Laurent Sauvage

Orcid: 0000-0002-6940-6856

According to our database1, Laurent Sauvage authored at least 37 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Quasi-linear Masking to Protect Kyber against both SCA and FIA.
IACR Cryptol. ePrint Arch., 2023

Investigating Efficient Deep Learning Architectures For Side-Channel Attacks on AES.
CoRR, 2023

High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

A Tale of Two Models: Discussing the Timing and Sampling EM Fault Injection Models.
Proceedings of the Workshop on Fault Detection and Tolerance in Cryptography, 2023

Highlighting Two EM Fault Models While Analyzing a Digital Sensor Limitations.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

2021
Formal Evaluation and Construction of Glitch-resistant Masked Functions.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

2020
Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller Instruction Buffer.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2020

2019
Cache-Timing Attacks Still Threaten IoT Devices.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

2017
Multi-level formal verification - A new approach against fault injection attack.
J. Cryptogr. Eng., 2017

How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace.
IACR Cryptol. ePrint Arch., 2017

2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Differential Fault Analysis on Midori.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures.
IACR Cryptol. ePrint Arch., 2015

2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014

Hardware Trojan Horses in Cryptographic IP Cores.
IACR Cryptol. ePrint Arch., 2014

A Pre-processing Composition for Secret Key Recovery on Android Smartphone.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

2012
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography.
Int. J. Reconfigurable Comput., 2012

A Small and High-Performance Coprocessor for Fingerprint Match-on-Card.
Proceedings of the 15th Euromicro Conference on Digital System Design, 2012

2011
Performance evaluation of protocols resilient to physical attacks.
Proceedings of the HOST 2011, 2011

2010
Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics.
IEEE Trans. Computers, 2010

Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics.
Int. J. Reconfigurable Comput., 2010

Cross-Correlation Cartography.
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010

Defeating Any Secret Cryptography with SCARE Attacks.
Proceedings of the Progress in Cryptology, 2010

Fault Injection Resilience.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010

Far Correlation-based EMA with a precharacterized leakage model.
Proceedings of the Design, Automation and Test in Europe, 2010

Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks.
Proceedings of the Topics in Cryptology, 2010

2009
Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module.
ACM Trans. Reconfigurable Technol. Syst., 2009

DPL on Stratix II FPGA: What to Expect?.
Proceedings of the ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, 2009

Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow.
Proceedings of the ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, 2009

Updates on the potential of clock-less logics to strengthen cryptographic circuits against side-channel attacks.
Proceedings of the 16th IEEE International Conference on Electronics, 2009

Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints.
Proceedings of the Design, Automation and Test in Europe, 2009

2008
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks.
IEEE Trans. Computers, 2008

Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008

Place-and-Route Impact on the Security of DPL Designs in FPGAs.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

Area optimization of cryptographic co-processors implemented in dual-rail with precharge positive logic.
Proceedings of the FPL 2008, 2008

Silicon-level Solutions to Counteract Passive and Active Attacks.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008


  Loading...