RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs M Nassar, Y Souissi, S Guilley, JL Danger 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012 | 216 | 2012 |
Practical setup time violation attacks on AES N Selmane, S Guilley, JL Danger 2008 Seventh European Dependable Computing Conference, 91-96, 2008 | 202 | 2008 |
Hardware Trojan horses in cryptographic IP cores S Bhasin, JL Danger, S Guilley, XT Ngo, L Sauvage 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 15-29, 2013 | 167 | 2013 |
lambda-min decoding algorithm of regular and irregular LDPC codes E Boutillon, F Guillou, JL Danger 3nd International Symposium on Turbo Codes & Related Topics, 2003 | 152 | 2003 |
High speed true random number generator based on open loop structures in FPGAs JL Danger, S Guilley, P Hoogvorst Microelectronics journal 40 (11), 1650-1656, 2009 | 135 | 2009 |
NICV: normalized inter-class variance for detection of side-channel leakage S Bhasin, JL Danger, S Guilley, Z Najm 2014 International Symposium on Electromagnetic Compatibility, Tokyo, 310-313, 2014 | 117 | 2014 |
High precision fault injections on the instruction cache of ARMv7-M architectures L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 113 | 2015 |
BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation M Nassar, S Bhasin, JL Danger, G Duc, S Guilley 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010 | 113 | 2010 |
Efficient FPGA implementation of Gaussian noise generator for communication channel emulation JL Danger, A Ghazel, E Boutillon, H Laamari ICECS 2000. 7th IEEE International Conference on Electronics, Circuits and …, 2000 | 106 | 2000 |
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses XT Ngo, S Bhasin, JL Danger, S Guilley, Z Najm 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 99 | 2015 |
An easy-to-design PUF based on a single oscillator: The loop PUF Z Cherif, JL Danger, S Guilley, L Bossuet 2012 15th Euromicro Conference on Digital System Design, 156-162, 2012 | 99 | 2012 |
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2012 | 85 | 2012 |
Design of high speed AWGN communication channel emulator E Boutillon, JL Danger, A Ghazel Analog Integrated Circuits and Signal Processing 34, 133-142, 2003 | 84 | 2003 |
WDDL is protected against setup time violation attacks N Selmane, S Bhasin, S Guilley, T Graba, JL Danger 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 73-83, 2009 | 82 | 2009 |
Generic description and synthesis of LDPC decoders F Guilloud, E Boutillon, J Tousch, JL Danger IEEE transactions on Communications 55 (11), 2084-2091, 2007 | 81 | 2007 |
Design and performance analysis of a high speed AWGN communication channel emulator A Ghazel, E Boutillon, JL Danger, G Gulak, H Laamari 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2001 | 81 | 2001 |
Overview of dual rail with precharge logic styles to thwart implementation-level attacks on hardware cryptoprocessors JL Danger, S Guilley, S Bhasin, M Nassar 2009 3rd International Conference on Signals, Circuits and Systems (SCS), 1-8, 2009 | 78 | 2009 |
Analysis and improvements of the DPA contest v4 implementation S Bhasin, N Bruneau, JL Danger, S Guilley, Z Najm Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014 | 71 | 2014 |
Laser-induced single-bit faults in flash memory: Instructions corruption on a 32-bit microcontroller B Colombier, A Menu, JM Dutertre, PA Moëllic, JB Rigaud, JL Danger 2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019 | 70 | 2019 |
Cryptographically secure shields JM Cioranesco, JL Danger, T Graba, S Guilley, Y Mathieu, D Naccache, ... 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 70 | 2014 |