An implementation of DES and AES, secure against some attacks ML Akkar, C Giraud Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001 | 880 | 2001 |
Dfa on aes C Giraud Advanced Encryption Standard–AES: 4th International Conference, AES 2004 …, 2005 | 534 | 2005 |
A survey on fault attacks C Giraud, H Thiebeauld Smart Card Research and Advanced Applications VI: IFIP 18th World Computer …, 2004 | 189 | 2004 |
An RSA implementation resistant to fault attacks and to simple power analysis C Giraud IEEE Transactions on computers 55 (9), 1116-1120, 2006 | 181 | 2006 |
Parallel scalar multiplication on general elliptic curves over hedged against Non-Differential Side-Channel Attacks W Fischer, C Giraud, EW Knudsen, JP Seifert Cryptology ePrint Archive, 2002 | 124 | 2002 |
Conversion of security proofs from one leakage model to another: A new issue JS Coron, C Giraud, E Prouff, S Renner, M Rivain, PK Vadnala International Workshop on Constructive Side-Channel Analysis and Secure …, 2012 | 86 | 2012 |
ROSETTA for single trace analysis: Recovery of secret exponent by triangular trace analysis C Clavier, B Feix, G Gagnerot, C Giraud, M Roussellet, V Verneuil Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012 | 68 | 2012 |
Fault analysis of infective AES computations A Battistello, C Giraud 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 101-107, 2013 | 64 | 2013 |
Atomicity improvement for elliptic curve scalar multiplication C Giraud, V Verneuil Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010 | 58 | 2010 |
Fault resistant RSA implementation C Giraud Fault Diagnosis and Tolerance in Cryptography, 142-151, 2005 | 55 | 2005 |
A systematic appraisal of side channel evaluation strategies M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ... Security Standardisation Research: 6th International Conference, SSR 2020 …, 2020 | 47 | 2020 |
Fault attacks on signature schemes C Giraud, EW Knudsen Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004 | 47 | 2004 |
On second-order fault analysis resistance for CRT-RSA implementations E Dottax, C Giraud, M Rivain, Y Sierra Information Security Theory and Practice. Smart Devices, Pervasive Systems …, 2009 | 44 | 2009 |
Fault attacks and countermeasures on Vigilant's RSA-CRT algorithm JS Coron, C Giraud, N Morin, G Piret, D Vigilant 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 89-96, 2010 | 36 | 2010 |
Provably secure S-box implementation based on Fourier transform E Prouff, C Giraud, S Aumônier Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006 | 34 | 2006 |
Piret and Quisquater's DFA on AES Revisited C Giraud, A Thillard Cryptology ePrint Archive, 2010 | 30 | 2010 |
A note on the security of CHES 2014 symmetric infective countermeasure A Battistello, C Giraud Constructive Side-Channel Analysis and Secure Design: 7th International …, 2016 | 23 | 2016 |
Securing AES implementation against fault attacks L Genelle, C Giraud, E Prouff 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 51-62, 2009 | 22 | 2009 |
Attack and improvement of a secure S-box calculation based on the Fourier transform JS Coron, C Giraud, E Prouff, M Rivain Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008 | 22 | 2008 |
Embedded eavesdropping on java card G Barbu, C Giraud, V Guerin Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 17 | 2012 |