Cécile Canovas

According to our database1, Cécile Canovas authored at least 28 papers between 2000 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Comprehensive Study of Deep Learning for Side-Channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Deep learning for side-channel analysis and introduction to ASCAD database.
J. Cryptogr. Eng., 2020

Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2020

2019
Deep Learning to Evaluate Secure RSA Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2018
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database.
IACR Cryptol. ePrint Arch., 2018

Gradient Visualization for General Characterization in Profiling Attacks.
IACR Cryptol. ePrint Arch., 2018

2017
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures - Profiling Attacks without Pre-Processing -.
IACR Cryptol. ePrint Arch., 2017

2016
Kernel Discriminant Analysis for Information Extraction in the Presence of Masking.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Enhancing Dimensionality Reduction Methods for Side-Channel Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Maximal Information Coefficient Analysis.
IACR Cryptol. ePrint Arch., 2014

2013
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2013

Fault Analysis and Evaluation of a True Random Number Generator Embedded in a Processor.
J. Electronic Testing, 2013

2012
A Survey of Differential Fault Analysis Against Classical RSA Implementations.
Proceedings of the Fault Analysis in Cryptography, 2012

2011
Influence of the temperature on true random number generators.
Proceedings of the HOST 2011, 2011

2010
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems.
IACR Cryptol. ePrint Arch., 2010

Public Key Perturbation of Randomized RSA Implementations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Fault Analysis of Rabbit: Toward a Secret Key Leakage.
Proceedings of the Progress in Cryptology, 2009

Fault Analysis of Grain-128.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable.
Proceedings of the Topics in Cryptology, 2009

2008
In(security) Against Fault Injection Attacks for CRT-RSA Implementations.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis.
Proceedings of the Design, Automation and Test in Europe, 2008

Perturbating RSA Public Keys: An Improved Attack.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

An overview of side channel analysis attacks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Novel Approaches for Improving the Power Consumption Models in Correlation Analysis.
IACR Cryptol. ePrint Arch., 2007

2006
A Proposition for Correlation Power Analysis Enhancement.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2005
What do S-boxes Say in Differential Side Channel Attacks?
IACR Cryptol. ePrint Arch., 2005

2000
A PVS Proof Obligation Generator for Lustre Programs.
Proceedings of the Logic for Programming and Automated Reasoning, 2000


  Loading...