Follow
Christophe Giraud
Christophe Giraud
Cryptography and Product Security Group Manager at IDEMIA
Verified email at idemia.com
Title
Cited by
Cited by
Year
An implementation of DES and AES, secure against some attacks
ML Akkar, C Giraud
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
8272001
Dfa on aes
C Giraud
Advanced Encryption Standard–AES: 4th International Conference, AES 2004 …, 2005
5052005
A survey on fault attacks
C Giraud, H Thiebeauld
Smart Card Research and Advanced Applications VI: IFIP 18th World Computer …, 2004
1822004
An RSA implementation resistant to fault attacks and to simple power analysis
C Giraud
IEEE Transactions on computers 55 (9), 1116-1120, 2006
1732006
Parallel scalar multiplication on general elliptic curves over hedged against Non-Differential Side-Channel Attacks
W Fischer, C Giraud, EW Knudsen, JP Seifert
Cryptology ePrint Archive, 2002
1212002
Conversion of security proofs from one leakage model to another: A new issue
JS Coron, C Giraud, E Prouff, S Renner, M Rivain, PK Vadnala
Constructive Side-Channel Analysis and Secure Design: Third International …, 2012
712012
ROSETTA for single trace analysis: Recovery of secret exponent by triangular trace analysis
C Clavier, B Feix, G Gagnerot, C Giraud, M Roussellet, V Verneuil
Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012
682012
Fault analysis of infective AES computations
A Battistello, C Giraud
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 101-107, 2013
592013
Fault resistant RSA implementation
C Giraud
Fault Diagnosis and Tolerance in Cryptography, 142-151, 2005
562005
Atomicity improvement for elliptic curve scalar multiplication
C Giraud, V Verneuil
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
532010
On second-order fault analysis resistance for CRT-RSA implementations
E Dottax, C Giraud, M Rivain, Y Sierra
Information Security Theory and Practice. Smart Devices, Pervasive Systems …, 2009
442009
Fault attacks on signature schemes
C Giraud, EW Knudsen
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
432004
Fault attacks and countermeasures on Vigilant's RSA-CRT algorithm
JS Coron, C Giraud, N Morin, G Piret, D Vigilant
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 89-96, 2010
382010
Provably secure S-box implementation based on Fourier transform
E Prouff, C Giraud, S Aumônier
Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006
352006
A systematic appraisal of side channel evaluation strategies
M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ...
Security Standardisation Research: 6th International Conference, SSR 2020 …, 2020
322020
Piret and Quisquater's DFA on AES Revisited
C Giraud, A Thillard
Cryptology ePrint Archive, 2010
262010
Securing AES implementation against fault attacks
L Genelle, C Giraud, E Prouff
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 51-62, 2009
232009
Attack and improvement of a secure S-box calculation based on the Fourier transform
JS Coron, C Giraud, E Prouff, M Rivain
Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008
232008
A note on the security of CHES 2014 symmetric infective countermeasure
A Battistello, C Giraud
Constructive Side-Channel Analysis and Secure Design: 7th International …, 2016
202016
Secure data processing method based particularly on a cryptographic algorithm
R Bevan, C Giraud, HT De La Crouee
US Patent 8,386,791, 2013
162013
The system can't perform the operation now. Try again later.
Articles 1–20