NICV: normalized inter-class variance for detection of side-channel leakage S Bhasin, JL Danger, S Guilley, Z Najm 2014 International Symposium on Electromagnetic Compatibility, Tokyo, 310-313, 2014 | 116 | 2014 |
High precision fault injections on the instruction cache of ARMv7-M architectures L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 113 | 2015 |
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses XT Ngo, S Bhasin, JL Danger, S Guilley, Z Najm 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 98 | 2015 |
Analysis and improvements of the DPA contest v4 implementation S Bhasin, N Bruneau, JL Danger, S Guilley, Z Najm Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014 | 66 | 2014 |
Hardware Trojan detection by delay and electromagnetic measurements XT Ngo, I Exurville, S Bhasin, JL Danger, S Guilley, Z Najm, JB Rigaud, ... 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 782-787, 2015 | 65 | 2015 |
Pll to the rescue: a novel em fault countermeasure N Miura, Z Najm, W He, S Bhasin, XT Ngo, M Nagata, JL Danger Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 56 | 2016 |
Fixslicing: A new gift representation A Adomnicai, Z Najm, T Peyrin Cryptology ePrint Archive, 2020 | 53 | 2020 |
Hardware property checker for run-time hardware trojan detection XT Ngo, JL Danger, S Guilley, Z Najm, O Emery 2015 European Conference on Circuit Theory and Design (ECCTD), 1-4, 2015 | 53 | 2015 |
Cryptographically secure shield for security IPs protection XT Ngo, JL Danger, S Guilley, T Graba, Y Mathieu, Z Najm, S Bhasin IEEE Transactions on Computers 66 (2), 354-360, 2016 | 48 | 2016 |
Side-channel leakage and trace compression using normalized inter-class variance S Bhasin, JL Danger, S Guilley, Z Najm Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014 | 47 | 2014 |
Dismantling real-world ECC with horizontal and vertical template attacks M Dugardin, L Papachristodoulou, Z Najm, L Batina, JL Danger, S Guilley International Workshop on Constructive Side-Channel Analysis and Secure …, 2016 | 45 | 2016 |
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis XT Ngo, Z Najm, S Bhasin, S Guilley, JL Danger Journal of Cryptographic Engineering 6, 239-247, 2016 | 43* | 2016 |
Time-frequency analysis for second-order attacks P Belgarric, S Bhasin, N Bruneau, JL Danger, N Debande, S Guilley, ... Smart Card Research and Advanced Applications: 12th International Conference …, 2014 | 35 | 2014 |
A look into SIMON from a side-channel perspective S Bhasin, T Graba, JL Danger, Z Najm 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 34 | 2014 |
Multivariate high-order attacks of shuffled tables recomputation N Bruneau, S Guilley, Z Najm, Y Teglia Journal of Cryptology 31, 351-393, 2018 | 33 | 2018 |
Formally proved security of assembly code against power analysis: A case study on balanced logic P Rauzy, S Guilley, Z Najm Journal of Cryptographic Engineering 6, 201-216, 2016 | 24 | 2016 |
A low-entropy first-degree secure provable masking scheme for resource-constrained devices S Bhasin, JL Danger, S Guilley, Z Najm Proceedings of the Workshop on Embedded Systems Security, 1-10, 2013 | 23 | 2013 |
Integrated sensor: a backdoor for hardware Trojan insertions? XT Ng, Z Naj, S Bhasin, DB Roy, JL Danger, S Guilley 2015 Euromicro conference on digital system design, 415-422, 2015 | 21 | 2015 |
Encoding the state of integrated circuits: a proactive and reactive protection against hardware trojans horses XT Ngo, S Guilley, S Bhasin, JL Danger, Z Najm Proceedings of the 9th Workshop on Embedded Systems Security, 1-10, 2014 | 21 | 2014 |
Formally Proved Security of Assembly Code Against Leakage. P Rauzy, S Guilley, Z Najm IACR Cryptol. ePrint Arch. 2013, 554, 2013 | 21 | 2013 |