关注
Yannick Teglia
Yannick Teglia
Cybersecurity Principal Engineer - Thales DIS
在 thalesgroup.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Leak resistant arithmetic
JC Bajard, L Imbert, PY Liardet, Y Teglia
Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International …, 2004
1162004
High-speed ring oscillator based sensors for remote side-channel attacks on FPGAs
J Gravellier, JM Dutertre, Y Teglia, P Loubet-Moundi
2019 International conference on ReConFigurable computing and FPGAs …, 2019
602019
Remote side-channel attacks on heterogeneous SoC
J Gravellier, JM Dutertre, Y Teglia, PL Moundi, F Olivier
Smart Card Research and Advanced Applications: 18th International Conference …, 2020
552020
Improving first order differential power attacks through digital signal processing
A Barenghi, G Pelosi, Y Teglia
Proceedings of the 3rd international conference on Security of information …, 2010
462010
Multivariate high-order attacks of shuffled tables recomputation
N Bruneau, S Guilley, Z Najm, Y Teglia
Journal of Cryptology 31, 351-393, 2018
382018
On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models
P Haddad, Y Teglia, F Bernard, V Fischer
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
372014
Information leakage discovery techniques to enhance secure chip design
A Barenghi, G Pelosi, Y Teglia
Information Security Theory and Practice. Security and Privacy of Mobile …, 2011
362011
Non-deterministic method for secured data transfer
Y Teglia
US Patent 7,116,783, 2006
322006
Processor for executing an AES-type algorithm
Y Teglia, F Romain, PY Liardet, P Fragneto, F Sozzani, G Bertoni
US Patent 8,102,997, 2012
302012
Cyphering/decyphering performed by an integrated circuit
PY Liardet, F Romain, Y Teglia, L Sirtori
US Patent 7,403,620, 2008
292008
Sideline: How delay-lines (may) leak secrets from your soc
J Gravellier, JM Dutertre, Y Teglia, PL Moundi
Constructive Side-Channel Analysis and Secure Design: 12th International …, 2021
252021
Protection of a DES algorithm
PY Liardet, Y Teglia
US Patent 7,764,786, 2010
212010
A model of the leakage in the frequency domain and its application to CPA and DPA
S Tiran, S Ordas, Y Teglia, M Agoyan, P Maurine
Journal of Cryptographic Engineering 4, 197-212, 2014
192014
Secure method for secret key cryptographic calculation and component using said method
F Romain, Y Teglia
US Patent 7,400,723, 2008
192008
Protected encryption method and associated component
F Romain, Y Teglia
US Patent 8,306,218, 2012
182012
Boosting higher-order correlation attacks by dimensionality reduction
N Bruneau, JL Danger, S Guilley, A Heuser, Y Teglia
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
172014
Stream ciphering of the content of a memory external to a processor
J Daemen, P Guillemin, C Anguille, M Bardouillet, PY Liardet, Y Teglia
US Patent 8,045,712, 2011
162011
Taking into account indirect jumps or calls in continuous control-flow checking
L Terras, Y Teglia, M Agoyan, R Leveugle
2016 11th International Design & Test Symposium (IDT), 125-130, 2016
142016
Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
N Bruneau, S Guilley, A Heuser, O Rioul, FX Standaert, Y Teglia
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
132016
Protection of the execution of a DES algorithm
Y Teglia, PY Liardet, A Pomet
US Patent 8,144,865, 2012
132012
系统目前无法执行此操作,请稍后再试。
文章 1–20