Lilian Bossuet
Lilian Bossuet
Professor, University of Lyon, Saint-Etienne - Laboratoire Hubert Curien - CNRS
Verified email at univ-st-etienne.fr - Homepage
Title
Cited by
Cited by
Year
Contactless electromagnetic active attack on ring oscillator based true random number generator
P Bayon, L Bossuet, A Aubert, V Fischer, F Poucheret, B Robisson, ...
International Workshop on Constructive Side-Channel Analysis and Secure …, 2012
1182012
Dynamically configurable security for SRAM FPGA bitstreams
L Bossuet, G Gogniat, W Burleson
International Journal of Embedded Systems 2 (1-2), 73-85, 2006
1082006
Reconfigurable hardware for high-security/high-performance embedded systems: the SAFES perspective
G Gogniat, T Wolf, W Burleson, JP Diguet, L Bossuet, R Vaslin
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 16 (2), 144-155, 2008
942008
A PUF based on a transient effect ring oscillator and insensitive to locking phenomenon
L Bossuet, XT Ngo, Z Cherif, V Fischer
IEEE Transactions on Emerging Topics in Computing 2 (1), 30-36, 2013
872013
Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip
L Bossuet, M Grand, L Gaspar, V Fischer, G Gogniat
ACM Computing Surveys (CSUR) 45 (4), 1-32, 2013
652013
Design space pruning through early estimations of area/delay tradeoffs for fpga implementations
S Bilavarn, G Gogniat, JL Philippe, L Bossuet
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2006
572006
An easy-to-design PUF based on a single oscillator: the loop PUF
Z Cherif, JL Danger, S Guilley, L Bossuet
2012 15th Euromicro Conference on Digital System Design, 156-162, 2012
522012
Implementation and characterization of a physical unclonable function for IoT: a case study with the TERO-PUF
C Marchand, L Bossuet, U Mureddu, N Bochard, A Cherkaoui, V Fischer
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2017
452017
Correlated power noise generator as a low cost DPA countermeasures to secure hardware AES cipher
N Kamoun, L Bossuet, A Ghazel
2009 3rd International Conference on Signals, Circuits and Systems (SCS), 1-6, 2009
442009
Design, evaluation, and optimization of physical unclonable functions based on transient effect ring oscillators
A Cherkaoui, L Bossuet, C Marchand
IEEE Transactions on Information Forensics and Security 11 (6), 1291-1305, 2016
402016
New paradigms for access control in constrained environments
A Cherkaoui, L Bossuet, L Seitz, G Selander, R Borgaonkar
2014 9th International Symposium on Reconfigurable and Communication-Centric …, 2014
392014
Generic design space exploration for reconfigurable architectures
L Bossuet, G Gogniat, JL Philippe
19th IEEE International Parallel and Distributed Processing Symposium, 4 pp., 2005
382005
Survey of hardware protection of design data for integrated circuits and intellectual properties
B Colombier, L Bossuet
IET Computers & Digital Techniques 8 (6), 274-287, 2014
372014
Gossip noc--avoiding timing side-channel attacks through traffic management
C Reinbrecht, A Susin, L Bossuet, J Sepúlveda
2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 601-606, 2016
362016
A survey of AIS-20/31 compliant TRNG cores suitable for FPGA devices
O Petura, U Mureddu, N Bochard, V Fischer, L Bossuet
2016 26th international conference on field programmable logic and …, 2016
352016
Automatic low-cost IP watermarking technique based on output mark insertions
B Le Gal, L Bossuet
Design Automation for Embedded Systems 16 (2), 71-92, 2012
342012
Experimental Implementation of 2ODPA attacks on AES design with flash-based FPGA Technology
NM Kamoun, L Bossuet, A Ghazel
2010 International Conference on Microelectronics, 407-410, 2010
252010
SRAM-FPGA implementation of masked S-Box based DPA countermeasure for AES
N Kamoun, L Bossuet, A Ghazel
2008 3rd International Design and Test Workshop, 74-77, 2008
242008
Key reconciliation protocols for error correction of silicon PUF responses
B Colombier, L Bossuet, V Fischer, D Hély
IEEE Transactions on Information Forensics and Security 12 (8), 1988-2002, 2017
232017
IP watermark verification based on power consumption analysis
C Marchand, L Bossuet, E Jung
2014 27th IEEE International System-on-Chip Conference (SOCC), 330-335, 2014
232014
The system can't perform the operation now. Try again later.
Articles 1–20