Leak resistant arithmetic JC Bajard, L Imbert, PY Liardet, Y Teglia Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International …, 2004 | 116 | 2004 |
High-speed ring oscillator based sensors for remote side-channel attacks on FPGAs J Gravellier, JM Dutertre, Y Teglia, P Loubet-Moundi 2019 International conference on ReConFigurable computing and FPGAs …, 2019 | 60 | 2019 |
Remote side-channel attacks on heterogeneous SoC J Gravellier, JM Dutertre, Y Teglia, PL Moundi, F Olivier Smart Card Research and Advanced Applications: 18th International Conference …, 2020 | 55 | 2020 |
Improving first order differential power attacks through digital signal processing A Barenghi, G Pelosi, Y Teglia Proceedings of the 3rd international conference on Security of information …, 2010 | 46 | 2010 |
Multivariate high-order attacks of shuffled tables recomputation N Bruneau, S Guilley, Z Najm, Y Teglia Journal of Cryptology 31, 351-393, 2018 | 38 | 2018 |
On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models P Haddad, Y Teglia, F Bernard, V Fischer 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014 | 37 | 2014 |
Information leakage discovery techniques to enhance secure chip design A Barenghi, G Pelosi, Y Teglia Information Security Theory and Practice. Security and Privacy of Mobile …, 2011 | 36 | 2011 |
Non-deterministic method for secured data transfer Y Teglia US Patent 7,116,783, 2006 | 32 | 2006 |
Processor for executing an AES-type algorithm Y Teglia, F Romain, PY Liardet, P Fragneto, F Sozzani, G Bertoni US Patent 8,102,997, 2012 | 30 | 2012 |
Cyphering/decyphering performed by an integrated circuit PY Liardet, F Romain, Y Teglia, L Sirtori US Patent 7,403,620, 2008 | 29 | 2008 |
Sideline: How delay-lines (may) leak secrets from your soc J Gravellier, JM Dutertre, Y Teglia, PL Moundi Constructive Side-Channel Analysis and Secure Design: 12th International …, 2021 | 25 | 2021 |
Protection of a DES algorithm PY Liardet, Y Teglia US Patent 7,764,786, 2010 | 21 | 2010 |
A model of the leakage in the frequency domain and its application to CPA and DPA S Tiran, S Ordas, Y Teglia, M Agoyan, P Maurine Journal of Cryptographic Engineering 4, 197-212, 2014 | 19 | 2014 |
Secure method for secret key cryptographic calculation and component using said method F Romain, Y Teglia US Patent 7,400,723, 2008 | 19 | 2008 |
Protected encryption method and associated component F Romain, Y Teglia US Patent 8,306,218, 2012 | 18 | 2012 |
Boosting higher-order correlation attacks by dimensionality reduction N Bruneau, JL Danger, S Guilley, A Heuser, Y Teglia Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014 | 17 | 2014 |
Stream ciphering of the content of a memory external to a processor J Daemen, P Guillemin, C Anguille, M Bardouillet, PY Liardet, Y Teglia US Patent 8,045,712, 2011 | 16 | 2011 |
Taking into account indirect jumps or calls in continuous control-flow checking L Terras, Y Teglia, M Agoyan, R Leveugle 2016 11th International Design & Test Symposium (IDT), 125-130, 2016 | 14 | 2016 |
Taylor expansion of maximum likelihood attacks for masked and shuffled implementations N Bruneau, S Guilley, A Heuser, O Rioul, FX Standaert, Y Teglia Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 13 | 2016 |
Protection of the execution of a DES algorithm Y Teglia, PY Liardet, A Pomet US Patent 8,144,865, 2012 | 13 | 2012 |