Adrien Facon

Orcid: 0000-0001-5303-3365

According to our database1, Adrien Facon authored at least 20 papers between 2018 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
End-to-end automated cache-timing attack driven by machine learning.
J. Cryptogr. Eng., 2021

Security evaluation against side-channel analysis at compilation time.
IACR Cryptol. ePrint Arch., 2021

2020
Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020

Feasibility study of a camera-based PUF in a realistic scenario.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Exhaustive single bit fault analysis. A use case against Mbedtls and OpenSSL's protection on ARM and Intel CPU.
Microprocess. Microsystems, 2019

Speed-up of SCA attacks on 32-bit multiplications.
IACR Cryptol. ePrint Arch., 2019

Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Experiment on Side-Channel Key-Recovery using a Real LPWA End-device.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Cache-Timing Attack Detection and Prevention - Application to Crypto Libs and PQC.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

Cache-Timing Attacks Still Threaten IoT Devices.
Proceedings of the Codes, Cryptology and Information Security, 2019

Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
On the Performance and Security of Multiplication in <i>GF</i>(2<sup><i>N</i></sup>).
Cryptogr., 2018

Binary Data Analysis for Source Code Leakage Assessment.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Development of the Unified Security Requirements of PUFs During the Standardization Process.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

Technology-agnostic power optimization for AES block cipher.
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018

Give me your binary, I'll tell you if it leaks.
Proceedings of the 13th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2018

CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018

OpenSSL Bellcore's Protection Helps Fault Attack.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018


  Loading...