Follow
Alexandre VENELLI
Title
Cited by
Cited by
Year
Methodology for efficient CNN architectures in profiling attacks
G Zaid, L Bossuet, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-36, 2020
1472020
Deep learning to evaluate secure RSA implementations
M Carbone, V Conin, MA Cornelie, F Dassance, G Dufresne, C Dumas, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 132-161, 2019
952019
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic
RR Goundar, M Joye, A Miyaji, M Rivain, A Venelli
Journal of cryptographic engineering 1, 161-176, 2011
662011
Side-channel analysis on blinded regular scalar multiplications
B Feix, M Roussellet, A Venelli
Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014
432014
Redundant modular reduction algorithms
V Dupaquis, A Venelli
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 …, 2011
412011
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines.
A Venelli
WISTP 6033, 17-30, 2010
392010
Ranking loss: Maximizing the success rate in deep learning side-channel analysis
G Zaid, L Bossuet, F Dassance, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 25-55, 2021
382021
Combined fault and side-channel attacks on the AES key schedule
F Dassance, A Venelli
2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 63-71, 2012
382012
Fast scalar multiplication for elliptic curve cryptosystems over prime fields
A Venelli, F Dassance
US Patent 8,369,517, 2013
272013
AES side-channel countermeasure using random tower field constructions
A Bonnecaze, P Liardet, A Venelli
Designs, codes and cryptography 69 (3), 331-349, 2013
222013
Faster side-channel resistant elliptic curve scalar multiplication
A Venelli, F Dassance
Contemporary mathematics 521, 29-40, 2010
212010
Defeating with fault injection a combined attack resistant exponentiation
B Feix, A Venelli
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
132013
Efficiency through diversity in ensemble models applied to side-channel attacks:–a case study on public-key algorithms–
G Zaid, L Bossuet, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 60-96, 2021
72021
Understanding methodology for efficient CNN architectures in profiling attacks
G Zaid, L Bossuet, A Habrard, A Venelli
Cryptology ePrint Archive, 2020
52020
Analysis of nonparametric estimation methods for mutual information analysis
A Venelli
Information Security and Cryptology-ICISC 2010: 13th International …, 2011
52011
Conditional variational autoencoder based on stochastic attacks
G Zaid, L Bossuet, M Carbone, A Habrard, A Venelli
IACR Transactions on Cryptographic Hardware and Embedded Systems, 310-357, 2023
42023
Contribution à la sécurité physique des cryptosystemes embarqués
A VENELLI
32011
Method for backing up data outside a secure microcircuit
V Dupaquis, A Venelli
US Patent App. 14/396,428, 2015
22015
Efficient entropy estimation for mutual information analysis
A Venelli, V Dupaquis
TSI-Technique et Science Informatiques 30 (10), 1217, 2011
12011
Side-Channel Resistant Scalar Multiplication Algorithms over Finite Fields
A Venelli, F Dassance
5th Conf. on Network Architectures and Information Systems Security, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20