What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sylvain Guilley
Google Scholar
61
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Statistical Analysis of Non-Profiling Higher-Order Distinguishers Against Inner Product Masking.
Qianmei Wu
Wei Cheng
Fan Zhang
Sylvain Guilley
2024
journals/tches
Quasi-linear masking against SCA and FIA, with cost amortization.
Claude Carlet
Abderrahman Daif
Sylvain Guilley
Cédric Tavernier
2024
conf/crypto
Formal Security Proofs via Doeblin Coefficients: - Optimal Side-Channel Factorization from Noisy Leakage to Random Probing.
Julien Béguinot
Wei Cheng
Sylvain Guilley
Olivier Rioul
2023
conf/csr2
Verified Value Chains, Innovation and Competition.
Arnd Weber
Sylvain Guilley
René Rathfelder
Marc Stöttinger
Christoph Lüth
Maja Malenko
Torsten Grawunder
Steffen Reith
Armand Puccetti
Jean-Pierre Seifert
Norbert Herfurth
Hagen Sankowski
Gernot Heiser
2023
conf/host
Security Order of Gate-Level Masking Schemes.
Sofiane Takarabt
Javad Bahrami
Mohammad Ebrahimabadi
Sylvain Guilley
Naghmeh Karimi
2023
conf/iwsec
Reliability of Ring Oscillator PUFs with Reduced Helper Data.
Julien Béguinot
Wei Cheng
Jean-Luc Danger
Sylvain Guilley
Olivier Rioul
Ville Yli-Mäyry
2022
journals/tches
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation.
Qianmei Wu
Wei Cheng
Sylvain Guilley
Fan Zhang
Wei Fu
2022
journals/tches
Side-Channel Expectation-Maximization Attacks.
Julien Béguinot
Wei Cheng
Sylvain Guilley
Olivier Rioul
2022
journals/tifs
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks.
Wei Cheng
Sylvain Guilley
Jean-Luc Danger
2022
conf/ccs
SpecDefender: Transient Execution Attack Defender using Performance Counters.
Amit Choudhari
Sylvain Guilley
Khaled Karray
2022
conf/host
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors.
Mohammad Ebrahimabadi
Suhee Sanjana Mehjabin
Raphael Viera
Sylvain Guilley
Jean-Luc Danger
Jean-Max Dutertre
Naghmeh Karimi
2022
conf/fdtc
Quantifying the Speed-Up Offered by Genetic Algorithms during Fault Injection Cartographies.
Idris Rais-Ali
Antoine Bouvet
Sylvain Guilley
2021
journals/tches
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.
Claude Carlet
Sylvain Guilley
Sihem Mesnager
2021
journals/tches
Information Leakages in Code-based Masking: A Unified Quantification Approach.
Wei Cheng
Sylvain Guilley
Claude Carlet
Jean-Luc Danger
Sihem Mesnager
2021
journals/tifs
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios.
Claude Carlet
Éloi de Chérisey
Sylvain Guilley
Selçuk Kavut
Deng Tang
2021
journals/tifs
Optimizing Inner Product Masking Scheme by a Coding Theory Approach.
Wei Cheng
Sylvain Guilley
Claude Carlet
Sihem Mesnager
Jean-Luc Danger
2021
journals/tifs
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack.
Yanbin Li
Zhe Liu
Sylvain Guilley
Ming Tang
2021
conf/eurosp
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level.
Quentin Forcioli
Jean-Luc Danger
Clémentine Maurice
Lilian Bossuet
Florent Bruguier
Maria Mushtaq
David Novo
Loïc France
Pascal Benoit
Sylvain Guilley
Thomas Perianin
2021
conf/host
Formal Evaluation and Construction of Glitch-resistant Masked Functions.
Sofiane Takarabt
Sylvain Guilley
Youssef Souissi
Khaled Karray
Laurent Sauvage
Yves Mathieu
2020
conf/icics
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation.
Junko Takahashi
Keiichi Okabe
Hiroki Itoh
Xuan Thuy Ngo
Sylvain Guilley
Ritu Ranjan Shrivastwa
Mushir Ahmed
Patrick Lejoly
2019
journals/tches
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis.
Eloi de Chérisey
Sylvain Guilley
Olivier Rioul
Pablo Piantanida
2018
journals/joc
Multivariate High-Order Attacks of Shuffled Tables Recomputation.
Nicolas Bruneau
Sylvain Guilley
Zakaria Najm
Yannick Teglia
2018
conf/fdtc
Random Numbers Generation: Tests and Attacks.
Sylvain Guilley
Youssef El Housni
2017
journals/tifs
Stochastic Collision Attack.
Nicolas Bruneau
Claude Carlet
Sylvain Guilley
Annelie Heuser
Emmanuel Prouff
Olivier Rioul
2017
conf/eurosp
Use of Simulators for Side-Channel Analysis.
Nikita Veshchikov
Sylvain Guilley
2017
conf/eurosp
Use of Simulators for Side-Channel Analysis.
Nikita Veshchikov
Sylvain Guilley
2016
conf/ches
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation.
Margaux Dugardin
Sylvain Guilley
Jean-Luc Danger
Zakaria Najm
Olivier Rioul
2016
conf/asiacrypt
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
Nicolas Bruneau
Sylvain Guilley
Annelie Heuser
Olivier Rioul
François-Xavier Standaert
Yannick Teglia
2015
conf/ches
Less is More - Dimensionality Reduction from a Theoretical Perspective.
Nicolas Bruneau
Sylvain Guilley
Annelie Heuser
Damien Marion
Olivier Rioul
2015
conf/ches
Multi-variate High-Order Attacks of Shuffled Tables Recomputation.
Nicolas Bruneau
Sylvain Guilley
Zakaria Najm
Yannick Teglia
2015
conf/host
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses.
Xuan Thuy Ngo
Shivam Bhasin
Jean-Luc Danger
Sylvain Guilley
Zakaria Najm
2014
conf/acns
Detecting Hidden Leakages.
Amir Moradi
Sylvain Guilley
Annelie Heuser
2014
conf/ches
Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory.
Annelie Heuser
Olivier Rioul
Sylvain Guilley
2014
conf/host
Cryptographically secure shields.
Jean-Michel Cioranesco
Jean-Luc Danger
Tarik Graba
Sylvain Guilley
Yves Mathieu
David Naccache
Xuan Thuy Ngo
2014
conf/fdtc
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA.
Pablo Rauzy
Sylvain Guilley
2014
conf/asiacrypt
Masks Will Fall Off - Higher-Order Optimal Distinguishers.
Nicolas Bruneau
Sylvain Guilley
Annelie Heuser
Olivier Rioul
2014
conf/acsac
HCODE: Hardware-Enhanced Real-Time CFI.
Jean-Luc Danger
Sylvain Guilley
Thibault Porteboeuf
Florian Praden
Michaël Timbert
2014
conf/africacrypt
DRECON: DPA Resistant Encryption by Construction.
Suvadeep Hajra
Chester Rebeiro
Shivam Bhasin
Gaurav Bajaj
Sahil Sharma
Sylvain Guilley
Debdeep Mukhopadhyay
2013
conf/fdtc
Hardware Trojan Horses in Cryptographic IP Cores.
Shivam Bhasin
Jean-Luc Danger
Sylvain Guilley
Xuan Thuy Ngo
Laurent Sauvage
2012
conf/ches
3D Hardware Canaries.
Sébastien Briais
Stéphane Caron
Jean-Michel Cioranesco
Jean-Luc Danger
Sylvain Guilley
Jacques-Henri Jourdan
Arthur Milchior
David Naccache
Thibault Porteboeuf
2012
conf/host
Register leakage masking using Gray code.
Houssem Maghrebi
Sylvain Guilley
Emmanuel Prouff
Jean-Luc Danger
2012
conf/icics
Comparison between Side-Channel Analysis Distinguishers.
Houssem Maghrebi
Olivier Rioul
Sylvain Guilley
Jean-Luc Danger
2012
conf/ctrsa
Towards Different Flavors of Combined Side Channel Attacks.
Youssef Souissi
Shivam Bhasin
Sylvain Guilley
Maxime Nassar
Jean-Luc Danger
2012
conf/ctrsa
A First-Order Leak-Free Masking Countermeasure.
Houssem Maghrebi
Emmanuel Prouff
Sylvain Guilley
Jean-Luc Danger
2012
conf/fdtc
Random Active Shield.
Sébastien Briais
Jean-Michel Cioranesco
Jean-Luc Danger
Sylvain Guilley
David Naccache
Thibault Porteboeuf
2012
conf/africacrypt
Optimal First-Order Masking with Linear and Non-linear Bijections.
Houssem Maghrebi
Claude Carlet
Sylvain Guilley
Jean-Luc Danger
2011
conf/host
Performance evaluation of protocols resilient to physical attacks.
Sylvain Guilley
Laurent Sauvage
Jean-Luc Danger
Nidhal Selmane
Denis Réal
2011
conf/host
Formal security evaluation of hardware Boolean masking against second-order attacks.
Houssem Maghrebi
Sylvain Guilley
Jean-Luc Danger
2010
conf/latincrypt
Defeating Any Secret Cryptography with SCARE Attacks.
Sylvain Guilley
Laurent Sauvage
Julien Micolod
Denis Réal
Frédéric Valette
2010
conf/icisc
First Principal Components Analysis: A New Side Channel Distinguisher.
Youssef Souissi
Maxime Nassar
Sylvain Guilley
Jean-Luc Danger
Florent Flament
2010
conf/host
Entropy-based Power Attack.
Houssem Maghrebi
Sylvain Guilley
Jean-Luc Danger
Florent Flament
2010
conf/wisa
Combined Side-Channel Attacks.
M. Abdelaziz Elaabid
Olivier Meynard
Sylvain Guilley
Jean-Luc Danger
2010
conf/ctrsa
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks.
Shivam Bhasin
Sylvain Guilley
Laurent Sauvage
Jean-Luc Danger
2010
conf/fdtc
Fault Injection Resilience.
Sylvain Guilley
Laurent Sauvage
Jean-Luc Danger
Nidhal Selmane
2010
conf/africacrypt
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator.
M. Abdelaziz Elaabid
Sylvain Guilley
2009
conf/host
Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs.
Shivam Bhasin
Jean-Luc Danger
Sylvain Guilley
Nidhal Selmane
2009
conf/fdtc
WDDL is Protected against Setup Time Violation Attacks.
Nidhal Selmane
Shivam Bhasin
Sylvain Guilley
Tarik Graba
Jean-Luc Danger
2008
conf/host
Place-and-Route Impact on the Security of DPL Designs in FPGAs.
Sylvain Guilley
Sumanta Chaudhuri
Jean-Luc Danger
Laurent Sauvage
Philippe Hoogvorst
Maxime Nassar
Tarik Graba
Vinh-Nga Vong
2008
conf/fdtc
Silicon-level Solutions to Counteract Passive and Active Attacks.
Sylvain Guilley
Laurent Sauvage
Jean-Luc Danger
Nidhal Selmane
Renaud Pacalet
2005
conf/sec
The Proof by 2M-1: a Low-Cost Method to Check Arithmetic Computations.
Sylvain Guilley
Philippe Hoogvorst
2005
conf/ches
The "Backend Duplication" Method.
Sylvain Guilley
Philippe Hoogvorst
Yves Mathieu
Renaud Pacalet
Coauthors
Abderrahman Daif
(1)
Amir Moradi
(1)
Amit Choudhari
(1)
Annelie Heuser
(6)
Antoine Bouvet
(1)
Armand Puccetti
(1)
Arnd Weber
(1)
Arthur Milchior
(1)
Cédric Tavernier
(1)
Chester Rebeiro
(1)
Christoph Lüth
(1)
Claude Carlet
(7)
Clémentine Maurice
(1)
Damien Marion
(1)
David Naccache
(3)
David Novo
(1)
Debdeep Mukhopadhyay
(1)
Deng Tang
(1)
Denis Réal
(2)
Eloi de Chérisey
(2)
Emmanuel Prouff
(3)
Fan Zhang
(2)
Florent Bruguier
(1)
Florent Flament
(2)
Florian Praden
(1)
François-Xavier Standaert
(1)
Frédéric Valette
(1)
Gaurav Bajaj
(1)
Gernot Heiser
(1)
Hagen Sankowski
(1)
Hiroki Itoh
(1)
Houssem Maghrebi
(6)
Idris Rais-Ali
(1)
Jacques-Henri Jourdan
(1)
Javad Bahrami
(1)
Jean-Luc Danger
(29)
Jean-Max Dutertre
(1)
Jean-Michel Cioranesco
(3)
Jean-Pierre Seifert
(1)
Julien Béguinot
(3)
Julien Micolod
(1)
Junko Takahashi
(1)
Keiichi Okabe
(1)
Khaled Karray
(2)
Laurent Sauvage
(8)
Lilian Bossuet
(1)
Loïc France
(1)
M. Abdelaziz Elaabid
(2)
Maja Malenko
(1)
Marc Stöttinger
(1)
Margaux Dugardin
(1)
Maria Mushtaq
(1)
Maxime Nassar
(3)
Michaël Timbert
(1)
Ming Tang
(1)
Mohammad Ebrahimabadi
(2)
Mushir Ahmed
(1)
Naghmeh Karimi
(2)
Nicolas Bruneau
(6)
Nidhal Selmane
(5)
Nikita Veshchikov
(2)
Norbert Herfurth
(1)
Olivier Meynard
(1)
Olivier Rioul
(11)
Pablo Piantanida
(1)
Pablo Rauzy
(1)
Pascal Benoit
(1)
Patrick Lejoly
(1)
Philippe Hoogvorst
(3)
Qianmei Wu
(2)
Quentin Forcioli
(1)
Raphael Viera
(1)
Renaud Pacalet
(2)
René Rathfelder
(1)
Ritu Ranjan Shrivastwa
(1)
Sahil Sharma
(1)
Sébastien Briais
(2)
Selçuk Kavut
(1)
Shivam Bhasin
(7)
Sihem Mesnager
(3)
Sofiane Takarabt
(2)
Steffen Reith
(1)
Stéphane Caron
(1)
Suhee Sanjana Mehjabin
(1)
Sumanta Chaudhuri
(1)
Suvadeep Hajra
(1)
Sylvain Guilley
(61)
Tarik Graba
(3)
Thibault Porteboeuf
(3)
Thomas Perianin
(1)
Torsten Grawunder
(1)
Ville Yli-Mäyry
(1)
Vinh-Nga Vong
(1)
Wei Cheng
(8)
Wei Fu
(1)
Xuan Thuy Ngo
(4)
Yanbin Li
(1)
Yannick Teglia
(3)
Youssef El Housni
(1)
Youssef Souissi
(3)
Yves Mathieu
(3)
Zakaria Najm
(4)
Zhe Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to