Benoît Gérard
Orcid: 0000-0002-0598-2387
According to our database1,
Benoît Gérard
authored at least 34 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
BIKE Key-Recovery: Combining Power Consumption Analysis and Information-Set Decoding.
Proceedings of the Applied Cryptography and Network Security, 2023
2021
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021
Proceedings of the Smart Card Research and Advanced Applications, 2021
2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
IEEE Trans. Computers, 2018
2017
Side-Channel Attacks on BLISS Lattice-Based Signatures - Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers.
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 22nd IEEE Symposium on Computer Arithmetic, 2015
2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version.
J. Cryptogr. Eng., 2013
IACR Cryptol. ePrint Arch., 2013
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013
Proceedings of the Advances in Cryptology, 2013
2012
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012
Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Accurate estimates of the data complexity and success probability for various cryptanalyses.
Des. Codes Cryptogr., 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
2010
Cryptanalyses statistiques des algorithmes de chiffrement à clef secrète. (Statistical cryptanalyses of symmetric-key algorithms).
PhD thesis, 2010
Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT.
IACR Cryptol. ePrint Arch., 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009