Laurent Sauvage
Laurent Sauvage
Institut Mines-Télécom
Dirección de correo verificada de telecom-paristech.fr
Título
Citado por
Citado por
Año
Hardware Trojan horses in cryptographic IP cores
S Bhasin, JL Danger, S Guilley, XT Ngo, L Sauvage
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 15-29, 2013
932013
Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module
L Sauvage, S Guilley, Y Mathieu
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2 (1), 1-24, 2009
642009
Security evaluation of WDDL and SecLib countermeasures against power attacks
S Guilley, L Sauvage, P Hoogvorst, R Pacalet, GM Bertoni, S Chaudhuri
IEEE Transactions on Computers 57 (11), 1482-1497, 2008
552008
Evaluation of power constant dual-rail logics countermeasures against DPA with design time security metrics
S Guilley, L Sauvage, F Flament, VN Vong, P Hoogvorst, R Pacalet
IEEE Transactions on Computers 59 (9), 1250-1263, 2010
512010
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures
YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger
IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2012
502012
High precision fault injections on the instruction cache of ARMv7-M architectures
L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
492015
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
L Sauvage, S Guilley, JL Danger, Y Mathieu, M Nassar
2009 Design, Automation & Test in Europe Conference & Exhibition, 640-645, 2009
442009
Silicon-level solutions to counteract passive and active attacks
S Guilley, L Sauvage, JL Danger, N Selmane, R Pacalet
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 3-17, 2008
442008
Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors
JL Danger, S Guilley, S Bhasin, M Nassar
2009 3rd International Conference on Signals, Circuits and Systems (SCS), 1-8, 2009
432009
Fault injection resilience
S Guilley, L Sauvage, JL Danger, N Selmane
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 51-65, 2010
422010
Evaluation of power-constant dual-rail logic as a protection of cryptographic applications in FPGAs
S Guilley, L Sauvage, JL Danger, T Graba, Y Mathieu
2008 Second International Conference on Secure System Integration and …, 2008
412008
Defeating any secret cryptography with SCARE attacks
S Guilley, L Sauvage, J Micolod, D Réal, F Valette
International Conference on Cryptology and Information Security in Latin …, 2010
352010
Far correlation-based EMA with a precharacterized leakage model
O Meynard, S Guilley, JL Danger, L Sauvage
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010
352010
Place-and-route impact on the security of DPL designs in FPGAs
S Guilley, S Chaudhuri, L Sauvage, T Graba, JL Danger, P Hoogvorst, ...
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, 26-32, 2008
352008
Evaluation of countermeasure implementations based on Boolean masking to thwart side-channel attacks
H Maghrebi, JL Danger, F Flament, S Guilley, L Sauvage
2009 3rd International Conference on Signals, Circuits and Systems (SCS), 1-6, 2009
332009
Shall we trust WDDL?
S Guilley, S Chaudhuri, L Sauvage, T Graba, JL Danger, P Hoogvorst, ...
Future of Trust in Computing, 208-215, 2009
292009
Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks
S Bhasin, S Guilley, L Sauvage, JL Danger
Cryptographers’ Track at the RSA Conference, 195-207, 2010
262010
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4 (4), 259-274, 2014
252014
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices
Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ...
IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2012
252012
Combined SCA and DFA countermeasures integrable in a FPGA design flow
S Bhasin, JL Danger, F Flament, T Graba, S Guilley, Y Mathieu, M Nassar, ...
2009 International Conference on Reconfigurable Computing and FPGAs, 213-218, 2009
252009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20