Olivier Rioul

Orcid: 0000-0002-8681-8916

According to our database1, Olivier Rioul authored at least 104 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Formal Security Proofs via Doeblin Coefficients: Optimal Side-channel Factorization from Noisy Leakage to Random Probing.
IACR Cryptol. ePrint Arch., 2024

What can Information Guess? Guessing Advantage vs. Rényi Entropy for Small Leakages.
CoRR, 2024

2023
The Interplay between Error, Total Variation, Alpha-Entropy and Guessing: Fano and Pinsker Direct and Reverse Inequalities.
Entropy, July, 2023

An information theoretic necessary condition for perfect reconstruction.
CoRR, 2023

Reliability of Ring Oscillator PUFs with Reduced Helper Data.
Proceedings of the Advances in Information and Computer Security, 2023

Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations.
Proceedings of the IEEE Information Theory Workshop, 2023

Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy.
Proceedings of the IEEE International Symposium on Information Theory, 2023

A Historical Perspective on Schützenberger-Pinsker Inequalities.
Proceedings of the Geometric Science of Information - 6th International Conference, 2023

2022
Variations on a Theme by Massey.
IEEE Trans. Inf. Theory, 2022

Side-Channel Expectation-Maximization Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations.
IACR Cryptol. ePrint Arch., 2022

Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings.
IACR Cryptol. ePrint Arch., 2022

A Novel Mixture Model for Characterizing Human Aiming Performance Data.
CoRR, 2022

Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Be My Guess: Guessing Entropy vs. Success Rate for Evaluating Side-Channel Attacks of Secure Chips.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022

Side-Channel Information Leakage of Code-Based Masked Implementations.
Proceedings of the 17th Canadian Workshop on Information Theory, 2022

2021
Designs in Finite Metric Spaces: A Probabilistic Approach.
Graphs Comb., 2021

Tight and Scalable Side-Channel Attack Evaluations through Asymptotically Optimal Massey-like Inequalities on Guessing Entropy.
Entropy, 2021

On Conditional α-Information and its Application to Side-Channel Analysis.
CoRR, 2021

Asymptotically Optimal Massey-Like Inequality on Guessing Entropy With Application to Side-Channel Attack Evaluations.
CoRR, 2021

Linear Programming Bounds on the Kissing Number of q-ary Codes.
Proceedings of the IEEE Information Theory Workshop, 2021

On Conditional Alpha-Information and its Application to Side-Channel Analysis.
Proceedings of the IEEE Information Theory Workshop, 2021

Bent Sequences over Hadamard Codes for Physically Unclonable Functions.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Cumulant Expansion of Mutual Information for Quantifying Leakage of a Protected Secret.
Proceedings of the IEEE International Symposium on Information Theory, 2021

A Primer on Alpha-Information Theory with Application to Leakage in Secrecy Systems.
Proceedings of the Geometric Science of Information - 5th International Conference, 2021

2020
Persistent Fault Analysis With Few Encryptions.
IACR Cryptol. ePrint Arch., 2020

A feedback information-theoretic transmission scheme (FITTS) for modeling trajectory variability in aimed movements.
Biol. Cybern., 2020

Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem.
Adv. Math. Commun., 2020

Rényi Entropy Power and Normal Transport.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

The Big Picture of Delay-PUF Dependability.
Proceedings of the European Conference on Circuit Theory and Design, 2020

How Relevant is Hick's Law for HCI?
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Asymptotic Normality of Q-Ary Linear Codes.
IEEE Commun. Lett., 2019

Best Information is Most Successful.
IACR Cryptol. ePrint Arch., 2019

Transportation Proofs of Rényi Entropy Power Inequalities.
CoRR, 2019

Equality in the Matrix Entropy-Power Inequality and Blind Separation of Real and Complex sources.
Proceedings of the IEEE International Symposium on Information Theory, 2019

An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Regression to a Linear Lower Bound With Outliers: An Exponentially Modified Gaussian Noise Model.
Proceedings of the 27th European Signal Processing Conference, 2019

Entropy Estimation of Physically Unclonable Functions via Chow Parameters.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

2018
Speed-Accuracy Tradeoff: A Formal Information-Theoretic Transmission Scheme (FITTS).
ACM Trans. Comput. Hum. Interact., 2018

Uniformly Projected RCQD QAM: A Low-Complexity Signal Space Diversity Solution Over Fading Channels With or Without Erasures.
IEEE Trans. Broadcast., 2018

Rényi Entropy Power Inequalities via Normal Transport and Rotation.
Entropy, 2018

A Feedback Information-Theoretic Transmission Scheme (FITTS) for Modelling Aimed Movements.
CoRR, 2018

On the optimality and practicability of mutual information analysis in some scenarios.
Cryptogr. Commun., 2018

Information-Theoretic Analysis of the Speed-Accuracy Tradeoff with Feedback.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

An Improved Analysis of Reliability and Entropy for Delay PUFs.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018

Confused yet Successful: - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

BIGFile: Bayesian Information Gain for Fast File Retrieval.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

The Perils of Confounding Factors: How Fitts' Law Experiments can Lead to False Conclusions.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Yet Another Proof of the Entropy Power Inequality.
IEEE Trans. Inf. Theory, 2017

Stochastic Collision Attack.
IEEE Trans. Inf. Forensics Secur., 2017

Optimal side-channel attacks for multivariate leakages and multiple models.
J. Cryptogr. Eng., 2017

Optimal Transport to the Entropy-Power Inequality and a Reverse Inequality.
CoRR, 2017

Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Optimal transportation to the entropy-power inequality.
Proceedings of the 2017 Information Theory and Applications Workshop, 2017

Information-Theoretic Analysis of Human Performance for Command Selection.
Proceedings of the Human-Computer Interaction - INTERACT 2017, 2017

One Fitts' Law, Two Metrics.
Proceedings of the Human-Computer Interaction - INTERACT 2017, 2017

At every corner : Determining corner points of two-user Gaussian interference channels.
Proceedings of the IEEE International Conference on Communications, 2017

Optimal Transport to Rényi Entropies.
Proceedings of the Geometric Science of Information - Third International Conference, 2017

BIGnav: Bayesian Information Gain for Guiding Multiscale Navigation.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

<i>To Miss is Human</i>: Information-Theoretic Rationale for Target Misses in Fitts' Law.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Codes for Side-Channel Attacks and Protections.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
A Key to Success - Success Exponents for Side-Channel Distinguishers.
IACR Cryptol. ePrint Arch., 2016

Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version.
IACR Cryptol. ePrint Arch., 2016

Less is More - Dimensionality Reduction from a Theoretical Perspective.
IACR Cryptol. ePrint Arch., 2016

Time-Frequency Analysis for Second-Order Attacks.
IACR Cryptol. ePrint Arch., 2016

On some almost properties.
Proceedings of the 2016 Information Theory and Applications Workshop, 2016

On the entropy of Physically Unclonable Functions.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Inter-class vs. mutual information as side-channel distinguishers.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks.
Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, 2016

Correlated Extra-Reductions Defeat Blinded Regular Exponentiation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Masks will Fall Off - Higher-Order Optimal Distinguishers.
IACR Cryptol. ePrint Arch., 2015

Almost there corner points of Gaussian interference channels.
Proceedings of the 2015 Information Theory and Applications Workshop, 2015

Glass+Skin: An Empirical Evaluation of the Added Value of Finger Identification to Basic Single-Touch Interaction on Touch Screens.
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015

A low-complexity 2D signal space diversity solution for future broadcasting systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A mathematical description of the speed/accuracy trade-off of aimed movement.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

2014
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms.
IACR Cryptol. ePrint Arch., 2014

Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory.
IACR Cryptol. ePrint Arch., 2014

A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2014

On Shannon's Formula and Hartley's Rule: Beyond the Mathematical Coincidence.
Entropy, 2014

2013
The Power Model of Fitts' Law Does Not Encompass the Logarithmic Model.
Electron. Notes Discret. Math., 2013

Robust relay beamforming for MIMO multi-relay networks with imperfect channel estimation.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Comparison between Side-Channel Analysis Distinguishers.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A new test of throughput invariance in Fitts' law: role of the intercept and of Jensen's inequality.
Proceedings of the BCS-HCI '12 Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, 2012

2011
Information Theoretic Proofs of Entropy Power Inequalities.
IEEE Trans. Inf. Theory, 2011

2009
Contributions aux théories des ondelettes, du codage conjoint source-canal et de l'information.
, 2009

2007
A Simple Proof of the Entropy-Power Inequality via Properties of Mutual Information.
Proceedings of the IEEE International Symposium on Information Theory, 2007

2005
Linear scalar quantization of wavelet image decomposition using joint optimization.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

2001
Joint source-channel coding using structured oversampled filters banks applied to image transmission.
Proceedings of the IEEE International Conference on Acoustics, 2001

2000
Real BCH codes as joint source channel codes for satellite images coding.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

Spectral interpolation coder for impulse noise cancellation over a binary symetric channel.
Proceedings of the 10th European Signal Processing Conference, 2000

1998
Image coding with an L<sup>infinity</sup> norm and confidence interval criteria.
IEEE Trans. Image Process., 1998

1994
L infinity -Coding of Images: A Confidence Interval Criterion.
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994

Border recovery for subband processing of finite-length signals. Application to time-varying filter banks.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

1993
Regular wavelets: a discrete-time approach.
IEEE Trans. Signal Process., 1993

A discrete-time multiresolution theory.
IEEE Trans. Signal Process., 1993

On the choice of 'wavelet' filter for still image compression.
Proceedings of the IEEE International Conference on Acoustics, 1993

Wavelet regularity of iterated filter banks with rational sampling changes.
Proceedings of the IEEE International Conference on Acoustics, 1993

1992
Time-scale energy distributions: a general class extending wavelet transforms.
IEEE Trans. Signal Process., 1992

Fast algorithms for discrete and continuous wavelet transforms.
IEEE Trans. Inf. Theory, 1992

1991
Wavelets and signal processing.
IEEE Signal Process. Mag., 1991

Fast algorithms for the continuous wavelet transform.
Proceedings of the 1991 International Conference on Acoustics, 1991

1990
Affine smoothing of the Wigner-Ville distribution.
Proceedings of the 1990 International Conference on Acoustics, 1990


  Loading...