Benoit Feix

According to our database1, Benoit Feix authored at least 20 papers between 2005 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Defeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
Chicken or the Egg - Computational Data Attacks or Physical Attacks.
IACR Cryptol. ePrint Arch., 2015

2014
Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques.
IACR Cryptol. ePrint Arch., 2014

Side-Channel Analysis on Blinded Regular Scalar Multiplications.
IACR Cryptol. ePrint Arch., 2014

Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

2013
There's Something about m-ary - Fixed-Point Scalar Multiplication Protected against Physical Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Defeating with Fault Injection a Combined Attack Resistant Exponentiation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Generating Provable Primes Efficiently on Embedded Devices.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

ROSETTA for Single Trace Analysis.
Proceedings of the Progress in Cryptology, 2012

2011
Square Always Exponentiation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Improved Collision-Correlation Power Analysis on First Order Protected AES.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Horizontal Correlation Analysis on Exponentiation.
IACR Cryptol. ePrint Arch., 2010

Passive and Active Combined Attacks on AES???Combining Fault Attacks and Side Channel Analysis.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010

Simple Power Analysis on Exponentiation Revisited.
Proceedings of the Smart Card Research and Advanced Application, 2010

2008
On the BRIP Algorithms Security for RSA.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Distinguishing Multiplications from Squaring Operations.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

2007
Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis.
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007

2005
Practical Attacks on Smart Cards.
Proceedings of the Handbook of Elliptic and Hyperelliptic Curve Cryptography., 2005


  Loading...