BibTeX records: Nicolas Veyrat-Charvillon

download as .bib file

@inproceedings{DBLP:conf/cosade/DurvauxSVMD15,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Jean{-}Baptiste Mairy and
                  Yves Deville},
  editor       = {Stefan Mangard and
                  Axel Y. Poschmann},
  title        = {Efficient Selection of Time Samples for Higher-Order {DPA} with Projection
                  Pursuits},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 6th International
                  Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9064},
  pages        = {34--50},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21476-4\_3},
  doi          = {10.1007/978-3-319-21476-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/DurvauxSVMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14,
  author       = {Christophe Clavier and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  M. Abdelaziz Elaabid and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Michael Kasper and
                  Yang Li and
                  Victor Lomn{\'{e}} and
                  Daisuke Nakatsu and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Laurent Sauvage and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger and
                  Nicolas Veyrat{-}Charvillon and
                  Matthieu Walle and
                  Antoine Wurcker},
  title        = {Practical improvements of side-channel attacks on {AES:} feedback
                  from the 2nd {DPA} contest},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {259--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0075-9},
  doi          = {10.1007/S13389-014-0075-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Veyrat-CharvillonGS14,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Soft Analytical Side-Channel Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_15},
  doi          = {10.1007/978-3-662-45611-8\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Veyrat-CharvillonGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DurvauxSV14,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {How to Certify the Leakage of a Chip?},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {459--476},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_26},
  doi          = {10.1007/978-3-642-55220-5\_26},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DurvauxSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonGS14,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Soft Analytical Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxSVMD14,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Jean{-}Baptiste Mairy and
                  Yves Deville},
  title        = {Efficient Selection of Time Samples for Higher-Order {DPA} with Projection
                  Pursuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxSVMD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Veyrat-CharvillonGS13,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Security Evaluations beyond Computing Power},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_8},
  doi          = {10.1007/978-3-642-38348-9\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Veyrat-CharvillonGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxSV13,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {How to Certify the Leakage of a Chip?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/706},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Veyrat-CharvillonMKS12,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Marcel Medwed and
                  St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Shuffling against Side-Channel Attacks: {A} Comprehensive Study with
                  Cautionary Note},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {740--757},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_44},
  doi          = {10.1007/978-3-642-34961-4\_44},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Veyrat-CharvillonMKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/StandaertPV12,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Christophe Petit and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {David Naccache},
  title        = {Masking with Randomized Look Up Tables - Towards Preventing Side-Channel
                  Attacks of All Orders},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {283--299},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_19},
  doi          = {10.1007/978-3-642-28368-0\_19},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/StandaertPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DurvauxRSOV12,
  author       = {Fran{\c{c}}ois Durvaux and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {Stefan Mangard},
  title        = {Efficient Removal of Random Delays from Embedded Software Implementations
                  Using Hidden Markov Models},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {123--140},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_9},
  doi          = {10.1007/978-3-642-37288-9\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DurvauxRSOV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Veyrat-CharvillonGRS12,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {An Optimal Key Enumeration Algorithm and Its Application to Side-Channel
                  Attacks},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {390--406},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_25},
  doi          = {10.1007/978-3-642-35999-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Veyrat-CharvillonGRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxRSOV12,
  author       = {Fran{\c{c}}ois Durvaux and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Cryptanalysis of the {CHES} 2009/2010 Random Delay Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxRSOV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonGS12,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Security Evaluations Beyond Computing Power: How to Analyze Side-Channel
                  Attacks you Cannot Mount?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BatinaGPRSV11,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Mutual Information Analysis: a Comprehensive Study},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {269--291},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9084-8},
  doi          = {10.1007/S00145-010-9084-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/KerckhofDVRDS11,
  author       = {St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Durvaux and
                  Nicolas Veyrat{-}Charvillon and
                  Francesco Regazzoni and
                  Guerric Meurice de Dormale and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Emmanuel Prouff},
  title        = {Compact {FPGA} Implementations of the Five {SHA-3} Finalists},
  booktitle    = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2011, Leuven, Belgium, September
                  14-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7079},
  pages        = {217--233},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27257-8\_14},
  doi          = {10.1007/978-3-642-27257-8\_14},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/KerckhofDVRDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Veyrat-CharvillonS11,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Phillip Rogaway},
  title        = {Generic Side-Channel Distinguishers: Improvements and Limitations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {354--372},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_20},
  doi          = {10.1007/978-3-642-22792-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Veyrat-CharvillonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RenauldSVKF11,
  author       = {Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Dina Kamel and
                  Denis Flandre},
  editor       = {Kenneth G. Paterson},
  title        = {A Formal Study of Power Variability Issues and Side-Channel Attacks
                  for Nanoscale Devices},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_8},
  doi          = {10.1007/978-3-642-20465-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RenauldSVKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehbaouiTMSV11,
  author       = {Amine Dehbaoui and
                  S{\'{e}}bastien Tiran and
                  Philippe Maurine and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Spectral Coherence Analysis - First Experimental Results -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehbaouiTMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonS11,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Generic Side-Channel Distinguishers: Improvements and Limitations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonGRS11,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {An optimal Key Enumeration Algorithm and its Application to Side-Channel
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Veyrat-CharvillonS10,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Adaptive Chosen-Message Side-Channel Attacks},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {186--199},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_12},
  doi          = {10.1007/978-3-642-13708-2\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Veyrat-CharvillonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  editor       = {Masayuki Abe},
  title        = {The World Is Not Enough: Another Look on Second-Order {DPA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_7},
  doi          = {10.1007/978-3-642-17373-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  title        = {The World is Not Enough: Another Look on Second-Order {DPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RenauldSV09,
  author       = {Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Algebraic Side-Channel Attacks on the {AES:} Why Time also Matters
                  in {DPA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_8},
  doi          = {10.1007/978-3-642-04138-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RenauldSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Veyrat-CharvillonS09,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Mutual Information Analysis: How, When and Why?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {429--443},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_30},
  doi          = {10.1007/978-3-642-04138-9\_30},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Veyrat-CharvillonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/MichardTV08,
  author       = {Romain Michard and
                  Arnaud Tisserand and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Optimisation d'op{\'{e}}rateurs arithm{\'{e}}tiques mat{\'{e}}riels
                  {\`{a}} base d'approximations polynomiales},
  journal      = {Tech. Sci. Informatiques},
  volume       = {27},
  number       = {6},
  pages        = {699--718},
  year         = {2008},
  url          = {https://doi.org/10.3166/tsi.27.699-718},
  doi          = {10.3166/TSI.27.699-718},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/MichardTV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/PetitVQ08,
  author       = {Christophe Petit and
                  Nicolas Veyrat{-}Charvillon and
                  Jean{-}Jacques Quisquater},
  title        = {Efficiency and pseudo-randomness of a variant of Z{\'{e}}mor-Tillich
                  hash function},
  booktitle    = {15th {IEEE} International Conference on Electronics, Circuits and
                  Systems, {ICECS} 2008, St. Julien's, Malta, August 31 2008-September
                  3, 2008},
  pages        = {906--909},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICECS.2008.4675001},
  doi          = {10.1109/ICECS.2008.4675001},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icecsys/PetitVQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertBMV08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Philippe Bulens and
                  Giacomo de Meulenaer and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Improving the Rules of the {DPA} Contest},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertBMV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/VeyratCharvillon07,
  author       = {Nicolas Veyrat{-}Charvillon},
  title        = {Op{\'{e}}rateurs arithm{\'{e}}tiques mat{\'{e}}riels
                  pour des applications sp{\'{e}}cifiques. (Hardware arithmetic
                  operators for specific applications)},
  school       = {{\'{E}}cole normale sup{\'{e}}rieure de Lyon, France},
  year         = {2007},
  url          = {https://tel.archives-ouvertes.fr/tel-00438603},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/VeyratCharvillon07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/GlabbIJTV07,
  author       = {Ryan Glabb and
                  Laurent Imbert and
                  Graham A. Jullien and
                  Arnaud Tisserand and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Multi-mode operator for {SHA-2} hash functions},
  journal      = {J. Syst. Archit.},
  volume       = {53},
  number       = {2-3},
  pages        = {127--138},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.sysarc.2006.09.006},
  doi          = {10.1016/J.SYSARC.2006.09.006},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/GlabbIJTV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ersa/GlabbIJTV06,
  author       = {Ryan Glabb and
                  Laurent Imbert and
                  Graham A. Jullien and
                  Arnaud Tisserand and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {Toomas P. Plaks},
  title        = {Multi-Mode Operator for {SHA-2} Hash Functions},
  booktitle    = {Proceedings of the 2006 International Conference on Engineering of
                  Reconfigurable Systems {\&} Algorithms, {ERSA} 2006, Las Vegas,
                  Nevada, USA, June 26-29, 2006},
  pages        = {207--210},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Mon, 11 Dec 2006 15:00:43 +0100},
  biburl       = {https://dblp.org/rec/conf/ersa/GlabbIJTV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sips/MichardTV06,
  author       = {Romain Michard and
                  Arnaud Tisserand and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Carry Prediction and Selection for Truncated Multiplication},
  booktitle    = {Proceedings of the {IEEE} Workshop on Signal Processing Systems, SiPS
                  2006, Proceedings, October 2-4, 2006, Banff, Alberta, Canada},
  pages        = {339--344},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SIPS.2006.352605},
  doi          = {10.1109/SIPS.2006.352605},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sips/MichardTV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/MichardTV05,
  author       = {Romain Michard and
                  Arnaud Tisserand and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Small {FPGA} polynomial approximations with 3-bit coefficients and
                  low-precision estimations of the powers of x},
  booktitle    = {16th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2005), 23-25 July 2005, Samos,
                  Greece},
  pages        = {334--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ASAP.2005.59},
  doi          = {10.1109/ASAP.2005.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/MichardTV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics