Follow
Romain Poussier
Romain Poussier
Research Scientist, Nanyang Technological University, Singapore
Verified email at uclouvain.be
Title
Cited by
Cited by
Year
Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis)
L Lerman, R Poussier, G Bontempi, O Markowitch, FX Standaert
Constructive Side-Channel Analysis and Secure Design: 6th International …, 2015
1702015
Simple key enumeration (and rank estimation) using histograms: An integrated approach
R Poussier, FX Standaert, V Grosso
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
1062016
Simpler and more efficient rank estimation for side-channel security assessment
C Glowacz, V Grosso, R Poussier, J Schüth, FX Standaert
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
932015
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
L Lerman, R Poussier, O Markowitch, FX Standaert
Journal of Cryptographic Engineering, 1-13, 2017
602017
On configurable SCA countermeasures against single trace attacks for the NTT: A performance evaluation study over Kyber and Dilithium on the arm Cortex-M4
P Ravi, R Poussier, S Bhasin, A Chattopadhyay
Security, Privacy, and Applied Cryptography Engineering: 10th International …, 2020
482020
Connecting and improving direct sum masking and inner product masking
R Poussier, Q Guo, FX Standaert, C Carlet, S Guilley
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
382018
Comparing approaches to rank estimation for side-channel security evaluations
R Poussier, V Grosso, FX Standaert
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
332016
SITM: See-in-the-middle side-channel assisted middle round differential cryptanalysis on SPN block ciphers
S Bhasin, J Breier, X Hou, D Jap, R Poussier, SM Sim
IACR Transactions on Cryptographic Hardware and Embedded Systems, 95-122, 2020
262020
A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
R Poussier, Y Zhou, FX Standaert
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
252017
Score-based vs. probability-based enumeration–a cautionary note
MO Choudary, R Poussier, FX Standaert
Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016
172016
Cache vs. key-dependency: Side channeling an implementation of Pilsung
D Genkin, R Poussier, RQ Sim, Y Yarom, Y Zhao
IACR Transactions on Cryptographic Hardware and Embedded Systems, 231-255, 2020
162020
Combining Leakage-Resilient PRFs and Shuffling: Towards Bounded Security for Small Embedded Devices
V Grosso, R Poussier, FX Standaert, L Gaspar
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
112015
A finer-grain analysis of the leakage (non) resilience of OCB
F Berti, S Bhasin, J Breier, X Hou, R Poussier, FX Standaert, B Udvarhelyi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 461-481, 2022
92022
Fast side-channel security evaluation of ECC implementations: shortcut formulas for horizontal side-channel attacks against ECSM with the montgomery ladder
M Azouaoui, R Poussier, FX Standaert
Constructive Side-Channel Analysis and Secure Design: 10th International …, 2019
92019
On the worst-case side-channel security of ECC point randomization in embedded devices
M Azouaoui, F Durvaux, R Poussier, FX Standaert, K Papagiannopoulos, ...
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
82020
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
M Azouaoui, R Poussier, FX Standaert, V Verneuil
Smart Card Research and Advanced Applications: 18th International Conference …, 2020
82020
Key Enumeration, Rank Estimation and Horizontal Side-Channel Attacks
R Poussier
ICTEAM Institute, 2017
52017
Secure your SOC: building system-an-chip designs for security
S Bhasin, TE Carlson, A Chattopadhyay, VBY Kumar, A Mendelson, ...
2020 IEEE 33rd International System-on-Chip Conference (SOCC), 248-253, 2020
12020
Divide-and-Conquer Side-Channel Attacks
R Poussier
Encyclopedia of Cryptography, Security and Privacy, 1-4, 2023
2023
Mitigating Power Attacks through Fine-Grained Instruction Reordering
Y Chen, A Hajiabadi, R Poussier, A Diavastos, S Bhasin, TE Carlson
arXiv preprint arXiv:2107.11336, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20