Suivre
Francois Durvaux
Francois Durvaux
Adresse e-mail validée de uclouvain.be
Titre
Citée par
Citée par
Année
SleepWalker: A 25-MHz 0.4-V Sub- 7- Microcontroller in 65-nm LP/GP CMOS for Low-Carbon Wireless Sensor Nodes
D Bol, J De Vos, C Hocquet, F Botman, F Durvaux, S Boyd, D Flandre, ...
IEEE Journal of Solid-State Circuits 48 (1), 20-32, 2012
1802012
From improved leakage detection to the detection of points of interests in leakage traces
F Durvaux, FX Standaert
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
1642016
Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint
S Kerckhof, F Durvaux, C Hocquet, D Bol, FX Standaert
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
1302012
How to certify the leakage of a chip?
F Durvaux, FX Standaert, N Veyrat-Charvillon
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
1152014
Compact FPGA implementations of the five SHA-3 finalists
S Kerckhof, F Durvaux, N Veyrat-Charvillon, F Regazzoni, ...
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 …, 2011
832011
Towards sound and optimal leakage detection procedure
AA Ding, L Zhang, F Durvaux, FX Standaert, Y Fei
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
572018
Efficient removal of random delays from embedded software implementations using hidden markov models
F Durvaux, M Renauld, FX Standaert, L Van Oldeneel Tot Oldenzeel, ...
Smart Card Research and Advanced Applications: 11th International Conference …, 2013
562013
A 25MHz 7μW/MHz ultra-low-voltage microcontroller SoC in 65nm LP/GP CMOS for low-carbon wireless sensor nodes
D Bol, J De Vos, C Hocquet, F Botman, F Durvaux, S Boyd, D Flandre, ...
2012 IEEE International Solid-State Circuits Conference, 490-492, 2012
562012
A 25MHz 7μW/MHz ultra-low-voltage microcontroller SoC in 65nm LP/GP CMOS for low-carbon wireless sensor nodes
D Bol, J De Vos, C Hocquet, F Botman, F Durvaux, S Boyd, D Flandre, ...
2012 IEEE International Solid-State Circuits Conference, 490-492, 2012
562012
SCREAM & iSCREAM side-channel resistant authenticated encryption with masking
V Grosso, G Leurent, FX Standaert, K Varici, F Durvaux, L Gaspar, ...
Submission to CAESAR, 2014
452014
Efficient selection of time samples for higher-order DPA with projection pursuits
F Durvaux, FX Standaert, N Veyrat-Charvillon, JB Mairy, Y Deville
Constructive Side-Channel Analysis and Secure Design: 6th International …, 2015
402015
Towards easy leakage certification
F Durvaux, FX Standaert, SM Del Pozo
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
282016
Cryptanalysis of the ches 2009/2010 random delay countermeasure
F Durvaux, M Renauld, FX Standaert, LO tot Oldenzeel, ...
Cryptology ePrint Archive, 2012
182012
SCREAM side-channel resistant authenticated encryption with masking
V Grosso, G Leurent, FX Standaert, K Varici, A Journault, F Durvaux, ...
CAESAR submission, 2015
172015
Intellectual property protection for integrated systems using soft physical hash functions
F Durvaux, B Gérard, S Kerckhof, F Koeune, FX Standaert
Information Security Applications: 13th International Workshop, WISA 2012 …, 2012
172012
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results
S Kerckhof, F Durvaux, FX Standaert, B Gérard
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
162013
Towards sound and optimal leakage detection procedure
L Zhang, AA Ding, F Durvaux, FX Standaert, Y Fei
Cryptology ePrint Archive, 2017
152017
Towards easy leakage certification: extended version
F Durvaux, FX Standaert, SM Del Pozo
Journal of Cryptographic Engineering 7, 129-147, 2017
122017
Efficient profiled side-channel analysis of masked implementations, extended
O Bronchain, F Durvaux, L Masure, FX Standaert
IEEE Transactions on Information Forensics and Security 17, 574-584, 2022
112022
SCA-Pitaya: A Practical and Affordable Side-Channel Attack Setup for Power Leakage--Based Evaluations
F Durvaux, M Durvaux
Digital Threats: Research and Practice 1 (1), 1-16, 2020
112020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20