Maxime Lecomte

Orcid: 0000-0002-9985-7586

According to our database1, Maxime Lecomte authored at least 21 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Approche hybride de modélisation explicable du métabolisme des écosystèmes microbiens. (Hybrid approach for explainable metabolic modelling of microbial ecosystems).
PhD thesis, 2024

A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms.
IACR Cryptol. ePrint Arch., 2024

Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA.
IACR Cryptol. ePrint Arch., 2024

Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

2023
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs.
J. Cryptol., October, 2023

Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Side-channel disassembly on a System-on-Chip: A practical feasibility study.
Microprocess. Microsystems, 2023

Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses.
IACR Cryptol. ePrint Arch., 2023

2022
Don’t Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking.
IACR Cryptol. ePrint Arch., 2022

The EVIL Machine: Encode, Visualize and Interpret the Leakage.
IACR Cryptol. ePrint Arch., 2022

Fit The Joint Moments.
IACR Cryptol. ePrint Arch., 2022

Fit the Joint Moments: How to Attack Any Masking Scheme.
IEEE Access, 2022

Towards Fine-grained Side-Channel Instruction Disassembly on a System-on-Chip.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022

2020
Template Attacks against ECC: practical implementation against Curve25519.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

Leakage Assessment Through Neural Estimation of the Mutual Information.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
A Bit-Level Approach to Side Channel Based Disassembling.
Proceedings of the Smart Card Research and Advanced Applications, 2019

2017
An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification.
IEEE Trans. Very Large Scale Integr. Syst., 2017

2016
Granularity and detection capability of an adaptive embedded Hardware Trojan detection system.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

On-chip fingerprinting of IC topology for integrity verification.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

2015
Extraction of intrinsic structure for Hardware Trojan detection.
IACR Cryptol. ePrint Arch., 2015

Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2015


  Loading...