Sylvain GUILLEY
Sylvain GUILLEY
TELECOM-ParisTech
Verifierad e-postadress på secure-ic.com - Startsida
TitelCiteras avÅr
Practical setup time violation attacks on AES
N Selmane, S Guilley, JL Danger
2008 Seventh European Dependable Computing Conference, 91-96, 2008
1232008
RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs
M Nassar, Y Souissi, S Guilley, JL Danger
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012
1042012
Differential power analysis model and some results
S Guilley, P Hoogvorst, R Pacalet
Smart Card Research and Advanced Applications Vi, 127-142, 2004
982004
Hardware Trojan horses in cryptographic IP cores
S Bhasin, JL Danger, S Guilley, XT Ngo, L Sauvage
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 15-29, 2013
862013
High speed true random number generator based on open loop structures in FPGAs
JL Danger, S Guilley, P Hoogvorst
Microelectronics journal 40 (11), 1650-1656, 2009
832009
Complementary dual codes for counter-measures to side-channel attacks
C Carlet, S Guilley
Coding Theory and Applications, 97-105, 2015
822015
The “backend duplication” method
S Guilley, P Hoogvorst, Y Mathieu, R Pacalet
International Workshop on Cryptographic Hardware and Embedded Systems, 383-397, 2005
802005
BCDL: a high speed balanced DPL for FPGA with global precharge and no early evaluation
M Nassar, S Bhasin, JL Danger, G Duc, S Guilley
Proceedings of the Conference on Design, Automation and Test in Europe, 849-854, 2010
732010
CMOS structures suitable for secured hardware
S Guilley, P Hoogvorst, Y Mathieu, R Pacalet, J Provost
Proceedings Design, Automation and Test in Europe Conference and Exhibition …, 2004
712004
Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module
L Sauvage, S Guilley, Y Mathieu
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2 (1), 4, 2009
602009
WDDL is protected against setup time violation attacks
N Selmane, S Bhasin, S Guilley, T Graba, JL Danger
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 73-83, 2009
552009
Security evaluation of WDDL and SecLib countermeasures against power attacks
S Guilley, L Sauvage, P Hoogvorst, R Pacalet, GM Bertoni, S Chaudhuri
IEEE Transactions on Computers 57 (11), 1482-1497, 2008
552008
Evaluation of power constant dual-rail logics countermeasures against DPA with design time security metrics
S Guilley, L Sauvage, F Flament, VN Vong, P Hoogvorst, R Pacalet
IEEE Transactions on Computers 59 (9), 1250-1263, 2010
492010
Complementary dual codes for counter-measures to side-channel attacks.
C Carlet, S Guilley
Adv. in Math. of Comm. 10 (1), 131-150, 2016
482016
Detecting hidden leakages
A Moradi, S Guilley, A Heuser
International Conference on Applied Cryptography and Network Security, 324-342, 2014
472014
Orthogonal direct sum masking
J Bringer, C Carlet, H Chabanne, S Guilley, H Maghrebi
IFIP International Workshop on Information Security Theory and Practice, 40-56, 2014
462014
Good is not good enough
A Heuser, O Rioul, S Guilley
International Workshop on Cryptographic Hardware and Embedded Systems, 55-74, 2014
452014
NICV: normalized inter-class variance for detection of side-channel leakage
S Bhasin, JL Danger, S Guilley, Z Najm
2014 International Symposium on Electromagnetic Compatibility, Tokyo, 310-313, 2014
452014
An easy-to-design PUF based on a single oscillator: the loop PUF
Z Cherif, JL Danger, S Guilley, L Bossuet
2012 15th Euromicro Conference on Digital System Design, 156-162, 2012
442012
Silicon-level solutions to counteract passive and active attacks
S Guilley, L Sauvage, JL Danger, N Selmane, R Pacalet
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 3-17, 2008
442008
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20