[1] | B. Gérard and J.-P. Tillich. Using Tools from Error Correcting Theory in Linear Cryptanalysis. In Advanced Linear Cryptanalysis of Block and Stream Ciphers. |
[1] | C. Blondeau, B. Gérard and J.-P. Tillich. Accurate Estimates of the Data Complexity and Success Probability for Various Cryptanalyses. In Designs, Codes and Cryptography: Special issue on Coding and Cryptography, volume 1-3, pages 3-34, 2011. |
[2] | B. Gérard and F.-X. Standaert. Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting - Extended Version -. In Journal of Cryptographic Engineering, volume 3, pages 45-58, 2013. |
[3] | C. Clavier, J.-L. Danger, G. Duc, M. Abdelaziz Elaabid, B. Gérard, S. Guilley, A. Heuser, M. Kasper, Y. Li, V. Lomné, D. Nakatsu, K. Ohta, K. Sakiyama, L. Sauvage, W. Schindler, M. Stöttinger, N. Veyrat-Charvillon, M. Walle and A. Wurcker. Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. In Journal of Cryptographic Engineering, volume 4, pages 1-16, 2014. |
[4] | Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard and Mehdi Tibouchi. Loop-Abort Faults on Lattice-Based Signature Schemes and Key Exchange Protocols. In IEEE Trans. Computers, volume 67, pages 1535-1549, 2018. |
[1] | B. Gérard and J.-P. Tillich. On Linear Cryptanalysis with Many Linear Approximations. In 12th IMA International Conference, Cryptography and Coding 2009, volume 5921 de LNCS, pages 112-132, 2009.[slides] |
[2] | C. Blondeau and B. Gérard. Multiple Differential Cryptanalysis: Theory and Practice. In Fast Software Encryption 2011, volume 6733 de LNCS, pages 35-54, 2011.[slides] |
[3] | C.Blondeau, B. Gérard and K. Nyberg. Multiple Differential Cryptanalysis using LLR and χ2 Statistics. In Conference on Security and Cryptography for Networks 2012, volume 7485 de LNCS, pages 343-360, 2012. |
[4] | N. Veyrat-Charvillon, B. Gérard, M. Renauld and F.-X. Standaert. An Optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks. In SAC, volume 7707 de LNCS, pages 390-406, 2012.[source code] |
[5] | F. Durvaux, B. Gérard, S. Kerckhof, F. Koeune and F.-X. Standaert. Intellectual Property Protection for Integrated Systems using Soft Physical Hash Functions. In WISA, volume 7690 de LNCS, pages 208-225, 2012. |
[6] | B. Gérard and F.-X. Standaert. Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting. In CHES, volume 7428 de LNCS, pages 175-192, 2012.[slides] |
[7] | J. Balasch, B. Ege, T. Eisenbarth, B. Gérard, Z. Gong, T. Güneysu, S. Heyse, S. Kerckhof, F. Koeune, T. Plos, T. Poppelmann, F. Regazzoni, F.-X. Standaert, G. Van Assche, R. Van Keer, L. Van Oldeneel Tot Oldenzeel and I. von Maurich. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. In CARDIS, volume 7771 de LNCS, pages 158-172, 2012.[source code] |
[8] | N. Veyrat-Charvillon, B. Gérard and F.-X. Standaert. Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?. In EUROCRYPT, volume 7881 de LNCS, pages 126-141, 2013.[source code] |
[9] | S. Kerckhof, F. Durvaux, F.-X. Standaert and B. Gérard. Intellectual Property Protection for FPGA Designs with Soft Physical Hash Functions: First Experimental Results. In HOST, volume de IEEE, pages 7-12, 2013. |
[10] | B. Gérard, V. Grosso, M. Naya-Plasencia and F.-X. Standaert. Block Ciphers that are Easier to Mask: How Far Can we Go?. In CHES, volume 8086 de LNCS, pages 383-399, 2013. |
[11] | R. Spreitzer and B. Gérard. Towards More Practical Time-Driven Cache Attacks. In WISTP, volume 8501 de LNCS, pages 24-39, 2014. |
[12] | Nicolas Veyrat-Charvillon, Benoît Gérard and François-Xavier Standaert. Soft Analytical Side-Channel Attacks. In ASIACRYPT, volume 8873 de LNCS, pages 282-296, 2014. |
[13] | Sonia Belaïd, Pierre-Alain Fouque and Benoît Gérard. Side-Channel Analysis of the Authentication of AES-GCM. In ASIACRYPT, volume 8873 de LNCS, pages 306-325, 2014. |
[14] | Diego F. Aranha, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi and Jean-Christophe Zapalowicz. GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures With Single-Bit Nonce Bias. In ASIACRYPT, volume 8873 de LNCS, pages 262-281, 2014. |
[15] | Benoît Gérard, Jean-Gabriel Kammerer and Nabil Merkiche. Contributions to the Design of Residue Number System Architectures. In ARITH 22, volume de IEEE, pages 105-112, 2015. |
[16] | Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer and Emmanuel Prouff. Improved Side-Channel Analysis of Finite-Field Multiplication. In CHES, volume 9293 de LNCS, pages 395-415, 2015. |
[17] | Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard and Mehdi Tibouchi. Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures. In SAC, volume 10532 de LNCS, pages 140-158, 2016. |
[18] | Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard and Mehdi Tibouchi. Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers. In CCS, volume - de ACM, pages 1857-1874, 2017. |
[19] | Vincent Migliore, Benoît Gérard, Mehdi Tibouchi and Pierre-Alain Fouque. Masking Dilithium - Efficient Implementation and Side-Channel Evaluation. In ACNS, volume 11464 de Springer, pages 344-362, 2019. |
[20] | C. Genevey-Metat, B. Gérard and A. Heuser. On What to Learn: Towards Deeply Learned Profile Robustness. In YACCRYPTED, volume - de -, pages x (COVID cancellation), 2020. |
[21] | Christophe Genevey-Metat, Annelie Heuser and Benoit Gérard. Train or Adapt a Deeply Learned Profile. In Latincrypt, volume 12912 de Springer, pages 213-232, 2021. |
[22] | Christophe Genevey-Metat, Annelie Heuser and Benoit Gérard. Trace-to-trace translation for SCA. In CARDIS, volume 13173 de Springer, pages 24--43, 2021. |
[23] | Agathe Cheriere, Nicolas Aragon, Tania Richmond and Benoît Gérard. BIKE Key-Recovery: Combining Power Consumption Analysis and Information-Set Decoding. In ACNS, volume 13905 de Springer, pages 725--748, 2023. |
[1] | C. Blondeau and B. Gérard. On the Data Complexity of Statistical Attacks Against Block Ciphers. In Workshop on Coding and Cryptography, 2009.[pdf][slides] |
[2] | C. Blondeau and B. Gérard. Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT. In Workshop on Tools for Cryptanalysis, 2010.[pdf][slides] |
[3] | C. Blondeau et B. Gérard. Differential Cryptanalysis of PUFFIN and PUFFIN2. In Workshop on Lightweight Cryptography, 2011.[pdf][slides][source code] |
[4] | V. Grosso, C. Boura, B. Gérard and F.-X. Standaert. A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks. In Symposium on Information Theory in the Benelux, 2012.[pdf] |
[5] | C. Genevey-Metat, B. Gérard and A. Heuser. Combining sources of side-channel information. In IA&D, 2019. |