1. Constructive side-channel analysis and secure design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers /: 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers. ([2017]) Editors: Guilley, Sylvain Other Names: COSADE (Workshop), 8th Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Information security applications : 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised selected papers /: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised selected papers. (2017) Editors: Choi, Dooho; Guilley, Sylvain Other Names: WISA (Workshop : Information security), 16th Record Type: Book Extent: 1 online resource (xi, 398 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets. (28th September 2015) Authors: DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain Other Names: Nagata Makoto Academic Editor. Journal: TheScientificWorldjournal Issue: Volume 2015(2015) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography. (5th April 2012) Authors: Sauvage, Laurent; Guilley, Sylvain; Flament, Florent; Danger, Jean-Luc; Mathieu, Yves Other Names: Gaj Kris Academic Editor. Journal: International journal of reconfigurable computing Issue: Volume 2012(2012) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics. (12th October 2010) Authors: Sauvage, Laurent; Nassar, Maxime; Guilley, Sylvain; Flament, Florent; Danger, Jean-Luc; Mathieu, Yves Other Names: Torres Lionel Academic Editor. Journal: International journal of reconfigurable computing Issue: Volume 2010(2010) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Implementation flaws in the masking scheme of DPA Contest v4. (1st November 2017) Authors: Veshchikov, Nikita; Guilley, Sylvain Journal: IET information security Issue: Volume 11:Number 6(2017) Page Start: 356 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗