007/fv2n⟩. ⟨hal-03037597⟩
Accès au bibtex
BibTex
ref_biblio
Eloi De Cherisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida. An information-theoretic model for side-channel attacks in embedded hardware. 2019 IEEE International Symposium on Information Theory (ISIT 2019), Jul 2019, Paris, France. ⟨10.1109/ISIT.2019.8849763⟩. ⟨hal-02300788⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300788/file/201907cheriseyguilleyrioulpiantanida.pdf BibTex
ref_biblio
Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, et al.. Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller. 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), May 2019, McLean, United States. pp.1-10, ⟨10.1109/HST.2019.8741030⟩. ⟨hal-02344050⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02344050/file/HAL_HOST2019_Laser_induced_Single_bit_Faults_in_Flash_Memory_Instructions_Corruption_on_a_32_bit_Microcontroller.pdf BibTex
ref_biblio
Jean-Luc Danger, Laurent Fribourg, Ulrich Kühne, Maha Naceur. LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection. 2019 22nd Euromicro Conference on Digital System Design (DSD), Aug 2019, Kallithea, Greece. pp.269-276, ⟨10.1109/DSD.2019.00047⟩. ⟨hal-02338436⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Alexander Schaub. Two-Metric Helper Data for Highly Robust and Secure Delay PUFs. 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI), Jun 2019, Otranto, Italy. pp.184-188, ⟨10.1109/IWASI.2019.8791249⟩. ⟨hal-02302114⟩
Accès au bibtex
BibTex
ref_biblio
Shugo Kaji, Masahiro Kinugawa, Daisuke Fujimoto, Laurent Sauvage, Jean-Luc Danger, et al.. Method for Identifying Individual Electronic Devices Focusing on Differences in Spectrum Emissions. 2019 Joint International Symposium on Electromagnetic Compatibility and Asia-Pacific International Symposium on Electromagnetic Compatibility, Sep 2019, Sapporo, Japan. ⟨hal-02319485⟩
Accès au bibtex
BibTex
ref_biblio
Alexandre Menu, Shivam Bhasin, Jean-Max Dutertre, Jean-Baptiste Rigaud, Jean-Luc Danger. Precise Spatio-Temporal Electromagnetic Fault Injections on Data Transfers. 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Aug 2019, Atlanta, United States. pp.1-8, ⟨10.1109/FDTC.2019.00009⟩. ⟨hal-02338456⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02338456/file/HAL_FDTC_2019_EM_injection.pdf BibTex
ref_biblio
Alexander Schaub, Olivier Rioul, Sylvain Guilley. STAnalyzer: A simple static analysis tool for detecting cache-timing leakages. 17th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2019), Jun 2019, Prague, Czech Republic. ⟨hal-02300786⟩
Accès au bibtex
BibTex
ref_biblio
Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage, et al.. Cache-Timing Attacks Still Threaten IoT Devices. 3rd International Conference on Codes, Cryptology, and Information Security (C2SI 2019), Apr 2019, Rabat, Morocco. pp.13-30, ⟨10.1007/978-3-030-16458-4_2⟩. ⟨hal-02319488⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02319488/file/main%20%281%29.pdf BibTex
ref_biblio
Etienne Tehrani, Tarik Graba, Abdelmalek Si Merabet, Sylvain Guilley, Jean-Luc Danger. Classification of Lightweight Block Ciphers for Specific Processor Accelerated Implementations. 2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS), Nov 2019, Genoa, Italy. pp.747-750, ⟨10.1109/ICECS46596.2019.8965156⟩. ⟨hal-02517585⟩
Accès au bibtex
BibTex
ref_biblio
Etienne Tehrani, Tarik Graba, Jean-Luc Danger. Acceleration of Lightweight Block Ciphers on Microprocessors. CryptArchi 2019, Jun 2019, Prague, Poland. ⟨hal-02271470⟩
Accès au bibtex
BibTex
ref_biblio
Oualid Trabelsi, Laurent Sauvage, Jean-Luc Danger. Characterization at Logical Level of Magnetic Injection Probes. 2019 Joint International Symposium on Electromagnetic Compatibility and Asia-Pacific International Symposium on Electromagnetic Compatibility, Jun 2019, Sapporo, Japan. ⟨hal-02318716⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02318716/file/2019_APEMC_CharacProbes_article.pdf BibTex
ref_biblio
Oualid Trabelsi, Laurent Sauvage, Jean-Luc Danger. Impact of Intentional Electromagnetic Interference on Pure Combinational Logic. 2019 International Symposium on Electromagnetic Compatibility - EMC EUROPE, Sep 2019, Barcelone, Spain. pp.398-403. ⟨hal-02318731⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02318731/file/2019_EMCE.pdf BibTex

2018

ref_biblio
Fabio Batagin Armelin, Lirida Alves de Barros Naviner, Roberto d'Amore. Probability Aware Fault-Injection Approach for SER Estimation. Proceedings of IEEE Latin American Test Symposium (LATS), Mar 2018, São Paulo, SP, Brazil. ⟨hal-02287888⟩
Accès au bibtex
BibTex
ref_biblio
Fabio Batagin Armelin, Lirida Alves de Barros Naviner, Roberto d'Amore. Using FPGA self-produced transients to emulate SETs for SER estimation. Proceedings of IEEE Latin American Test Symposium (LATS), Mar 2018, São Paulo, SP, Brazil. ⟨hal-02288530⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Jun Yang, Wang Kang, et al.. Enabling Resilient Voltage-Controlled MeRAM Using Write Assist Techniques. IEEE International Symposium on Circuits and Systems (ISCAS), May 2018, Florence, Italy. ⟨hal-02288533⟩
Accès au bibtex
BibTex
ref_biblio
Sumanta Chaudhuri. A security vulnerability analysis of SoCFPGA architectures. Proceedings of the 55th Annual Design Automation Conference, DAC 2018, San Francisco, CA, USA, June 24-29, 2018, 2018, San Francisco, United States. pp.139:1-139:6, ⟨10.1145/3195970.3195979⟩. ⟨hal-02412407⟩
Accès au bibtex
BibTex
ref_biblio
Sumanta Chaudhuri. Beyond Bits: A Quaternary FPGA Architecture Using Multi-Vt Multi-Vdd FDSOI Devices. 48th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2018, Linz, Austria, May 16-18, 2018, 2018, Linz, Austria. pp.38-43, ⟨10.1109/ISMVL.2018.00015⟩. ⟨hal-02412408⟩
Accès au bibtex
BibTex
ref_biblio
Eloi De Cherisey, Sylvain Guilley, Olivier Rioul. Confused yet successful: Theoretical computation of distinguishers for monobit leakages in terms of confusion coefficient and SNR. 14th International Conference on Information Security and Cryptology (Inscrypt 2018), Dec 2018, Fuzhou, China. ⟨10.1007/978-3-030-14234-6_28⟩. ⟨hal-02300768⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300768/file/201811cheriseyguilleyrioul.pdf.pdf BibTex
ref_biblio
Elaine Crespo Marques, Nilson Maciel, Lirida Alves de Barros Naviner, Hao Cai, Jun Yang. Compressed Sensing for Wideband HF Channel Estimation. 4th International Conference on Frontiers of Signal Processing, Sep 2018, Poitiers, France. pp.1-5. ⟨hal-02287975⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ulrich Kühne, et al.. CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity. 2018 21st Euromicro Conference on Digital System Design (DSD), Aug 2018, Prague, Czech Republic. pp.529-536, ⟨10.1109/DSD.2018.00093⟩. ⟨hal-01900361⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Risa Yashiro, Tarik Graba, Yves Mathieu, Abdelmalek Si-Merabet, et al.. Analysis of Mixed PUF-TRNG Circuit Based on SR-Latches in FD-SOI Technology. 2018 21st Euromicro Conference on Digital System Design (DSD), Aug 2018, Prague, Czech Republic. pp.508-515. ⟨hal-02271687⟩
Accès au bibtex
BibTex
ref_biblio
Eloi de Chérisey, Sylvain Guilley, Olivier Rioul. Confusing information: How confusion improves side-channel analysis for monobit leakages. 16th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2018), Jun 2018, Lorient, France. ⟨hal-02287934⟩
Accès au bibtex
BibTex
ref_biblio
Naghmeh Karimi, Sylvain Guilley, Jean-Luc Danger. Impact of Aging on Template Attacks. GLSVLSI, May 2018, Chicago, United States. pp.455-458, ⟨10.1145/3194554.3194638⟩. ⟨hal-02412366⟩
Accès au bibtex
BibTex
ref_biblio
Naghmeh Karimi, Sylvain Guilley, Jean-Luc Danger. On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis.. IOLTS, Jul 2018, Platja d'Aro, Spain. ⟨10.1109/IOLTS.2018.8474089⟩. ⟨hal-02288013⟩
Accès au bibtex
BibTex
ref_biblio
Alexander Schaub, Olivier Rioul, Joseph Boutros, Jean-Luc Danger, Sylvain Guilley. Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem. Latin American Workshop on Coding and Information, Jul 2018, Unicamp-Campinas, Brazil. ⟨hal-02287965⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02287965/file/201806schaubrioulboutrosdangerguilley.pdf BibTex
ref_biblio
Alexander Schaub, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul. Reliability and entropy of delay PUFs: A theoretical analysis. 16th International Workshop on Cryptographic Architectures Embedded in Logic Devices (CryptArchi 2018), Jun 2018, Lorient, France. ⟨hal-02287933⟩
Accès au bibtex
BibTex
ref_biblio
Alexander Schaub, Jean-Luc Danger, Sylvain Guilley, Olivier Rioul. An improved analysis of reliability and entropy for delay PUFs. Euromicro Conference on Digital System Design (DSD'18), Aug 2018, Prague, Czech Republic. ⟨10.1109/DSD.2018.00096⟩. ⟨hal-02288537⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02288537/file/201806schaubdangerguilleyrioul.pdf.pdf BibTex
ref_biblio
Sofiane Takarabt, Kais Chibani, Youssef Souissi, Laurent Sauvage, Sylvain Guilley, et al.. Pre-Silicon Embedded System Evaluation as new EDA for Security Verification. International Verification and Security Workshop (IVSW), Jun 2018, Platja d’Aro, Spain. ⟨hal-02287930⟩
Accès au bibtex
BibTex
ref_biblio
Etienne Tehrani, Jean-Luc Danger, Tarik Graba. Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers. 12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩. ⟨hal-02294599⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-02294599/file/484602_1_En_4_Chapter.pdf BibTex
ref_biblio
You Wang, Yue Zhang, Zhabg Youguang, Weisheng Zhao, Hao Cai, et al.. Design Space Exploration of Magnetic Tunnel Junction based Stochastic Computing in Deep Learning. To appear in Proceedings of ACM Great Lakes Symposium on VLSI (GLSVLSI), May 2018, Chicago, Illinois, United States. pp.23-25. ⟨hal-02287894⟩
Accès au bibtex
BibTex

2017

ref_biblio
Daniel Augot, Hervé Chabanne, Thomas Chenevier, William George, Laurent Lamber. A User-Centric System for Verified Identities on the Bitcoin Blockchain. International Workshop on Cryptocurrencies and Blockchain Technology - CBT'17, Sep 2017, Oslo, Norway. ⟨hal-01611251⟩
Accès au texte intégral et bibtex
https://hal.inria.fr/hal-01611251/file/accgl-cbt.pdf BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Weisheng Zhao. Novel Pulsed-Latch Replacement in Non-Volatile Flip-Flop Core. VLSI (ISVLSI), 2017 IEEE Computer Society Annual Symposium on, Jun 2017, Bochum, Germany. ⟨hal-02287633⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Weisheng Zhao. Energy Efficient Magnetic Tunnel Junction Based Hybrid LSI Using Multi-Threshold UTBB-FD-SOI Device. Great Lakes Symposium on VLSI 2017 (GLSVLSI 17), May 2017, Banff, Canada. ⟨hal-02287632⟩
Accès au bibtex
BibTex
ref_biblio
Sumanta Chaudhuri. Cache Timing Attacks from The SoCFPGA Coherency Port (Abstract Only). Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, FPGA 2017, Monterey, CA, USA, February 22-24, 2017, Feb 2017, Monterey, CA, United States. pp.295-296. ⟨hal-02412325⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Philippe Nguyen, Robert Nguyen, Youssef Souissi. Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow. DATE, Dec 2017, lausanne, Switzerland. ⟨10.23919/DATE.2017.7927159⟩. ⟨hal-02412314⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger. Formalism to assess and enhance the entropy and reliability of a Loop-PUF. CRYPTO'IC, Sep 2017, Chengdu, China. ⟨hal-02287902⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Olivier Rioul, Sylvain Guilley, Alexander Schaub. Formalism to assess the entropy and reliability of the loop-PUF. 15th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2017), Jun 2017, Smolenice, Slovakia. ⟨hal-02287598⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Guilley, Annelie Heuser, Ming Tang, Olivier Rioul. Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition. Int. Conf. Information Technology and Communications Security (SECITC 2017), Jun 2017, Bucharest, Romania. ⟨hal-01628679⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-01628679/file/17_secitc.pdf BibTex
ref_biblio
Ammar Hideur, Ming Tang, F. Lesparre, H. Wang, K. Qian, et al.. Laser ultrarapide à base d'une fibe active fortement dispersive. JNOG 2017, Jul 2017, Limoges, France. ⟨hal-02412306⟩
Accès au bibtex
BibTex
ref_biblio
Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'H, Sylvain Guilley. Impact of the switching activity on the aging of delay-PUFs. ETS, May 2017, Limassol, Greece. ⟨10.1109/ETS.2017.7968223⟩. ⟨hal-02412489⟩
Accès au bibtex
BibTex
ref_biblio
Nilson Maciel, Elaine Crespo Marques, Lirida Alves de Barros Naviner. Sparsity Analysis using a Mixed Approach with Greedy and LS Algorithms on Channel Estimation. International Conference on Frontiers of Signal Processing (ICFSP), Sep 2017, Paris, France. pp.91-95. ⟨hal-02287640⟩
Accès au bibtex
BibTex
ref_biblio
Noriyuki Miura, Kohei Matsuda, Karol Myszkowski, Makoto Nagata, Shivam Bhasin, et al.. A 2.5ns-Latency 0.39pJ/b 289µm2/Gb/s Ultra-Light-Weight PRINCE Cryptographic Processor. Symposium on VLSI Circuits, Jun 2017, Kyoto, Japan. pp.C266-C267. ⟨hal-02288491⟩
Accès au bibtex
BibTex
ref_biblio
Laurent Sauvage. Electromagnetic Fault Injection: from Attack to Countermeasure Design. CryptoIC, Sep 2017, Chengdu, China. ⟨hal-02287699⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Slimani, Karim Benkalaia, Lirida Alves de Barros Naviner. Analysis of Ageing effects on ARTIX7 XILINX FPGA. European Symposium on Reliability of Electron Devices, Failure Physics and Analysis (ESREF), Sep 2017, Bordeaux, France. ⟨hal-02287636⟩
Accès au bibtex
BibTex
ref_biblio
Alexandre Stempkovskiy, Dmitry Telpukhov, Roman Solovyev, Ekaterina Balaka, Lirida Alves de Barros Naviner. Practical metrics for evaluation of fault-tolerant logic design. IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, Feb 2017, Saint Petersbourgh, Russia. pp.569-573. ⟨hal-02287656⟩
Accès au bibtex
BibTex
ref_biblio
Francisco Veirano, Lirida Alves de Barros Naviner, Fernando Silveira. Asymmetrical Length Biasing for Energy Efficient Digital Circuits. IEEE Latin American Symposium on Circuits and Systems, Feb 2017, Bariloche, Argentina. ⟨hal-02287637⟩
Accès au bibtex
BibTex
ref_biblio
Chien-Yi Wang, Shirin Saeedi Bidokhti, Michèle Wigger. Improved Converses and Gap-Results for Coded Caching. ISIT 2017, Jun 2017, Aix-La-Chapelle, Germany. ⟨hal-02287714⟩
Accès au bibtex
BibTex

2016

ref_biblio
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Marion Damien, Olivier Rioul. Optimal side-channel attacks for multivariate leakages and multiple models. PROOFS 2016 Security Proofs for Embedded Systems, Aug 2016, Santa Barbara, United States. ⟨10.1007/s13389-017-0170-9⟩. ⟨hal-02300060⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300060/file/201608bruneauguilleyheusermarionrioul.pdf BibTex
ref_biblio
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-Xavier Standaert, et al.. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (AsiaCrypt 2016), Dec 2016, Hanoi, Vietnam. ⟨10.1007/978-3-662-53887-6_21⟩. ⟨hal-02287426⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02287426/file/201612bruneauguilleyheuserrioulstandaertteglia.pdf.pdf BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Weisheng Zhao. Approximate Computing in MOS/Spintronic Non-Volatile Full-Adder. 12th ACM/IEEE International Symposium on Nanoscale Architectures, Jun 2016, Beijing, China. ⟨hal-02412223⟩
Accès au bibtex
BibTex
ref_biblio
Wei Cheng, Yongbin Zhou, Laurent Sauvage. Differential Fault Analysis on Midori. Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, Sep 2016, Singapore, Singapore. pp.307-317, ⟨10.1007/978-3-319-50011-9_24⟩. ⟨hal-02412272⟩
Accès au bibtex
BibTex
ref_biblio
Eloi De Cherisey, Sylvain Guilley, Olivier Rioul, Darshana Jayasinghe. Template attacks with partial profiles and Dirichlet priors: Application to timing attacks. Hardware and Architectural Support for Security and Privacy (HASP 2016), Jun 2016, Seoul, South Korea. ⟨10.1145/2948618.2948625⟩. ⟨hal-02300026⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300026/file/201606cheriseyguilleyriouljayasinghe.pdf.pdf BibTex
ref_biblio
Eloi De Cherisey, Sylvain Guilley, Annelie Heuser, Olivier Rioul. On the optimality and practicability of mutual information analysis in some scenarios. ArticCrypt 2016, Jul 2016, Longyearbyen, Svalbard, Norway. ⟨hal-02300055⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300055/file/201607cheriseyguilleyheuserrioul.pdf BibTex
ref_biblio
Benjamin Coeffic, Victor Malherbe, Jean-Marc Daveau, Gilles Gasiot, Lirida A. B. Naviner, et al.. A Layout-Based Fault Injection Methodology for SER Prediction: Implementation and Correlation with 65nm Heavy Ion Experimental Results. Proceedings of IEEE Nuclear and Space Radiation Effects Conference (NSREC), Jul 2016, New Orleans, United States. ⟨hal-02288532⟩
Accès au bibtex
BibTex
ref_biblio
Benjamin Coeffic, Jean-Marc Daveau, Gilles Gasiot, A.E. Pricco, S. Parini, et al.. Radiation Hardening Improvement of a SerDes under Heavy Ions up to 60 MeV.cm2/mg by Layout-Aware Fault Injection. Proceedings of IEEE Workshop on Silicon Errors in Logic - System Effects (SELSE), Mar 2016, Austin, Texas, United States. ⟨hal-02287892⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Philippe Nguyen, Olivier Rioul. PUFs: Standardization and Evaluation. 2nd IEEE Workshop on Mobile System Technologies (MST 2016), Sep 2016, Milano, Italy. ⟨10.1109/MST.2016.11⟩. ⟨hal-02288475⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02288475/file/201609dangerguilleynguyenrioul.pdf.pdf BibTex
ref_biblio
Jean-Luc Danger. Overview of Protections Against IC Counterfeiting and Hardware Trojan Horses. ISSCC, Jan 2016, Sab Francisco, United States. ⟨hal-02287903⟩
Accès au bibtex
BibTex
ref_biblio
Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Annelie Heuser. Defining perceived information based on Shannon’s communication theory. Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France. ⟨hal-02287329⟩
Accès au bibtex
BibTex
ref_biblio
Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, et al.. Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes. TrustCom-16, Aug 2016, Tianjin, China. ⟨hal-02287456⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Guilley, Nicolas Bruneau, Annelie Heuser, Olivier Rioul, François-Xavier Standaert, et al.. Taylor expansion of maximum likelihood attacks, with application to masked and shuffled implementations. Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France. ⟨hal-02287328⟩
Accès au bibtex
BibTex
ref_biblio
Natalija Jovanovic, Olivier Thomas, Elisa Vianello, Boris Nikolic, Lirida A. B. Naviner. Design Considerations for Reliable OxRAM-based Non-Volatile Flip-Flops in 28nm FD-SOI Technology. IEEE International Symposium on Circuits and Systems (ISCAS 2016), May 2016, Montréal, Canada. pp.1146-1149, ⟨10.1109/ISCAS.2016.7527448⟩. ⟨hal-02287862⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02287862/file/07527448.pdf BibTex
ref_biblio
Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'H, Sylvain Guilley. Predictive Aging of Reliability of Two Delay PUFs. SPACE, Dec 2016, Hyderabad, India. ⟨10.1007/978-3-319-49445-6_12⟩. ⟨hal-02412243⟩
Accès au bibtex
BibTex
ref_biblio
Noriyuki Miura, Zakaria Najm, Wei He, Shivam Bhasin, Xuan-Thuy Ngo, et al.. PLL to the rescue: a novel EM fault countermeasure. DAC, Jun 2016, Austin, United States. ⟨10.1145/2897937.2898065⟩. ⟨hal-02288461⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Rioul, Patrick Solé, Sylvain Guilley, Jean-Luc Danger. A challenge code for maximizing the entropy of PUF responses. Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Jun 2016, Montpellier, France. ⟨hal-02287330⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Rioul, Annelie Heuser, Sylvain Guilley, Jean-Luc Danger. Inter-Class vs. Mutual Information as Side-Channel Distinguishers. 2016 IEEE International Symposium on Information Theory (ISIT'16), Jul 2016, Barcelona, Spain. ⟨10.1109/ISIT.2016.7541410⟩. ⟨hal-02287308⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02287308/file/201607rioulheuserguilleydanger.pdf.pdf BibTex
ref_biblio
Olivier Rioul, Patrick Solé, Sylvain Guilley, Jean-Luc Danger. On the Entropy of Physically Unclonable Functions. 2016 IEEE International Symposium on Information Theory (ISIT'16), Jul 2016, Barcelona, Spain. ⟨10.1109/ISIT.2016.7541835⟩. ⟨hal-02288459⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02288459/file/201607rioulsoleguilleydanger.pdf.pdf BibTex
ref_biblio
Laurent Sauvage, Sofiane Takarabt, Youssef Souissi. Secure Silicon: Towards Virtual Prototyping. TRUDEVICE, Nov 2016, Barcelona, Spain. ⟨hal-02287467⟩
Accès au bibtex
BibTex

2015

ref_biblio
Lirida Alves de Barros Naviner, Hao Cai, You Wang, Weisheng Zhao, Arwa Ben Dhia. Stochastic Computation With Spin Torque Transfer Magnetic Tunnel Junction. IEEE-NEWCAS, Jun 2015, Grenoble, France. ⟨hal-02412179⟩
Accès au bibtex
BibTex
ref_biblio
Emna Amouri, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger. Countering Early Propagation and Routing Imbalance of DPL. International Conference on IC Design and Technology (ICICDT), Jun 2015, Leuven, Belgium. ⟨10.1109/ICICDT.2015.7165897⟩. ⟨hal-02287122⟩
Accès au bibtex
BibTex
ref_biblio
Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay. From theory to practice of private circuit: A cautionary note. ICCD, Oct 2015, New York, United States. ⟨10.1109/ICCD.2015.7357117⟩. ⟨hal-02412245⟩
Accès au bibtex
BibTex
ref_biblio
Cyril Bottoni, Benjamin Coeffic, Jean-Marc Daveau, Lirida Alves de Barros Naviner, Philippe Roche. Partial Triplication of a Sparc-V8 Microprocessor Using Fault Injection. Proceedings of IEEE Latin American Symposium on Circuits and Systems (LASCAS), Feb 2015, Montevideo, Uruguay. ⟨hal-02287891⟩
Accès au bibtex
BibTex
ref_biblio
Cyril Bottoni, Benjamin Coeffic, Jean-Marc Daveau, Gilles Gasiot, F. Abouzeid, et al.. Frequency and Voltage Effects on SER on a 65nm Sparc-V8 Microprocessor Under Radiation Test. Proceedings of IEEE International Reliability Physics Symposium (IRPS), Apr 2015, Monterrey, CA, United States. ⟨hal-02287890⟩
Accès au bibtex
BibTex
ref_biblio
Cyril Bottoni, Benjamin Coeffic, Jean-Marc Daveau, Gilles Gasiot, Lirida Alves de Barros Naviner, et al.. A Layout-Aware Approach to Fault Injection for Improving Failure Mode Prediction. Proceedings of Workshop on Silicon Errors in Logic - System Effects (SELSE), Mar 2015, Austin, United States. ⟨hal-02288531⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, You Wang, Lirida Alves de Barros Naviner, Weisheng Zhao. Ultra wide voltage range consideration of reliability-aware STT magnetic flip-flop in 28nm FDSOI technology. 26th European Symposium on Reliability of Electron Devices, Failure Physics and Analysis (ESREF), Oct 2015, Toulouse, France. ⟨hal-02287226⟩
Accès au bibtex
BibTex
ref_biblio
Eloi De Cherisey, Annelie Heuser, Sylvain Guilley, Olivier Rioul. On the optimality of mutual information analysis for discrete leakages. 13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium. ⟨hal-02300011⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Yves Mathieu, Thibault Porteboeuf. IC variability : Pros and cons for security blocks. TRUDEVICE, Mar 2015, Grenoble, France. ⟨hal-02412162⟩
Accès au bibtex
BibTex
ref_biblio
Daisuke Fujimoto, Makoto Nagata, Shivam Bhasin, Jean-Luc Danger. A novel methodology for testing hardware security and trust exploiting On-Chip Power noise Measurement. ASP-DAC, Jan 2015, Tokyo, Japan. ⟨10.1109/ASPDAC.2015.7059100⟩. ⟨hal-02412244⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Guilley, Annelie Heuser, Olivier Rioul. A Key to Success: Success Exponents for Side-Channel Distinguishers. 16th International Conference on Cryptology in India (IndoCrypt 2015), Dec 2015, Bangalore, India. pp.270-290, ⟨10.1007/978-3-319-26617-6_15⟩. ⟨hal-02287175⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02287175/file/201512guilleyheuserrioul.pdf.pdf BibTex
ref_biblio
Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-Xavier Standaert. Template Attacks, Optimal Distinguishers and the Perceived Information Metric. 13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Jun 2015, Leuven, Belgium. ⟨hal-02287176⟩
Accès au bibtex
BibTex
ref_biblio
Natalija Jovanovic, Elisa Vianello, Olivier Thomas, Boris Nikolic, Lirida A. B. Naviner. Design insights for reliable energy efficient OxRAM-based flip-flop in 28nm FD-SOI. Proceedings of IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S), Oct 2015, Sonoma Valley, CA, United States. ⟨hal-02287895⟩
Accès au bibtex
BibTex
ref_biblio
Han Le Duc, D. M. Nguyen, Chadi Jabbour, Tarik Graba, Patricia Desgreys, et al.. Hardware Implementation of All Digital Calibration for Undersampling TIADCs. IEEE International Symposium on Circuits and Systems ISCAS2015, May 2015, Lisbon, Portugal. ⟨hal-02287188⟩
Accès au bibtex
BibTex
ref_biblio
Xavier Pons Masbernart, Christophe Gruet, Eric Georgeaux, Lirida A. B. Naviner. D2D Broadcast Communications for 4G PMR Networks. Proceedings of IFIF International Conference on New Technologies, Mobility and Security (NTMS), Jul 2015, Paris, France. ⟨hal-02287897⟩
Accès au bibtex
BibTex
ref_biblio
Laurent Sauvage. Injection électromagnétique de fautes sur FPGA : caractérisation & contre-mesure. CRYPTO'PUCES, May 2015, Porquerolles, France. ⟨hal-02287251⟩
Accès au bibtex
BibTex
ref_biblio
Laurent Sauvage. Electromagnetic Fault injection: Impact on FPGA. Journée Sécurité Numérique du GDR SoC-SiP, Jun 2015, Paris, France. ⟨hal-02287253⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Slimani, Arwa Ben Dhia, Lirida Alves de Barros Naviner. A Novel Analytical Method for Defect Tolerance Assessment. European Symposium on Reliability of Electron devices, Failure physics and Analysis, Oct 2015, Toulouse, France. ⟨hal-01216726⟩
Accès au bibtex
BibTex
ref_biblio
Mariem Slimani, Lirida A. B. Naviner. A Tool for Transient Fault Analysis in Combinational Circuits. IEEE International Conference on Electronics, Circuits, and Systems, Dec 2015, Caire, Egypt. ⟨hal-02287234⟩
Accès au bibtex
BibTex

2014

ref_biblio
Lirida Alves de Barros Naviner, Kaikai Liu, Hao Cai, Jean-François Naviner. Efficient Computation of Combinational Circuits Reliability Based on Probabilistic Transfer Matrix. International Conference on IC Design and Technology (ICICDT), May 2014, Austin, United States. ⟨hal-02412060⟩
Accès au bibtex
BibTex
ref_biblio
Ting An, Hao Cai, Lirida Alves de Barros Naviner. Simulation Study of Aging in CMOS Binary Adders. MIPRO 37th International Convention/Microelectronics, Electronics and Electronic Technology, May 2014, Opatija, Croatia. ⟨hal-02288395⟩
Accès au bibtex
BibTex
ref_biblio
Ting An, Kaikai Liu, Hao Cai, Lirida Alves de Barros Naviner. Efficient Implementation for Accurate Analysis of CED Circuits Against Multiple Faults. 21st International Conference Mixed Design of Integrated Circuits and Systems (MIXDES), Jun 2014, Lublin, Poland. ⟨hal-02286893⟩
Accès au bibtex
BibTex
ref_biblio
Ting An, Kaikai Liu, Lirida Alves de Barros Naviner. Analytical method for reliability assessment of concurrent checking circuits under multiple faults. MIPRO 37th International Convention/Microelectronics, Electronics and Electronic Technology, May 2014, Opatija, Croatia. ⟨hal-02286867⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Mariem Slimani, Lirida Alves de Barros Naviner. Comparative Study of Defect-Tolerant Multiplexers for FPGAs. 20th IEEE International On-Line Testing Symposium (IOLTS), Jul 2014, Platja d'Aro, Spain. pp.7-12. ⟨hal-01062059⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Mariem Slimani, Lirida A. B. Naviner. A Defect-Tolerant Multiplexer Using Differential Logic for FPGAs. IEEE 21st Mixed Design of Integrated Circuits and Systems Conference (MIXDES), Jun 2014, Lublin, Poland. pp.375-380. ⟨hal-01062063⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Mariem Slimani, Lirida Alves de Barros Naviner. Improving the Robustness of a Switch Box in a Mesh of Clusters FPGA. 15th IEEE Latin American Test Workshop (LATW), Mar 2014, Fortaleza, Brazil. pp.1-6. ⟨hal-01062066⟩
Accès au bibtex
BibTex
ref_biblio
Shivam Bhasin, Tarik Graba, Jean-Luc Danger, Zakaria Najm. A Look into SIMON from a Side-channel Perspective. HOST, May 2014, Washington DC, United States. ⟨10.1109/HST.2014.6855568⟩. ⟨hal-02412115⟩
Accès au bibtex
BibTex
ref_biblio
Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. Analysis and Improvements of the DPA Contest v4 Implementation. SPACE, Oct 2014, Pune, India. ⟨10.1007/978-3-319-12060-7_14⟩. ⟨hal-02288411⟩
Accès au bibtex
BibTex
ref_biblio
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. EMC, May 2014, Tokyo, Japan. ⟨hal-02412040⟩
Accès au bibtex
BibTex
ref_biblio
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. Side-channel leakage and trace compression using normalized inter-class variance.. HASP, Jun 2014, Minneapolis, United States. ⟨10.1145/2611765.2611772⟩. ⟨hal-02412117⟩
Accès au bibtex
BibTex
ref_biblio
Shivam Bhasin, Jean-Luc Danger, Tarik Graba, Yves Mathieu. Physical Security Evaluation at an Early Design-Phase: A Side-Channel Aware Simulation Methodology. ES4CPS, Mar 2014, Dresden, Germany. ⟨10.1145/2559627.2559628⟩. ⟨hal-02412041⟩
Accès au bibtex
BibTex
ref_biblio
Cyril Bottoni, Jean-Marc Daveau, Gilles Gasiot, Lirida Alves de Barros Naviner, Philippe Roche. Heavy ions test result on a 65nm sparc-v8 radiation-hard microprocessor. IEEE International Reliability Physics Symposium, Jun 2014, Waikoloa, Hawai, United States. ⟨hal-02412075⟩
Accès au bibtex
BibTex
ref_biblio
Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia. Boosting High-Order Correlation Attacks by Dimensionality Reduction. SPACE, Oct 2014, Pune, India. ⟨10.1007/978-3-319-12060-7_13⟩. ⟨hal-02286958⟩
Accès au bibtex
BibTex
ref_biblio
Jérémie Brunel, Salaheddine Ouaarab, Renaud Pacalet, Guillaume Duc. SecBus, a software/hardware architecture for securing external memories. The 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, IEEE MobileCloud 2014, Apr 2014, Oxford, United Kingdom. ⟨hal-02286951⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, Kaikai Liu, Lirida Alves de Barros Naviner. Reliability-aware Delay Faults Evaluation of CMOS Flip-Flops. 21st International Conference Mixed Design of Integrated Circuits and Systems (MIXDES), Jun 2014, Lublin, Poland. ⟨hal-02412061⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, Kaikai Liu, Lirida Alves de Barros Naviner. A Study of Statistical Variability-aware Methods. IEEE International Symposium on Radio Frequency Integration Technology (RFIT), Aug 2014, Hefei, China. ⟨hal-02286946⟩
Accès au bibtex
BibTex
ref_biblio
Taoufik Chouta, Tarik Graba, Jean-Luc Danger, Julien Bringer, Maël Berthier, et al.. Side channel analysis on an embedded hardware fingerprint biometric comparator & low cost countermeasures.. HASP, Jun 2014, Minneapolis, United States. ⟨10.1145/2611765.2611771⟩. ⟨hal-02412116⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Florian Praden. Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding. PPREW, Jan 2014, San Diego, United States. ⟨10.1145/2556464.2556469⟩. ⟨hal-02412068⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger. How to get a trusted FPGA ?. Workshop INRIA, May 2014, Rennes, France. ⟨hal-02412161⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Florent Lozac'H, Zouha Cherif. Methods to Enhance the Reliability of Key Generation from Physically Unclonable Functions. PROOFS, Sep 2014, Busan, South Korea. ⟨hal-02412476⟩
Accès au bibtex
BibTex
ref_biblio
Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-Ichi Hayashi, et al.. Side-channel leakage on silicon substrate of CMOS cryptographic chip. HOST, May 2014, Washington DC, United States. ⟨10.1109/HST.2014.6855564⟩. ⟨hal-02412069⟩
Accès au bibtex
BibTex
ref_biblio
Lubos Gaspar, Marek Repka, Houssem Maghrebi, Jean-Luc Danger, Viktor Fischer. Cryptoprocessor with Native Resistance against Side Channel and Fault Injection Attacks. Wseas, Dec 2014, Istanbul, Turkey. ⟨hal-02412163⟩
Accès au bibtex
BibTex
ref_biblio
Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, et al.. DRECON: DPA Resistant Encryption by Construction. Africacrypt, May 2014, Marrakech, Morocco. ⟨10.1007/978-3-319-06734-6_25⟩. ⟨hal-02412067⟩
Accès au bibtex
BibTex
ref_biblio
Saïd Hamdiaoui, Jean-Luc Danger, Giorgio Di Natale, Fethulah Smailbegovic, Gerard van Battum, et al.. Hacking and protecting IC hardware. DATE 2014 - 17th Design, Automation and Test in Europe Conference and Exhibition, Mar 2014, Dresden, Germany. ⟨10.7873/DATE.2014.112⟩. ⟨hal-02412114⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02412114/file/06800313_hacking.pdf BibTex
ref_biblio
Annelie Heuser, Olivier Rioul, Sylvain Guilley. Good is not good enough: Deriving optimal distinguishers from communication theory. 16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. pp.55-74, ⟨10.1007/978-3-662-44709-3_4⟩. ⟨hal-02286943⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02286943/file/201409heuserrioulguilley.pdf.pdf BibTex
ref_biblio
Annelie Heuser, Olivier Rioul, Sylvain Guilley. When optimal means optimal: Finding optimal distinguishers from the mathematical theory of communication. 12th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2014), Jun 2014, Annecy, France. ⟨hal-02286940⟩
Accès au bibtex
BibTex
ref_biblio
Annelie Heuser, Olivier Rioul, Sylvain Guilley. A theoretical study of Kolmogorov-Smirnov distinguishers: Side-channel analysis vs. differential cryptanalysis. Fifth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2014), Apr 2014, Paris, France. pp.9-28, ⟨10.1007/978-3-319-10175-0_2⟩. ⟨hal-02286939⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02286939/file/201404heuserrioulguilley.pdf.pdf BibTex
ref_biblio
Natalija Jovanovic, Olivier Thomas, Elisa Vianello, Jean-Michel Portal, Boris Nikolic, et al.. OxRAM-Based Non Volatile Flip-Flop in 28nm FDSOI. 2014 IEEE 12th International New Circuits and Systems Conference (NEWCAS), Jun 2014, Trois Rivières, Canada. ⟨10.1109/NEWCAS.2014.6934003⟩. ⟨hal-02288534⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02288534/file/NEWCAS14.pdf BibTex
ref_biblio
Amir Moradi, Sylvain Guilley, Annelie Heuser. detecting hidden leakage. ACNS, Jun 2014, lausanne, Switzerland. ⟨hal-02412066⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Jean-François Naviner, Dhiraj Pradhan. A hybrid reliability assessment method and its support of sequential logic modelling. IEEE International On-line Test Symposium, Jul 2014, Platja d'Aro, Spain. ⟨hal-02412073⟩
Accès au bibtex
BibTex
ref_biblio
Xavier Pons Masbernart, S. Althunibat, G Kibalya, Christophe Gruet, Lirida A. B. Naviner, et al.. Battery-aware network discovery algorithm for mobile terminals within heterogeneous networks. Proceedings of IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Dec 2014, Athens, Greece. ⟨hal-02287896⟩
Accès au bibtex
BibTex
ref_biblio
Pablo Rauzy, Sylvain Guilley. Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security. Program Protection and Reverse Engineering Workshop 2014, Jan 2014, San Diego, CA, United States. pp.Article No. 2, ⟨10.1145/2556464.2556466⟩. ⟨hal-00939473v2⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-00939473/file/bellcore_vigilant-hal.pdf BibTex
ref_biblio
Sébastien Sarrazin, Samuel Evain, Ivan Miro Panades, Alexandre Valentian, Lirida Alves de Barros Naviner, et al.. Flip-flop selection for in-situ slack-time monito- ring based on the activation probability of timing-critical paths.. IEEE International On-line Test Symposium, Jul 2014, Platja d'Aro, Spain. ⟨hal-02412072⟩
Accès au bibtex
BibTex
ref_biblio
Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, et al.. Attacking suggest boxes in web applications over https using stochastic side-channel algorithms. 9th International Conference on Risks and Security of Internet and Systems (CRISIS 2014), Aug 2014, Trente, Italy. ⟨10.1007/978-3-319-17127-2_8⟩. ⟨hal-02288408⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02288408/file/201408schschholcalljoltouheuguirio.pdf.pdf BibTex
ref_biblio
Mariem Slimani, Arwa Ben Dhia, Lirida A. B. Naviner. Cross Logic : A New Approach for Defect-Tolerant Circuits. IEEE International Conference on IC Design and Technology (ICICDT), May 2014, Austin, United States. pp.1-4. ⟨hal-01062064⟩
Accès au bibtex
BibTex

2013

ref_biblio
Ting An, Lirida Alves de Barros Naviner, Philippe Matherat. Evaluation of Fault-tolerant Composite Field AES S-Boxes under Multiple Transient Faults. IEEE International NEWCAS Conference, Jun 2013, Paris, France. pp.1 - 4. ⟨hal-00973720⟩
Accès au bibtex
BibTex
ref_biblio
Ting An, Lirida Alves de Barros Naviner, Philippe Matherat. Exploring the Impact of Transient Faults on CORDIC Processor. Journées Nationales du Réseau Doctoral en Micro-nanoélectronique (JNRDM), Jun 2013, Grenoble, France. ⟨hal-02411992⟩
Accès au bibtex
BibTex
ref_biblio
Ting An, Lirida Alves de Barros Naviner, Philippe Matherat. A Low Cost Reliable Architecture for S-Boxes in AES Processors. IEEE Symp. Defect and Fault Tolerance (DFT), Oct 2013, New York City, U.S. Outlying Islands. pp.155-160. ⟨hal-01024892⟩
Accès au bibtex
BibTex
ref_biblio
Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, et al.. Time-frequency analysis for second-order attacks. Smart Card Research and Advanced Application Conference (CARDIS 2013), Nov 2013, Berlin, Germany. pp.108-122, ⟨10.1007/978-3-319-08302-5_8⟩. ⟨hal-02299996⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02299996/file/201311belbhabrudandebguiheunajrio.pdf.pdf BibTex
ref_biblio
Arwa Ben Dhia, Lirida Alves de Barros Naviner, Philippe Matherat. Evaluating CLB Designs under Multiple SETs in SRAM-based FPGAs. IEEE Symp. Defect and Fault Tolerance (DFT), Oct 2013, New-York City, United States. pp.112-117. ⟨hal-01062101⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Lirida Alves de Barros Naviner, Philippe Matherat. Comparison of Fault-Tolerant Fabless CLBs in SRAM-based FPGAs. IEEE Latin-American Test Workshop (LATW), Apr 2013, Cordoba, Argentina. pp.1-6. ⟨hal-01062112⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Lirida Alves de Barros Naviner, Philippe Matherat. Nouvelle architecture de BLE tolérante aux fautes dans les FPGAs SRAM. Journées Nationales du Réseau Doctoral de Microélectronique (JNRDM), Jun 2013, Grenoble, France. ⟨hal-02288374⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia. A Defect-tolerant Cluster in a Mesh SRAM-based FPGA. International Conference on Field-Programmable Technology (ICFPT), Dec 2013, Kyoto, Japan. pp.434-437. ⟨hal-01062073⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Habib Mehrez, Philippe Matherat. A defect-tolerant area-efficient multiplexer for basic blocks in SRAM-based FPGAs. European Symposium on Reliability of Electron Devices, Failure Physics and Analysis (ESREF), Oct 2013, Arcachon, France. pp.1189-1193. ⟨hal-01062075⟩
Accès au bibtex
BibTex
ref_biblio
Molka Ben Romdhane, Tarik Graba, Jean-Luc Danger. Stochastic model of a Metastability-based True Random Number Generator. TRUST, Jun 2013, Londres, United Kingdom. ⟨10.1007/978-3-642-38908-5_7⟩. ⟨hal-02412461⟩
Accès au bibtex
BibTex
ref_biblio
Molka Ben Romdhane, Jean-Luc Danger, Tarik Graba, Yves Mathieu. Design Methodology of an ASIC TRNG based on an open-loop delay chain. NEWCAS, Jun 2013, Paris, France. ⟨10.1109/NEWCAS.2013.6573654⟩. ⟨hal-02411986⟩
Accès au bibtex
BibTex
ref_biblio
Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm. A Low-Entropy First-Degree Secure Provable Masking Scheme for Resource-Constrained Devices. WESS, Sep 2013, Montreal, Canada. ⟨10.1145/2527317.2527324⟩. ⟨hal-02412039⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, H. Petit, J. F. Naviner. A Fast Reliability-aware Approach for Analogue Integrated Circuits based on Pareto Fronts. IEEE International NEWCAS Conference, Jun 2013, Paris, France. ⟨hal-02286777⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, H. Petit, J. F. Naviner. NBTI Effects on Clock Uncertainty and Applications in Continuous-Time Sigma-Delta Modulator. EdaWorkshop13, May 2013, Dresden, Germany. ⟨hal-02286519⟩
Accès au bibtex
BibTex
ref_biblio
Yu-Ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, et al.. Introduction to Recent Research on EM Information Leakage. Asia-Pacific Symposium on Electromagnetic Compatibility (APEMC2013), May 2013, Melbourne, Australia. pp.320-323. ⟨hal-02286818⟩
Accès au bibtex
BibTex
ref_biblio
Annelie Heuser, Sylvain Guilley, Olivier Rioul. Practical vs. theoretical evaluation of DPA and CPA. 3rd International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers (CrossFyre'13), Jun 2013, KU Leuven, Belgium. ⟨hal-02286734⟩
Accès au bibtex
BibTex
ref_biblio
Annelie Heuser, Sylvain Guilley, Olivier Rioul. Revealing the secrets of success: Theoretical efficiency of side-channel distinguishers. 11th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2013), Jun 2013, Fréjus, France. ⟨hal-02288378⟩
Accès au bibtex
BibTex
ref_biblio
Kaikai Liu, Hao Cai, Ting An, Lirida Alves de Barros Naviner, Jean-François Naviner, et al.. Reliability analysis of combinational circuits with the influences of noise and single-event transients. IEEE Symp. Defect and Fault Tolerance (DFT), Oct 2013, New York City, United States. ⟨hal-02286814⟩
Accès au bibtex
BibTex
ref_biblio
Kaikai Liu, Lirida Alves de Barros Naviner, Jean-François Naviner. A model to simulate the behaviour of probabilistic gates. Journées Nationales du Réseau Doctoral de Microélectronique, Jun 2013, Grenoble, France. ⟨hal-02286894⟩
Accès au bibtex
BibTex
ref_biblio
Kaikai Liu, Ting An, Hao Cai, Lirida Alves de Barros Naviner, Jean-François Naviner, et al.. A General Cost-effective Design Structure for Probabilistic-Based Noise-Tolerant Logic Functions in Nanometer CMOS Technology. Eurocon 2013, Jul 2013, Zagreb, Croatia. pp.1829-1836, ⟨10.1109/EUROCON.2013.6625225⟩. ⟨hal-02286855⟩
Accès au bibtex
BibTex
ref_biblio
Florent Lozac'H, Molka Ben Romdhane, Tarik Graba, Jean-Luc Danger. FPGA design of an Open-Loop True Random Number Generator. 16th euromicro conference on digital system design, Sep 2013, Santander, Spain. pp.615-622, ⟨10.1109/DSD.2013.73⟩. ⟨hal-02412025⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Jean-François Naviner. Single Event Transient Mitigation Through Pulse Quenching: Effectiveness at Circuit Level. IEEE International Conference of Electronics, Circuits and Systems (ICECS), Dec 2013, Abu Dhabi, United Arab Emirates. ⟨hal-02412466⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Tian Ban, Lirida Alves de Barros Naviner, Jean-François Naviner. Reliability Assessment of Combinational Logic Using First-Order-Only Fanout Reconvergence Analysis. Midwest Symposium on Circuits and Systems (MWSCAS), Aug 2013, Columbus, OH., United States. ⟨hal-02411994⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Jean-François Naviner. Selective Hardening Against Multiple Faults Employing a Net-based Reliability Analysis. International New Circuits and Systems Conference (NEWCAS), Jun 2013, Paris, France. ⟨hal-02411993⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Jean-François Naviner. Circuit-level Hardening Against Multiple Faults: Combining Global TMR and Selective Hardening. Journées Nationales du Réseau Doctoral de Microélectronique, Jun 2013, Grenoble, France. ⟨hal-02286728⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Arwa Ben Dhia, Lirida Alves de Barros Naviner, J. F. Naviner. SNaP: a Novel Hybrid Method for Circuit Reliability Assessment Under Multiple Faults. European Symposium on Reliability of Electron Devices, Failure Physics and Analysis (ESREF), Oct 2013, Arcachon, France. pp.1230-1234. ⟨hal-01062078⟩
Accès au bibtex
BibTex
ref_biblio
Xavier Pons Masbernart, Raul Palacios, Christophe Gruet, Lirida Alves de Barros Naviner, Hugo Marques, et al.. Uplink energy efficiency in LTE systems. IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Sep 2013, Berlin, Germany. ⟨hal-02412074⟩
Accès au bibtex
BibTex
ref_biblio
Laurent Sauvage. Electric Probes for Fault Injection Attack. APEMC, Aug 2013, Melbourne, Australia. ⟨hal-02286766⟩
Accès au bibtex
BibTex
ref_biblio
Laurent Sauvage. Limitations of Fault Injection Attack Based on Immunity to Radiated EM Field Standards. EMC Europe, Sep 2013, Brugge, Belgium. ⟨hal-02412018⟩
Accès au bibtex
BibTex

2012

ref_biblio
Felipe Almeida, Fernanda Lima Kastensmidt, Samuel Nascimento Pagliarini, Luis Entrena, Almudena Lindoso, et al.. Single-Event-Induced Charge Sharing Effects in TMR with Different Levels of Granularity. European Conference on Radiation and Its Effects on Components and Systems (RADECS), Sep 2012, Biarritz, France. ⟨hal-02286461⟩
Accès au bibtex
BibTex
ref_biblio
Lirida Alves de Barros Naviner. Designing Digital Reliable Processors in Nanotechnologies. NanoTechItaly, Nov 2012, Venice, Italy. ⟨hal-02411921⟩
Accès au bibtex
BibTex
ref_biblio
Ting An, Matteo Causo, Lirida Alves de Barros Naviner, Philippe Matherat. Transient Fault Analysis of CORDIC Processor. IEEE International Conference on Electronics, Circuits, and Systems (ICECS), Dec 2012, Séville, Spain. pp.757 - 760. ⟨hal-00973764⟩
Accès au bibtex
BibTex
ref_biblio
Tian Ban, Lirida Alves de Barros Naviner. Fault tolerant architectures in nanoelectronics: The progressive approach. Southern Simposium of Microelectronics, Apr 2012, Sao Miguel das Missoes, RS, Brazil. ⟨hal-02286332⟩
Accès au bibtex
BibTex
ref_biblio
Tian Ban, Lirida Alves de Barros Naviner. Signal Probability, Reliability and Error Bound of Majority Voter in TMR. IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Aug 2012, Boise, Idaho, United States. ⟨hal-02286333⟩
Accès au bibtex
BibTex
ref_biblio
Guillaume Barbu, Ph. Hoogvorst, Guillaume Duc. Tampering with Java Card Exceptions – The Exception Proves the Rule. SECRYPT - International Conference on Security and Cryptography, Jul 2012, Rome, Italy. pp.55-63. ⟨hal-02288320⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Lirida Alves de Barros Naviner, P. Matherat. Tolérance aux défauts dans les FPGAs. Journées Nationales du Réseau Doctoral de Microélectronique (JNRDM), Jun 2012, Marseille, France. ⟨hal-02411877⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Lirida Alves de Barros Naviner, P. Matherat. A New Fault-Tolerant Architecture for CLBs in SRAM-based FPGAs. IEEE International Conference on Electronics, Circuits, and Systems (ICECS), Dec 2012, Sevilla, Spain. pp.761-764. ⟨hal-01062116⟩
Accès au bibtex
BibTex
ref_biblio
Arwa Ben Dhia, Lirida Alves de Barros Naviner, P. Matherat. Analyzing and Alleviating the Impact of Errors on an SRAM-based FPGA Cluster. IEEE International On-Line Testing Symposium (IOLTS), Jun 2012, Sitges, Spain. pp.31-36. ⟨hal-01062799⟩
Accès au bibtex
BibTex
ref_biblio
Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. From cryptography to hardware: analyzing embedded Xilinx BRAM for cryptographic applications. HASP, Dec 2012, Vancouver, Canada. ⟨10.1109/MICROW.2012.11⟩. ⟨hal-02411933⟩
Accès au bibtex
BibTex
ref_biblio
Hao Cai, H. Petit, J. F. Naviner. A Statistical Method for Transistor Ageing and Process Variation Applied to Reliability Simulation. 3rd European Workshop on CMOS variability, Jun 2012, Nice – Sophia Antipolis, France. ⟨hal-02286335⟩
Accès au bibtex
BibTex
ref_biblio
Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi. Leakage Squeezing of Order Two. IndoCypt, Dec 2012, Kolkata, India. ⟨10.1007/978-3-642-34931-7_8⟩. ⟨hal-02411906⟩
Accès au bibtex
BibTex
ref_biblio
Matteo Causo, Ting An, Lirida Alves de Barros Naviner. Parallel Scaling-Free and Area-Time Efficient CORDIC Algorithm. IEEE International Conference on Electronics, Circuits, and Systems (ICECS), Dec 2012, Séville, Spain. pp.149 - 152. ⟨hal-01024891⟩
Accès au bibtex
BibTex
ref_biblio
Taoufik Chouta, Jean-Luc Danger, Laurent Sauvage, Tarik Graba. A Small and High-performance Coprocessor for Fingerprint Match-On-Card. DSD, Sep 2012, Cesme/Izmir, Turkey. ⟨10.1109/DSD.2012.14⟩. ⟨hal-02286419⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger. Delay PUF Overview. GDR Soc-SIP, Nov 2012, Paris, France. ⟨hal-02286508⟩
Accès au bibtex
BibTex
ref_biblio
Nicolas Debande, Youssef Souissi, Moulay Aziz Elaabid, Sylvain Guilley, Jean-Luc Danger. Wavelet Transform Based Pre-processing for Side Channel Analysis. HASP, Dec 2012, Vancouver, Canada. ⟨10.1109/MICROW.2012.15⟩. ⟨hal-02411932⟩
Accès au bibtex
BibTex
ref_biblio
Gutemberg Gonçalves dos Santos Jr, Lirida Alves de Barros Naviner, J. F. Naviner. Reliability and Hardening of FPGA Implementations face to Radiative Constraints. Journées Nationales Electronique et Rayonnements Naturels au Niveau du Sol (RADSOL), Jun 2012, Paris, France. ⟨hal-02288324⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Guilley, Jean-Luc Danger, Robert Nguyen, Philippe Nguyen. System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion. ICISTM, Mar 2012, Grenoble, France. pp.433-438, ⟨10.1007/978-3-642-29166-1_41⟩. ⟨hal-00701990v2⟩
Accès au texte intégral et bibtex
https://hal.archives-ouvertes.fr/hal-00701990/file/pprew.pdf BibTex
ref_biblio
Kaikai Liu, Tian Ban, Lirida Alves de Barros Naviner, Jean-François Naviner. Reliability Analysis of a Reed-Solomon Decoder. IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Aug 2012, Boise, Idaho, United States. ⟨hal-02411876⟩
Accès au bibtex
BibTex
ref_biblio
Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger. Comparison between Side-Channel Analysis Distinguishers. 14th International Conference on Information and Communications Security (ICICS'2012), Oct 2012, Hong Kong, China. pp.331-340, ⟨10.1007/978-3-642-34129-8_30⟩. ⟨hal-02299929⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02299929/file/201210maghrebirioulguilleydanger.pdf.pdf BibTex
ref_biblio
Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger. Register Leakage Masking Using Gray Code. HOST, Jun 2012, San Francisco, United States. ⟨10.1109/HST.2012.6224316⟩. ⟨hal-02411870⟩
Accès au bibtex
BibTex
ref_biblio
Houssem Maghrebi, Sylvain Guilley, Olivier Rioul, Jean-Luc Danger. Some results about the distinction of side-channel distinguishers based on distributions. 10th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2012), Jun 2012, Saint-Etienne, France. ⟨hal-02286359⟩
Accès au bibtex
BibTex
ref_biblio
Houssem Maghrebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger. Optimal First-Order Masking with Linear and Non-Linear Bijections. AfricaCrypt, Jul 2012, Ifrane, Morocco. ⟨10.1007/978-3-642-31410-0_22⟩. ⟨hal-02411869⟩
Accès au bibtex
BibTex
ref_biblio
Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger. A First-Order Leak-Free Masking Countermeasure. CT-RSA, Feb 2012, San Francisco, CA, United States. pp.156-170, ⟨10.1007/978-3-642-27954-6_10⟩. ⟨hal-02288316⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Jean-François Naviner. Selective Hardening Concerning Single and Multiple Faults. Journées Nationales du Réseau Doctoral de Microélectronique (JNRDM), Jun 2012, Marseille, France. ⟨hal-02286334⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Gutemberg Gonçalves dos Santos Jr, Lirida Alves de Barros Naviner, Jean-François Naviner. Exploring the Feasibility of Selective Hardening for Combinational Logic. European Symposium on Reliability of Electron Devices, Failure Physics and Analysis (ESREF), Oct 2012, Cagliari, Italy. ⟨hal-02288323⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Denis Teixeira Franco, Lirida Alves de Barros Naviner, Jean-François Naviner. Reliability estimation methods : Tradeoffs between complexity and accuracy. Southern Simposium of Microelectronics, Apr 2012, Sao Miguel das Missoes, RS, Brazil. ⟨hal-02288322⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Jean-François Naviner. Towards the Mitigation of Multiple Faults Induced by Single Event Effects: Combining Global TMR and Selective Hardening. European Conference on Radiation and Its Effects on Components and Systems (RADECS), Sep 2012, Biarritz, France. ⟨hal-02286459⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Jean-François Naviner. Selective Hardening Methodology Concerning Multiple Faults. IEEE Nuclear and Space Radiation Effects Conference, Jul 2012, Miami, Florida, United States. ⟨hal-02411864⟩
Accès au bibtex
BibTex
ref_biblio
Samuel Nascimento Pagliarini, Lirida Alves de Barros Naviner, Jean-François Naviner. Selective Hardening Methodology for Combinational Logic. IEEE Latin-American Test Workshop (LATW), Apr 2012, Quito, Ecuador. pp.6. ⟨hal-00695808⟩
Accès au texte intégral et bibtex
https://hal-imt.archives-ouvertes.fr/hal-00695808/file/latw_camera.pdf BibTex
ref_biblio
Samuel Nascimento Pagliarini, Arwa Ben Dhia, Lirida Alves de Barros Naviner, J. F. Naviner. Automatic Selective Hardening Against Soft Errors: a Cost-based and Regularity-aware Approach. IEEE International Conference on Electronics, Circuits, and Systems (ICECS), Dec 2012, Sevilla, Spain. pp.753-756. ⟨hal-01062119⟩
Accès au bibtex
BibTex
ref_biblio
Xavier Pons Masbernart, Christophe Gruet, Frédéric Fraysse, Serge Contal, Lirida Alves de Barros Naviner. Green Solutions for Future LTE PMR Networks. IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Sep 2012, Barcelona, Spain. ⟨hal-02411920⟩
Accès au bibtex
BibTex
ref_biblio
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Naofumi Homma, Yu-Ichi Hayashi. A Fault Model for Conducted Intentional ElectroMagnetic Interferences. EMC, Aug 2012, Pittsburgh, United States. pp.788-793, ⟨10.1109/ISEMC.2012.6351664⟩. ⟨hal-02411875⟩
Accès au bibtex
BibTex
ref_biblio
Briais Sébastien, Sylvain Guilley, Jean-Luc Danger. A formal study of two physical countermeasures against side channel attacks. PROOFS, Sep 2012, Leuven, Belgium. ⟨10.1007/s13389-013-0054-6⟩. ⟨hal-02286504⟩
Accès au bibtex
BibTex
ref_biblio
Haruki Shimada, Yu-Ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, et al.. Efficient mapping of EM radiation associated with information leakage for cryptographic devices. EMC, Aug 2012, Pittsburgh, United States. pp.794-799, ⟨10.1109/ISEMC.2012.6351663⟩. ⟨hal-02288342⟩
Accès au bibtex
BibTex
ref_biblio
Youssef Souissi, Shivam Bhasin, Maxime Nassar, Sylvain Guilley, Jean-Luc Danger. Towards Different Flavors of Combined Side Channel Attacks. CT-RSA, Feb 2012, San Francisco, United States. pp.245-259, ⟨10.1007/978-3-642-27954-6_16⟩. ⟨hal-02288312⟩
Accès au bibtex
BibTex

2011

ref_biblio
Nicolas Debande, Youssef Souissi, Thanh-Ha Le, Sylvain Guilley, Jean-Luc Danger. A Multiresolution Time-Frequency Analysis Based Side Channel Attacks. WIFS Poster Session, Nov 2011, Iguacu Falls, Brazil. ⟨hal-02411850⟩
Accès au bibtex
BibTex

2010

ref_biblio
Stéphane Mancini, Lionel Pierrefeu, Zahir Larabi, Yves Mathieu. Calibrating a predictive cache emulator for SoC design. NASA/ESA Conference on Adaptive Hardware and Systems (AHS), Jun 2010, Anaheim, Californie, United States. pp.273-280, ⟨10.1109/AHS.2010.5546246⟩. ⟨hal-02278686⟩
Accès au bibtex
BibTex

Book sections

2021

ref_biblio
Jean-Luc Danger, Ritu-Ranjan Shrivastwa, Sylvain Guilley. Multi-source Fault Injection Detection Using Machine Learning and Sensor Fusion. Security and Privacy, 1497, Springer International Publishing, pp.93-107, 2021, Communications in Computer and Information Science, ⟨10.1007/978-3-030-90553-8_7⟩. ⟨hal-03433855⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Trevor Kroeger, Wei Cheng, Sylvain Guilley, Naghmeh Karimi. Enhancing the Resiliency of Multi-bit Parallel Arbiter-PUF and Its Derivatives Against Power Attacks. Constructive Side-Channel Analysis and Secure Design, 12910, Springer International Publishing, pp.303-321, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-89915-8_14⟩. ⟨hal-03433854⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Michael Pehl, Sophiane Senni, Youssef Souissi. Highly Reliable PUFs for Embedded Systems, Protected Against Tampering. Industrial Networks and Intelligent Systems, 379, Springer International Publishing, pp.167-184, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ⟨10.1007/978-3-030-77424-0_14⟩. ⟨hal-03433807⟩
Accès au bibtex
BibTex
ref_biblio
Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Laurent Sauvage, Yves Mathieu. Post-layout Security Evaluation Methodology Against Probing Attacks. Industrial Networks and Intelligent Systems, 379, Springer International Publishing, pp.465-482, 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ⟨10.1007/978-3-030-77424-0_37⟩. ⟨hal-03365004⟩
Accès au bibtex
BibTex
ref_biblio
Lars Tebelmann, Ulrich Kühne, Jean-Luc Danger, Michael Pehl. Analysis and Protection of the Two-Metric Helper Data Scheme. Constructive Side-Channel Analysis and Secure Design, 12910, Springer International Publishing, pp.279-302, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-89915-8_13⟩. ⟨hal-03419399⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03419399/file/Analysis_and_Protection_of_the_Two_Metric_Helper_Data_Scheme.pdf BibTex
ref_biblio
Lars Tebelmann, Jean-Luc Danger, Michael Pehl. Self-secured PUF: Protecting the Loop PUF by Masking. Proceedings of COSADE workshop, pp.293-314, 2021, ⟨10.1007/978-3-030-68773-1_14⟩. ⟨hal-03138858⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-03138858/file/SCA_and_Countermeasures_for_Loop_PUF.pdf BibTex

2019

ref_biblio
Sihem Mesnager, Claude Carlet, Sylvain Guilley. Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks. Security and Privacy in the Internet of Things, 2019. ⟨hal-03025857⟩
Accès au bibtex
BibTex
ref_biblio
Sihem Mesnager, Claude Carlet, Sylvain Guilley, Cem Guneri, Ferruh Özbudak. Construction of Efficient Codes for High-Order Direct Sum Masking. Security and Privacy in the Internet of Things: Challenges and Solutions, 27, IOS Press, pp.108-128, 2019, Ambient Intelligence and Smart Environments Series, 978-1-64368-052-1 (print) | 978-1-64368-053-8 (online). ⟨hal-03025841⟩
Accès au bibtex
BibTex

2018

ref_biblio
Jean-Luc Danger, Khaled Karray, Sylvain Guilley, M. Abdelaziz Elaabid. Attack Tree Construction and Its Application to the Connected Vehicle. Cyber-Physical Systems Security, Springer International Publishing, pp.175-190, 2018, ⟨10.1007/978-3-319-98935-8_9⟩. ⟨hal-03433714⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Axel Legay, Tang Ming. Physical Security Versus Masking Schemes. Cyber-Physical Systems Security, Springer International Publishing, pp.269-284, 2018, ⟨10.1007/978-3-319-98935-8_13⟩. ⟨hal-03433713⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Khaled Karray, Sylvain Guilley, M. Abdelaziz Elaabid. Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks. Cyber-Physical Systems Security, Springer International Publishing, pp.219-254, 2018, ⟨10.1007/978-3-319-98935-8_11⟩. ⟨hal-03433710⟩
Accès au bibtex
BibTex

2015

ref_biblio
Zouha Cherif, Jean-Luc Danger, Florent Lozac'H, Philippe Nguyen. Physically Unclonable Function: Principle, Design and Characterization of the Loop PUF. Trusted Computing for Embedded Systems, SPRINGER, pp.115-133, 2015, ⟨10.1007/978-3-319-09420-5_6⟩. ⟨hal-02287062⟩
Accès au bibtex
BibTex
ref_biblio
Annelie Heuser, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger. Information theoretic comparison of side-channel distinguishers: Inter-class distance, confusion, and success. Bernard Candaele; Dimitrios Soudris; Iraklis Anagnostopoulos. Trusted Computing for European Embedded Systems, Springer, pp.187-225, 2015, 978-3-319-09419-9. ⟨10.1007/978-3-319-09420-5_10⟩. ⟨hal-02286944⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02286944/file/distinguishers.pdf BibTex
ref_biblio
Xavier Pons Masbernart, Eric Georgeaux, Christophe Gruet, François Montaigne, Lirida Alves de Barros Naviner. From DMO to D2D. Wireless Public Safety Networks: Overview and Challenges, ISTE Press & Elsivier, pp.9-126, 2015. ⟨hal-02287836⟩
Accès au bibtex
BibTex

2014

ref_biblio
P. Maris Ferreira, Hao Cai, Lirida Alves de Barros Naviner. Reliability Aware AMS/RF Performance Optimization. Performance Optimization Techniques in Analog, Mixed-Signal, and Radio-Frequency Circuit Design, IGI Global, 2014. ⟨hal-02286875⟩
Accès au bibtex
BibTex

2013

ref_biblio
J. Le Feuvre, Yves Mathieu. 23 : Graphics Composition for Multiview Displays. Emerging Technologies for 3D Video, Wiley, 2013. ⟨hal-02286558⟩
Accès au bibtex
BibTex

2012

ref_biblio
Sylvain Guilley, Jean-Luc Danger. 17 : Global Fault on Cryptographic Circuits. Fault Analysis in Cryptography, Springer, pp.295-312, 2012. ⟨hal-02286401⟩
Accès au bibtex
BibTex

2008

ref_biblio
Anthony Kolar, Olivier Romain, Tarik Graba, Thomas Ea, Bertrand Granado. Stereo Vision. http://intechweb.org/. Stereo Vision, 9 - The Integrated Active Stereoscopic Vision Theory, Integration and Application, I-tech, pp.131 - 152, 2008. ⟨hal-01534448⟩
Accès au bibtex
BibTex

Habilitation à diriger des recherches

2012

ref_biblio
Sylvain Guilley. Protection des Accélérateurs Matériels de Cryptographie Symétrique. Cryptographie et sécurité [cs.CR]. Université Paris-Diderot - Paris VII, 2012. ⟨tel-00815544⟩
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-00815544/file/hdr_guilley.pdf BibTex

Books

2015

ref_biblio
P. Matherat. Doublures & redoublements. Éditions Tsémah, 72 p., 2015. ⟨hal-02287137⟩
Accès au bibtex
BibTex

Patents

2020

ref_biblio
Olivier Rioul, Sylvain Guilley. SECRET KEY ESTIMATION METHODS AND DEVICES. France, Patent n° : US2020/0313845 A1. 2020. ⟨hal-03326381⟩
Accès au bibtex
BibTex

2017

ref_biblio
Sylvain Guilley, Annelie Heuser, Olivier Rioul. METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICE. United States, Patent n° : US Patent 2017/0270307 A1. 2017. ⟨hal-03326375⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Rioul, Sylvain Guilley. SECRET KEY ESTIMATION METHODS AND DEVICES. France, Patent n° : PCT/EP2017/057295. 2017. ⟨hal-03326378⟩
Accès au bibtex
BibTex

2016

ref_biblio
Olivier Rioul, Sylvain Guilley. SECRET KEY ESTIMATION METHODS AND DEVICES. France, Patent n° : France N° 16305386.1. 2016. ⟨hal-03326377⟩
Accès au bibtex
BibTex

2015

ref_biblio
Makoto Nagata, Daisuke Fujimoto, Jean-Luc Danger, Shivam Bhasin. ON-CHIP MONITOR CIRCUIT AND SEMICONDUCTOR CHIP. Japan, Patent n° : JP20150004346 20150113. MN:OCM. 2015. ⟨hal-02412551⟩
Accès au bibtex
BibTex
ref_biblio
Olivier Rioul, Sylvain Guilley. METHODS AND DEVICES FOR ESTIMATING SECRET VALUES. France, Patent n° : Europe N° 15306992.7. 2015. ⟨hal-03326376⟩
Accès au bibtex
BibTex

2014

ref_biblio
Christophe Gruet, Eric Georgeaux, Hugo Gromat, Xavier Pons Masbernart, Lirida Alves de Barros Naviner. Procédé permettant d'établir une stratégie d'économie d'énergie de batterie de terminaux mobiles. France, N° de brevet: WO Patent App. PCT/EP2013/003,489. XP:Patent-14. 2014. ⟨hal-02412539⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Guilley, Annelie Heuser, Olivier Rioul. METHODS FOR RECOVERING SECRET DATA OF A CRYPTOGRAPHIC DEVICE AND FOR EVALUATING THE SECURITY OF SUCH A DEVICE. France, Patent n° : PCT/IB2014/003248. 2014. ⟨hal-03326373⟩
Accès au bibtex
BibTex

2012

ref_biblio
Jean-Luc Danger, Guillaume Duc, Marc Gatti, Didier Regis, Sébastien Thomas. PROCEDE DE CONTROLE DU FONCTIONNEMENT D'UN COMPOSANT ELECTRONIQUE, DISPOSITIF ELECTRONIQUE ET CALCULATEUR ELECTRONIQUE EMBARQUES CORRESPONDANTS. France, N° de brevet: FR20110001307 20110427. JLD:TEST-SCA. 2012. ⟨hal-02412522⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Luc Danger, Guillaume Duc, Marc Gatti, Damien Jugié, Didier Regis, et al.. PROCEDE DE CONTROLE PREDICTIF DU FONCTIONNEMENT D'UN EQUIPEMENT ELECTRONIQUE, EQUIPEMENT ELECTRONIQUE ET DISPOSITIF DE CONTROLE. France, N° de brevet: FR20110000233 20110126. JLD:PAT-TEST-12. 2012. ⟨hal-02412521⟩
Accès au bibtex
BibTex
ref_biblio
Gutemberg Gonçalves dos Santos Jr, Lirida Alves de Barros Naviner, Bastien Cousin, Gilles Deleuze, Laurent Crétinon. Procédé de Durcissement Logique par Partitionnement d'un Circuit Electronique. France, N° de brevet: 1261439. GG:BREVET-12. 2012, pp.21. ⟨hal-02412523⟩
Accès au bibtex
BibTex
ref_biblio
Kaikai Liu, Lirida Alves de Barros Naviner, Jean-François Naviner. Structure d'Atténuation de Bruit d'une Fonction Logique Combinatoire. France, N° de brevet: 1262053. KL:BREVET-12. 2012. ⟨hal-02412524⟩
Accès au bibtex
BibTex

2011

ref_biblio
Sébastien Briais, Jean-Luc Danger, Thibault Porteboeuf, Sylvain Guilley, Philippe Nguyen. Electronic component i.e. smart card, for use in secure module, has input/output interface, and filtering and partitioning module interacting with interface to control access to one peripheral of set of peripherals. France, Patent n° : FR20110062508. JLD:firewall. 2011. ⟨hal-02412549⟩
Accès au bibtex
BibTex
ref_biblio
Sylvain Guilley, Jean-Luc Danger. Method for securing result of cryptographic calculations against attack by injection of faults in chip card in electronic component, involves providing discretionary value processed by processing unit for one of output values of blocks. France, Patent n° : FR20110062509. JLD:resilience. 2011. ⟨hal-02412550⟩
Accès au bibtex
BibTex

Poster communications

2020

ref_biblio
Alexander Schaub, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger, Joseph J Boutros. Rényi Entropy Estimation for Secure Silicon Fingerprints. IEEE Information Theory and Applications Workshop (ITA 2020), Feb 2020, Sans Diego, United States. 2020. ⟨hal-02950211⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02950211/file/202002schaubrioulguilleydangerboutros.pdf BibTex

2019

ref_biblio
Wei Cheng, Olivier Rioul, Sylvain Guilley. Guessing a secret cryptographic key from side-channel leakages. 2019 IEEE European School of Information Theory (ESIT'19), Apr 2019, Sophia Antipolis, France. 2019. ⟨hal-02300782⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300782/file/201904chengrioulguilley.pdf BibTex

2016

ref_biblio
Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Marion Damien, Olivier Rioul. Optimal attacks for multivariate and multi-model side-channel leakages. 18th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2016), Aug 2016, Santa Barbara, United States. Cryptographic Hardware and Embedded Systems – CHES 2016, 2016. ⟨hal-02300058⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300058/file/201608bruneauguilleyheusermarionrioul-poster.pdf BibTex

2014

ref_biblio
François Bailly, Sylvain Guilley, Annelie Heuser, Olivier Rioul. On optimality of MIA for unknown leakage models and related new practical results. Lejla Batina; Matthew Robshaw. 16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. Springer, Lecture Notes in Computer Science, 8731, 2014, Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings. ⟨hal-02300004⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300004/file/201409baillyguilleyheuserrioul.pdf BibTex
ref_biblio
Sylvain Guilley, Annelie Heuser, Martial Ren, Olivier Rioul, Simon Sellem. Success rate exponents for side-channel attacks. 16th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014), Sep 2014, Busan, South Korea. ⟨hal-02300002⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02300002/file/201409guilleyheuserrenrioulsellem.pdf BibTex
ref_biblio
Annelie Heuser, Sylvain Guilley, Olivier Rioul. Maximizing the success of a side-channel attack. 3e colloque de l'Institut Mines-Télécom, Numérique: Grande échelle et complexité (Sécurité, sûreté, risques), Mar 2014, Paris, France. 2014. ⟨hal-02299999⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02299999/file/201403heuserguilleyrioul.pdf BibTex

2013

ref_biblio
Annelie Heuser, Sylvain Guilley, Olivier Rioul. Side-channel attacks. European Google Doctoral Fellowship Forum, Sep 2013, Zurich, Switzerland. 2013. ⟨hal-02299991⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02299991/file/201309heuserguilleyrioul.pdf BibTex
ref_biblio
Annelie Heuser, Sylvain Guilley, Olivier Rioul. Success metric: An all-in-one criterion for comparing side-channel distinguishers. Guido Bertoni; Jean-Sébastien Coron. 15th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2013), Aug 2013, Santa Barbara, CA, United States. Springer, Lecture Notes in Computer Science, 8086, Cryptographic Hardware and Embedded Systems - CHES 2013 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings. ⟨hal-02299990⟩
Accès au texte intégral et bibtex
https://hal.telecom-paris.fr/hal-02299990/file/201308heuserguilleyrioul.pdf BibTex

Reports

2014

ref_biblio
Laurent Sauvage. Description des nouvelles attaques et de leurs caractéristiques en termes d'efficacité et de modèles de fautes. [Contrat] 2KCPV1206, Télécom ParisTech. 2014. ⟨hal-02286963⟩
Accès au bibtex
BibTex

Theses

2022

ref_biblio
Linda Guiga. Software protections for artificial neural networks. Cryptography and Security [cs.CR]. Institut Polytechnique de Paris, 2022. English. ⟨NNT : 2022IPPAT024⟩. ⟨tel-03715693⟩
Accès au texte intégral et bibtex
https://tel.archives-ouvertes.fr/tel-03715693/file/121616_GUIGA_2022_archivage.pdf BibTex

Preprints, Working Papers, ...

2019

ref_biblio
Sumanta Chaudhuri, Tarik Graba, Yves Mathieu. Multi-Valued Routing Tracks for FPGAs in 28nm FDSOI Technology. 2019. ⟨hal-02287527⟩
Accès au bibtex
https://arxiv.org/pdf/1609.08681 BibTex