![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Cécile Canovas
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c21]Gabriel Destouet
, Cécile Dumas, Anne Frassati, Valérie Perrier:
Generalized Morse Wavelet Frame Estimation Applied to Side-Channel Analysis. ICFSP 2021: 52-57 - 2020
- [j4]Ryad Benadjila, Emmanuel Prouff
, Rémi Strullu, Eleonora Cagli, Cécile Dumas
:
Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10(2): 163-188 (2020) - [j3]Loïc Masure
, Cécile Dumas, Emmanuel Prouff:
A Comprehensive Study of Deep Learning for Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 348-375 (2020) - [c20]Gabriel Destouet
, Cécile Dumas
, Anne Frassati, Valérie Perrier:
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis. COSADE 2020: 71-89 - [c19]Loïc Masure
, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie
, Damien Couroussé
, Cécile Dumas
, Laurent Maingault
:
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES. ESORICS (1) 2020: 440-460 - [i13]Gabriel Destouet, Cécile Dumas, Anne Frassati, Valérie Perrier:
Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2020: 310 (2020) - [i12]Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault:
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES. IACR Cryptol. ePrint Arch. 2020: 881 (2020)
2010 – 2019
- 2019
- [j2]Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli:
Deep Learning to Evaluate Secure RSA Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 132-161 (2019) - [c18]Loïc Masure
, Cécile Dumas
, Emmanuel Prouff:
Gradient Visualization for General Characterization in Profiling Attacks. COSADE 2019: 145-167 - [i11]Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli:
Deep Learning to Evaluate Secure RSA Implementations. IACR Cryptol. ePrint Arch. 2019: 54 (2019) - [i10]Loïc Masure, Cécile Dumas, Emmanuel Prouff:
A Comprehensive Study of Deep Learning for Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2019: 439 (2019) - 2018
- [i9]Emmanuel Prouff, Rémi Strullu, Ryad Benadjila, Eleonora Cagli, Cécile Dumas:
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database. IACR Cryptol. ePrint Arch. 2018: 53 (2018) - [i8]Loïc Masure, Cécile Dumas, Emmanuel Prouff:
Gradient Visualization for General Characterization in Profiling Attacks. IACR Cryptol. ePrint Arch. 2018: 1196 (2018) - 2017
- [c17]Eleonora Cagli, Cécile Dumas
, Emmanuel Prouff:
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing. CHES 2017: 45-68 - [i7]Eleonora Cagli, Cécile Dumas, Emmanuel Prouff:
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures - Profiling Attacks without Pre-Processing -. IACR Cryptol. ePrint Arch. 2017: 740 (2017) - 2016
- [c16]Eleonora Cagli, Cécile Dumas
, Emmanuel Prouff:
Kernel Discriminant Analysis for Information Extraction in the Presence of Masking. CARDIS 2016: 1-22 - 2015
- [c15]Eleonora Cagli, Cécile Dumas
, Emmanuel Prouff:
Enhancing Dimensionality Reduction Methods for Side-Channel Attacks. CARDIS 2015: 15-33 - [c14]Louis Dureuil, Marie-Laure Potet, Philippe de Choudens, Cécile Dumas
, Jessy Clédière
:
From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference. CARDIS 2015: 107-124 - 2014
- [c13]Yanis Linge, Cécile Dumas
, Sophie Lambert-Lacroix:
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis. COSADE 2014: 199-213 - [i6]Yanis Linge, Cécile Dumas, Sophie Lambert-Lacroix:
Maximal Information Coefficient Analysis. IACR Cryptol. ePrint Arch. 2014: 12 (2014) - 2013
- [j1]Mathilde Soucarros, Jessy Clédière
, Cécile Canovas-Dumas
, Philippe Elbaz-Vincent:
Fault Analysis and Evaluation of a True Random Number Generator Embedded in a Processor. J. Electron. Test. 29(3): 367-381 (2013) - [i5]Yanis Linge, Cécile Dumas, Sophie Lambert-Lacroix:
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis. IACR Cryptol. ePrint Arch. 2013: 859 (2013) - 2012
- [c12]Alexandre Berzati, Cécile Canovas-Dumas
, Louis Goubin:
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems. Cryptography and Security 2012: 233-247 - [p1]Alexandre Berzati, Cécile Canovas-Dumas
, Louis Goubin:
A Survey of Differential Fault Analysis Against Classical RSA Implementations. Fault Analysis in Cryptography 2012: 111-124 - 2011
- [c11]Mathilde Soucarros, Cécile Canovas-Dumas
, Jessy Clédière
, Philippe Elbaz-Vincent, Denis Réal:
Influence of the temperature on true random number generators. HOST 2011: 24-27 - 2010
- [c10]Alexandre Berzati, Cécile Canovas-Dumas
, Louis Goubin:
Public Key Perturbation of Randomized RSA Implementations. CHES 2010: 306-319 - [i4]Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin:
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems. IACR Cryptol. ePrint Arch. 2010: 582 (2010)
2000 – 2009
- 2009
- [c9]Alexandre Berzati, Cécile Canovas
, Jean-Guillaume Dumas
, Louis Goubin:
Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. CT-RSA 2009: 414-428 - [c8]Guilhem Castagnos, Alexandre Berzati, Cécile Canovas
, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier, Stephanie Salgado:
Fault Analysis of Grain-128. HOST 2009: 7-14 - [c7]Alexandre Berzati, Cécile Canovas-Dumas
, Louis Goubin:
Fault Analysis of Rabbit: Toward a Secret Key Leakage. INDOCRYPT 2009: 72-87 - [i3]Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas
, Louis Goubin:
Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable. CoRR abs/0901.0911 (2009) - 2008
- [c6]Thanh-Ha Le, Cécile Canovas
, Jessy Clédière
:
An overview of side channel analysis attacks. AsiaCCS 2008: 33-43 - [c5]Alexandre Berzati, Cécile Canovas
, Louis Goubin:
Perturbating RSA Public Keys: An Improved Attack. CHES 2008: 380-395 - [c4]Denis Réal, Cécile Canovas
, Jessy Clédière
, M'hamed Drissi, Frédéric Valette:
Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis. DATE 2008: 1274-1279 - [c3]Alexandre Berzati, Cécile Canovas
, Louis Goubin:
In(security) Against Fault Injection Attacks for CRT-RSA Implementations. FDTC 2008: 101-107 - 2007
- [i2]Thanh-Ha Le, Quoc-Thinh Nguyen-Vuong, Cécile Canovas, Jessy Clédière:
Novel Approaches for Improving the Power Consumption Models in Correlation Analysis. IACR Cryptol. ePrint Arch. 2007: 306 (2007) - 2006
- [c2]Thanh-Ha Le, Jessy Clédière
, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume:
A Proposition for Correlation Power Analysis Enhancement. CHES 2006: 174-186 - 2005
- [i1]Cécile Canovas, Jessy Clédière:
What do S-boxes Say in Differential Side Channel Attacks? IACR Cryptol. ePrint Arch. 2005: 311 (2005) - 2000
- [c1]Cécile Canovas-Dumas, Paul Caspi:
A PVS Proof Obligation Generator for Lustre Programs. LPAR 2000: 179-188
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint