Research
Homepage Research Teaching francais
Book chapters
[1] B. Gérard and J.-P. Tillich. Using Tools from Error Correcting Theory in Linear Cryptanalysis. In Advanced Linear Cryptanalysis of Block and Stream Ciphers, 2011.
Journals
[1] C. Blondeau, B. Gérard and J.-P. Tillich. Accurate Estimates of the Data Complexity and Success Probability for Various Cryptanalyses. In Designs, Codes and Cryptography: Special issue on Coding and Cryptography, volume 1-3, pages 3-34, 2011.
[2] B. Gérard and F.-X. Standaert. Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting - Extended Version -. In Journal of Cryptographic Engineering, volume 3, pages 45-58, 2013.
[3] C. Clavier, J.-L. Danger, G. Duc, M. Abdelaziz Elaabid, B. Gérard, S. Guilley, A. Heuser, M. Kasper, Y. Li, V. Lomné, D. Nakatsu, K. Ohta, K. Sakiyama, L. Sauvage, W. Schindler, M. Stöttinger, N. Veyrat-Charvillon, M. Walle and A. Wurcker. Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. In Journal of Cryptographic Engineering, pages 1-16, 2014.
Proceedings
[1] B. Gérard and J.-P. Tillich. On Linear Cryptanalysis with Many Linear Approximations. In 12th IMA International Conference, Cryptography and Coding 2009, volume 5921 of LNCS, pages 112-132, 2009. [slides]
[2] C. Blondeau and B. Gérard. Multiple Differential Cryptanalysis: Theory and Practice. In Fast Software Encryption 2011, volume 6733 of LNCS, pages 35-54, 2011. [slides]
[3] C.Blondeau, B. Gérard and K. Nyberg. Multiple Differential Cryptanalysis using LLR and χ2 Statistics. In Conference on Security and Cryptography for Networks 2012, volume 7485 of LNCS, pages 343-360, 2012.
[4] N. Veyrat-Charvillon, B. Gérard, M. Renauld and F.-X. Standaert. An Optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks. In Selected Areas in Cryptography, volume 7707 of LNCS, pages 390-406, 2012. [source code]
[5] F. Durvaux, B. Gérard, S. Kerckhof, F. Koeune and F.-X. Standaert. Intellectual Property Protection for Integrated Systems using Soft Physical Hash Functions. In Workshop on Information Security Applications, volume 7690 of LNCS, pages 208-225, 2012.
[6] B. Gérard and F.-X. Standaert. Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting. In Workshop on Cryptographic Hardware and Embedded Systems 2012, volume 7428 of LNCS, pages 175-192, 2012. [slides]
[7] J. Balasch, B. Ege, T. Eisenbarth, B. Gérard, Z. Gong, T. Güneysu, S. Heyse, S. Kerckhof, F. Koeune, T. Plos, T. Poppelmann, F. Regazzoni, F.-X. Standaert, G. Van Assche, R. Van Keer, L. Van Oldeneel Tot Oldenzeel and I. von Maurich. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. In Eleventh Smart Card Research and Advanced Application Conference - CARDIS, volume 7771 of LNCS, pages 158-172, 2012. [source code]
[8] N. Veyrat-Charvillon, B. Gérard and F.-X. Standaert. Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?. In EUROCRYPT, volume 7881 of LNCS, pages 126-141, 2013. [source code]
[9] S. Kerckhof, F. Durvaux, F.-X. Standaert and B. Gérard. Intellectual Property Protection for FPGA Designs with Soft Physical Hash Functions: First Experimental Results. In HOST of IEEE, pages 7-12, 2013.
[10] B. Gérard, V. Grosso, M. Naya-Plasencia and F.-X. Standaert. Block Ciphers that are Easier to Mask: How Far Can we Go?. In CHES, volume 8086 of LNCS, pages 383-399, 2013.
[11] R. Spreitzer and B. Gérard. Towards More Practical Time-Driven Cache Attacks. In WISTP, volume 8501 of LNCS, pages 24-39, 2014.
[12] Nicolas Veyrat-Charvillon, Benoît Gérard and François-Xavier Standaert. Soft Analytical Side-Channel Attacks. In ASIACRYPT, volume 8873 of LNCS, pages 282-296, 2014.
[13] Sonia Belaïd, Pierre-Alain Fouque and Benoît Gérard. Side-Channel Analysis of the Authentication of AES-GCM. In ASIACRYPT, volume 8873 of LNCS, pages 306-325, 2014.
[14] Diego F. Aranha, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi and Jean-Christophe Zapalowicz. GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures With Single-Bit Nonce Bias. In ASIACRYPT, volume 8873 of LNCS, pages 262-281, 2014.
[15] Benoît Gérard, Jean-Gabriel Kammerer and Nabil Merkiche. Contributions to the Design of Residue Number System Architectures. In ARITH 22 of IEEE, pages 105-112, 2015.
[16] Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer and Emmanuel Prouff. Improved Side-Channel Analysis of Finite-Field Multiplication. In CHES, volume 9293 of LNCS, pages 395-415, 2015.
[17] Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard and Mehdi Tibouchi. Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures. In SAC, volume xxxx of LNCS, pages xxx-xxx, 2016.
Workshops
[1] C. Blondeau and B. Gérard. On the Data Complexity of Statistical Attacks Against Block Ciphers. In Workshop on Coding and Cryptography, 2009. [pdf] [slides]
[2] C. Blondeau and B. Gérard. Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT. In Workshop on Tools for Cryptanalysis, 2010. [pdf] [slides]
[3] C. Blondeau et B. Gérard. Differential Cryptanalysis of PUFFIN and PUFFIN2. In Workshop on Lightweight Cryptography, 2011. [pdf] [slides] [data]
[4] V. Grosso, C. Boura, B. Gérard and F.-X. Standaert. A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks. In Symposium on Information Theory in the Benelux, 2012. [pdf]
Miscellaneous
[1] B. Gérard. Utilisation de techniques de codage correcteur d'erreurs pour la cryptanalyse de systèmes de chiffrement à clé secrète. Master thesis at Université de Versailles Saint-Quentin, 2007.
[2] C. Blondeau and B. Gérard. On the Data Complexity of Statistical Attacks Against Block Ciphers. Poster presented at EUROCRYPT 2009, 2009. [pdf]
[3] B. Gérard. Cryptanalyses statistiques des algorithmes de chiffrement à clef secrète. PhD thesis from Université Pierre et Marie Curie, 2010. [slides]
Talks and Seminars
  • Utilisation de techniques de codage pour la cryptanalyse linéaire - Cryptographie, Codes et Arithmétique - CCA (ENSTA), 19th October 2007.
  • Utilisation de techniques de codage pour la cryptanalyse linéaire - Séminaire IRMAR (Rennes), 7th December 2007.
  • Codage et cryptanalyse linéaire - Journées Codage et Cryptographie C2 (Carcans), 18th March 2008.
  • Quantification de l'information sur la clef apportée par une cryptanalyse statistique - Séminaire CRYPTO (Caen), 23th October 2008.
  • Évaluation de la complexité en données des attaques statistiques - Séminaire (Limoges), 25th November 2008.
  • Complexité en données et probabilité de succès des cryptanalyses statistiques - Journées Codage et Cryptographie C2 (Fréjus), 5th October 2009.
  • On Linear Cryptanalysis with Many Linear Approximations - Conférence IMACC (UK), 15th December 2009. [slides]
  • Links between Theoretical and Effective Differential Probabilities - Workshop TOOLS (UK), 23rd June 2010. [slides]
  • Cryptanalyses statistiques des algorithmes de chiffrement à clef secrète - Soutenance de thèse (ENSTA), 9th December 2010. [slides]
  • Analyse des cryptanalyses statistiques - Séminaire protection de l'information (Paris 8), 16th December 2010. [slides]
  • Shannon entropy: a generic tool for analysing attacks - Séminaire de l'équipe CRYPTO (UVSQ), 5th May 2011. [slides]
  • Shannon entropy: a generic tool for analysing statistical attacks - Séminaire CCA (Télécom Paris Tech), 27th May 2011. [slides]
  • Differential cryptanalysis of PUFFIN and PUFFIN2 - Workshop on Lightweight Cryptography (Belgium), 28th November 2011. [slides]
  • Techniques for Estimating the Data Complexity of Statistical Cryptanalyses: a Brief Overview - COSIC seminar (Belgium), 10th February 2012. [slides]
  • Attaques par consommation de courant: collisions et codes LDPC. - Séminaire CRYPTO (Caen), 29th March 2012. [slides]
  • Attaques par consommation de courant: collisions et codes LDPC. - Séminaire IRMAR (Rennes), 30th March 2012. [slides]
  • Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting - Workshop on Cryptographic Hardware and Embedded Systems (Belgium), 10th September 2012. [slides]
  • Canaux auxiliaires et cryptographie symétrique: deux attaques de l’espace - Séminaire CCA (Inria de Paris), 1st July 2016.
  • Thesis Committees
  • Hélène Le Bouder - 10/24/2014
  • Jean-Christophe Zapalowicz - 11/21/2014
  • Vincent Grosso - 02/11/2015
  • Pierre Belgarric - 31/08/2016
  • Pierre Karpman - 18/11/2016
  • Program Committees
  • LC 2011 - workshop on lightweight cryptography - Louvain-la-Neuve, Belgium,November 28-29, 2011
  • COSADE 2016 - Graz, Austria,April 14-15, 2016
  • FSE 2017 - Tokyo, Japan,March 5-8, 2017
  • COSADE 2017 - Paris, France,April 13-14, 2017
  • Subreviews
  • AFRICACRYPT - 2014
  • ASIACRYPT - 2013
  • CAM - 2013
  • CANS - 2012
  • CCDS - 2014
  • CCS - 2011,2014
  • CHES - 2012,2013,2014,2015,2016
  • CRYPTO - 2012
  • DCC - 2014
  • EUROCRYPT - 2014,2017
  • FDTC - 2016
  • FSE - 2012,2013,2015
  • INDOCRYPT - 2011,2014
  • SAC - 2011,2015,2016