Youssef Souissi

According to our database1, Youssef Souissi authored at least 24 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Formal Evaluation and Construction of Glitch-resistant Masked Functions.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

2020
Side-Channel Evaluation Methodology on Software.
Cryptogr., 2020

2019
Cache-Timing Attack Detection and Prevention - Application to Crypto Libs and PQC.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

Cache-Timing Attacks Still Threaten IoT Devices.
Proceedings of the Codes, Cryptology and Information Security, 2019

Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

Technology-agnostic power optimization for AES block cipher.
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018

2017
Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
A Pre-processing Composition for Secret Key Recovery on Android Smartphone.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

High-order timing attacks.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

2013
Software Camouflage.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2012
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Wavelet transform based pre-processing for side channel analysis.
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012

RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

Towards Different Flavors of Combined Side Channel Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Optimization methods for side channel attacks. (Méthodes optimisant l'analyse des cryptoprocesseurs sur les canaux cachés).
PhD thesis, 2011

"Re-synchronization by moments": An efficient solution to align Side-Channel traces.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Efficient Dual-Rail Implementations in FPGA Using Block RAMs.
Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs, 2011

"Rank Correction": A New Side-Channel Approach for Secret Key Recovery.
Proceedings of the Security Aspects in Information Technology, 2011

Embedded systems security: An evaluation methodology against Side Channel Attacks.
Proceedings of the 2011 Conference on Design and Architectures for Signal and Image Processing, 2011

2010
First Principal Components Analysis: A New Side Channel Distinguisher.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Improvement of power analysis attacks using Kalman filter.
Proceedings of the IEEE International Conference on Acoustics, 2010


  Loading...