publications list - secure ic

33
EUROPE - APAC - AMERICAS - www.secure-ic.com - [email protected] 2017 All Rights Reserved - Confidential - Property of Secure-IC EUROPE I APAC I JAPAN I AMERICAS I www.secure-IC.com I [email protected] 2019 All Rights Reserved I Confidential I Property of Secure-IC Publications list Between years 2008 and 2020 Sylvain Guilley Think Ahead Business line February 21, 2020

Upload: others

Post on 21-Oct-2021

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Publications list - Secure IC

EUROPE - APAC - AMERICAS - www.secure-ic.com - [email protected]

2017 All Rights Reserved - Confidential - Property of Secure-IC EUROPE I APAC I JAPAN I AMERICAS I www.secure-IC.com I [email protected]

2019 All Rights Reserved I Confidential I Property of Secure-IC

Publications listBetween years 2008 and 2020

Sylvain GuilleyThink Ahead Business line

February 21, 2020

Page 2: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

2/33

ForewordEmbedded cyber-security is a fast evolving field: new threats are discovered pe-riodically (recall Spectre & Meltdown, disclosed at the beginning of year 2018).In response, protections must be updated accordingly, ideally at the same speed,hence a race between attackers and designers. Besides, technology is also devel-oping to respond to the need for new usages. Therefore, security solutions shallalso evolve to adapt; think for instance about lightweight cryptography, white-box cryptography, physically unclonable functions, post-quantum cryptography,etc.

In this context, it is paramount to sustain an active research and develop-ment activity. As an innovative company, Secure-IC aims at remaining beyondstate-of-the-art. This is why we strive not only to follow academic results andstandardization trends, but to contribute to the advance of the security field.

In order to materialize this commitment, Secure-IC has adopted the phrase“Security Science Company” as a corporate baseline. Our researchers and engi-neers invest time to challenge the state-of-the-art and produce ground-breakingnew ideas. We also believe in “scientific marketing”, that is, to give trust to tech-nologies by clearly explaining their security rationale in a convincing manner.Specifically, scientific publications allow to reach this goal in three respects: firstbecause presentation is made pedagogical hence accessible to the general publicas well as experts, second because the results are demonstrated in a rigorousway, and third because the work has been peer-reviewed hence is independentlyvalidated and agreed on as relevant and correct.

This reinforces Secure-IC as a provider of secure embedded systems. Indeed,reliable security is rooted in rigorously validated concepts. This is the path to“security by design”: security solutions are designed to thwart the most powerfulknown attacks. This methodology takes all its value when the attack/defensegame is captured formally in a mathematical model.

In the rest of this document, we report a compilation of the research workcarried out by Secure-IC between years 2008 and 2020 as a contribution to theadvance of security techniques improvements.

Sylvain GUILLEY,CTO of Secure-IC.

Page 3: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

3/33

2020

2019[1] Claude Carlet, Abderrahman Daif, Sylvain Guilley, and Cédric Tavernier.

Polynomial direct sum masking to protect against both SCA and FIA. J.Cryptographic Engineering, 9(3):303–312, 2019.

[2] Sébastien Carré, Matthieu Desjardins, Adrien Facon, and Sylvain Guil-ley. Exhaustive single bit fault analysis. A use case against mbedtls andopenssl’s protection on ARM and intel CPU. Microprocessors and Mi-crosystems - Embedded Hardware Design, 71, 2019.

[3] Sébastien Carré, Adrien Facon, Sylvain Guilley, Sofiane Takarabt, Alexan-der Schaub, and Youssef Souissi. Cache-timing attack detection and pre-vention - application to crypto libs and PQC. In Ilia Polian and Marc Stöt-tinger, editors, Constructive Side-Channel Analysis and Secure Design -10th International Workshop, COSADE 2019, Darmstadt, Germany, April3-5, 2019, Proceedings, volume 11421 of Lecture Notes in Computer Sci-ence, pages 13–21. Springer, 2019.

[4] Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moël-lic, Jean-Baptiste Rigaud, and Jean-Luc Danger. Laser-induced single-bit faults in flash memory: Instructions corruption on a 32-bit microcon-troller. In IEEE International Symposium on Hardware Oriented Securityand Trust, HOST 2019, McLean, VA, USA, May 5-10, 2019, pages 1–10.IEEE, 2019.

[5] Jean-Luc Danger, Laurent Fribourg, Ulrich Kühne, and Maha Naceur. Lao-coön: A run-time monitoring and verification approach for hardware trojandetection. In 22nd Euromicro Conference on Digital System Design, DSD2019, Kallithea, Greece, August 28-30, 2019, pages 269–276. IEEE, 2019.

[6] Jean-Luc Danger, Sylvain Guilley, and Alexander Schaub. Two-metrichelper data for highly robust and secure delay pufs. In IEEE 8th Inter-national Workshop on Advances in Sensors and Interfaces, IWASI 2019,Otranto, Italy, June 13-14, 2019, pages 184–188. IEEE, 2019.

[7] Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, and Pablo Piantanida. Bestinformation is most successful mutual information and success rate in side-channel analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019(2):49–79, 2019.

[8] Éloi de Chérisey, Sylvain Guilley, Olivier Rioul, and Pablo Piantanida. Aninformation-theoretic model for side-channel attacks in embedded hard-ware. In IEEE International Symposium on Information Theory, ISIT2019, Paris, France, July 7-12, 2019, pages 310–315. IEEE, 2019.

Page 4: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

4/33

[9] Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shin-saku Kiyomoto, and Sylvain Guilley. Experiment on side-channel key-recovery using a real LPWA end-device. In Paolo Mori, Steven Furnell,and Olivier Camp, editors, Proceedings of the 5th International Confer-ence on Information Systems Security and Privacy, ICISSP 2019, Prague,Czech Republic, February 23-25, 2019, pages 67–74. SciTePress, 2019.

[10] Alexandre Menu, Shivam Bhasin, Jean-Max Dutertre, Jean-BaptisteRigaud, and Jean-Luc Danger. Precise spatio-temporal electromagneticfault injections on data transfers. In 2019 Workshop on Fault Diagnosisand Tolerance in Cryptography, FDTC 2019, Atlanta, GA, USA, August24, 2019, pages 1–8. IEEE, 2019.

[11] Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, andSafwan El Assad. Speed-up of SCA attacks on 32-bit multiplications.In Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, and El MamounSouidi, editors, Codes, Cryptology and Information Security - Third In-ternational Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019,Proceedings - In Honor of Said El Hajji, volume 11445 of Lecture Notes inComputer Science, pages 31–39. Springer, 2019.

[12] Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser,Sikhar Patranabis, and Debdeep Mukhopadhyay. CC meets FIPS: A hy-brid test methodology for first order side channel analysis. IEEE Trans.Computers, 68(3):347–361, 2019.

[13] Youssef Souissi, Adrien Facon, and Sylvain Guilley. Virtual security eval-uation - an operational methodology for side-channel leakage detection atsource-code level. In Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj,and El Mamoun Souidi, editors, Codes, Cryptology and Information Secu-rity - Third International Conference, C2SI 2019, Rabat, Morocco, April22-24, 2019, Proceedings - In Honor of Said El Hajji, volume 11445 ofLecture Notes in Computer Science, pages 3–12. Springer, 2019.

[14] Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Lau-rent Sauvage, Youssef Souissi, and Yves Mathieu. Cache-timing attacksstill threaten iot devices. In Claude Carlet, Sylvain Guilley, AbderrahmaneNitaj, and El Mamoun Souidi, editors, Codes, Cryptology and InformationSecurity - Third International Conference, C2SI 2019, Rabat, Morocco,April 22-24, 2019, Proceedings - In Honor of Said El Hajji, volume 11445of Lecture Notes in Computer Science, pages 13–30. Springer, 2019.

[15] Etienne Tehrani, Tarik Graba, Abdelmalek Si-Merabet, Sylvain Guilley,and Jean-Luc Danger. Classification of lightweight block ciphers for specificprocessor accelerated implementations. In 26th IEEE International Con-ference on Electronics, Circuits and Systems, ICECS 2019, Genoa, Italy,November 27-29, 2019, pages 747–750. IEEE, 2019.

Page 5: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

5/33

2018[16] Antoine Bouvet, Nicolas Bruneau, Adrien Facon, Sylvain Guilley, and

Damien Marion. Give me your binary, i’ll tell you if it leaks. In 13thInternational Conference on Design & Technology of Integrated Systems InNanoscale Era, DTIS 2018, Taormina, Italy, April 9-12, 2018, pages 1–4.IEEE, 2018.

[17] Nicolas Bruneau, Jean-Luc Danger, Adrien Facon, Sylvain Guilley, SoshiHamaguchi, Yohei Hori, Yousung Kang, and Alexander Schaub. Develop-ment of the unified security requirements of pufs during the standardizationprocess. In Jean-Louis Lanet and Cristian Toma, editors, Innovative Secu-rity Solutions for Information Technology and Communications - 11th In-ternational Conference, SecITC 2018, Bucharest, Romania, November 8-9,2018, Revised Selected Papers, volume 11359 of Lecture Notes in ComputerScience, pages 314–330. Springer, 2018.

[18] Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, and Yannick Teglia. Mul-tivariate high-order attacks of shuffled tables recomputation. J. Cryptology,31(2):351–393, 2018.

[19] Claude Carlet and Sylvain Guilley. Statistical properties of side-channeland fault injection attacks using coding theory. Cryptography and Commu-nications, 10(5):909–933, 2018.

[20] Sébastien Carré, Matthieu Desjardins, Adrien Facon, and Sylvain Guilley.Openssl bellcore’s protection helps fault attack. In Martin Novotný, NikosKonofaos, and Amund Skavhaug, editors, 21st Euromicro Conference onDigital System Design, DSD 2018, Prague, Czech Republic, August 29-31,2018, pages 500–507. IEEE Computer Society, 2018.

[21] Kais Chibani, Adrien Facon, Sylvain Guilley, and Youssef Souissi.Technology-agnostic power optimization for AES block cipher. In 25thIEEE International Conference on Electronics, Circuits and Systems,ICECS 2018, Bordeaux, France, December 9-12, 2018, pages 397–400.IEEE, 2018.

[22] Jean-Luc Danger, Adrien Facon, Sylvain Guilley, Karine Heydemann, Ul-rich Kühne, Abdelmalek Si-Merabet, and Michaël Timbert. Ccfi-cache: Atransparent and flexible hardware protection for code and control-flow in-tegrity. In Martin Novotný, Nikos Konofaos, and Amund Skavhaug, editors,21st Euromicro Conference on Digital System Design, DSD 2018, Prague,Czech Republic, August 29-31, 2018, pages 529–536. IEEE Computer Soci-ety, 2018.

[23] Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh ThiecoumbaGueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Per-sichetti, and Alexander Schaub. On the performance and security of mul-tiplication in GF (2n ). Cryptography, 2(3):25, 2018.

Page 6: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

6/33

[24] Jean-Luc Danger, Risa Yashiro, Tarik Graba, Yves Mathieu, AbdelmalekSi-Merabet, Kazuo Sakiyama, Noriyuki Miura, and Makoto Nagata. Anal-ysis of mixed PUF-TRNG circuit based on sr-latches in FD-SOI technol-ogy. In Martin Novotný, Nikos Konofaos, and Amund Skavhaug, editors,21st Euromicro Conference on Digital System Design, DSD 2018, Prague,Czech Republic, August 29-31, 2018, pages 508–515. IEEE Computer Soci-ety, 2018.

[25] Eloi de Chérisey, Sylvain Guilley, Annelie Heuser, and Olivier Rioul. Onthe optimality and practicability of mutual information analysis in somescenarios. Cryptography and Communications, 10(1):101–121, 2018.

[26] Eloi de Chérisey, Sylvain Guilley, and Olivier Rioul. Confused yet success-ful: - theoretical comparison of distinguishers for monobit leakages in termsof confusion coefficient and SNR. In Fuchun Guo, Xinyi Huang, and MotiYung, editors, Information Security and Cryptology - 14th InternationalConference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, RevisedSelected Papers, volume 11449 of Lecture Notes in Computer Science, pages533–553. Springer, 2018.

[27] Adrien Facon, Sylvain Guilley, Matthieu Lec’Hvien, Damien Marion, andThomas Perianin. Binary data analysis for source code leakage assessment.In Jean-Louis Lanet and Cristian Toma, editors, Innovative Security Solu-tions for Information Technology and Communications - 11th InternationalConference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Re-vised Selected Papers, volume 11359 of Lecture Notes in Computer Science,pages 391–409. Springer, 2018.

[28] Adrien Facon, Sylvain Guilley, Matthieu Lec’Hvien, Alexander Schaub, andYoussef Souissi. Detecting cache-timing vulnerabilities in post-quantumcryptography algorithms. In 3rd IEEE International Verification and Se-curity Workshop, IVSW 2018, Costa Brava, Spain, July 2-4, 2018, pages7–12. IEEE, 2018.

[29] Sylvain Guilley and Youssef El Housni. Random numbers generation: Testsand attacks. In 2018 Workshop on Fault Diagnosis and Tolerance in Cryp-tography, FDTC 2018, Amsterdam, The Netherlands, September 13, 2018,pages 49–54. IEEE Computer Society, 2018.

[30] Annelie Heuser, Stjepan Picek, Sylvain Guilley, and Nele Mentens.Lightweight ciphers and their side-channel resilience. IEEE Transactionson Computers, pages 1–1, 2018.

[31] Naghmeh Karimi, Jean-Luc Danger, and Sylvain Guilley. Impact of agingon the reliability of delay pufs. J. Electronic Testing, 34(5):571–586, 2018.

[32] Naghmeh Karimi, Jean-Luc Danger, and Sylvain Guilley. On the effect ofaging in detecting hardware trojan horses with template analysis. In Dim-itris Gizopoulos, Dan Alexandrescu, Mihalis Maniatakos, and Panagiota

Page 7: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

7/33

Papavramidou, editors, 24th IEEE International Symposium on On-LineTesting And Robust System Design, IOLTS 2018, Platja D’Aro, Spain, July2-4, 2018, pages 281–286. IEEE, 2018.

[33] Naghmeh Karimi, Sylvain Guilley, and Jean-Luc Danger. Impact of agingon template attacks. In Deming Chen, Houman Homayoun, and BarisTaskin, editors, Proceedings of the 2018 on Great Lakes Symposium onVLSI, GLSVLSI 2018, Chicago, IL, USA, May 23-25, 2018, pages 455–458. ACM, 2018.

[34] Khaled Karray, Jean-Luc Danger, Sylvain Guilley, and Moulay AbdelazizElaabid. Prediction-based intrusion detection system for in-vehicle net-works using supervised learning and outlier-detection. In Olivier Blazyand Chan Yeob Yeun, editors, Information Security Theory and Practice- 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels,Belgium, December 10-11, 2018, Revised Selected Papers, volume 11469 ofLecture Notes in Computer Science, pages 109–128. Springer, 2018.

[35] Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley,Wei He, Debdeep Mukhopadhyay, Zakaria Najm, and Xuan Thuy Ngo.The conflicted usage of rluts for security-critical applications on FPGA. J.Hardware and Systems Security, 2(2):162–178, 2018.

[36] Alexander Schaub, Jean-Luc Danger, Sylvain Guilley, and Olivier Rioul.An improved analysis of reliability and entropy for delay pufs. In MartinNovotný, Nikos Konofaos, and Amund Skavhaug, editors, 21st EuromicroConference on Digital System Design, DSD 2018, Prague, Czech Republic,August 29-31, 2018, pages 553–560. IEEE Computer Society, 2018.

[37] Sofiane Takarabt, Kais Chibani, Adrien Facon, Sylvain Guilley, Yves Math-ieu, Laurent Sauvage, and Youssef Souissi. Pre-silicon embedded systemevaluation as new EDA tool for security verification. In 3rd IEEE Inter-national Verification and Security Workshop, IVSW 2018, Costa Brava,Spain, July 2-4, 2018, pages 74–79. IEEE, 2018.

[38] Ming Tang, Pengbo Wang, Xiaoqi Ma, Wenjie Chang, Huanguo Zhang,Guojun Peng, and Jean-Luc Danger. An efficient SCA leakage model con-struction method under predictable evaluation. IEEE Trans. InformationForensics and Security, 13(12):3008–3018, 2018.

[39] Etienne Tehrani, Jean-Luc Danger, and Tarik Graba. Generic architecturefor lightweight block ciphers: A first step towards agile implementation ofmultiple ciphers. In Olivier Blazy and Chan Yeob Yeun, editors, Infor-mation Security Theory and Practice - 12th IFIP WG 11.2 InternationalConference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Re-vised Selected Papers, volume 11469 of Lecture Notes in Computer Science,pages 28–43. Springer, 2018.

Page 8: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

8/33

2017[40] Nicolas Bruneau, Claude Carlet, Sylvain Guilley, Annelie Heuser, Em-

manuel Prouff, and Olivier Rioul. Stochastic collision attack. IEEE Trans.Information Forensics and Security, 12(9):2090–2104, 2017.

[41] Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, andOlivier Rioul. Optimal side-channel attacks for multivariate leakages andmultiple models. J. Cryptographic Engineering, 7(4):331–341, 2017.

[42] Jean-Luc Danger, Sylvain Guilley, Philippe Nguyen, Robert Nguyen, andYoussef Souissi. Analyzing security breaches of countermeasures through-out the refinement process in hardware design flow. In David Atienza andGiorgio Di Natale, editors, Design, Automation & Test in Europe Con-ference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27-31,2017, pages 1129–1134. IEEE, 2017.

[43] Jean-Luc Danger, Olivier Rioul, Sylvain Guilley, and Alexander Schaub.Formalism to assess the entropy and reliability of the loop-PUF. In 15thInternational Workshop on Cryptographic Architectures Embedded in Re-configurable Devices (CryptArchi 2017), June 19-20 2017. Smolenice, Slo-vakia.

[44] Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, andPablo Rauzy. Using modular extension to provably protect edwards curvesagainst fault attacks. J. Cryptographic Engineering, 7(4):321–330, 2017.

[45] Sylvain Guilley. Editorial about PROOFS 2015. J. Cryptographic Engi-neering, 7(1):19–20, 2017.

[46] Sylvain Guilley, Annelie Heuser, and Olivier Rioul. Codes for side-channelattacks and protections. In Said El Hajji, Abderrahmane Nitaj, andEl Mamoun Souidi, editors, Codes, Cryptology and Information Security- Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet, volume 10194 of LectureNotes in Computer Science, pages 35–55. Springer, 2017.

[47] Sylvain Guilley, Annelie Heuser, Ming Tang, and Olivier Rioul. Stochas-tic side-channel leakage analysis via orthonormal decomposition. In PooyaFarshim and Emil Simion, editors, Innovative Security Solutions for Infor-mation Technology and Communications - 10th International Conference,SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Pa-pers, volume 10543 of Lecture Notes in Computer Science, pages 12–27.Springer, 2017.

[48] Naghmeh Karimi, Jean-Luc Danger, Mariem Slimani, and Sylvain Guilley.Impact of the switching activity on the aging of delay-pufs. In 22nd IEEEEuropean Test Symposium, ETS 2017, Limassol, Cyprus, May 22-26, 2017,pages 1–2. IEEE, 2017.

Page 9: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

9/33

[49] Philippe Maurine and Sylvain Guilley. Impacts of technology trends onphysical attacks? In Sylvain Guilley, editor, Constructive Side-ChannelAnalysis and Secure Design - 8th International Workshop, COSADE 2017,Paris, France, April 13-14, 2017, Revised Selected Papers, volume 10348of Lecture Notes in Computer Science, pages 190–206. Springer, 2017.

[50] Noriyuki Miura, Kohei Matsuda, Makoto Nagata, Shivam Bhasin, VilleYli-Mayry, Naofumi Homma, Yves Mathieu, Tarik Graba, and Jean-LucDanger. A 2.5ns-latency 0.39pj/b 289µm2/gb/s ultra-light-weight princecryptographic processor. In 2017 Symposium on VLSI Circuits, pagesC266–C267, June 2017. Kyoto, Japan.

[51] Xuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Tarik Graba, YvesMathieu, Zakaria Najm, and Shivam Bhasin. Cryptographically secureshield for security ips protection. IEEE Trans. Computers, 66(2):354–360,2017.

[52] Stjepan Picek, Annelie Heuser, and Sylvain Guilley. Template attack versusbayes classifier. J. Cryptographic Engineering, 7(4):343–351, 2017.

[53] Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A. Ludwig, SylvainGuilley, Domagoj Jakobovic, and Nele Mentens. Side-channel analysis andmachine learning: A practical perspective. In 2017 International JointConference on Neural Networks, IJCNN 2017, Anchorage, AK, USA, May14-19, 2017, pages 4095–4102. IEEE, 2017.

[54] Romain Poussier, Qian Guo, François-Xavier Standaert, Claude Carlet,and Sylvain Guilley. Connecting and improving direct sum masking andinner product masking. In Thomas Eisenbarth and Yannick Teglia, edi-tors, Smart Card Research and Advanced Applications - 16th InternationalConference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017,Revised Selected Papers, volume 10728 of Lecture Notes in Computer Sci-ence, pages 123–141. Springer, 2017.

[55] Laurent Sauvage, Tarik Graba, and Thibault Porteboeuf. Multi-level for-mal verification - A new approach against fault injection attack. J. Cryp-tographic Engineering, 7(1):87–95, 2017.

[56] Laurent Sauvage, Sofiane Takarabt, and Youssef Souissi. Secure silicon:Towards virtual prototyping. In 2017 International Symposium on Electro-magnetic Compatibility - EMC EUROPE, pages 1–5, Sept 2017. Angers,France.

[57] Ming Tang, Zhipeng Guo, Annelie Heuser, Yanzhen Ren, Jie Li, and Jean-Luc Danger. PFD - A flexible higher-order masking scheme. IEEE Trans.on CAD of Integrated Circuits and Systems, 36(8):1327–1339, 2017.

[58] Ming Tang, Zhenlong Qiu, Zhipeng Guo, Yi Mu, Xinyi Huang, and Jean-Luc Danger. A generic table recomputation-based higher-order masking.

Page 10: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

10/33

IEEE Trans. on CAD of Integrated Circuits and Systems, 36(11):1779–1789, 2017.

[59] Nikita Veshchikov and Sylvain Guilley. Implementation flaws in the mask-ing scheme of DPA contest v4. IET Information Security, 11(6):356–362,2017.

[60] Nikita Veshchikov and Sylvain Guilley. Use of simulators for side-channelanalysis. In 2017 IEEE European Symposium on Security and Privacy,EuroS&P 2017, Paris, France, April 26-28, 2017, pages 51–59. IEEE, 2017.

2016[61] Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-

Xavier Standaert, and Yannick Teglia. Taylor expansion of maximum likeli-hood attacks for masked and shuffled implementations. In Jung Hee Cheonand Tsuyoshi Takagi, editors, Advances in Cryptology - ASIACRYPT 2016- 22nd International Conference on the Theory and Application of Cryp-tology and Information Security, Hanoi, Vietnam, December 4-8, 2016,Proceedings, Part I, volume 10031 of Lecture Notes in Computer Science,pages 573–601, 2016.

[62] Claude Carlet and Sylvain Guilley. Complementary dual codes for counter-measures to side-channel attacks. Adv. in Math. of Comm., 10(1):131–150,2016.

[63] Wei Cheng, Yongbin Zhou, and Laurent Sauvage. Differential fault analysison midori. In Kwok-Yan Lam, Chi-Hung Chi, and Sihan Qing, editors, In-formation and Communications Security - 18th International Conference,ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings, vol-ume 9977 of Lecture Notes in Computer Science, pages 307–317. Springer,2016.

[64] Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica,and David Naccache. Improving the big mac attack on elliptic curvecryptography. In Peter Y. A. Ryan, David Naccache, and Jean-JacquesQuisquater, editors, The New Codebreakers - Essays Dedicated to DavidKahn on the Occasion of His 85th Birthday, volume 9100 of Lecture Notesin Computer Science, pages 374–386. Springer, 2016.

[65] Jean-Luc Danger, Sylvain Guilley, Philippe Nguyen, and Olivier Ri-oul. PUFs: Standardization and Evaluation, September 23 2016. Proc.2nd IEEE Workshop on Mobile System Technologies (MST 2016 –http://www.mstworkshop.eu/), Milano, Italy. [Online version]. DOI:10.1109/MST.2016.11.

Page 11: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

11/33

[66] Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden,and Michaël Timbert. Hardware-enforced protection against buffer over-flow using masked program counter. In Peter Y. A. Ryan, David Naccache,and Jean-Jacques Quisquater, editors, The New Codebreakers - Essays Ded-icated to David Kahn on the Occasion of His 85th Birthday, volume 9100of Lecture Notes in Computer Science, pages 439–454. Springer, 2016.

[67] Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, and Darshana Jayasinghe.Template attacks with partial profiles and dirichlet priors: Application totiming attacks. In Proceedings of the Hardware and Architectural Supportfor Security and Privacy 2016, HASP@ICSA 2016, Seoul, Republic of Ko-rea, June 18, 2016, pages 7:1–7:8. ACM, 2016.

[68] Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, andOlivier Rioul. Correlated extra-reductions defeat blinded regular exponenti-ation. In Benedikt Gierlichs and Axel Y. Poschmann, editors, CryptographicHardware and Embedded Systems - CHES 2016 - 18th International Confer-ence, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, volume9813 of Lecture Notes in Computer Science, pages 3–22. Springer, 2016.

[69] Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, LejlaBatina, Jean-Luc Danger, and Sylvain Guilley. Dismantling real-world ECCwith horizontal and vertical template attacks. In François-Xavier Standaertand Elisabeth Oswald, editors, Constructive Side-Channel Analysis and Se-cure Design - 7th International Workshop, COSADE 2016, Graz, Austria,April 14-15, 2016, Revised Selected Papers, volume 9689 of Lecture Notesin Computer Science, pages 88–108. Springer, 2016.

[70] Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, and David Naccache.Safe-errors on SPA protected implementations with the atomicity tech-nique. In Peter Y. A. Ryan, David Naccache, and Jean-Jacques Quisquater,editors, The New Codebreakers - Essays Dedicated to David Kahn on theOccasion of His 85th Birthday, volume 9100 of Lecture Notes in ComputerScience, pages 479–493. Springer, 2016.

[71] Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, and Lau-rent Sauvage. Delay PUF assessment method based on side-channel andmodeling analyzes: The final piece of all-in-one assessment methodology.In 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,2016, pages 201–207. IEEE, 2016.

[72] Annelie Heuser, Stjepan Picek, Sylvain Guilley, and Nele Mentens. Side-channel Analysis of Lightweight Ciphers: Current Status and Future Di-rections, October 17-18 2016. https://www.nist.gov/sites/default/files/documents/2016/10/17/picek-paper-lwc2016.pdf.

[73] Annelie Heuser, Stjepan Picek, Sylvain Guilley, and Nele Mentens. Side-channel analysis of lightweight ciphers: Does lightweight equal easy? In

Page 12: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

12/33

Gerhard P. Hancke and Konstantinos Markantonakis, editors, Radio Fre-quency Identification and IoT Security - 12th International Workshop,RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Re-vised Selected Papers, volume 10155 of Lecture Notes in Computer Science,pages 91–104. Springer, 2016.

[74] Naghmeh Karimi, Jean-Luc Danger, Florent Lozach, and Sylvain Guilley.Predictive aging of reliability of two delay pufs. In Claude Carlet, M. An-war Hasan, and Vishal Saraswat, editors, Security, Privacy, and AppliedCryptography Engineering - 6th International Conference, SPACE 2016,Hyderabad, India, December 14-18, 2016, Proceedings, volume 10076 ofLecture Notes in Computer Science, pages 213–232. Springer, 2016.

[75] Noriyuki Miura, Zakaria Najm, Wei He, Shivam Bhasin, Xuan Thuy Ngo,Makoto Nagata, and Jean-Luc Danger. PLL to the rescue: a novel EM faultcountermeasure. In Proceedings of the 53rd Annual Design AutomationConference, DAC 2016, Austin, TX, USA, June 5-9, 2016, pages 90:1–90:6. ACM, 2016.

[76] Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, and Jean-Luc Danger. Method taking into account process dispersion to detect hard-ware trojan horse by side-channel analysis. J. Cryptographic Engineering,6(3):239–247, 2016.

[77] Stjepan Picek, Claude Carlet, Sylvain Guilley, Julian F. Miller, and Do-magoj Jakobovic. Evolutionary algorithms for boolean functions in diversedomains of cryptography. Evolutionary Computation, 24(4):667–694, 2016.

[78] Pablo Rauzy, Sylvain Guilley, and Zakaria Najm. Formally proved securityof assembly code against power analysis - A case study on balanced logic.J. Cryptographic Engineering, 6(3):201–216, 2016.

[79] Olivier Rioul, Annelie Heuser, Sylvain Guilley, and Jean-Luc Danger. Inter-class vs. mutual information as side-channel distinguishers. In IEEE Inter-national Symposium on Information Theory, ISIT 2016, Barcelona, Spain,July 10-15, 2016, pages 805–809. IEEE, 2016.

[80] Olivier Rioul, Patrick Solé, Sylvain Guilley, and Jean-Luc Danger. On theentropy of physically unclonable functions. In IEEE International Sym-posium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15,2016, pages 2928–2932. IEEE, 2016.

2015[81] Emna Amouri, Shivam Bhasin, Yves Mathieu, Tarik Graba, and Jean-

Luc Danger. Countering early propagation and routing imbalance of DPLdesigns in a tree-based FPGA. In 2015 International Conference on IC

Page 13: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

13/33

Design & Technology, ICICDT 2015, Leuven, Belgium, June 1-3, 2015,pages 1–4. IEEE, 2015.

[82] Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, and Wei He. Exploit-ing FPGA block memories for protected cryptographic implementations.TRETS, 8(3):16:1–16:16, 2015.

[83] Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, andOlivier Rioul. Less is more - dimensionality reduction from a theoreticalperspective. In Tim Güneysu and Helena Handschuh, editors, Crypto-graphic Hardware and Embedded Systems - CHES 2015 - 17th Interna-tional Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings,volume 9293 of Lecture Notes in Computer Science, pages 22–41. Springer,2015.

[84] Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, and Yannick Teglia.Multi-variate high-order attacks of shuffled tables recomputation. In TimGüneysu and Helena Handschuh, editors, Cryptographic Hardware and Em-bedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo,France, September 13-16, 2015, Proceedings, volume 9293 of Lecture Notesin Computer Science, pages 475–494. Springer, 2015.

[85] Claude Carlet, Abderrahman Daif, Jean-Luc Danger, Sylvain Guilley, Za-karia Najm, Xuan Thuy Ngo, Thibault Porteboeuf, and Cédric Tavernier.Optimized linear complementary codes implementation for hardware tro-jan prevention. In European Conference on Circuit Theory and Design,ECCTD 2015, Trondheim, Norway, August 24-26, 2015, pages 1–4. IEEE,2015.

[86] Alexander DeTrano, Sylvain Guilley, Xiaofei Guo, Naghmeh Karimi, andRamesh Karri. Exploiting small leakages in masks to turn a second-orderattack into a first-order attack. In Ruby B. Lee, Weidong Shi, and JakubSzefer, editors, Proceedings of the Fourth Workshop on Hardware and Ar-chitectural Support for Security and Privacy, HASP@ISCA 2015, Portland,OR, USA, June 14, 2015, pages 7:1–7:5. ACM, 2015.

[87] Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta,Daisuke Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger,and Takafumi Aoki. A silicon-level countermeasure against fault sensitiv-ity analysis and its evaluation. IEEE Trans. VLSI Syst., 23(8):1429–1438,2015.

[88] Daisuke Fujimoto, Makoto Nagata, Shivam Bhasin, and Jean-Luc Danger.A novel methodology for testing hardware security and trust exploiting on-chip power noise measurement. In The 20th Asia and South Pacific DesignAutomation Conference, ASP-DAC 2015, Chiba, Japan, January 19-22,2015, pages 749–754. IEEE, 2015.

Page 14: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

14/33

[89] Sylvain Guilley, Annelie Heuser, and Olivier Rioul. A key to success -success exponents for side-channel distinguishers. In Alex Biryukov andVipul Goyal, editors, Progress in Cryptology - INDOCRYPT 2015 - 16thInternational Conference on Cryptology in India, Bangalore, India, De-cember 6-9, 2015, Proceedings, volume 9462 of Lecture Notes in ComputerScience, pages 270–290. Springer, 2015.

[90] Wei He, Shivam Bhasin, Andrés Otero, Tarik Graba, Eduardo de la Torre,and Jean-Luc Danger. Sophisticated security verification on routing re-paired balanced cell-based dual-rail logic against side channel analysis. IETInformation Security, 9(1):1–13, 2015.

[91] Xuan Thuy Ngo, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, andZakaria Najm. Linear complementary dual code improvement to strengthenencoded circuit against hardware trojan horses. In IEEE InternationalSymposium on Hardware Oriented Security and Trust, HOST 2015, Wash-ington, DC, USA, 5-7 May, 2015, pages 82–87. IEEE Computer Society,2015.

[92] Xuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, andOlivier Emery. Hardware property checker for run-time hardware trojandetection. In European Conference on Circuit Theory and Design, ECCTD2015, Trondheim, Norway, August 24-26, 2015, pages 1–4. IEEE, 2015.

[93] Xuan Thuy Ngo, Ingrid Exurville, Shivam Bhasin, Jean-Luc Danger, Syl-vain Guilley, Zakaria Najm, Jean-Baptiste Rigaud, and Bruno Robisson.Hardware trojan detection by delay and electromagnetic measurements. InWolfgang Nebel and David Atienza, editors, Proceedings of the 2015 De-sign, Automation & Test in Europe Conference & Exhibition, DATE 2015,Grenoble, France, March 9-13, 2015, pages 782–787. ACM, 2015.

[94] Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, and Sylvain Guilley. Integrated sensor: A backdoor for hard-ware trojan insertions? In 2015 Euromicro Conference on Digital SystemDesign, DSD 2015, Madeira, Portugal, August 26-28, 2015, pages 415–422.IEEE Computer Society, 2015.

[95] Stjepan Picek, Sylvain Guilley, Claude Carlet, Domagoj Jakobovic, andJulian F. Miller. Evolutionary approach for finding correlation immuneboolean functions of order t with minimal hamming weight. In Adrian-Horia Dediu, Luis Magdalena, and Carlos Martín-Vide, editors, Theory andPractice of Natural Computing - Fourth International Conference, TPNC2015, Mieres, Spain, December 15-16, 2015. Proceedings, volume 9477 ofLecture Notes in Computer Science, pages 71–82. Springer, 2015.

[96] Henitsoa Rakotomalala, Xuan Thuy Ngo, Zakaria Najm, Jean-Luc Danger,and Sylvain Guilley. Private circuits II versus fault injection attacks. InMichael Hübner, Maya Gokhale, and René Cumplido, editors, International

Page 15: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

15/33

Conference on ReConFigurable Computing and FPGAs, ReConFig 2015,Riviera Maya, Mexico, December 7-9, 2015, pages 1–9. IEEE, 2015.

[97] Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, JulienBringer, and Laurent Sauvage. High precision fault injections on the in-struction cache of armv7-m architectures. In IEEE International Sympo-sium on Hardware Oriented Security and Trust, HOST 2015, Washington,DC, USA, 5-7 May, 2015, pages 62–67. IEEE Computer Society, 2015.

[98] Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger,and Debdeep Mukhopadhyay. From theory to practice of private circuit:A cautionary note. In 33rd IEEE International Conference on ComputerDesign, ICCD 2015, New York City, NY, USA, October 18-21, 2015, pages296–303. IEEE Computer Society, 2015.

[99] Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger,Debdeep Mukhopadhyay, Xuan Thuy Ngo, and Zakaria Najm. Reconfig-urable LUT: A double edged sword for security-critical applications. InRajat Subhra Chakraborty, Peter Schwabe, and Jon A. Solworth, editors,Security, Privacy, and Applied Cryptography Engineering - 5th Interna-tional Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceed-ings, volume 9354 of Lecture Notes in Computer Science, pages 248–268.Springer, 2015.

2014[100] Emna Amouri, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc

Danger, and Habib Mehrez. Balancing WDDL dual-rail logic in a tree-based FPGA to enhance physical security. In 24th International Confer-ence on Field Programmable Logic and Applications, FPL 2014, Munich,Germany, 2-4 September, 2014, pages 1–4. IEEE, 2014.

[101] Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, TaoufikChouta, Jean-Luc Danger, Mélanie Favre, and Tarik Graba. Studyingleakages on an embedded biometric system using side channel analysis.In Emmanuel Prouff, editor, Constructive Side-Channel Analysis and Se-cure Design - 5th International Workshop, COSADE 2014, Paris, France,April 13-15, 2014. Revised Selected Papers, volume 8622 of Lecture Notesin Computer Science, pages 281–298. Springer, 2014.

[102] Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, andZakaria Najm. Analysis and improvements of the DPA contest v4 imple-mentation. In Rajat Subhra Chakraborty, Vashek Matyas, and PatrickSchaumont, editors, Security, Privacy, and Applied Cryptography Engi-neering - 4th International Conference, SPACE 2014, Pune, India, Octo-ber 18-22, 2014. Proceedings, volume 8804 of Lecture Notes in ComputerScience, pages 201–218. Springer, 2014.

Page 16: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

16/33

[103] Shivam Bhasin, Jean-Luc Danger, Tarik Graba, Yves Mathieu, DaisukeFujimoto, and Makoto Nagata. Physical security evaluation at an earlydesign-phase: A side-channel aware simulation methodology. In ChristianBerger and Ina Schaefer, editors, International Workshop on EngineeringSimulations for Cyber-Physical Systems, ES4CPS ’14, Dresden, Germany,March 28 - 28, 2014, page 13. ACM, 2014.

[104] Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, and Zakaria Najm.Side-channel leakage and trace compression using normalized inter-classvariance. In Ruby B. Lee and Weidong Shi, editors, HASP 2014, Hardwareand Architectural Support for Security and Privacy, Minneapolis, MN,USA, June 15, 2014, pages 7:1–7:9. ACM, 2014.

[105] Shivam Bhasin, Tarik Graba, Jean-Luc Danger, and Zakaria Najm. A lookinto SIMON from a side-channel perspective. In 2014 IEEE InternationalSymposium on Hardware-Oriented Security and Trust, HOST 2014, Ar-lington, VA, USA, May 6-7, 2014, pages 56–59. IEEE Computer Society,2014.

[106] Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, andHoussem Maghrebi. Orthogonal direct sum masking - A smartcardfriendly computation paradigm in a code, with builtin protection againstside-channel and fault attacks. In David Naccache and Damien Sauveron,editors, Information Security Theory and Practice. Securing the Internetof Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014,Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, volume8501 of Lecture Notes in Computer Science, pages 40–56. Springer, 2014.

[107] Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, andYannick Teglia. Boosting higher-order correlation attacks by dimensional-ity reduction. In Rajat Subhra Chakraborty, Vashek Matyas, and PatrickSchaumont, editors, Security, Privacy, and Applied Cryptography Engi-neering - 4th International Conference, SPACE 2014, Pune, India, Octo-ber 18-22, 2014. Proceedings, volume 8804 of Lecture Notes in ComputerScience, pages 183–200. Springer, 2014.

[108] Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, and Olivier Rioul.Masks will fall off - higher-order optimal distinguishers. In Palash Sarkarand Tetsu Iwata, editors, Advances in Cryptology - ASIACRYPT 2014- 20th International Conference on the Theory and Application of Cryp-tology and Information Security, Kaoshiung, Taiwan, R.O.C., December7-11, 2014, Proceedings, Part II, volume 8874 of Lecture Notes in Com-puter Science, pages 344–365. Springer, 2014.

[109] Claude Carlet, Jean-Luc Danger, Sylvain Guilley, and Houssem Maghrebi.Leakage squeezing: Optimal implementation and security evaluation. J.Mathematical Cryptology, 8(3):249–295, 2014.

Page 17: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

17/33

[110] Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi, andEmmanuel Prouff. Achieving side-channel high-order correlation immu-nity with leakage squeezing. J. Cryptographic Engineering, 4(2):107–121,2014.

[111] Claude Carlet, Finley Freibert, Sylvain Guilley, Michael Kiermaier, Jon-Lark Kim, and Patrick Solé. Higher-order CIS codes. IEEE Trans. Infor-mation Theory, 60(9):5283–5295, 2014.

[112] Claude Carlet and Sylvain Guilley. Complementary dual codes for counter-measures to side-channel attacks. In Raquel Pinto, Paula Rocha Malonek,and Paolo Vettori, editors, Coding Theory and Applications, 4th Interna-tional Castle Meeting, ICMCTA 2014, Palmela Castle, Portugal, Septem-ber 15-18, 2014, volume 3 of CIM Series in Mathematical Sciences, pages97–105. Springer, 2014.

[113] Yeow Meng Chee, Zouha Cherif, Jean-Luc Danger, Sylvain Guilley,Han Mao Kiah, Jon-Lark Kim, Patrick Solé, and Xiande Zhang. Multi-ply constant-weight codes and the reliability of loop physically unclonablefunctions. IEEE Trans. Information Theory, 60(11):7026–7034, 2014.

[114] Taoufik Chouta, Tarik Graba, Jean-Luc Danger, Julien Bringer, MaëlBerthier, Yves Bocktaels, Mélanie Favre, and Hervé Chabanne. Side chan-nel analysis on an embedded hardware fingerprint biometric comparator& low cost countermeasures. In Ruby B. Lee and Weidong Shi, editors,HASP 2014, Hardware and Architectural Support for Security and Pri-vacy, Minneapolis, MN, USA, June 15, 2014, pages 6:1–6:6. ACM, 2014.

[115] Jean-Michel Cioranesco, Jean-Luc Danger, Tarik Graba, Sylvain Guilley,Yves Mathieu, David Naccache, and Xuan Thuy Ngo. Cryptographicallysecure shields. In 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7,2014, pages 25–31. IEEE Computer Society, 2014.

[116] Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. AbdelazizElaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper,Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama,Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, and Antoine Wurcker. Practical improve-ments of side-channel attacks on AES: feedback from the 2nd DPA contest.J. Cryptographic Engineering, 4(4):259–274, 2014.

[117] Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, and Youssef Souissi.High-order timing attacks. In Jens Knoop, Valentina Salapura, IsraelKoren, and Gerardo Pelosi, editors, Proceedings of the First Workshop onCryptography and Security in Computing Systems, CS2@HiPEAC 2014,Vienna, Austria, January 20, 2014, pages 7–12. ACM, 2014.

Page 18: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

18/33

[118] Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden,and Michaël Timbert. HCODE: hardware-enhanced real-time CFI.In Mila Dalla Preda and Jeffrey Todd McDonald, editors, Proceed-ings of the 4th Program Protection and Reverse Engineering Workshop,PPREW@ACSAC 2014, New Orleans, LA, USA, December 9, 2014, pages6:1–6:11. ACM, 2014.

[119] Jean-Luc Danger, Sylvain Guilley, and Florian Praden. Hardware-enforcedprotection against software reverse-engineering based on an instruction setencoding. In Suresh Jagannathan and Peter Sewell, editors, Proceedingsof the 3rd ACM SIGPLAN Program Protection and Reverse EngineeringWorkshop 2014, PPREW 2014, January 25, 2014, San Diego, CA, USA,pages 5:1–5:11. ACM, 2014.

[120] Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Nao-fumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, KazuoSakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, ShivamBhasin, and Jean-Luc Danger. Power noise measurements of cryptographicVLSI circuits regarding side-channel information leakage. IEICE Trans-actions, 97-C(4):272–279, 2014.

[121] Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Shivam Bhasin, and Jean-Luc Danger.Side-channel leakage on silicon substrate of CMOS cryptographic chip. In2014 IEEE International Symposium on Hardware-Oriented Security andTrust, HOST 2014, Arlington, VA, USA, May 6-7, 2014, pages 32–37.IEEE Computer Society, 2014.

[122] Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, SahilSharma, Sylvain Guilley, and Debdeep Mukhopadhyay. DRECON: DPAresistant encryption by construction. In David Pointcheval and DamienVergnaud, editors, Progress in Cryptology - AFRICACRYPT 2014 - 7thInternational Conference on Cryptology in Africa, Marrakesh, Morocco,May 28-30, 2014. Proceedings, volume 8469 of Lecture Notes in ComputerScience, pages 420–439. Springer, 2014.

[123] Said Hamdioui, Jean-Luc Danger, Giorgio Di Natale, Fethulah Smailbe-govic, Gerard van Battum, and Mark Tehranipoor. Hacking and protect-ing IC hardware. In Gerhard P. Fettweis and Wolfgang Nebel, editors,Design, Automation & Test in Europe Conference & Exhibition, DATE2014, Dresden, Germany, March 24-28, 2014, pages 1–7. European De-sign and Automation Association, 2014.

[124] Annelie Heuser, Olivier Rioul, and Sylvain Guilley. Good is not goodenough - deriving optimal distinguishers from communication theory. InLejla Batina and Matthew Robshaw, editors, Cryptographic Hardware andEmbedded Systems - CHES 2014 - 16th International Workshop, Busan,

Page 19: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

19/33

South Korea, September 23-26, 2014. Proceedings, volume 8731 of LectureNotes in Computer Science, pages 55–74. Springer, 2014.

[125] Annelie Heuser, Olivier Rioul, and Sylvain Guilley. A theoretical study ofkolmogorov-smirnov distinguishers - side-channel analysis vs. differentialcryptanalysis. In Emmanuel Prouff, editor, Constructive Side-ChannelAnalysis and Secure Design - 5th International Workshop, COSADE 2014,Paris, France, April 13-15, 2014. Revised Selected Papers, volume 8622of Lecture Notes in Computer Science, pages 9–28. Springer, 2014.

[126] Amir Moradi, Sylvain Guilley, and Annelie Heuser. Detecting hiddenleakages. In Ioana Boureanu, Philippe Owesarski, and Serge Vaudenay,editors, Applied Cryptography and Network Security - 12th InternationalConference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Pro-ceedings, volume 8479 of Lecture Notes in Computer Science, pages 324–342. Springer, 2014.

[127] Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, and Yutaka Miyake. Apre-processing composition for secret key recovery on android smartphone.In David Naccache and Damien Sauveron, editors, Information SecurityTheory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30- July 2, 2014. Proceedings, volume 8501 of Lecture Notes in ComputerScience, pages 76–91. Springer, 2014.

[128] Xuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, andZakaria Najm. Encoding the state of integrated circuits: a proactiveand reactive protection against hardware trojans horses. In Ting Yu andShengqi Yang, editors, Proceedings of the 9th Workshop on Embedded Sys-tems Security, WESS ’14, New Delhi, India, October 17, 2014, pages 7:1–7:10. ACM, 2014.

[129] Pablo Rauzy and Sylvain Guilley. Countermeasures against high-orderfault-injection attacks on CRT-RSA. In Assia Tria and Dooho Choi, ed-itors, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography,FDTC 2014, Busan, South Korea, September 23, 2014, pages 68–82. IEEEComputer Society, 2014.

[130] Pablo Rauzy and Sylvain Guilley. Formal analysis of CRT-RSA vigilant’scountermeasure against the bellcore attack: A pledge for formal methodsin the field of implementation security. In Suresh Jagannathan and PeterSewell, editors, Proceedings of the 3rd ACM SIGPLAN Program Protec-tion and Reverse Engineering Workshop 2014, PPREW 2014, January25, 2014, San Diego, CA, USA, pages 2:1–2:10. ACM, 2014.

[131] Pablo Rauzy and Sylvain Guilley. A formal proof of countermeasuresagainst fault injection attacks on CRT-RSA. J. Cryptographic Engineer-ing, 4(3):173–185, 2014.

Page 20: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

20/33

[132] Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, ViniciusCalasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guil-ley, and Olivier Rioul. Attacking suggest boxes in web applications overHTTPS using side-channel stochastic algorithms. In Javier López, Indra-jit Ray, and Bruno Crispo, editors, Risks and Security of Internet andSystems - 9th International Conference, CRiSIS 2014, Trento, Italy, Au-gust 27-29, 2014, Revised Selected Papers, volume 8924 of Lecture Notesin Computer Science, pages 116–130. Springer, 2014.

2013[133] Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger,

Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, andOlivier Rioul. Time-frequency analysis for second-order attacks. In Au-rélien Francillon and Pankaj Rohatgi, editors, Smart Card Research andAdvanced Applications - 12th International Conference, CARDIS 2013,Berlin, Germany, November 27-29, 2013. Revised Selected Papers, vol-ume 8419 of Lecture Notes in Computer Science, pages 108–122. Springer,2013.

[134] Molka Ben-Romdhane, Tarik Graba, and Jean-Luc Danger. Stochasticmodel of a metastability-based true random number generator. In MichaelHuth, N. Asokan, Srdjan Capkun, Ivan Flechais, and Lizzie Coles-Kemp,editors, Trust and Trustworthy Computing - 6th International Conference,TRUST 2013, London, UK, June 17-19, 2013. Proceedings, volume 7904of Lecture Notes in Computer Science, pages 92–105. Springer, 2013.

[135] Molka Ben-Romdhane, Tarik Graba, Jean-Luc Danger, and Yves Math-ieu. Design methodology of an ASIC TRNG based on an open-loop delaychain. In IEEE 11th International New Circuits and Systems Conference,NEWCAS 2013, Paris, France, June 16-19, 2013, pages 1–4. IEEE, 2013.

[136] Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, and Zakaria Najm.A low-entropy first-degree secure provable masking scheme for resource-constrained devices. In Proceedings of the Workshop on Embedded SystemsSecurity, WESS 2013, Montreal, Quebec, Canada, September 29 - October4, 2013, pages 7:1–7:10. ACM, 2013.

[137] Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, andLaurent Sauvage. Hardware trojan horses in cryptographic IP cores. InWieland Fischer and Jörn-Marc Schmidt, editors, 2013 Workshop on FaultDiagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, Au-gust 20, 2013, pages 15–29. IEEE Computer Society, 2013.

[138] Shivam Bhasin, Sylvain Guilley, Annelie Heuser, and Jean-Luc Danger.From cryptography to hardware: analyzing and protecting embedded xil-

Page 21: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

21/33

inx BRAM for cryptographic applications. J. Cryptographic Engineering,3(4):213–225, 2013.

[139] Shivam Bhasin, Wei He, Sylvain Guilley, and Jean-Luc Danger. ExploitingFPGA block memories for protected cryptographic implementations. In2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Darmstadt, Germany, July 10-12,2013, pages 1–8. IEEE, 2013.

[140] Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, and Assia Tria.Fault injection to reverse engineer des-like cryptosystems. In Founda-tions and Practice of Security - 6th International Symposium, FPS 2013,La Rochelle, France, October 21-22, 2013, Revised Selected Papers, pages105–121, 2013.

[141] Sébastien Briais, Jean-Luc Danger, and Sylvain Guilley. A formal studyof two physical countermeasures against side channel attacks. J. Crypto-graphic Engineering, 3(3):169–180, 2013.

[142] Claude Carlet and Sylvain Guilley. Side-channel indistinguishability. InRuby B. Lee and Weidong Shi, editors, HASP 2013, The Second Workshopon Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013, page 9. ACM, 2013.

[143] Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, Jon-Lark Kim, andPatrick Solé. Multiply constant weight codes. In Proceedings of the 2013IEEE International Symposium on Information Theory, Istanbul, Turkey,July 7-12, 2013, pages 306–310. IEEE, 2013.

[144] Zouha Cherif, Jean-Luc Danger, Florent Lozach, Yves Mathieu, and LilianBossuet. Evaluation of delay pufs on CMOS 65 nm technology: ASICvs FPGA. In Ruby B. Lee and Weidong Shi, editors, HASP 2013, TheSecond Workshop on Hardware and Architectural Support for Security andPrivacy, Tel-Aviv, Israel, June 23-24, 2013, page 4. ACM, 2013.

[145] Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica,and David Naccache. Dynamic countermeasure against the zero poweranalysis. In IEEE International Symposium on Signal Processing andInformation Technology, Athens, Greece, December 12-15, 2013, pages140–147. IEEE Computer Society, 2013.

[146] Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica,and David Naccache. A synthesis of side-channel attacks on elliptic curvecryptography in smart-cards. J. Cryptographic Engineering, 3(4):241–265,2013.

[147] Sylvain Guilley, Damien Marion, Zakaria Najm, Youssef Souissi, and An-toine Wurcker. Software camouflage. In Foundations and Practice ofSecurity - 6th International Symposium, FPS 2013, La Rochelle, France,October 21-22, 2013, Revised Selected Papers, pages 122–139, 2013.

Page 22: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

22/33

[148] Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki,Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, and Kazuo Sakiyama. Ex-ploring the relations between fault sensitivity and power consumption.In Emmanuel Prouff, editor, Constructive Side-Channel Analysis and Se-cure Design - 4th International Workshop, COSADE 2013, Paris, France,March 6-8, 2013, Revised Selected Papers, volume 7864 of Lecture Notesin Computer Science, pages 137–153. Springer, 2013.

[149] Florent Lozach, Molka Ben-Romdhane, Tarik Graba, and Jean-Luc Dan-ger. FPGA design of an open-loop true random number generator. In2013 Euromicro Conference on Digital System Design, DSD 2013, LosAlamitos, CA, USA, September 4-6, 2013, pages 615–622. IEEE Com-puter Society, 2013.

2012[150] Shivam Bhasin, Sylvain Guilley, and Jean-Luc Danger. From cryptogra-

phy to hardware: Analyzing embedded xilinx BRAM for cryptographicapplications. In 45th Annual IEEE/ACM International Symposium onMicroarchitecture, MICRO 2012, Workshops Proceedings, Vancouver, BC,Canada, December 1-5, 2012, pages 1–8. IEEE Computer Society, 2012.

[151] Sébastien Briais, Stéphane Caron, Jean-Michel Cioranesco, Jean-Luc Dan-ger, Sylvain Guilley, Jacques-Henri Jourdan, Arthur Milchior, David Nac-cache, and Thibault Porteboeuf. 3d hardware canaries. In EmmanuelProuff and Patrick Schaumont, editors, Cryptographic Hardware and Em-bedded Systems - CHES 2012 - 14th International Workshop, Leuven, Bel-gium, September 9-12, 2012. Proceedings, volume 7428 of Lecture Notesin Computer Science, pages 1–22. Springer, 2012.

[152] Sébastien Briais, Jean-Michel Cioranesco, Jean-Luc Danger, Sylvain Guil-ley, David Naccache, and Thibault Porteboeuf. Random active shield. InGuido Bertoni and Benedikt Gierlichs, editors, 2012 Workshop on FaultDiagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9,2012, pages 103–113. IEEE Computer Society, 2012.

[153] Claude Carlet, Jean-Luc Danger, Sylvain Guilley, and Houssem Maghrebi.Leakage squeezing of order two. In Steven D. Galbraith and Mridul Nandi,editors, Progress in Cryptology - INDOCRYPT 2012, 13th InternationalConference on Cryptology in India, Kolkata, India, December 9-12, 2012.Proceedings, volume 7668 of Lecture Notes in Computer Science, pages120–139. Springer, 2012.

[154] Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, and Lilian Bossuet. Aneasy-to-design PUF based on a single oscillator: The loop PUF. In15th Euromicro Conference on Digital System Design, DSD 2012, Cesme,

Page 23: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

23/33

Izmir, Turkey, September 5-8, 2012, pages 156–162. IEEE Computer So-ciety, 2012.

[155] Taoufik Chouta, Jean-Luc Danger, Laurent Sauvage, and Tarik Graba. Asmall and high-performance coprocessor for fingerprint match-on-card. In15th Euromicro Conference on Digital System Design, DSD 2012, Cesme,Izmir, Turkey, September 5-8, 2012, pages 915–922. IEEE Computer So-ciety, 2012.

[156] Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica,and David Naccache. Low-cost countermeasure against RPA. In StefanMangard, editor, Smart Card Research and Advanced Applications - 11thInternational Conference, CARDIS 2012, Graz, Austria, November 28-30,2012, Revised Selected Papers, volume 7771 of Lecture Notes in ComputerScience, pages 106–122. Springer, 2012.

[157] Nicolas Debande, Youssef Souissi, M. Abdelaziz Elaabid, Sylvain Guilley,and Jean-Luc Danger. Wavelet transform based pre-processing for sidechannel analysis. In 45th Annual IEEE/ACM International Symposiumon Microarchitecture, MICRO 2012, Workshops Proceedings, Vancouver,BC, Canada, December 1-5, 2012, pages 32–38. IEEE Computer Society,2012.

[158] M. Abdelaziz Elaabid and Sylvain Guilley. Portability of templates. J.Cryptographic Engineering, 2(1):63–74, 2012.

[159] Sylvain Guilley, Jean-Luc Danger, Robert Nguyen, and Philippe Nguyen.System-level methods to prevent reverse-engineering, cloning, and trojaninsertion. In Sumeet Dua, Aryya Gangopadhyay, Parimala Thulasiraman,Umberto Straccia, Michael A. Shepherd, and Benno Stein, editors, Infor-mation Systems, Technology and Management - 6th International Confer-ence, ICISTM 2012, Grenoble, France, March 28-30, 2012. Proceedings,volume 285 of Communications in Computer and Information Science,pages 433–438. Springer, 2012.

[160] Houssem Maghrebi, Claude Carlet, Sylvain Guilley, and Jean-Luc Dan-ger. Optimal first-order masking with linear and non-linear bijections. InAikaterini Mitrokotsa and Serge Vaudenay, editors, Progress in Cryptology- AFRICACRYPT 2012 - 5th International Conference on Cryptology inAfrica, Ifrance, Morocco, July 10-12, 2012. Proceedings, volume 7374 ofLecture Notes in Computer Science, pages 360–377. Springer, 2012.

[161] Houssem Maghrebi, Sylvain Guilley, Emmanuel Prouff, and Jean-LucDanger. Register leakage masking using gray code. In 2012 IEEE In-ternational Symposium on Hardware-Oriented Security and Trust, HOST2012, San Francisco, CA, USA, June 3-4, 2012, pages 37–42. IEEE Com-puter Society, 2012.

Page 24: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

24/33

[162] Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, and Jean-LucDanger. A first-order leak-free masking countermeasure. In Orr Dunkel-man, editor, Topics in Cryptology - CT-RSA 2012 - The Cryptographers’Track at the RSA Conference 2012, San Francisco, CA, USA, February 27- March 2, 2012. Proceedings, volume 7178 of Lecture Notes in ComputerScience, pages 156–170. Springer, 2012.

[163] Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, and Jean-Luc Danger.Comparison between side-channel analysis distinguishers. In Tat WingChim and Tsz Hon Yuen, editors, Information and Communications Se-curity - 14th International Conference, ICICS 2012, Hong Kong, China,October 29-31, 2012. Proceedings, volume 7618 of Lecture Notes in Com-puter Science, pages 331–340. Springer, 2012.

[164] Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst,and David Naccache. Same values power analysis using special pointson elliptic curves. In Werner Schindler and Sorin A. Huss, editors, Con-structive Side-Channel Analysis and Secure Design - Third InternationalWorkshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Pro-ceedings, volume 7275 of Lecture Notes in Computer Science, pages 183–198. Springer, 2012.

[165] Maxime Nassar, Youssef Souissi, Sylvain Guilley, and Jean-Luc Danger.RSM: A small and fast countermeasure for aes, secure against 1st and2nd-order zero-offset scas. In Wolfgang Rosenstiel and Lothar Thiele, edi-tors, 2012 Design, Automation & Test in Europe Conference & Exhibition,DATE 2012, Dresden, Germany, March 12-16, 2012, pages 1173–1178.IEEE, 2012.

[166] Laurent Sauvage, Sylvain Guilley, Florent Flament, Jean-Luc Danger,and Yves Mathieu. Blind cartography for side channel attacks: Cross-correlation cartography. Int. J. Reconfig. Comp., 2012:360242:1–360242:9,2012.

[167] Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, andJean-Luc Danger. Towards different flavors of combined side channel at-tacks. In Orr Dunkelman, editor, Topics in Cryptology - CT-RSA 2012 -The Cryptographers’ Track at the RSA Conference 2012, San Francisco,CA, USA, February 27 - March 2, 2012. Proceedings, volume 7178 ofLecture Notes in Computer Science, pages 245–259. Springer, 2012.

[168] Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, AliMaalaoui, and Jean-Luc Danger. On the optimality of correlation powerattack on embedded cryptographic systems. In Ioannis G. Askoxylakis,Henrich Christopher Pöhls, and Joachim Posegga, editors, InformationSecurity Theory and Practice. Security, Privacy and Trust in ComputingSystems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 Interna-tional Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceed-

Page 25: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

25/33

ings, volume 7322 of Lecture Notes in Computer Science, pages 169–178.Springer, 2012.

2011[169] Shivam Bhasin, Sylvain Guilley, Youssef Souissi, Tarik Graba, and Jean-

Luc Danger. Efficient dual-rail implementations in FPGA using blockrams. In Peter M. Athanas, Jürgen Becker, and René Cumplido, editors,2011 International Conference on Reconfigurable Computing and FPGAs,ReConFig 2011, Cancun, Mexico, November 30 - December 2, 2011, pages261–267. IEEE Computer Society, 2011.

[170] Nicolas Debande, Youssef Souissi, Maxime Nassar, Sylvain Guilley,Thanh-Ha Le, and Jean-Luc Danger. "re-synchronization by moments":An efficient solution to align side-channel traces. In 2011 IEEE Inter-national Workshop on Information Forensics and Security, WIFS 2011,Iguacu Falls, Brazil, November 29 - December 2, 2011, pages 1–6. IEEEComputer Society, 2011.

[171] Sylvain Guilley, Karim Khalfallah, Victor Lomné, and Jean-Luc Danger.Formal framework for the evaluation of waveform resynchronization al-gorithms. In Claudio Agostino Ardagna and Jianying Zhou, editors, In-formation Security Theory and Practice. Security and Privacy of MobileDevices in Wireless Communication - 5th IFIP WG 11.2 InternationalWorkshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Pro-ceedings, volume 6633 of Lecture Notes in Computer Science, pages 100–115. Springer, 2011.

[172] Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, andDenis Réal. Performance evaluation of protocols resilient to physical at-tacks. In HOST 2011, Proceedings of the 2011 IEEE International Sympo-sium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011,San Diego, California, USA, pages 51–56. IEEE Computer Society, 2011.

[173] Houssem Maghrebi, Sylvain Guilley, and Jean-Luc Danger. Formal secu-rity evaluation of hardware boolean masking against second-order attacks.In HOST 2011, Proceedings of the 2011 IEEE International Symposiumon Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, SanDiego, California, USA, pages 40–46. IEEE Computer Society, 2011.

[174] Houssem Maghrebi, Sylvain Guilley, and Jean-Luc Danger. Leakagesqueezing countermeasure against high-order attacks. In Claudio AgostinoArdagna and Jianying Zhou, editors, Information Security Theory andPractice. Security and Privacy of Mobile Devices in Wireless Communi-cation - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Herak-lion, Crete, Greece, June 1-3, 2011. Proceedings, volume 6633 of LectureNotes in Computer Science, pages 208–223. Springer, 2011.

Page 26: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

26/33

[175] Olivier Meynard, Denis Réal, Florent Flament, Sylvain Guilley, NaofumiHomma, and Jean-Luc Danger. Enhancement of simple electro-magneticattacks by pre-characterization in frequency domain and demodulationtechniques. In Design, Automation and Test in Europe, DATE 2011,Grenoble, France, March 14-18, 2011, pages 1004–1009. IEEE, 2011.

[176] Maxime Nassar, Sylvain Guilley, and Jean-Luc Danger. Formal analysisof the entropy / security trade-off in first-order masking countermeasuresagainst side-channel attacks. In Daniel J. Bernstein and Sanjit Chatter-jee, editors, Progress in Cryptology - INDOCRYPT 2011 - 12th Inter-national Conference on Cryptology in India, Chennai, India, December11-14, 2011. Proceedings, volume 7107 of Lecture Notes in Computer Sci-ence, pages 22–39. Springer, 2011.

[177] Maxime Nassar, Youssef Souissi, Sylvain Guilley, and Jean-Luc Danger."rank correction": A new side-channel approach for secret key recovery.In Marc Joye, Debdeep Mukhopadhyay, and Michael Tunstall, editors,Security Aspects in Information Technology - First International Confer-ence, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Pro-ceedings, volume 7011 of Lecture Notes in Computer Science, pages 128–143. Springer, 2011.

[178] Manuel San Pedro, Mate Soos, and Sylvain Guilley. FIRE: fault injectionfor reverse engineering. In Claudio Agostino Ardagna and Jianying Zhou,editors, Information Security Theory and Practice. Security and Privacyof Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 In-ternational Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3,2011. Proceedings, volume 6633 of Lecture Notes in Computer Science,pages 280–293. Springer, 2011.

[179] Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, and Jean-Luc Danger.Security evaluation of application-specific integrated circuits and field pro-grammable gate arrays against setup time violation attacks. IET Infor-mation Security, 5(4):181–190, 2011.

[180] Youssef Souissi, Jean-Luc Danger, Sylvain Guilley, Shivam Bhasin, andMaxime Nassar. Embedded systems security: An evaluation methodologyagainst side channel attacks. In Jari Nurmi and Tapani Ahonen, edi-tors, 2011 Conference on Design and Architectures for Signal and ImageProcessing, DASIP 2011, Tampere, Finland, November 2-4, 2011, pages230–237. IEEE, 2011.

[181] Sébastien Thomas, Didier Regis, David Faura, Marc Gatti, GuillaumeDuc, and Jean-Luc Danger. Non intrusive fault detection through electro-magnetism analysis. In Zoubir Mammeri, editor, IEEE 16th Conferenceon Emerging Technologies & Factory Automation, ETFA 2011, Toulouse,France, September 5-9, 2011, pages 1–8. IEEE, 2011.

Page 27: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

27/33

2010[182] Shivam Bhasin, Sylvain Guilley, Florent Flament, Nidhal Selmane, and

Jean-Luc Danger. Countering early evaluation: an approach towards ro-bust dual-rail precharge logic. In Proceedings of the 5th Workshop onEmbedded Systems Security, WESS 2010, Scottsdale, AZ, USA, October24, 2010, page 6. ACM, 2010.

[183] Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, and Jean-Luc Danger.Unrolling cryptographic circuits: A simple countermeasure against side-channel attacks. In Josef Pieprzyk, editor, Topics in Cryptology - CT-RSA2010, The Cryptographers’ Track at the RSA Conference 2010, San Fran-cisco, CA, USA, March 1-5, 2010. Proceedings, volume 5985 of LectureNotes in Computer Science, pages 195–207. Springer, 2010.

[184] Zouha Cherif, Florent Flament, Jean-Luc Danger, Shivam Bhasin, Syl-vain Guilley, and Hervé Chabanne. Evaluation of white-box and grey-box noekeon implementations in FPGA. In Viktor K. Prasanna, JürgenBecker, and René Cumplido, editors, ReConFig’10: 2010 InternationalConference on Reconfigurable Computing and FPGAs, Cancun, QuintanaRoo, Mexico, 13-15 December 2010, Proceedings, pages 310–315. IEEEComputer Society, 2010.

[185] M. Abdelaziz Elaabid and Sylvain Guilley. Practical improvementsof profiled side-channel attacks on a hardware crypto-accelerator. InDaniel J. Bernstein and Tanja Lange, editors, Progress in Cryptology -AFRICACRYPT 2010, Third International Conference on Cryptology inAfrica, Stellenbosch, South Africa, May 3-6, 2010. Proceedings, volume6055 of Lecture Notes in Computer Science, pages 243–260. Springer, 2010.

[186] M. Abdelaziz Elaabid, Olivier Meynard, Sylvain Guilley, and Jean-LucDanger. Combined side-channel attacks. In Yongwha Chung and MotiYung, editors, Information Security Applications - 11th InternationalWorkshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, RevisedSelected Papers, volume 6513 of Lecture Notes in Computer Science, pages175–190. Springer, 2010.

[187] Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, and Nidhal Selmane.Fault injection resilience. In Luca Breveglieri, Marc Joye, Israel Koren,David Naccache, and Ingrid Verbauwhede, editors, 2010 Workshop onFault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Bar-bara, California, USA, 21 August 2010, pages 51–65. IEEE ComputerSociety, 2010.

[188] Sylvain Guilley, Laurent Sauvage, Florent Flament, Vinh-Nga Vong,Philippe Hoogvorst, and Renaud Pacalet. Evaluation of power constantdual-rail logics countermeasures against DPA with design time securitymetrics. IEEE Trans. Computers, 59(9):1250–1263, 2010.

Page 28: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

28/33

[189] Sylvain Guilley, Laurent Sauvage, Julien Micolod, Denis Réal, andFrédéric Valette. Defeating any secret cryptography with SCARE at-tacks. In Michel Abdalla and Paulo S. L. M. Barreto, editors, Progressin Cryptology - LATINCRYPT 2010, First International Conference onCryptology and Information Security in Latin America, Puebla, Mexico,August 8-11, 2010, Proceedings, volume 6212 of Lecture Notes in Com-puter Science, pages 273–293. Springer, 2010.

[190] Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, and Florent Fla-ment. Entropy-based power attack. In Jim Plusquellic and Ken Mai,editors, HOST 2010, Proceedings of the 2010 IEEE International Sym-posium on Hardware-Oriented Security and Trust (HOST), 13-14 June2010, Anaheim Convention Center, California, USA, pages 1–6. IEEEComputer Society, 2010.

[191] Olivier Meynard, Sylvain Guilley, Jean-Luc Danger, and Laurent Sauvage.Far correlation-based EMA with a precharacterized leakage model. InGiovanni De Micheli, Bashir M. Al-Hashimi, Wolfgang Müller, and En-rico Macii, editors, Design, Automation and Test in Europe, DATE 2010,Dresden, Germany, March 8-12, 2010, pages 977–980. IEEE ComputerSociety, 2010.

[192] Olivier Meynard, Denis Réal, Sylvain Guilley, Florent Flament, Jean-LucDanger, and Frédéric Valette. Characterization of the electromagneticside channel in frequency domain. In Xuejia Lai, Moti Yung, and Dong-dai Lin, editors, Information Security and Cryptology - 6th InternationalConference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Re-vised Selected Papers, volume 6584 of Lecture Notes in Computer Science,pages 471–486. Springer, 2010.

[193] Maxime Nassar, Shivam Bhasin, Jean-Luc Danger, Guillaume Duc, andSylvain Guilley. BCDL: A high speed balanced DPL for FPGA with globalprecharge and no early evaluation. In Giovanni De Micheli, Bashir M. Al-Hashimi, Wolfgang Müller, and Enrico Macii, editors, Design, Automationand Test in Europe, DATE 2010, Dresden, Germany, March 8-12, 2010,pages 849–854. IEEE Computer Society, 2010.

[194] Laurent Sauvage, Sylvain Guilley, Florent Flament, Jean-Luc Danger, andYves Mathieu. Cross-correlation cartography. In Viktor K. Prasanna,Jürgen Becker, and René Cumplido, editors, ReConFig’10: 2010 Inter-national Conference on Reconfigurable Computing and FPGAs, Cancun,Quintana Roo, Mexico, 13-15 December 2010, Proceedings, pages 268–273.IEEE Computer Society, 2010.

[195] Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, and Yves Mathieu. Exploiting dual-output programmableblocks to balance secure dual-rail logics. Int. J. Reconfig. Comp.,2010:375245:1–375245:12, 2010.

Page 29: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

29/33

[196] Youssef Souissi, Sylvain Guilley, Jean-Luc Danger, Sami Mekki, and Guil-laume Duc. Improvement of power analysis attacks using kalman filter. InProceedings of the IEEE International Conference on Acoustics, Speech,and Signal Processing, ICASSP 2010, 14-19 March 2010, Sheraton DallasHotel, Dallas, Texas, USA, pages 1778–1781. IEEE, 2010.

[197] Youssef Souissi, Maxime Nassar, Sylvain Guilley, Jean-Luc Danger, andFlorent Flament. First principal components analysis: A new side channeldistinguisher. In Kyung Hyune Rhee and DaeHun Nyang, editors, Infor-mation Security and Cryptology - ICISC 2010 - 13th International Confer-ence, Seoul, Korea, December 1-3, 2010, Revised Selected Papers, volume6829 of Lecture Notes in Computer Science, pages 407–419. Springer, 2010.

2009[198] Shivam Bhasin, Jean-Luc Danger, Florent Flament, Tarik Graba, Sylvain

Guilley, Yves Mathieu, Maxime Nassar, Laurent Sauvage, and Nidhal Sel-mane. Combined SCA and DFA countermeasures integrable in a FPGAdesign flow. In Viktor K. Prasanna, Lionel Torres, and René Cumplido,editors, ReConFig’09: 2009 International Conference on ReconfigurableComputing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December2009, Proceedings, pages 213–218. IEEE Computer Society, 2009.

[199] Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, and Nidhal Selmane.Security evaluation of different AES implementations against practicalsetup time violation attacks in fpgas. In Mohammad Tehranipoor and JimPlusquellic, editors, IEEE International Workshop on Hardware-OrientedSecurity and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009.Proceedings, pages 15–21. IEEE Computer Society, 2009.

[200] Julien Bringer, Hervé Chabanne, and Jean-Luc Danger. Protecting theNOEKEON cipher against SCARE attacks in fpgas by using dynamic im-plementations. In Viktor K. Prasanna, Lionel Torres, and René Cumplido,editors, ReConFig’09: 2009 International Conference on ReconfigurableComputing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December2009, Proceedings, pages 183–188. IEEE Computer Society, 2009.

[201] Jean-Luc Danger, Sylvain Guilley, and Philippe Hoogvorst. High speedtrue random number generator based on open loop structures in fpgas.Microelectronics Journal, 40(11):1650–1656, 2009.

[202] Sylvain Guilley, Sumanta Chaudhuri, Laurent Sauvage, Jean-Luc Dan-ger, Taha Beyrouthy, and Laurent Fesquet. Updates on the potential ofclock-less logics to strengthen cryptographic circuits against side-channelattacks. In 16th IEEE International Conference on Electronics, Circuits,and Systems, ICECS 2009, Yasmine Hammamet, Tunisia, 13-19 Decem-ber, 2009, pages 351–354. IEEE, 2009.

Page 30: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

30/33

[203] Mohaned Kafi, Sylvain Guilley, Sandra Marcello, and David Naccache.Deconvolving protected signals. In Proceedings of the The Forth Interna-tional Conference on Availability, Reliability and Security, ARES 2009,March 16-19, 2009, Fukuoka, Japan, pages 687–694. IEEE Computer So-ciety, 2009.

[204] Sami Mekki, Jean-Luc Danger, and Benoit Miscopein. On the implemen-tation of a probabilistic equalizer for low-cost impulse radio UWB in highdata rate. Wireless Sensor Network, 1(4):245–256, 2009.

[205] Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger, Yves Mathieu, andMaxime Nassar. Successful attack on an fpga-based WDDL DES cryp-toprocessor without place and route constraints. In Luca Benini, Gio-vanni De Micheli, Bashir M. Al-Hashimi, and Wolfgang Müller, editors,Design, Automation and Test in Europe, DATE 2009, Nice, France, April20-24, 2009, pages 640–645. IEEE, 2009.

[206] Laurent Sauvage, Sylvain Guilley, and Yves Mathieu. Electromagneticradiations of fpgas: High spatial resolution cartography and attack on acryptographic module. TRETS, 2(1):4:1–4:24, 2009.

[207] Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, and Yves Mathieu. DPL on stratix II FPGA: what to expect?In Viktor K. Prasanna, Lionel Torres, and René Cumplido, editors, Re-ConFig’09: 2009 International Conference on Reconfigurable Computingand FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Pro-ceedings, pages 243–248. IEEE Computer Society, 2009.

[208] Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Tarik Graba, and Jean-Luc Danger. WDDL is protected against setup time violation attacks. InLuca Breveglieri, Israel Koren, David Naccache, Elisabeth Oswald, andJean-Pierre Seifert, editors, Sixth International Workshop on Fault Diag-nosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland,6 September 2009, pages 73–83. IEEE Computer Society, 2009.

2008[209] Sumanta Chaudhuri, Jean-Luc Danger, Philippe Hoogvorst, and Sylvain

Guilley. Efficient tiling patterns for reconfigurable gate arrays. In MikeHutton and Paul Chow, editors, Proceedings of the ACM/SIGDA 16th In-ternational Symposium on Field Programmable Gate Arrays, FPGA 2008,Monterey, California, USA, February 24-26, 2008, page 257. ACM, 2008.

[210] Sumanta Chaudhuri, Sylvain Guilley, Florent Flament, PhilippeHoogvorst, and Jean-Luc Danger. An 8x8 run-time reconfigurable FPGAembedded in a soc. In Limor Fix, editor, Proceedings of the 45th De-sign Automation Conference, DAC 2008, Anaheim, CA, USA, June 8-13,2008, pages 120–125. ACM, 2008.

Page 31: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

31/33

[211] Sumanta Chaudhuri, Sylvain Guilley, Philippe Hoogvorst, and Jean-LucDanger. Efficient tiling patterns for reconfigurable gate arrays. In Ion I.Mandoiu and Andrew A. Kennings, editors, The Tenth InternationalWorkshop on System-Level Interconnect Prediction (SLIP 2008), New-castle, UK, April 5-8, 2008, Proceedings, pages 11–18. ACM, 2008.

[212] Sumanta Chaudhuri, Sylvain Guilley, Philippe Hoogvorst, Jean-Luc Dan-ger, Taha Beyrouthy, Alin Razafindraibe, Laurent Fesquet, and Marc Re-naudin. Physical design of FPGA interconnect to prevent informationleakage. In Roger F. Woods, Katherine Compton, Christos-Savvas Bouga-nis, and Pedro C. Diniz, editors, Reconfigurable Computing: Architectures,Tools and Applications, 4th International Workshop, ARC 2008, London,UK, March 26-28, 2008. Proceedings, volume 4943 of Lecture Notes inComputer Science, pages 87–98. Springer, 2008.

[213] Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Danger, Laurent Sauvage,Philippe Hoogvorst, Maxime Nassar, Tarik Graba, and Vinh-Nga Vong.Place-and-route impact on the security of DPL designs in fpgas. In Mo-hammad Tehranipoor and Jim Plusquellic, editors, IEEE InternationalWorkshop on Hardware-Oriented Security and Trust, HOST 2008, Ana-heim, CA, USA, June 9, 2008. Proceedings, pages 26–32. IEEE ComputerSociety, 2008.

[214] Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Tarik Graba, andYves Mathieu. Evaluation of power-constant dual-rail logic as a protec-tion of cryptographic applications in fpgas. In Second International Con-ference on Secure System Integration and Reliability Improvement, SSIRI2008, July 14-17, 2008, Yokohama, Japan, pages 16–23. IEEE ComputerSociety, 2008.

[215] Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, and PhilippeHoogvorst. Area optimization of cryptographic co-processors implementedin dual-rail with precharge positive logic. In FPL 2008, InternationalConference on Field Programmable Logic and Applications, Heidelberg,Germany, 8-10 September 2008, pages 161–166. IEEE, 2008.

[216] Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, andRenaud Pacalet. Silicon-level solutions to counteract passive and activeattacks. In Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache,and Jean-Pierre Seifert, editors, Fifth International Workshop on FaultDiagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washing-ton, DC, USA, 10 August 2008, pages 3–17. IEEE Computer Society,2008.

[217] Sylvain Guilley, Laurent Sauvage, Philippe Hoogvorst, Renaud Pacalet,Guido Marco Bertoni, and Sumanta Chaudhuri. Security evaluation ofWDDL and seclib countermeasures against power attacks. IEEE Trans.Computers, 57(11):1482–1497, 2008.

Page 32: Publications list - Secure IC

EUROPE | APAC | JAPAN | AMERICAS | www.secure-ic.com | [email protected] All Rights Reserved | Confidential | Property of Secure-IC

32/33

[218] Farouk Khelil, Mohamed Hamdi, Sylvain Guilley, Jean-Luc Danger, andNidhal Selmane. Fault analysis attack on an FPGA AES implementa-tion. In Akshai Aggarwal, Mohamad Badra, and Fabio Massacci, editors,NTMS 2008, 2nd International Conference on New Technologies, Mobilityand Security, November 5-7, 2008, Tangier, Morocco, pages 1–5. IEEE,2008.

[219] Sami Mekki, Jean-Luc Danger, Benoit Miscopein, Jean Schwoerer, andJoseph Jean Boutros. Probabilistic equalizer for ultra-wideband energydetection. In Proceedings of the 67th IEEE Vehicular Technology Confer-ence, VTC Spring 2008, 11-14 May 2008, Singapore, pages 1108–1112.IEEE, 2008.

[220] Nidhal Selmane, Sylvain Guilley, and Jean-Luc Danger. Practical setuptime violation attacks on AES. In Seventh European Dependable Comput-ing Conference, EDCC-7 2008, Kaunas, Lithuania, 7-9 May 2008, pages91–96. IEEE Computer Society, 2008.

Page 33: Publications list - Secure IC

2 EUROPE I APAC I JAPAN I AMERICAS I www.secure-IC.com I [email protected]

2018 All Rights Reserved I Confidential I Property of Secure-IC I Specifications are subject to change without prior notice

EUROPE

[email protected]

APAC

[email protected]

AMERICAS

[email protected]

JAPAN

[email protected]

HEADQUARTERS

ZAC des Champs Blancs

15, rue Claude Chappe

35510 Cesson-Sévigné FRANCE

EUROPE I APAC I JAPAN I AMERICAS I www.secure-IC.com I [email protected] 2019 All Rights Reserved I Property of Secure-IC