Benoît Gérard

Orcid: 0000-0002-0598-2387

According to our database1, Benoît Gérard authored at least 34 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
BIKE Key-Recovery: Combining Power Consumption Analysis and Information-Set Decoding.
Proceedings of the Applied Cryptography and Network Security, 2023

2021
Train or Adapt a Deeply Learned Profile?
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021

Trace-to-Trace Translation for SCA.
Proceedings of the Smart Card Research and Advanced Applications, 2021

2020
On What to Learn: Train or Adapt a Deeply Learned Profile?
IACR Cryptol. ePrint Arch., 2020

2019
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation.
IACR Cryptol. ePrint Arch., 2019

2018
Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols.
IEEE Trans. Computers, 2018

2017
Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers.
IACR Cryptol. ePrint Arch., 2017

2016
Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures.
IACR Cryptol. ePrint Arch., 2016

Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2015
Improved Side-Channel Analysis of Finite-Field Multiplication.
IACR Cryptol. ePrint Arch., 2015

Contributions to the Design of Residue Number System Architectures.
Proceedings of the 22nd IEEE Symposium on Computer Arithmetic, 2015

2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014

Soft Analytical Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

Towards More Practical Time-Driven Cache Attacks.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version.
J. Cryptogr. Eng., 2013

Block Ciphers that are Easier to Mask: How Far Can we Go?
IACR Cryptol. ePrint Arch., 2013

Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

Security Evaluations beyond Computing Power.
Proceedings of the Advances in Cryptology, 2013

2012
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
IACR Cryptol. ePrint Arch., 2012

Multiple Differential Cryptanalysis using \LLR and χ<sup>2</sup> Statistics.
IACR Cryptol. ePrint Arch., 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012

Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2011

Multiple Differential Cryptanalysis: Theory and Practice (Corrected).
IACR Cryptol. ePrint Arch., 2011

Accurate estimates of the data complexity and success probability for various cryptanalyses.
Des. Codes Cryptogr., 2011

Multiple Differential Cryptanalysis: Theory and Practice.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Cryptanalyses statistiques des algorithmes de chiffrement à clef secrète. (Statistical cryptanalyses of symmetric-key algorithms).
PhD thesis, 2010

Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT.
IACR Cryptol. ePrint Arch., 2010

2009
On Linear Cryptanalysis with Many Linear Approximations.
IACR Cryptol. ePrint Arch., 2009

On the Data Complexity of Statistical Attacks Against Block Ciphers (full version).
IACR Cryptol. ePrint Arch., 2009


  Loading...