Christophe Clavier

Orcid: 0000-0002-0767-3684

According to our database1, Christophe Clavier authored at least 44 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Study of Soft Analytical Side-Channel Attacks on Secure Hash Algorithms.
IACR Cryptol. ePrint Arch., 2024

Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

2023
Side-channel disassembly on a System-on-Chip: A practical feasibility study.
Microprocess. Microsystems, 2023

Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses.
IACR Cryptol. ePrint Arch., 2023

2022
Blind Side Channel on the Elephant LFSR.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Blind Side Channel Analysis on the Elephant LFSR Extended Version.
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022

Towards Fine-grained Side-Channel Instruction Disassembly on a System-on-Chip.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022

2019
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm.
IACR Cryptol. ePrint Arch., 2019

Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes.
IACR Cryptol. ePrint Arch., 2019

2018
Quadrivariate Improved Blind Side-Channel Analysis on Boolean Masked AES.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2017
SCATTER : A New Dimension in Side-Channel.
IACR Cryptol. ePrint Arch., 2017

Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard.
Proceedings of the New Codebreakers, 2016

2015
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule.
IACR Cryptol. ePrint Arch., 2015

Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks.
Cryptogr. Commun., 2015

2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014

Simple Power Analysis on AES Key Expansion Revisited.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault Analysis.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013

Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Attacking Block Ciphers.
Proceedings of the Fault Analysis in Cryptography, 2012

Generating Provable Primes Efficiently on Embedded Devices.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

ROSETTA for Single Trace Analysis.
Proceedings of the Progress in Cryptology, 2012

2011
Square Always Exponentiation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Improved Collision-Correlation Power Analysis on First Order Protected AES.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Horizontal Correlation Analysis on Exponentiation.
IACR Cryptol. ePrint Arch., 2010

Passive and Active Combined Attacks on AES???Combining Fault Attacks and Side Channel Analysis.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010

New Families of ECM Curves for Cunningham Numbers.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010

2009
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptol. ePrint Arch., 2009

2008
How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Proceedings of the Provable Security, Second International Conference, 2008

Fault Analysis Study of IDEA.
Proceedings of the Topics in Cryptology, 2008

2007
De la sécurité physique des crypto-systèmes embarqués. (On physical security of embedded systems).
PhD thesis, 2007

An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm.
Proceedings of the Information Systems Security, Third International Conference, 2007

On the Implementation of a Fast Prime Generation Algorithm.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

Secret External Encodings Do Not Prevent Transient Fault Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors.
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006

Fault Analysis of DPA-Resistant Algorithms.
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006

Why One Should Also Secure RSA Public Key Elements.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2004
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm.
IACR Cryptol. ePrint Arch., 2004

Correlation Power Analysis with a Leakage Model.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003
Optimal Statistical Power Analysis.
IACR Cryptol. ePrint Arch., 2003

2001
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding.
Proceedings of the Advances in Cryptology, 2001

Universal Exponentiation Algorithm.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
Differential Power Analysis in the Presence of Hardware Countermeasures.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000


  Loading...