default search action
Bruno Robisson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c32]Hélène Le Bouder, Gaël Thomas, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria:
An Evaluation Tool for Physical Attacks. ADHOC-NOW 2018: 112-119 - [c31]Damien Couroussé, Thierno Barry, Bruno Robisson, Nicolas Belleville, Philippe Jaillon, Olivier Potin, Hélène Le Bouder, Jean-Louis Lanet, Karine Heydemann:
All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. CS2@HiPEAC 2018: 17-18 - [p1]Nicolas Belleville, Karine Heydemann, Damien Couroussé, Thierno Barry, Bruno Robisson, Abderrahmane Seriai, Henri-Pierre Charles:
Automatic Application of Software Countermeasures Against Physical Attacks. Cyber-Physical Systems Security 2018: 135-155 - 2017
- [j4]Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan:
Smart security management in secure devices. J. Cryptogr. Eng. 7(1): 47-61 (2017) - [i9]Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. IACR Cryptol. ePrint Arch. 2017: 699 (2017) - 2016
- [j3]Bruno Robisson, Hélène Le Bouder:
Physical functions: the common factor of side-channel and fault attacks? J. Cryptogr. Eng. 6(3): 217-227 (2016) - [c30]Karim M. Abdellatif, Christian Cornesse, Jacques J. A. Fournier, Bruno Robisson:
New Partitioning Approach for Hardware Trojan Detection Using Side-Channel Measurements. ARC 2016: 171-182 - [c29]Thierno Barry, Damien Couroussé, Bruno Robisson:
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks. CS2@HiPEAC 2016: 1-6 - [c28]Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. WISTP 2016: 136-152 - 2015
- [c27]Xuan Thuy Ngo, Ingrid Exurville, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Jean-Baptiste Rigaud, Bruno Robisson:
Hardware trojan detection by delay and electromagnetic measurements. DATE 2015: 782-787 - [c26]Clement Champeix, Nicolas Borrel, Jean-Max Dutertre, Bruno Robisson, Mathieu Lisart, Alexandre Sarafianos:
SEU sensitivity and modeling using pico-second pulsed laser stimulation of a D Flip-Flop in 40 nm CMOS technology. DFTS 2015: 177-182 - [c25]Loïc Zussa, Ingrid Exurville, Jean-Max Dutertre, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria, Jessy Clédière:
Evidence of an information leakage between logically independent blocks. CS2@HiPEAC 2015: 25-30 - [c24]Ingrid Exurville, Loïc Zussa, Jean-Baptiste Rigaud, Bruno Robisson:
Resilient hardware Trojans detection based on path delay measurements. HOST 2015: 151-156 - [c23]Clement Champeix, Nicolas Borrel, Jean-Max Dutertre, Bruno Robisson, Mathieu Lisart, Alexandre Sarafianos:
Experimental validation of a Bulk Built-In Current Sensor for detecting laser-induced currents. IOLTS 2015: 150-155 - [i8]Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan:
Smart Security Management in Secure Devices. IACR Cryptol. ePrint Arch. 2015: 670 (2015) - 2014
- [j2]Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson:
Formal verification of a software countermeasure against instruction skip attacks. J. Cryptogr. Eng. 4(3): 145-156 (2014) - [c22]Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz:
Experimental evaluation of two software countermeasures against fault attacks. HOST 2014: 112-117 - [c21]Loïc Zussa, Jean-Max Dutertre, Jessy Clédière, Bruno Robisson:
Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter. HOST 2014: 130-135 - [c20]Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon, Philippe Lalevée:
COGITO: Code Polymorphism to Secure Devices. SECRYPT 2014: 451-456 - [c19]Laurent Chusseau, Rachid Omarouayache, Jérémy Raoult, Sylvie Jarrix, Philippe Maurine, Karim Tobich, Alexandre Boyer, Bertrand Vrignon, John Shepherd, Thanh-Ha Le, Maël Berthier, Lionel Rivière, Bruno Robisson, Anne-Lise Ribotta:
Electromagnetic analysis, deciphering and reverse engineering of integrated circuits (E-MATA HARI). VLSI-SoC 2014: 1-6 - [c18]Paolo Maistri, Régis Leveugle, Lilian Bossuet, Alain Aubert, Viktor Fischer, Bruno Robisson, Nicolas Moro, Philippe Maurine, Jean-Max Dutertre, Mathieu Lisart:
Electromagnetic analysis and fault injection onto secure circuits. VLSI-SoC 2014: 1-6 - [i7]Nicolas Moro, Amine Dehbaoui, Karine Heydemann, Bruno Robisson, Emmanuelle Encrenaz:
Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. CoRR abs/1402.6421 (2014) - [i6]Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson:
Formal verification of a software countermeasure against instruction skip attacks. CoRR abs/1402.6461 (2014) - [i5]Nicolas Moro, Karine Heydemann, Amine Dehbaoui, Bruno Robisson, Emmanuelle Encrenaz:
Experimental evaluation of two software countermeasures against fault attacks. CoRR abs/1407.6019 (2014) - [i4]Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria:
A Unified Formalism for Physical Attacks. IACR Cryptol. ePrint Arch. 2014: 682 (2014) - [i3]Bruno Robisson, Hélène Le Bouder:
Physical functions : the common factor of side-channel and fault attacks ? IACR Cryptol. ePrint Arch. 2014: 927 (2014) - 2013
- [c17]Nicolas Moro, Amine Dehbaoui, Karine Heydemann, Bruno Robisson, Emmanuelle Encrenaz:
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller. FDTC 2013: 77-88 - [c16]Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria:
Fault Injection to Reverse Engineer DES-Like Cryptosystems. FPS 2013: 105-121 - [c15]Ingrid Exurville, Jacques J. A. Fournier, Jean-Max Dutertre, Bruno Robisson, Assia Tria:
Practical measurements of data path delays for IP authentication & integrity verification. ReCoSoC 2013: 1-6 - [i2]Karine Heydemann, Nicolas Moro, Emmanuelle Encrenaz, Bruno Robisson:
Formal verification of a software countermeasure against instruction skip attacks. IACR Cryptol. ePrint Arch. 2013: 679 (2013) - 2012
- [c14]Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer, François Poucheret, Bruno Robisson, Philippe Maurine:
Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator. COSADE 2012: 151-166 - [c13]Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, Assia Tria:
Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES. FDTC 2012: 7-15 - [c12]Ronan Lashermes, Guillaume Reymond, Jean-Max Dutertre, Jacques J. A. Fournier, Bruno Robisson, Assia Tria:
A DFA on AES Based on the Entropy of Error Distributions. FDTC 2012: 34-43 - [i1]Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, P. Orsatelli, Philippe Maurine, Assia Tria:
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-. IACR Cryptol. ePrint Arch. 2012: 123 (2012) - 2011
- [j1]Jacques J. A. Fournier, Jean-Baptiste Rigaud, Sylvain Bouquet, Bruno Robisson, Assia Tria, Jean-Max Dutertre, Michel Agoyan:
Design and characterisation of an AES chip embedding countermeasures. Int. J. Intell. Eng. Informatics 1(3/4): 328-347 (2011) - [c11]François Poucheret, Karim Tobich, Mathieu Lisart, Laurent Chusseau, Bruno Robisson, Philippe Maurine:
Local and Direct EM Injection of Power Into CMOS Integrated Circuits. FDTC 2011: 100-104 - [c10]Nguyen Minh Huu, Bruno Robisson, Michel Agoyan, Nathalie Drach:
Low-cost recovery for the code integrity protection in secure embedded processors. HOST 2011: 99-104 - [c9]Marion Doulcier-Verdier, Jean-Max Dutertre, Jacques J. A. Fournier, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria:
A side-channel and fault-attack resistant AES circuit working on duplicated complemented values. ISSCC 2011: 274-276 - [c8]Bruno Robisson, Michel Agoyan, Sébastien Le Henaff, Patrick Soquet, Guillaume Phan, Franck Wajsbürt, Pirouz Bazargan-Sabet:
Implementation of Complex Strategies of Security Insecure Embedded Systems. NTMS 2011: 1-5 - [c7]Driss Aboulkassimi, Michel Agoyan, Laurent Freund, Jacques J. A. Fournier, Bruno Robisson, Assia Tria:
ElectroMagnetic analysis (EMA) of software AES on Java mobile phones. WIFS 2011: 1-6 - 2010
- [c6]Michel Agoyan, Jean-Max Dutertre, David Naccache, Bruno Robisson, Assia Tria:
When Clocks Fail: On Critical Paths and Clock Faults. CARDIS 2010: 182-193 - [c5]Nguyen Minh Huu, Bruno Robisson, Michel Agoyan, Nathalie Drach:
Low-cost fault tolerance on the ALU in simple pipelined processors. DDECS 2010: 28-31 - [c4]Jean-Baptiste Rigaud, Jean-Max Dutertre, Michel Agoyan, Bruno Robisson, Assia Tria:
Experimental Fault Injection based on the Prototyping of an AES Cryptosystem. ReCoSoC 2010: 141-147
2000 – 2009
- 2007
- [c3]Bruno Robisson, Pascal Manet:
Differential Behavioral Analysis. CHES 2007: 413-426 - 2006
- [c2]Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume:
A Proposition for Correlation Power Analysis Enhancement. CHES 2006: 174-186 - [c1]Pascal Manet, Jean-Baptiste Rigaud, Julien Francq, Marc Jeambrun, Assia Tria, Bruno Robisson, Jerome Quartana, Selma Laabidi:
Integrated Evaluation Platform for Secured Devices. ReCoSoC 2006: 214-219 - 2001
- [b1]Bruno Robisson:
Découverte automatique de circuits en électronique de puissance. (Automatic discovery of power electronic circuits). Pierre and Marie Curie University, Paris, France, 2001
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint