Follow
Alexandre VENELLI
Title
Cited by
Cited by
Year
Methodology for efficient CNN architectures in profiling attacks
G Zaid, L Bossuet, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-36, 2020
1992020
Deep learning to evaluate secure RSA implementations
M Carbone, V Conin, MA Cornélie, F Dassance, G Dufresne, C Dumas, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 132-161, 2019
1062019
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic
RR Goundar, M Joye, A Miyaji, M Rivain, A Venelli
Journal of cryptographic engineering 1, 161-176, 2011
692011
Ranking loss: Maximizing the success rate in deep learning side-channel analysis
G Zaid, L Bossuet, F Dassance, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 25-55, 2021
552021
Side-channel analysis on blinded regular scalar multiplications
B Feix, M Roussellet, A Venelli
Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014
482014
Redundant modular reduction algorithms
V Dupaquis, A Venelli
International Conference on Smart Card Research and Advanced Applications …, 2011
412011
Efficient entropy estimation for mutual information analysis using B-splines
A Venelli
IFIP International Workshop on Information Security Theory and Practices, 17-30, 2010
392010
Combined fault and side-channel attacks on the AES key schedule
F Dassance, A Venelli
2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 63-71, 2012
382012
Fast scalar multiplication for elliptic curve cryptosystems over prime fields
A Venelli, F Dassance
US Patent 8,369,517, 2013
272013
AES side-channel countermeasure using random tower field constructions
A Bonnecaze, P Liardet, A Venelli
Designs, codes and cryptography 69 (3), 331-349, 2013
222013
Faster side-channel resistant elliptic curve scalar multiplication
A Venelli, F Dassance
Contemporary mathematics 521, 29-40, 2010
212010
Defeating with fault injection a combined attack resistant exponentiation
B Feix, A Venelli
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
152013
Efficiency through diversity in ensemble models applied to side-channel attacks:–a case study on public-key algorithms–
G Zaid, L Bossuet, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 60-96, 2021
132021
Conditional variational autoencoder based on stochastic attacks
G Zaid, L Bossuet, M Carbone, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 310-357, 2023
122023
Understanding methodology for efficient CNN architectures in profiling attacks
G Zaid, L Bossuet, A Habrard, A Venelli
Cryptology ePrint Archive, 2020
62020
Analysis of nonparametric estimation methods for mutual information analysis
A Venelli
Information Security and Cryptology-ICISC 2010: 13th International …, 2011
52011
Contribution à la sécurité physique des cryptosystemes embarqués
A VENELLI
32011
Method for backing up data outside a secure microcircuit
V Dupaquis, A Venelli
US Patent App. 14/396,428, 2015
22015
Efficient entropy estimation for mutual information analysis
A Venelli, V Dupaquis
TSI-Technique et Science Informatiques 30 (10), 1217, 2011
12011
Side-Channel Resistant Scalar Multiplication Algorithms over Finite Fields
A Venelli, F Dassance
5th Conf. on Network Architectures and Information Systems Security, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20