default search action
Lilian Bossuet
Person information
- affiliation: University of Lyon, Saint-Etienne, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Damien Robissout, Lilian Bossuet, Amaury Habrard:
Scoring the predictions: a way to improve profiling side-channel attacks. J. Cryptogr. Eng. 14(3): 513-535 (2024) - [j36]Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso:
Switching Off your Device Does Not Protect Against Fault Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 425-450 (2024) - [c76]Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino:
A Lightweight Non-Oscillatory Delay-Sensor for Remote Power Analysis. HOST 2024: 343-348 - [c75]Anis Fellah-Touta, Lilian Bossuet, Vincent Grosso, Carlos Andres Lara-Nino:
Lightweight Active Fences for FPGAs. VLSI-SoC 2024: 1-4 - [i16]Damien Robissout, Lilian Bossuet, Amaury Habrard:
Scoring the predictions: a way to improve profiling side-channel attacks. IACR Cryptol. ePrint Arch. 2024: 558 (2024) - [i15]Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso:
Switching Off your Device Does Not Protect Against Fault Attacks. IACR Cryptol. ePrint Arch. 2024: 1123 (2024) - 2023
- [j35]Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli:
Conditional Variational AutoEncoder based on Stochastic Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 310-357 (2023) - [c74]Lilian Bossuet, Carlos Andres Lara-Nino:
Emulating Covert Data Transmission on Heterogeneous SoCs. AsianHOST 2023: 1-6 - [c73]Raphaële Milan, Lilian Bossuet, Loïc Lagadec, Carlos Andres Lara-Nino, Brice Colombier:
TrustSoC: Light and Efficient Heterogeneous SoC Architecture, Secure-by-design. AsianHOST 2023: 1-6 - [c72]Dorian Llavata, Eleonora Cagli, Rémi Eyraud, Vincent Grosso, Lilian Bossuet:
Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks. CARDIS 2023: 235-255 - [c71]Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino:
Combined Internal Attacks on SoC-FPGAs: Breaking AES with Remote Power Analysis and Frequency-based Covert Channels. EuroS&P Workshops 2023: 281-286 - [c70]Lilian Bossuet, Vincent Grosso, Carlos Andres Lara-Nino:
Emulating Side Channel Attacks on gem5: lessons learned. EuroS&P Workshops 2023: 287-295 - [c69]Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno:
Low-Latency Masking with Arbitrary Protection Order Based on Click Elements. HOST 2023: 36-47 - [c68]Lilian Bossuet, Carlos Andres Lara-Nino:
Advanced Covert-Channels in Modern SoCs. HOST 2023: 80-88 - [c67]Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso:
BALoo: First and Efficient Countermeasure Dedicated to Persistent Fault Attacks. IOLTS 2023: 1-7 - [c66]Raphaële Milan, Loïc Lagadec, Théotime Bollengier, Lilian Bossuet, Ciprian Teodorov:
Secured-by-design systems-on-chip: a MBSE Approach. RSP 2023: 07:1-07:7 - [i14]Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso:
BALoo: First and Efficient Countermeasure dedicated to Persistent Fault Attacks. IACR Cryptol. ePrint Arch. 2023: 944 (2023) - 2022
- [c65]Mateus Simoes, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno:
Self-timed Masking: Implementing Masked S-Boxes Without Registers. CARDIS 2022: 146-164 - [c64]Gaëtan Leplus, Olivier Savry, Lilian Bossuet:
SecDec: Secure Decode Stage thanks to masking of instructions with the generated signals. DSD 2022: 556-563 - [c63]Gaëtan Leplus, Olivier Savry, Lilian Bossuet:
Insertion of random delay with context-aware dummy instructions generator in a RISC-V processor. HOST 2022: 81-84 - [i13]Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli:
Conditional Variational AutoEncoder based on Stochastic Attack. IACR Cryptol. ePrint Arch. 2022: 232 (2022) - [i12]Mateus Simoes, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad:
Self-Timed Masking: Implementing First-Order Masked S-Boxes Without Registers. IACR Cryptol. ePrint Arch. 2022: 641 (2022) - 2021
- [j34]Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Cuauhtemoc Mancillas-López, Carolina Del-Valle-Soto, Lilian Bossuet:
The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis. Comput. Electr. Eng. 94: 107311 (2021) - [j33]Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso:
Improving Deep Learning Networks for Profiled Side-channel Analysis Using Performance Improvement Techniques. ACM J. Emerg. Technol. Comput. Syst. 17(3): 41:1-41:30 (2021) - [j32]Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli:
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 25-55 (2021) - [j31]Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study on Public-Key Algorithms -. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 60-96 (2021) - [c62]Brice Colombier, Paul Grandamme, Julien Vernay, Émilie Chanavat, Lilian Bossuet, Lucie de Laulanié, Bruno Chassagne:
Multi-Spot Laser Fault Injection Setup: New Possibilities for Fault Injection Attacks. CARDIS 2021: 151-166 - [c61]Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet:
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem. EUROCRYPT (2) 2021: 438-467 - [c60]Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin:
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. EuroS&P Workshops 2021: 96-102 - [c59]Lilian Bossuet, El Mehdi Benhani:
Security Assessment of Heterogeneous SoC-FPGA: On the Practicality of Cache Timing Attacks. VLSI-SoC 2021: 1-6 - [c58]Julie Roux, Katell Morin-Allory, Vincent Beroulle, Régis Leveugle, Lilian Bossuet, Frédéric Cézilly, Frédéric Berthoz, Gilles Genévrier, François Cerisier:
Cross-layer Approach to Assess FMEA on Critical Systems and Evaluate High-Level Model Realism. VLSI-SoC 2021: 1-6 - [c57]Julie Roux, Katell Morin-Allory, Vincent Beroulle, Lilian Bossuet, Frédéric Cézilly, Frédéric Berthoz, Gilles Genévrier, François Cerisier, Régis Leveugle:
FMEA on Critical Systems: A Cross-Layer Approach Based on High-Level Models. VLSI-SoC (Selected Papers) 2021: 113-133 - [i11]Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study on Public-Key Algorithms -. IACR Cryptol. ePrint Arch. 2021: 909 (2021) - [i10]Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso:
Improving Deep Learning Networks for Profiled Side-Channel Analysis Using Performance Improvement Techniques. IACR Cryptol. ePrint Arch. 2021: 1546 (2021) - 2020
- [j30]Lilian Bossuet, Cuauhtemoc Mancillas-López, Brisbane Ovilla-Martinez:
Pipelined Hardware Implementation of COPA, ELmD, and COLM. IEEE Trans. Computers 69(10): 1533-1543 (2020) - [j29]Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:
Methodology for Efficient CNN Architectures in Profiling Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 1-36 (2020) - [c56]Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard:
Online Performance Evaluation of Deep Learning Networks for Profiled Side-Channel Analysis. COSADE 2020: 200-218 - [c55]Brice Colombier, Nathalie Bochard, Florent Bernard, Lilian Bossuet:
Backtracking Search for Optimal Parameters of a PLL-based True Random Number Generator. DATE 2020: 1-6 - [c54]Julie Roux, Vincent Beroulle, Katell Morin-Allory, Régis Leveugle, Lilian Bossuet, Frédéric Cézilly, Frédéric Berthoz, Gilles Genévrier, François Cerisier:
Cross Layer Fault Simulations for Analyzing the Robustness of RTL Designs in Airborne Systems. DDECS 2020: 1-4 - [c53]Lilian Bossuet:
Physical Security of Ring-based PUF. ECCTD 2020: 1-5 - [c52]Julie Roux, Vincent Beroulle, Katell Morin-Allory, Régis Leveugle, Lilian Bossuet, Frédéric Cézilly, Frédéric Berthoz, Gilles Genévrier, François Cerisier:
High Level Fault Injection Method for Evaluating Critical System Parameter Ranges. ICECS 2020: 1-4 - [i9]El Mehdi Benhani, Cuauhtemoc Mancillas López, Lilian Bossuet:
Secure Internal Communication of a Trustzone-Enabled Heterogeneous Soc Lightweight Encryption. CoRR abs/2009.06896 (2020) - [i8]Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard:
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2020: 39 (2020) - [i7]Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:
Understanding Methodology for Efficient CNN Architectures in Profiling Attacks. IACR Cryptol. ePrint Arch. 2020: 757 (2020) - [i6]Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli:
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2020: 872 (2020) - [i5]Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet:
Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 900 (2020)
2010 – 2019
- 2019
- [j28]El Mehdi Benhani, Lilian Bossuet, Alain Aubert:
The Security of ARM TrustZone in a FPGA-Based SoC. IEEE Trans. Computers 68(8): 1238-1248 (2019) - [j27]Ugo Mureddu, Nathalie Bochard, Lilian Bossuet, Viktor Fischer:
Experimental Study of Locking Phenomena on Oscillating Rings Implemented in Logic Devices. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(7): 2560-2571 (2019) - [c51]El Mehdi Benhani, Cuauhtemoc Mancillas López, Lilian Bossuet:
Secure Internal Communication of a Trustzone-Enabled Heterogeneous Soc Lightweight Encryption. FPT 2019: 239-242 - [c50]Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer:
Transient Effect Ring Oscillators Leak Too. ISVLSI 2019: 37-42 - [i4]El Mehdi Benhani, Lilian Bossuet:
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC. CoRR abs/1902.08517 (2019) - [i3]Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer:
Transient Effect Ring Oscillators Leak Too. IACR Cryptol. ePrint Arch. 2019: 300 (2019) - [i2]Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:
Methodology for Efficient CNN Architectures in Profiling Attacks. IACR Cryptol. ePrint Arch. 2019: 803 (2019) - 2018
- [j26]Fabien Majéric, Benoit Gonzalvo, Lilian Bossuet:
JTAG Fault Injection Attack. IEEE Embed. Syst. Lett. 10(3): 65-68 (2018) - [j25]Cédric Marchand, Lilian Bossuet, Ugo Mureddu, Nathalie Bochard, Abdelkarim Cherkaoui, Viktor Fischer:
Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1): 97-109 (2018) - [c49]El Mehdi Benhani, Lilian Bossuet:
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC. ICECS 2018: 489-492 - 2017
- [j24]Cédric Marchand, Lilian Bossuet, Kris Gaj:
Area-oriented comparison of lightweight block ciphers implemented in hardware for the activation mechanism in the anti-counterfeiting schemes. Int. J. Circuit Theory Appl. 45(2): 274-291 (2017) - [j23]Cezar Reinbrecht, Altamiro Amadeu Susin, Lilian Bossuet, Georg Sigl, Johanna Sepúlveda:
Timing attack on NoC-based systems: Prime+Probe attack and NoC-based protection. Microprocess. Microsystems 52: 556-565 (2017) - [j22]Brice Colombier, Lilian Bossuet, Viktor Fischer, David Hély:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. IEEE Trans. Inf. Forensics Secur. 12(8): 1988-2002 (2017) - [c48]Brice Colombier, Ugo Mureddu, Marek Laban, Oto Petura, Lilian Bossuet, Viktor Fischer:
Complete activation scheme for FPGA-oriented IP cores design protection. FPL 2017: 1 - [c47]Brice Colombier, Lilian Bossuet, Ugo Mureddu, David Hély:
A comprehensive hardware/software infrastructure for IP cores design protection. FPT 2017: 263-266 - [c46]Brice Colombier, Lilian Bossuet, David Hély:
Centrality Indicators for Efficient and Scalable Logic Masking. ISVLSI 2017: 98-103 - [c45]Ugo Mureddu, Oto Petura, Nathalie Bochard, Lilian Bossuet, Viktor Fischer:
Efficient design of Oscillator based Physical Unclonable Functions on Flash FPGAs. IVSW 2017: 146-151 - [c44]El Mehdi Benhani, Cédric Marchand, Alain Aubert, Lilian Bossuet:
On the security evaluation of the ARM TrustZone extension in a heterogeneous SoC. SoCC 2017: 108-113 - [c43]Brisbane Ovilla-Martinez, Lilian Bossuet:
Restoration protocol: Lightweight and secur devices authentication based on PUF. VLSI-SoC 2017: 1-6 - 2016
- [j21]Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer:
Fault model of electromagnetic attacks targeting ring oscillator-based true random number generators. J. Cryptogr. Eng. 6(1): 61-74 (2016) - [j20]Lilian Bossuet, Giorgio Di Natale, Paris Kitsos:
Introduction to Special Issue on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE). Microprocess. Microsystems 47: 1-2 (2016) - [j19]Edward Jung, Lilian Bossuet, Seonho Choi, Cédric Marchand:
Identification of IP control units by state encoding and side channel verification. Microprocess. Microsystems 47: 11-22 (2016) - [j18]Brice Colombier, Lilian Bossuet, David Hély:
From secured logic to IP protection. Microprocess. Microsystems 47: 44-54 (2016) - [j17]Lilian Bossuet, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi:
ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation. IEEE Trans. Computers 65(11): 3318-3331 (2016) - [j16]Abdelkarim Cherkaoui, Lilian Bossuet, Cédric Marchand:
Design, Evaluation, and Optimization of Physical Unclonable Functions Based on Transient Effect Ring Oscillators. IEEE Trans. Inf. Forensics Secur. 11(6): 1291-1305 (2016) - [j15]Lilian Bossuet, Brice Colombier:
Comments on "A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-per-Device Licensing". IEEE Trans. Inf. Forensics Secur. 11(11): 2624-2625 (2016) - [c42]Florent Bruguier, Pascal Benoit, Lionel Torres, Lilian Bossuet:
Hardware security: From concept to application. EWME 2016: 1-6 - [c41]Cédric Marchand, Lilian Bossuet, Abdelkarim Cherkaoui:
Enhanced TERO-PUF Implementations and Characterization on FPGAs (Abstract Only). FPGA 2016: 282 - [c40]Oto Petura, Ugo Mureddu, Nathalie Bochard, Viktor Fischer, Lilian Bossuet:
A survey of AIS-20/31 compliant TRNG cores suitable for FPGA devices. FPL 2016: 1-10 - [c39]Fabien Majéric, Eric Bourbao, Lilian Bossuet:
Electromagnetic security tests for SoC. ICECS 2016: 265-268 - [c38]Cédric Marchand, Lilian Bossuet, Abdelkarim Cherkaoui:
Design and Characterization of the TERO-PUF on SRAM FPGAs. ISVLSI 2016: 134-139 - [c37]Cezar Reinbrecht, Altamiro Amadeu Susin, Lilian Bossuet, Johanna Sepúlveda:
Gossip NoC - Avoiding Timing Side-Channel Attacks through Traffic Management. ISVLSI 2016: 601-606 - [c36]Fabien Majéric, Benoit Gonzalvo, Lilian Bossuet:
JTAG Combined Attack - Another Approach for Fault Injection. NTMS 2016: 1-5 - [c35]Cezar Reinbrecht, Altamiro Amadeu Susin, Lilian Bossuet, Georg Sigl, Martha Johanna Sepúlveda:
Side channel attack on NoC-based MPSoCs are practical: NoC Prime+Probe attack. SBCCI 2016: 1-6 - [i1]Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. IACR Cryptol. ePrint Arch. 2016: 939 (2016) - 2015
- [j14]Lilian Bossuet, Pierre Bayon, Viktor Fischer:
An Ultra-Lightweight Transmitter for Contactless Rapid Identification of Embedded IP in FPGA. IEEE Embed. Syst. Lett. 7(4): 97-100 (2015) - [j13]Lilian Bossuet, Viktor Fischer, Lubos Gaspar, Lionel Torres, Guy Gogniat:
Disposable configuration of remotely reconfigurable systems. Microprocess. Microsystems 39(6): 382-392 (2015) - [c34]Brice Colombier, Lilian Bossuet:
Functional Locking Modules for Design Protection of Intellectual Property Cores. FCCM 2015: 233 - [c33]Brice Colombier, Lilian Bossuet, David Hély:
Reversible Denial-of-Service by Locking Gates Insertion for IP Cores Design Protection. ISVLSI 2015: 210-215 - [c32]Edward Jung, Cédric Marchand, Lilian Bossuet:
Identification of embedded control units by state encoding and power consumption analysis. SAC 2015: 1957-1959 - [c31]Lilian Bossuet, Viktor Fischer, Pierre Bayon:
Contactless transmission of intellectual property data to protect FPGA designs. VLSI-SoC 2015: 19-24 - [c30]Lilian Bossuet, Pierre Bayon, Viktor Fischer:
Electromagnetic Transmission of Intellectual Property Data to Protect FPGA Designs. VLSI-SoC (Selected Papers) 2015: 150-169 - 2014
- [j12]Brice Colombier, Lilian Bossuet:
Survey of hardware protection of design data for integrated circuits and intellectual properties. IET Comput. Digit. Tech. 8(6): 274-287 (2014) - [j11]Lilian Bossuet:
Sustainable electronics: On the trail of reconfigurable computing. Sustain. Comput. Informatics Syst. 4(3): 196-202 (2014) - [j10]Lilian Bossuet, Xuan Thuy Ngo, Zouha Cherif, Viktor Fischer:
A PUF Based on a Transient Effect Ring Oscillator and Insensitive to Locking Phenomenon. IEEE Trans. Emerg. Top. Comput. 2(1): 30-36 (2014) - [c29]Abdelkarim Cherkaoui, Lilian Bossuet, Ludwig Seitz, Göran Selander, Ravishankar Borgaonkar:
New paradigms for access control in constrained environments. ReCoSoC 2014: 1-4 - [c28]Cédric Marchand, Lilian Bossuet, Edward Jung:
IP watermark verification based on power consumption analysis. SoCC 2014: 330-335 - [c27]Paolo Maistri, Régis Leveugle, Lilian Bossuet, Alain Aubert, Viktor Fischer, Bruno Robisson, Nicolas Moro, Philippe Maurine, Jean-Max Dutertre, Mathieu Lisart:
Electromagnetic analysis and fault injection onto secure circuits. VLSI-SoC 2014: 1-6 - 2013
- [j9]Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat:
Architectures of flexible symmetric key crypto engines - a survey: From hardware coprocessor to multi-crypto-processor system on chip. ACM Comput. Surv. 45(4): 41:1-41:32 (2013) - [c26]Lilian Bossuet:
Teaching FPGA security. FPT 2013: 306-309 - [c25]Zouha Cherif, Jean-Luc Danger, Florent Lozach, Yves Mathieu, Lilian Bossuet:
Evaluation of delay PUFs on CMOS 65 nm technology: ASIC vs FPGA. HASP@ISCA 2013: 4 - [c24]Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer:
Electromagnetic analysis on ring oscillator-based true random number generators. ISCAS 2013: 1954-1957 - 2012
- [j8]Bertrand Le Gal, Lilian Bossuet:
Automatic low-cost IP watermarking technique based on output mark insertions. Des. Autom. Embed. Syst. 16(2): 71-92 (2012) - [j7]Lubos Gaspar, Viktor Fischer, Lilian Bossuet, Robert Fouquet:
Secure Extension of FPGA General Purpose Processors for Symmetric Key Cryptography with Partial Reconfiguration Capabilities. ACM Trans. Reconfigurable Technol. Syst. 5(3): 16:1-16:13 (2012) - [c23]Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer, François Poucheret, Bruno Robisson, Philippe Maurine:
Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator. COSADE 2012: 151-166 - [c22]Zouha Cherif, Jean-Luc Danger, Sylvain Guilley, Lilian Bossuet:
An Easy-to-Design PUF Based on a Single Oscillator: The Loop PUF. DSD 2012: 156-162 - 2011
- [j6]Vincent Kerzerho, Vincent Fresnaud, Dominique Dallet, Serge Bernard, Lilian Bossuet:
Fast Digital Post-Processing Technique for Integral Nonlinearity Correction of Analog-to-Digital Converters: Validation on a 12-Bit Folding-and-Interpolating Analog-to-Digital Converter. IEEE Trans. Instrum. Meas. 60(3): 768-775 (2011) - [c21]Michael Grand, Lilian Bossuet, Bertrand Le Gal, Guy Gogniat, Dominique Dallet:
Design and Implementation of a Multi-Core Crypto-Processor for Software Defined Radios. ARC 2011: 29-40 - [c20]Lubos Gaspar, Viktor Fischer, Lilian Bossuet, Milos Drutarovský:
Cryptographic Extension for Soft General-Purpose Processors with Secure Key Management. FPL 2011: 500-505 - [c19]Michael Grand, Lilian Bossuet, Guy Gogniat, Bertrand Le Gal, Jean-Philippe Delahaye, Dominique Dallet:
A Reconfigurable Multi-core Cryptoprocessor for Multi-channel Communication Systems. IPDPS Workshops 2011: 204-211 - [c18]Lubos Gaspar, Viktor Fischer, Lilian Bossuet, Robert Fouquet:
Secure extensions of FPGA soft core processors for symmetric key cryptography. ReCoSoC 2011: 1-8 - 2010
- [c17]Bertrand Le Gal, Aurélien Ribon, Lilian Bossuet, Dominique Dallet:
Area optimization of ROM-based controllers dedicated to digital signal processing applications. EUSIPCO 2010: 547-551 - [c16]Nicolas Mechouk, Dominique Dallet, Lilian Bossuet, Bertrand Le Gal:
A low-area filter bank design methodology for on-chip ADC testing. ICECS 2010: 718-721 - [c15]Lubos Gaspar, Viktor Fischer, Florent Bernard, Lilian Bossuet, Pascal Cotret:
HCrypt: A Novel Concept of Crypto-processor with Secured Key Management. ReConFig 2010: 280-285 - [c14]Bertrand Le Gal, Aurélien Ribon, Lilian Bossuet, Dominique Dallet:
Reducing and smoothing power consumption of ROM-based controller implementations. SBCCI 2010: 8-13
2000 – 2009
- 2008
- [j5]Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-Philippe Diguet, Lilian Bossuet, Romain Vaslin:
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective. IEEE Trans. Very Large Scale Integr. Syst. 16(2): 144-155 (2008) - [c13]Guillaume Ferré, Bertrand Le Gal, Lilian Bossuet, Maher Jridi, Dominique Dallet, Pierre Colucci:
Orthogonal correction implementation for time interleaved analog-to-digital converters: Realtime application. EUSIPCO 2008: 1-5 - [c12]Guillaume Ferré, Maher Jridi, Lilian Bossuet, Bertrand Le Gal, Dominique Dallet:
A new orthogonal online digital calibration for time-interleaved analog-to-digital converters. ISCAS 2008: 576-579 - 2007
- [j4]Lilian Bossuet, Guy Gogniat, Jean Luc Philippe:
Communication-Oriented Design Space Exploration for Reconfigurable Architectures. EURASIP J. Embed. Syst. 2007 (2007) - [c11]Bertrand Le Gal, Lilian Bossuet, Dominique Dallet:
Mathematical functions based watermarking for IPP. ICECS 2007: 310-313 - [c10]Bertrand Le Gal, Lilian Bossuet, Shafqat Khan, Emmanuel Casseau:
HLS design flow for the synthesis of multimode systems under multiple constraints. ICECS 2007: 314-317 - 2006
- [j3]Lilian Bossuet, Guy Gogniat, Wayne P. Burleson:
Dynamically configurable security for SRAM FPGA bitstreams. Int. J. Embed. Syst. 2(1/2): 73-85 (2006) - [j2]Sébastien Bilavarn, Guy Gogniat, Jean Luc Philippe, Lilian Bossuet:
Design Space Pruning Through Early Estimations of Area/Delay Tradeoffs for FPGA Implementations. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(10): 1950-1968 (2006) - [j1]Lilian Bossuet, Guy Gogniat, Jean Luc Philippe:
Exploration de l'espace de conception des architectures reconfigurables. Tech. Sci. Informatiques 25(7): 921-946 (2006) - [c9]Vincent Fresnaud, Lilian Bossuet, Dominique Dallet, Serge Bernard, Jean-Marie Janik, B. Agnus, Philippe Cauvet, Ph. Gandy:
A Low Cost Alternative Method for Harmonics Estimation in a BIST Context. ETS 2006: 193-198 - [c8]Maher Jridi, Guillaume Monnerie, Lilian Bossuet, Dominique Dallet:
An offset and gain calibration method for time-interleaved analog to digital converters. ICECS 2006: 1097-1100 - 2005
- [c7]Lilian Bossuet, Guy Gogniat, Jean Luc Philippe:
Generic Design Space Exploration for Reconfigurable Architectures. IPDPS 2005 - [c6]Guy Gogniat, Wayne P. Burleson, Lilian Bossuet:
Configurable Computing for High-Security/High-Performance Ambient Systems. SAMOS 2005: 72-81 - 2004
- [c5]Lilian Bossuet, Guy Gogniat, Wayne P. Burleson:
Dynamically Configurable Security for SRAM FPGA Bitstreams. IPDPS 2004 - 2003
- [c4]Lilian Bossuet, Guy Gogniat, Jean Luc Philippe:
Fast Design Space Exploration Method for Reconfigurable Architectures. Engineering of Reconfigurable Systems and Algorithms 2003: 65-71 - [c3]Lilian Bossuet, Guy Gogniat, Jean Luc Philippe:
Communication Costs Driven Design Space Exploration for Reconfigurable Architectures. FPL 2003: 921-933 - [c2]Lilian Bossuet, Wayne P. Burleson, Guy Gogniat, Vikas Anand, Andrew Laffely, Jean Luc Philippe:
Targeting Tiled Architectures in Design Exploration. IPDPS 2003: 172 - [c1]Sébastien Bilavarn, Guy Gogniat, Jean Luc Philippe, Lilian Bossuet:
Fast prototyping of reconfigurable architectures from a C program. ISCAS (5) 2003: 589-592
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint