Follow
Alexandre VENELLI
Title
Cited by
Cited by
Year
Methodology for efficient CNN architectures in profiling attacks
G Zaid, L Bossuet, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (1), 1-36, 2020
1192020
Deep learning to evaluate secure RSA implementations
M Carbone, V Conin, MA Cornelie, F Dassance, G Dufresne, C Dumas, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 132-161, 2019
742019
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic
RR Goundar, M Joye, A Miyaji, M Rivain, A Venelli
Journal of cryptographic engineering 1 (2), 161-176, 2011
612011
Side-channel analysis on blinded regular scalar multiplications
B Feix, M Roussellet, A Venelli
International Conference on Cryptology in India, 3-20, 2014
422014
Redundant modular reduction algorithms
V Dupaquis, A Venelli
International Conference on Smart Card Research and Advanced Applications …, 2011
392011
Efficient entropy estimation for mutual information analysis using B-splines
A Venelli
IFIP International Workshop on Information Security Theory and Practices, 17-30, 2010
362010
Combined fault and side-channel attacks on the AES key schedule
F Dassance, A Venelli
2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 63-71, 2012
332012
Ranking loss: Maximizing the success rate in deep learning side-channel analysis
G Zaid, L Bossuet, F Dassance, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 25-55, 2021
242021
Fast scalar multiplication for elliptic curve cryptosystems over prime fields
A Venelli, F Dassance
US Patent 8,369,517, 2013
242013
AES side-channel countermeasure using random tower field constructions
A Bonnecaze, P Liardet, A Venelli
Designs, codes and cryptography 69 (3), 331-349, 2013
222013
Faster side-channel resistant elliptic curve scalar multiplication
A Venelli, F Dassance
Contemporary mathematics 521, 29-40, 2010
192010
Defeating with fault injection a combined attack resistant exponentiation
B Feix, A Venelli
International Workshop on Constructive Side-Channel Analysis and Secure …, 2013
122013
Understanding methodology for efficient CNN architectures in profiling attacks
G Zaid, L Bossuet, A Habrard, A Venelli
Cryptology ePrint Archive, 2020
52020
Efficiency through diversity in ensemble models applied to side-channel attacks:–a case study on public-key algorithms–
G Zaid, L Bossuet, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 60-96, 2021
42021
Analysis of nonparametric estimation methods for mutual information analysis
A Venelli
International Conference on Information Security and Cryptology, 1-15, 2010
42010
Contribution à la sécurité physique des cryptosystemes embarqués
A VENELLI
32011
Method for backing up data outside a secure microcircuit
V Dupaquis, A Venelli
US Patent App. 14/396,428, 2015
22015
Conditional Variational AutoEncoder based on Stochastic Attack
G Zaid, L Bossuet, M Carbone, A Habrard, A Venelli
Cryptology ePrint Archive, 2022
12022
Efficient entropy estimation for mutual information analysis
A Venelli, V Dupaquis
TSI-Technique et Science Informatiques 30 (10), 1217, 2011
12011
Side-Channel Resistant Scalar Multiplication Algorithms over Finite Fields
A Venelli, F Dassance
5th Conf. on Network Architectures and Information Systems Security, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20