Simon Pontié

Orcid: 0000-0002-7193-7576

Affiliations:
  • École des Mines de Saint-Étienne, France


According to our database1, Simon Pontié authored at least 15 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Evaluation of Parameter-Based Attacks Against Embedded Neural Networks with Laser Injection.
Proceedings of the Computer Safety, Reliability, and Security, 2023

Exploration of System-on-Chip Secure-Boot Vulnerability to Fault-Injection by Side-Channel Analysis.
Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2023

Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-Bit Microcontrollers.
Proceedings of the Smart Card Research and Advanced Applications, 2023

2022
SIKE Channels Zero-Value Side-Channel Attacks on SIKE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

SIKE Channels.
IACR Cryptol. ePrint Arch., 2022

Real-Time Frequency Detection to Synchronize Fault Injection on System-on-Chip.
IACR Cryptol. ePrint Arch., 2022

A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters.
Proceedings of the Smart Card Research and Advanced Applications, 2022

Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack.
IACR Cryptol. ePrint Arch., 2021

Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design.
Proceedings of the 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2021

2020
Electromagnetic Fault Injection as a New Forensic Approach for SoCs.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

2016
Dummy operations in scalar multiplication over elliptic curves: A tradeoff between security and performance.
Microprocess. Microsystems, 2016

HLS-Based Methodology for Fast Iterative Development Applied to Elliptic Curve Arithmetic.
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016

2014
An Elliptic Curve Crypto-Processor Secured by Randomized Windows.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

Randomized windows for secure scalar multiplication on elliptic curves.
Proceedings of the IEEE 25th International Conference on Application-Specific Systems, 2014


  Loading...