High precision fault injections on the instruction cache of ARMv7-M architectures L Riviere, Z Najm, P Rauzy, JL Danger, J Bringer, L Sauvage 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 117 | 2015 |
A formal proof of countermeasures against fault injection attacks on CRT-RSA P Rauzy, S Guilley Journal of Cryptographic Engineering 4, 173-185, 2014 | 50 | 2014 |
Countermeasures against high-order fault-injection attacks on CRT-RSA P Rauzy, S Guilley 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 68-82, 2014 | 39 | 2014 |
Formally proved security of assembly code against power analysis: A case study on balanced logic P Rauzy, S Guilley, Z Najm Journal of Cryptographic Engineering 6, 201-216, 2016 | 27 | 2016 |
Formally Proved Security of Assembly Code Against Leakage. P Rauzy, S Guilley, Z Najm IACR Cryptol. ePrint Arch. 2013, 554, 2013 | 24 | 2013 |
Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT Á Kiss, J Krämer, P Rauzy, JP Seifert Constructive Side-Channel Analysis and Secure Design: 7th International …, 2016 | 21 | 2016 |
Can code polymorphism limit information leakage? A Amarilli, S Müller, D Naccache, D Page, P Rauzy, M Tunstall IFIP International Workshop on Information Security Theory and Practices, 1-21, 2011 | 19 | 2011 |
Formal analysis of CRT-RSA vigilant's countermeasure against the BellCoRe attack: A pledge for formal methods in the field of implementation security P Rauzy, S Guilley Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering …, 2014 | 14 | 2014 |
Can a program reverse-engineer itself? A Amarilli, D Naccache, P Rauzy, E Simion Cryptography and Coding: 13th IMA International Conference, IMACC 2011 …, 2011 | 8 | 2011 |
Using modular extension to provably protect ECC against fault attacks P Rauzy, M Moreau, S Guilley, Z Najm Cryptology ePrint Archive, Report 2015/882, 2015 | 6 | 2015 |
Using modular extension to provably protect Edwards curves against fault attacks M Dugardin, S Guilley, M Moreau, Z Najm, P Rauzy Journal of Cryptographic Engineering 7, 321-330, 2017 | 5 | 2017 |
Capacity: an abstract model of control over personal data D Le Métayer, P Rauzy Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 4 | 2018 |
Physical attacks N El Mrabet, L Goubin, S Guilley, J Fournier, D Jauvart, M Moreau, ... Guide to Pairing-Based Cryptography, 12-1-12-32, 2017 | 2 | 2017 |
A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography. P Rauzy, M Moreau, S Guilley, Z Najm IACR Cryptol. ePrint Arch. 2015, 882, 2015 | 2 | 2015 |
From rational number reconstruction to set reconciliation and file synchronization A Amarilli, F Ben Hamouda, F Bourse, R Morisset, D Naccache, P Rauzy International Symposium on Trustworthy Global Computing, 1-18, 2012 | 2 | 2012 |
Promesses et (dés)illusions : une introduction technocritique aux blockchains P Rauzy Terminal. Technologie de l’information, culture & société 136, 2023 | 1 | 2023 |
Guide to Pairing-Based Cryptography L Goubin, S Guilley, J Fournier, D Jauvart, M Moreau, P Rauzy, ... CRC Press, 2017 | 1* | 2017 |
Blockchain: une mauvaise solution à la recherche d'un problème P Rauzy JRES (Journées réseaux de l'enseignement et de la recherche) 2024, 2024 | | 2024 |
Auteur·ices, relecteur·ices : redoublons de prudence face aux effets de modes technologiques E Blanchard, FL Vigni, P Rauzy | | 2022 |
THC: Practical and Cost-Effective Verification of Delegated Computation P Rauzy, A Nehme International Conference on Cryptology and Network Security, 513-530, 2021 | | 2021 |