Nicolas Veyrat-Charvillon
Nicolas Veyrat-Charvillon
Ubisoft Annecy
Verified email at
Cited by
Cited by
Mutual information analysis: a comprehensive study
L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ...
Journal of Cryptology 24 (2), 269-291, 2011
A formal study of power variability issues and side-channel attacks for nanoscale devices
M Renauld, FX Standaert, N Veyrat-Charvillon, D Kamel, D Flandre
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
Shuffling against side-channel attacks: A comprehensive study with cautionary note
N Veyrat-Charvillon, M Medwed, S Kerckhof, FX Standaert
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
Mutual information analysis: how, when and why?
N Veyrat-Charvillon, FX Standaert
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
Algebraic side-channel attacks on the AES: Why time also matters in DPA
M Renauld, FX Standaert, N Veyrat-Charvillon
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.
N Veyrat-Charvillon, B Gérard, M Renauld, FX Standaert
Selected Areas in Cryptography 7707, 390-406, 2012
Security Evaluations beyond Computing Power: How to Analyze Side-Channel Attacks You Cannot Mount?
N Veyrat-Charvillon, B Gérard, FX Standaert
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
Soft analytical side-channel attacks
N Veyrat-Charvillon, B Gérard, FX Standaert
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
How to certify the leakage of a chip?
F Durvaux, FX Standaert, N Veyrat-Charvillon
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
Compact FPGA Implementations of the Five SHA-3 Finalists.
S Kerckhof, F Durvaux, N Veyrat-Charvillon, F Regazzoni, ...
Cardis 7079, 217-233, 2011
Multi-mode operator for SHA-2 hash functions
R Glabb, L Imbert, G Jullien, A Tisserand, N Veyrat-Charvillon
Journal of Systems Architecture 53 (2-3), 127-138, 2007
Generic side-channel distinguishers: Improvements and limitations
N Veyrat-Charvillon, FX Standaert
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
Efficient removal of random delays from embedded software implementations using hidden markov models
F Durvaux, M Renauld, FX Standaert, L Van Oldeneel Tot Oldenzeel, ...
Smart Card Research and Advanced Applications: 11th International Conference …, 2013
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4, 259-274, 2014
Efficient selection of time samples for higher-order DPA with projection pursuits
F Durvaux, FX Standaert, N Veyrat-Charvillon, JB Mairy, Y Deville
Constructive Side-Channel Analysis and Secure Design: 6th International …, 2015
Adaptive Chosen-Message Side-Channel Attacks.
N Veyrat-Charvillon, FX Standaert
ACNS 6123, 186-199, 2010
Improving the Rules of the DPA Contest
FX Standaert, P Bulens, G de Meulenaer, N Veyrat-Charvillon
Cryptology EPrint Archive, 2008
Carry prediction and selection for truncated multiplication
R Michard, A Tisserand, N Veyrat-Charvillon
2006 IEEE Workshop on Signal Processing Systems Design and Implementation …, 2006
Cryptanalysis of the ches 2009/2010 random delay countermeasure
F Durvaux, M Renauld, FX Standaert, LO tot Oldenzeel, ...
Cryptology ePrint Archive, 2012
The system can't perform the operation now. Try again later.
Articles 1–20