Christophe Giraud

Orcid: 0000-0003-4414-1852

Affiliations:
  • IDEMIA, Pessac, France


According to our database1, Christophe Giraud authored at least 34 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
All Shall FA-LLL: Breaking CT-RSA 2022 and CHES 2022 Infective Countermeasures with Lattice-Based Fault Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

2022
ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest.
IACR Cryptol. ePrint Arch., 2022

2021
A High-Order Infective Countermeasure Framework.
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021

White-Box ECDSA: Challenges and Existing Solutions.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021

2020
A Systematic Appraisal of Side Channel Evaluation Strategies.
IACR Cryptol. ePrint Arch., 2020

2016
A Note on the Security of CHES 2014 Symmetric Infective Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

2015
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure.
IACR Cryptol. ePrint Arch., 2015

Lost in Translation: Fault Analysis of Infective Security Proofs.
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015

2014
New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public?
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Fault Analysis of Infective AES Computations.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013

2012
Differential Fault Analysis of the Advanced Encryption Standard.
Proceedings of the Fault Analysis in Cryptography, 2012

Embedded Eavesdropping on Java Card.
Proceedings of the Information Security and Privacy Research, 2012

ROSETTA for Single Trace Analysis.
Proceedings of the Progress in Cryptology, 2012

Conversion of Security Proofs from One Leakage Model to Another: A New Issue.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Dynamic Fault Injection Countermeasure - A New Conception of Java Card Security.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2010
Piret and Quisquater's DFA on AES Revisited.
IACR Cryptol. ePrint Arch., 2010

Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010

Atomicity Improvement for Elliptic Curve Scalar Multiplication.
Proceedings of the Smart Card Research and Advanced Application, 2010

Improved Fault Analysis of Signature Schemes.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.
IACR Cryptol. ePrint Arch., 2009

Securing AES Implementation against Fault Attacks.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

2008
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2006
An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis.
IEEE Trans. Computers, 2006

Enhanced Security Architecture for Music Distribution on Mobile.
Proceedings of the Computer Security, 2006

Provably Secure S-Box Implementation Based on Fourier Transform.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2004
Transient Fault Induction Attacks on XTR.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

A Survey on Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

Fault Attacks on Signature Schemes.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
DFA on AES.
IACR Cryptol. ePrint Arch., 2003

2002
Parallel scalar multiplication on general elliptic curves over F<sub>p</sub> hedged against Non-Differential Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2002

2001
An Implementation of DES and AES, Secure against Some Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001


  Loading...