What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Benoît Gérard
Google Scholar
17
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Optimal Dimensionality Reduction using Conditional Variational AutoEncoder.
Sana Boussam
Mathieu Carbone
Benoît Gérard
Guénaël Renault
Gabriel Zaid
2023
conf/acns
BIKE Key-Recovery: Combining Power Consumption Analysis and Information-Set Decoding.
Agathe Cheriere
Nicolas Aragon
Tania Richmond
Benoît Gérard
2021
conf/latincrypt
Train or Adapt a Deeply Learned Profile?
Christophe Genevey-Metat
Annelie Heuser
Benoît Gérard
2019
conf/acns
Masking Dilithium - Efficient Implementation and Side-Channel Evaluation.
Vincent Migliore
Benoît Gérard
Mehdi Tibouchi
Pierre-Alain Fouque
2017
conf/ccs
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
Thomas Espitau
Pierre-Alain Fouque
Benoît Gérard
Mehdi Tibouchi
2016
conf/sacrypt
Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures.
Thomas Espitau
Pierre-Alain Fouque
Benoît Gérard
Mehdi Tibouchi
2015
conf/ches
Improved Side-Channel Analysis of Finite-Field Multiplication.
Sonia Belaïd
Jean-Sébastien Coron
Pierre-Alain Fouque
Benoît Gérard
Jean-Gabriel Kammerer
Emmanuel Prouff
2014
conf/asiacrypt
Soft Analytical Side-Channel Attacks.
Nicolas Veyrat-Charvillon
Benoît Gérard
François-Xavier Standaert
2014
conf/asiacrypt
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Diego F. Aranha
Pierre-Alain Fouque
Benoît Gérard
Jean-Gabriel Kammerer
Mehdi Tibouchi
Jean-Christophe Zapalowicz
2014
conf/asiacrypt
Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
Sonia Belaïd
Pierre-Alain Fouque
Benoît Gérard
2013
conf/ches
Block Ciphers That Are Easier to Mask: How Far Can We Go?
Benoît Gérard
Vincent Grosso
María Naya-Plasencia
François-Xavier Standaert
2013
conf/host
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results.
Stéphanie Kerckhof
François Durvaux
François-Xavier Standaert
Benoît Gérard
2013
conf/eurocrypt
Security Evaluations beyond Computing Power.
Nicolas Veyrat-Charvillon
Benoît Gérard
François-Xavier Standaert
2012
conf/ches
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting.
Benoît Gérard
François-Xavier Standaert
2012
conf/wisa
Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.
François Durvaux
Benoît Gérard
Stéphanie Kerckhof
François Koeune
François-Xavier Standaert
2012
conf/sacrypt
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.
Nicolas Veyrat-Charvillon
Benoît Gérard
Mathieu Renauld
François-Xavier Standaert
2011
conf/fse
Multiple Differential Cryptanalysis: Theory and Practice.
Céline Blondeau
Benoît Gérard
Coauthors
Agathe Cheriere
(1)
Annelie Heuser
(1)
Benoît Gérard
(17)
Céline Blondeau
(1)
Christophe Genevey-Metat
(1)
Diego F. Aranha
(1)
Emmanuel Prouff
(1)
François Durvaux
(2)
François Koeune
(1)
François-Xavier Standaert
(7)
Gabriel Zaid
(1)
Guénaël Renault
(1)
Jean-Christophe Zapalowicz
(1)
Jean-Gabriel Kammerer
(2)
Jean-Sébastien Coron
(1)
María Naya-Plasencia
(1)
Mathieu Carbone
(1)
Mathieu Renauld
(1)
Mehdi Tibouchi
(4)
Nicolas Aragon
(1)
Nicolas Veyrat-Charvillon
(3)
Pierre-Alain Fouque
(6)
Sana Boussam
(1)
Sonia Belaïd
(2)
Stéphanie Kerckhof
(2)
Tania Richmond
(1)
Thomas Espitau
(2)
Vincent Grosso
(1)
Vincent Migliore
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to