Methodology for efficient CNN architectures in profiling attacks G Zaid, L Bossuet, A Habrard, A Venelli IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-36, 2020 | 247 | 2020 |
Deep learning to evaluate secure RSA implementations M Carbone, V Conin, MA Cornélie, F Dassance, G Dufresne, C Dumas, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 132-161, 2019 | 109 | 2019 |
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic RR Goundar, M Joye, A Miyaji, M Rivain, A Venelli Journal of cryptographic engineering 1, 161-176, 2011 | 69 | 2011 |
Ranking loss: Maximizing the success rate in deep learning side-channel analysis G Zaid, L Bossuet, F Dassance, A Habrard, A Venelli IACR Transactions on Cryptographic Hardware and Embedded Systems, 25-55, 2021 | 61 | 2021 |
Side-channel analysis on blinded regular scalar multiplications B Feix, M Roussellet, A Venelli Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014 | 49 | 2014 |
Efficient entropy estimation for mutual information analysis using B-splines A Venelli IFIP International Workshop on Information Security Theory and Practices, 17-30, 2010 | 40 | 2010 |
Combined fault and side-channel attacks on the AES key schedule F Dassance, A Venelli 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 63-71, 2012 | 38 | 2012 |
Redundant modular reduction algorithms V Dupaquis, A Venelli International Conference on Smart Card Research and Advanced Applications …, 2011 | 38 | 2011 |
Fast scalar multiplication for elliptic curve cryptosystems over prime fields A Venelli, F Dassance US Patent 8,369,517, 2013 | 28 | 2013 |
AES side-channel countermeasure using random tower field constructions A Bonnecaze, P Liardet, A Venelli Designs, codes and cryptography 69 (3), 331-349, 2013 | 22 | 2013 |
Faster side-channel resistant elliptic curve scalar multiplication A Venelli, F Dassance Contemporary mathematics 521, 29-40, 2010 | 20 | 2010 |
Efficiency through diversity in ensemble models applied to side-channel attacks:–a case study on public-key algorithms– G Zaid, L Bossuet, A Habrard, A Venelli IACR Transactions on Cryptographic Hardware and Embedded Systems, 60-96, 2021 | 19 | 2021 |
Defeating with fault injection a combined attack resistant exponentiation B Feix, A Venelli Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013 | 15 | 2013 |
Conditional variational autoencoder based on stochastic attacks G Zaid, L Bossuet, M Carbone, A Habrard, A Venelli IACR Transactions on Cryptographic Hardware and Embedded Systems, 310-357, 2023 | 12 | 2023 |
Understanding methodology for efficient CNN architectures in profiling attacks G Zaid, L Bossuet, A Habrard, A Venelli Cryptology ePrint Archive, 2020 | 7 | 2020 |
Contribution à la sécurité physique des cryptosystemes embarqués A VENELLI | 4 | 2011 |
Analysis of nonparametric estimation methods for mutual information analysis A Venelli Information Security and Cryptology-ICISC 2010: 13th International …, 2011 | 4 | 2011 |
Method for backing up data outside a secure microcircuit V Dupaquis, A Venelli US Patent App. 14/396,428, 2015 | 2 | 2015 |
Efficient entropy estimation for mutual information analysis A Venelli, V Dupaquis TSI-Technique et Science Informatiques 30 (10), 1217, 2011 | 1 | 2011 |
Side-Channel Resistant Scalar Multiplication Algorithms over Finite Fields A VENELLI, F DASSANCE 5th Conf. on Network Architectures and Information Systems Security, 2010 | 1 | 2010 |