Yannick Teglia

According to our database1, Yannick Teglia authored at least 26 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems.
IEEE Access, 2024

2022
CVA6's Data cache: Structure and Behavior.
CoRR, 2022

Recovering Information on the CVA6 RISC-V CPU with a Baremetal Micro-Architectural Covert Channel.
Proceedings of the 28th IEEE International Symposium on On-Line Testing and Robust System Design, 2022

2021
FaultLine: Software-Based Fault Injection on Memory Transfers.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

2020
SideLine: How Delay-Lines (May) Leak Secrets from your SoC.
IACR Cryptol. ePrint Arch., 2020

2019
High-Speed Ring Oscillator based Sensors for Remote Side-Channel Attacks on FPGAs.
Proceedings of the 2019 International Conference on ReConFigurable Computing and FPGAs, 2019

Remote Side-Channel Attacks on Heterogeneous SoC.
Proceedings of the Smart Card Research and Advanced Applications, 2019

2018
Multivariate High-Order Attacks of Shuffled Tables Recomputation.
J. Cryptol., 2018

2017
Mutual information analysis: higher-order statistical moments, efficiency and efficacy.
J. Cryptogr. Eng., 2017

2016
Taking into account indirect jumps or calls in continuous control-flow checking.
Proceedings of the 11th International Design & Test Symposium, 2016

Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Multi-Variate High-Order Attacks of Shuffled Tables Recomputation.
IACR Cryptol. ePrint Arch., 2015

Interest of MIA in frequency domain?
Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, 2015

2014
A model of the leakage in the frequency domain and its application to CPA and DPA.
J. Cryptogr. Eng., 2014

Boosting Higher-Order Correlation Attacks by Dimensionality Reduction.
IACR Cryptol. ePrint Arch., 2014

A frequency leakage model for SCA.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

On the assumption of mutual independence of jitter realizations in P-TRNG stochastic models.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

On Adaptive Bandwidth Selection for Efficient MIA.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
A Frequency Leakage Model and its application to CPA and DPA.
IACR Cryptol. ePrint Arch., 2013

2011
Shape analysis for power signal cryptanalysis on secure components.
J. Syst. Softw., 2011

Information Leakage Discovery Techniques to Enhance Secure Chip Design.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

2010
Improving first order differential power attacks through digital signal processing.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Random Euclidean Addition Chain Generation and Its Application to Point Multiplication.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2006
On Statistical Testing of Random Numbers Generators.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Reverse Engineering of Embedded Software Using Syntactic Pattern Recognition.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

2004
Leak Resistant Arithmetic.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004


  Loading...