Edit Profile Guilley, Sylvain Compute Distance To: Compute Author ID: guilley.sylvain Published as: Guilley, Sylvain Documents Indexed: 51 Publications since 2008, including 3 Books all top 5 Co-Authors 1 single-authored 19 Danger, Jean-Luc 12 Heuser, Annelie 11 Rioul, Olivier 8 Bruneau, Nicolas 8 Carlet, Claude 6 Bhasin, Shivam 5 Najm, Zakaria 5 Sauvage, Laurent 4 Facon, Adrien 4 Maghrebi, Houssem 4 Souissi, Youssef 4 Teglia, Yannick 3 Flament, Florent 3 Hoogvorst, Philippe 3 Mukhopadhyay, Debdeep 3 Naccache, David 3 Nassar, Maxime 2 de Chérisey, Éloi 2 Kim, Jon-Lark 2 Mathieu, Yves 2 Murdica, Cédric 2 Pacalet, Renaud 2 Réal, Denis 2 Schaub, Alexander 2 Solé, Patrick 2 Valette, Frédéric 1 Bajaj, Gaurav 1 Bertoni, Guido Marco 1 Boutros, Joseph Jean 1 Chaudhuri, Sumanta 1 Chee, Yeow Meng 1 Cherif, Zouha 1 Christen, Charles 1 Dong, Xiaofei 1 Dugardin, Margaux 1 El Assad, Safwan 1 Elaabid, M. Abdelaziz 1 Ferradi, Houda 1 Fouque, Pierre-Alain 1 Freibert, Finley 1 Gautier, Guillaume 1 Géraud, Rémi 1 Gierlichs, Benedikt 1 Graba, Tarik 1 Hajra, Suvadeep 1 He, Wei 1 Karimi, Naghmeh 1 Kiah, Han Mao 1 Kiermaier, Michael 1 Liu, Zhe 1 Lozac’h, Florent 1 Marion, Damien 1 Mentens, Nele 1 Meynard, Olivier 1 Micolod, Julien 1 Moradi, Amir 1 Ngo, Xuan Thuy 1 Nguyen, Robert 1 Nitaj, Abderrahmane 1 Patranabis, Sikhar 1 Picek, Stjepan 1 Porteboeuf, Thibault 1 Praden, Florian 1 Prouff, Emmanuel 1 Rebeiro, Chester 1 Ren, Kui 1 Roy, Debapriya Basu 1 Sharma, Sahil 1 Souidi, El Mamoun 1 Standaert, Francois-Xavier 1 Takarabt, Sofiane 1 Tibouchi, Mehdi 1 Timbert, Michaël 1 Vong, Vinh-Nga 1 Yang, Bolin 1 Zhang, Fan 1 Zhang, Fangguo 1 Zhang, Xiande all top 5 Serials 6 IEEE Transactions on Computers 3 Lecture Notes in Computer Science 2 IEEE Transactions on Information Theory 2 Journal of Mathematical Cryptology 2 Advances in Mathematics of Communications 2 Cryptography and Communications 1 Journal of Cryptology all top 5 Fields 45 Information and communication theory, circuits (94-XX) 11 Computer science (68-XX) 3 General and overarching topics; collections (00-XX) 3 Statistics (62-XX) 2 Algebraic geometry (14-XX) 1 Number theory (11-XX) 1 Probability theory and stochastic processes (60-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 27 Publications have been cited 111 times in 81 Documents Cited by ▼ Year ▼ Complementary dual codes for counter-measures to side-channel attacks. Zbl 1398.94209Carlet, Claude; Guilley, Sylvain 29 2015 Complementary dual codes for counter-measures to side-channel attacks. Zbl 1352.94091Carlet, Claude; Guilley, Sylvain 26 2016 Multiply constant-weight codes and the reliability of loop physically unclonable functions. Zbl 1360.94365Chee, Yeow Meng; Cherif, Zouha; Danger, Jean-Luc; Guilley, Sylvain; Kiah, Han Mao; Kim, Jon-Lark; Solé, Patrick; Zhang, Xiande 8 2014 Masks will fall off. Higher-order optimal distinguishers. Zbl 1317.94090Bruneau, Nicolas; Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier 5 2014 Higher-order CIS codes. Zbl 1360.94362Carlet, Claude; Freibert, Finley; Guilley, Sylvain; Kiermaier, Michael; Kim, Jon-Lark; Solé, Patrick 4 2014 Statistical properties of side-channel and fault injection attacks using coding theory. Zbl 06875341Carlet, Claude; Guilley, Sylvain 3 2018 A key to success. Success exponents for side-channel distinguishers. Zbl 1377.94051Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier 3 2015 Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem 3 2014 Leakage squeezing of order two. Zbl 1295.94031Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem 3 2012 Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks. Zbl 1291.94135Nassar, Maxime; Guilley, Sylvain; Danger, Jean-Luc 3 2011 Defeating any secret cryptography with SCARE attacks. Zbl 1285.94065Guilley, Sylvain; Sauvage, Laurent; Micolod, Julien; Réal, Denis; Valette, Frédéric 3 2010 Multi-variate high-order attacks of shuffled tables recomputation. Zbl 1380.94076Bruneau, Nicolas; Guilley, Sylvain; Najm, Zakaria; Teglia, Yannick 2 2015 Less is more: dimensionality reduction from a theoretical perspective. Zbl 1380.94013Bruneau, Nicolas; Guilley, Sylvain; Heuser, Annelie; Marion, Damien; Rioul, Olivier 2 2015 Boosting higher-order correlation attacks by dimensionality reduction. Zbl 1404.94045Bruneau, Nicolas; Danger, Jean-Luc; Guilley, Sylvain; Heuser, Annelie; Teglia, Yannick 2 2014 Good is not good enough. Deriving optimal distinguishers from communication theory. Zbl 1383.94003Heuser, Annelie; Rioul, Olivier; Guilley, Sylvain 2 2014 Detecting hidden leakages. Zbl 1404.94098Moradi, Amir; Guilley, Sylvain; Heuser, Annelie 2 2014 Cache-timing attacks still threaten IoT devices. Zbl 1432.94143Takarabt, Sofiane; Schaub, Alexander; Facon, Adrien; Guilley, Sylvain; Sauvage, Laurent; Souissi, Youssef; Mathieu, Yves 1 2019 Multivariate high-order attacks of shuffled tables recomputation. Zbl 1444.94050Bruneau, Nicolas; Guilley, Sylvain; Najm, Zakaria; Teglia, Yannick 1 2018 Codes for side-channel attacks and protections. Zbl 1365.94430Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier 1 2017 Taylor expansion of maximum likelihood attacks for masked and shuffled implementations. Zbl 1404.94046Bruneau, Nicolas; Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier; Standaert, François-Xavier; Teglia, Yannick 1 2016 Improving the Big Mac attack on elliptic curve cryptography. Zbl 1405.94056Danger, Jean-Luc; Guilley, Sylvain; Hoogvorst, Philippe; Murdica, Cédric; Naccache, David 1 2016 Analysis and improvements of the DPA contest v4 implementation. Zbl 1404.94040Bhasin, Shivam; Bruneau, Nicolas; Danger, Jean-Luc; Guilley, Sylvain; Najm, Zakaria 1 2014 Optimal first-order masking with linear and non-linear bijections. Zbl 1291.94123Maghrebi, Houssem; Carlet, Claude; Guilley, Sylvain; Danger, Jean-Luc 1 2012 A first-order leak-free masking countermeasure. Zbl 1292.94110Maghrebi, Houssem; Prouff, Emmanuel; Guilley, Sylvain; Danger, Jean-Luc 1 2012 First principal components analysis: a new side channel distinguisher. Zbl 1341.68045Souissi, Youssef; Nassar, Maxime; Guilley, Sylvain; Danger, Jean-Luc; Flament, Florent 1 2011 Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator. Zbl 1284.94073Elaabid, M. Abdelaziz; Guilley, Sylvain 1 2010 Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks. Zbl 1390.94828Bhasin, Shivam; Guilley, Sylvain; Sauvage, Laurent; Danger, Jean-Luc 1 2010 Cache-timing attacks still threaten IoT devices. Zbl 1432.94143Takarabt, Sofiane; Schaub, Alexander; Facon, Adrien; Guilley, Sylvain; Sauvage, Laurent; Souissi, Youssef; Mathieu, Yves 1 2019 Statistical properties of side-channel and fault injection attacks using coding theory. Zbl 06875341Carlet, Claude; Guilley, Sylvain 3 2018 Multivariate high-order attacks of shuffled tables recomputation. Zbl 1444.94050Bruneau, Nicolas; Guilley, Sylvain; Najm, Zakaria; Teglia, Yannick 1 2018 Codes for side-channel attacks and protections. Zbl 1365.94430Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier 1 2017 Complementary dual codes for counter-measures to side-channel attacks. Zbl 1352.94091Carlet, Claude; Guilley, Sylvain 26 2016 Taylor expansion of maximum likelihood attacks for masked and shuffled implementations. Zbl 1404.94046Bruneau, Nicolas; Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier; Standaert, François-Xavier; Teglia, Yannick 1 2016 Improving the Big Mac attack on elliptic curve cryptography. Zbl 1405.94056Danger, Jean-Luc; Guilley, Sylvain; Hoogvorst, Philippe; Murdica, Cédric; Naccache, David 1 2016 Complementary dual codes for counter-measures to side-channel attacks. Zbl 1398.94209Carlet, Claude; Guilley, Sylvain 29 2015 A key to success. Success exponents for side-channel distinguishers. Zbl 1377.94051Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier 3 2015 Multi-variate high-order attacks of shuffled tables recomputation. Zbl 1380.94076Bruneau, Nicolas; Guilley, Sylvain; Najm, Zakaria; Teglia, Yannick 2 2015 Less is more: dimensionality reduction from a theoretical perspective. Zbl 1380.94013Bruneau, Nicolas; Guilley, Sylvain; Heuser, Annelie; Marion, Damien; Rioul, Olivier 2 2015 Multiply constant-weight codes and the reliability of loop physically unclonable functions. Zbl 1360.94365Chee, Yeow Meng; Cherif, Zouha; Danger, Jean-Luc; Guilley, Sylvain; Kiah, Han Mao; Kim, Jon-Lark; Solé, Patrick; Zhang, Xiande 8 2014 Masks will fall off. Higher-order optimal distinguishers. Zbl 1317.94090Bruneau, Nicolas; Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier 5 2014 Higher-order CIS codes. Zbl 1360.94362Carlet, Claude; Freibert, Finley; Guilley, Sylvain; Kiermaier, Michael; Kim, Jon-Lark; Solé, Patrick 4 2014 Leakage squeezing: optimal implementation and security evaluation. Zbl 1372.94414Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem 3 2014 Boosting higher-order correlation attacks by dimensionality reduction. Zbl 1404.94045Bruneau, Nicolas; Danger, Jean-Luc; Guilley, Sylvain; Heuser, Annelie; Teglia, Yannick 2 2014 Good is not good enough. Deriving optimal distinguishers from communication theory. Zbl 1383.94003Heuser, Annelie; Rioul, Olivier; Guilley, Sylvain 2 2014 Detecting hidden leakages. Zbl 1404.94098Moradi, Amir; Guilley, Sylvain; Heuser, Annelie 2 2014 Analysis and improvements of the DPA contest v4 implementation. Zbl 1404.94040Bhasin, Shivam; Bruneau, Nicolas; Danger, Jean-Luc; Guilley, Sylvain; Najm, Zakaria 1 2014 Leakage squeezing of order two. Zbl 1295.94031Carlet, Claude; Danger, Jean-Luc; Guilley, Sylvain; Maghrebi, Houssem 3 2012 Optimal first-order masking with linear and non-linear bijections. Zbl 1291.94123Maghrebi, Houssem; Carlet, Claude; Guilley, Sylvain; Danger, Jean-Luc 1 2012 A first-order leak-free masking countermeasure. Zbl 1292.94110Maghrebi, Houssem; Prouff, Emmanuel; Guilley, Sylvain; Danger, Jean-Luc 1 2012 Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks. Zbl 1291.94135Nassar, Maxime; Guilley, Sylvain; Danger, Jean-Luc 3 2011 First principal components analysis: a new side channel distinguisher. Zbl 1341.68045Souissi, Youssef; Nassar, Maxime; Guilley, Sylvain; Danger, Jean-Luc; Flament, Florent 1 2011 Defeating any secret cryptography with SCARE attacks. Zbl 1285.94065Guilley, Sylvain; Sauvage, Laurent; Micolod, Julien; Réal, Denis; Valette, Frédéric 3 2010 Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator. Zbl 1284.94073Elaabid, M. Abdelaziz; Guilley, Sylvain 1 2010 Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks. Zbl 1390.94828Bhasin, Shivam; Guilley, Sylvain; Sauvage, Laurent; Danger, Jean-Luc 1 2010 all cited Publications top 5 cited Publications all top 5 Cited by 172 Authors 12 Solé, Patrick 8 Shi, Minjia 7 Guilley, Sylvain 6 Güneri, Cem 5 Carlet, Claude 5 Sok, Lin 4 Kim, Hyunjin 4 Li, Chengju 3 Alahmadi, Adel N. 3 Bruneau, Nicolas 3 Guenda, Kenza 3 Gulliver, Thomas Aaron 3 Heuser, Annelie 3 Huang, Daitao 3 Lee, Yoonjin 3 Liu, Hualu 3 Liu, Xiusheng 3 Mesnager, Sihem 3 Özbudak, Ferruh 3 Özkaya, Buket 3 Rioul, Olivier 2 Batina, Lejla 2 Chang, Yanxun 2 Danger, Jean-Luc 2 de la Cruz, Javier 2 Feng, Tao 2 Fu, Fangwei 2 Harada, Masaaki 2 Jitman, Somphong 2 Li, Ruihu 2 Liu, Zihui 2 López, Hiram H. 2 Matthews, Gretchen L. 2 Moradi, Amir 2 Rao, Yi 2 Saçıkara, Elif 2 Shoaib, Hatoon 2 Standaert, Francois-Xavier 2 Tang, Chunming 2 Teglia, Yannick 2 Wang, Changyuan 2 Willems, Wolfgang 2 Wu, Yansheng 2 Yue, Qin 1 Abel, R. Julian R. 1 Araya, Makoto 1 Bagchi, Satya 1 Bailey, Robert F. 1 Bandi, Ramakrishna 1 Batoul, Aicha 1 Benahmed, Fatma-Zohra 1 Benbelkacem, N. 1 Bhowmick, Sanjit 1 Bock, René 1 Borello, Martino 1 Borges, Joaquim 1 Boripan, Arunwan 1 Burgess, Andrea C. 1 Cao, Weiqiong 1 Chee, Yeow Meng 1 Chen, Hua 1 Cheng, Feng 1 Choe, Junyop 1 Choi, Whan-Hyuk 1 Christen, Charles 1 Clavier, Christophe 1 Danziger, Peter 1 de Chérisey, Éloi 1 Devi, Meenakshi 1 Deza, Michel Marie 1 Ding, Cunsheng 1 Dougherty, Steven T. 1 Duc, Alexandre 1 Durğun, Yılmaz 1 Dutour-Sikiric, Mathieu 1 Ege, Barış 1 Eisenbarth, Thomas 1 Facon, Adrien 1 Fan, Limin 1 Fan, Yun 1 Faust, Sebastian 1 Fernández-Córdoba, Cristina 1 Fu, Qiang 1 Fu, Qiang 1 Galvez, Lucky Erap 1 Gao, Fei 1 Gao, Si 1 Ge, Gennian 1 Ge, Maorong 1 Hogenboom, Jip 1 Hong, Sekung 1 Hu, Xiaobo Sharon 1 Huang, Xinmei 1 Isorez, Quentin 1 Kai, Xiaoshan 1 Kaur, Taranjot 1 Kiah, Han Mao 1 Kim, Hyunkwang 1 Kim, Jaeseon 1 Kim, Jon-Lark ...and 72 more Authors all top 5 Cited in 17 Serials 15 Designs, Codes and Cryptography 14 Finite Fields and their Applications 12 Cryptography and Communications 7 Advances in Mathematics of Communications 3 Discrete Applied Mathematics 3 Journal of Applied Mathematics and Computing 2 Bulletin of the Australian Mathematical Society 2 Discrete Mathematics 2 Graphs and Combinatorics 2 SIAM Journal on Discrete Mathematics 2 Journal of Cryptology 2 International Journal of Foundations of Computer Science 1 Bulletin of the Korean Mathematical Society 1 Discrete Mathematics, Algorithms and Applications 1 Science China. Mathematics 1 Science China. Information Sciences 1 Korean Journal of Mathematics all top 5 Cited in 12 Fields 79 Information and communication theory, circuits (94-XX) 27 Number theory (11-XX) 9 Combinatorics (05-XX) 4 Algebraic geometry (14-XX) 2 Commutative algebra (13-XX) 2 Statistics (62-XX) 2 Quantum theory (81-XX) 2 Operations research, mathematical programming (90-XX) 1 Associative rings and algebras (16-XX) 1 Group theory and generalizations (20-XX) 1 Convex and discrete geometry (52-XX) 1 Computer science (68-XX) Citations by Year