What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jean-Luc Danger
Google Scholar
40
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/fdtc
A Tale of Two Models: Discussing the Timing and Sampling EM Fault Injection Models.
Roukoz Nabhan
Jean-Max Dutertre
Jean-Baptiste Rigaud
Jean-Luc Danger
Laurent Sauvage
2023
conf/iwsec
Reliability of Ring Oscillator PUFs with Reduced Helper Data.
Julien Béguinot
Wei Cheng
Jean-Luc Danger
Sylvain Guilley
Olivier Rioul
Ville Yli-Mäyry
2022
journals/tifs
Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks.
Wei Cheng
Sylvain Guilley
Jean-Luc Danger
2022
conf/host
Detecting Laser Fault Injection Attacks via Time-to-Digital Converter Sensors.
Mohammad Ebrahimabadi
Suhee Sanjana Mehjabin
Raphael Viera
Sylvain Guilley
Jean-Luc Danger
Jean-Max Dutertre
Naghmeh Karimi
2021
journals/tches
Information Leakages in Code-based Masking: A Unified Quantification Approach.
Wei Cheng
Sylvain Guilley
Claude Carlet
Jean-Luc Danger
Sihem Mesnager
2021
journals/tifs
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE.
Ville Yli-Mäyry
Rei Ueno
Noriyuki Miura
Makoto Nagata
Shivam Bhasin
Yves Mathieu
Tarik Graba
Jean-Luc Danger
Naofumi Homma
2021
journals/tifs
Optimizing Inner Product Masking Scheme by a Coding Theory Approach.
Wei Cheng
Sylvain Guilley
Claude Carlet
Sihem Mesnager
Jean-Luc Danger
2021
conf/acns
Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks.
Hervé Chabanne
Jean-Luc Danger
Linda Guiga
Ulrich Kühne
2021
conf/eurosp
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level.
Quentin Forcioli
Jean-Luc Danger
Clémentine Maurice
Lilian Bossuet
Florent Bruguier
Maria Mushtaq
David Novo
Loïc France
Pascal Benoit
Sylvain Guilley
Thomas Perianin
2021
conf/fdtc
Laser Fault Injection in a 32-bit Microcontroller: from the Flash Interface to the Execution Pipeline.
Vanthanh Khuat
Jean-Luc Danger
Jean-Max Dutertre
2020
conf/fdtc
Single-bit Laser Fault Model in NOR Flash Memories: Analysis and Exploitation.
Alexandre Menu
Jean-Max Dutertre
Jean-Baptiste Rigaud
Brice Colombier
Pierre-Alain Moëllic
Jean-Luc Danger
2019
conf/host
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller.
Brice Colombier
Alexandre Menu
Jean-Max Dutertre
Pierre-Alain Moëllic
Jean-Baptiste Rigaud
Jean-Luc Danger
2019
conf/fdtc
Precise Spatio-Temporal Electromagnetic Fault Injections on Data Transfers.
Alexandre Menu
Shivam Bhasin
Jean-Max Dutertre
Jean-Baptiste Rigaud
Jean-Luc Danger
2018
journals/tifs
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation.
Ming Tang
Pengbo Wang
Xiaoqi Ma
Wenjie Chang
Huanguo Zhang
Guojun Peng
Jean-Luc Danger
2016
conf/ches
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation.
Margaux Dugardin
Sylvain Guilley
Jean-Luc Danger
Zakaria Najm
Olivier Rioul
2015
conf/host
High precision fault injections on the instruction cache of ARMv7-M architectures.
Lionel Rivière
Zakaria Najm
Pablo Rauzy
Jean-Luc Danger
Julien Bringer
Laurent Sauvage
2015
conf/host
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses.
Xuan Thuy Ngo
Shivam Bhasin
Jean-Luc Danger
Sylvain Guilley
Zakaria Najm
2014
conf/host
Cryptographically secure shields.
Jean-Michel Cioranesco
Jean-Luc Danger
Tarik Graba
Sylvain Guilley
Yves Mathieu
David Naccache
Xuan Thuy Ngo
2014
conf/host
A look into SIMON from a side-channel perspective.
Shivam Bhasin
Tarik Graba
Jean-Luc Danger
Zakaria Najm
2014
conf/host
Side-channel leakage on silicon substrate of CMOS cryptographic chip.
Daisuke Fujimoto
Daichi Tanaka
Noriyuki Miura
Makoto Nagata
Yu-ichi Hayashi
Naofumi Homma
Shivam Bhasin
Jean-Luc Danger
2014
conf/acsac
HCODE: Hardware-Enhanced Real-Time CFI.
Jean-Luc Danger
Sylvain Guilley
Thibault Porteboeuf
Florian Praden
Michaël Timbert
2013
conf/fdtc
Hardware Trojan Horses in Cryptographic IP Cores.
Shivam Bhasin
Jean-Luc Danger
Sylvain Guilley
Xuan Thuy Ngo
Laurent Sauvage
2012
conf/ches
3D Hardware Canaries.
Sébastien Briais
Stéphane Caron
Jean-Michel Cioranesco
Jean-Luc Danger
Sylvain Guilley
Jacques-Henri Jourdan
Arthur Milchior
David Naccache
Thibault Porteboeuf
2012
conf/host
Register leakage masking using Gray code.
Houssem Maghrebi
Sylvain Guilley
Emmanuel Prouff
Jean-Luc Danger
2012
conf/icics
Comparison between Side-Channel Analysis Distinguishers.
Houssem Maghrebi
Olivier Rioul
Sylvain Guilley
Jean-Luc Danger
2012
conf/ctrsa
Towards Different Flavors of Combined Side Channel Attacks.
Youssef Souissi
Shivam Bhasin
Sylvain Guilley
Maxime Nassar
Jean-Luc Danger
2012
conf/ctrsa
A First-Order Leak-Free Masking Countermeasure.
Houssem Maghrebi
Emmanuel Prouff
Sylvain Guilley
Jean-Luc Danger
2012
conf/fdtc
Random Active Shield.
Sébastien Briais
Jean-Michel Cioranesco
Jean-Luc Danger
Sylvain Guilley
David Naccache
Thibault Porteboeuf
2012
conf/africacrypt
Optimal First-Order Masking with Linear and Non-linear Bijections.
Houssem Maghrebi
Claude Carlet
Sylvain Guilley
Jean-Luc Danger
2011
conf/host
Performance evaluation of protocols resilient to physical attacks.
Sylvain Guilley
Laurent Sauvage
Jean-Luc Danger
Nidhal Selmane
Denis Réal
2011
conf/host
Formal security evaluation of hardware Boolean masking against second-order attacks.
Houssem Maghrebi
Sylvain Guilley
Jean-Luc Danger
2010
conf/icisc
First Principal Components Analysis: A New Side Channel Distinguisher.
Youssef Souissi
Maxime Nassar
Sylvain Guilley
Jean-Luc Danger
Florent Flament
2010
conf/host
Entropy-based Power Attack.
Houssem Maghrebi
Sylvain Guilley
Jean-Luc Danger
Florent Flament
2010
conf/wisa
Combined Side-Channel Attacks.
M. Abdelaziz Elaabid
Olivier Meynard
Sylvain Guilley
Jean-Luc Danger
2010
conf/ctrsa
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks.
Shivam Bhasin
Sylvain Guilley
Laurent Sauvage
Jean-Luc Danger
2010
conf/fdtc
Fault Injection Resilience.
Sylvain Guilley
Laurent Sauvage
Jean-Luc Danger
Nidhal Selmane
2009
conf/host
Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs.
Shivam Bhasin
Jean-Luc Danger
Sylvain Guilley
Nidhal Selmane
2009
conf/fdtc
WDDL is Protected against Setup Time Violation Attacks.
Nidhal Selmane
Shivam Bhasin
Sylvain Guilley
Tarik Graba
Jean-Luc Danger
2008
conf/host
Place-and-Route Impact on the Security of DPL Designs in FPGAs.
Sylvain Guilley
Sumanta Chaudhuri
Jean-Luc Danger
Laurent Sauvage
Philippe Hoogvorst
Maxime Nassar
Tarik Graba
Vinh-Nga Vong
2008
conf/fdtc
Silicon-level Solutions to Counteract Passive and Active Attacks.
Sylvain Guilley
Laurent Sauvage
Jean-Luc Danger
Nidhal Selmane
Renaud Pacalet
Coauthors
Alexandre Menu
(3)
Arthur Milchior
(1)
Brice Colombier
(2)
Claude Carlet
(3)
Clémentine Maurice
(1)
Daichi Tanaka
(1)
Daisuke Fujimoto
(1)
David Naccache
(3)
David Novo
(1)
Denis Réal
(1)
Emmanuel Prouff
(2)
Florent Bruguier
(1)
Florent Flament
(2)
Florian Praden
(1)
Guojun Peng
(1)
Hervé Chabanne
(1)
Houssem Maghrebi
(6)
Huanguo Zhang
(1)
Jacques-Henri Jourdan
(1)
Jean-Baptiste Rigaud
(4)
Jean-Luc Danger
(40)
Jean-Max Dutertre
(6)
Jean-Michel Cioranesco
(3)
Julien Béguinot
(1)
Julien Bringer
(1)
Laurent Sauvage
(8)
Lilian Bossuet
(1)
Linda Guiga
(1)
Lionel Rivière
(1)
Loïc France
(1)
M. Abdelaziz Elaabid
(1)
Makoto Nagata
(2)
Margaux Dugardin
(1)
Maria Mushtaq
(1)
Maxime Nassar
(3)
Michaël Timbert
(1)
Ming Tang
(1)
Mohammad Ebrahimabadi
(1)
Naghmeh Karimi
(1)
Naofumi Homma
(2)
Nidhal Selmane
(5)
Noriyuki Miura
(2)
Olivier Meynard
(1)
Olivier Rioul
(3)
Pablo Rauzy
(1)
Pascal Benoit
(1)
Pengbo Wang
(1)
Philippe Hoogvorst
(1)
Pierre-Alain Moëllic
(2)
Quentin Forcioli
(1)
Raphael Viera
(1)
Rei Ueno
(1)
Renaud Pacalet
(1)
Roukoz Nabhan
(1)
Sébastien Briais
(2)
Shivam Bhasin
(10)
Sihem Mesnager
(2)
Stéphane Caron
(1)
Suhee Sanjana Mehjabin
(1)
Sumanta Chaudhuri
(1)
Sylvain Guilley
(29)
Tarik Graba
(5)
Thibault Porteboeuf
(3)
Thomas Perianin
(1)
Ulrich Kühne
(1)
Vanthanh Khuat
(1)
Ville Yli-Mäyry
(2)
Vinh-Nga Vong
(1)
Wei Cheng
(4)
Wenjie Chang
(1)
Xiaoqi Ma
(1)
Xuan Thuy Ngo
(3)
Youssef Souissi
(2)
Yu-ichi Hayashi
(1)
Yves Mathieu
(2)
Zakaria Najm
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to