Follow
Simon Pontié
Simon Pontié
Verified email at cea.fr - Homepage
Title
Cited by
Cited by
Year
Electromagnetic Fault Injection as a New Forensic Approach for SoCs
C Gaine, D Aboulkassimi, S Pontié, JP Nikolovski, JM Dutertre
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
232020
Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack
É Tasso, L De Feo, N El Mrabet, S Pontié
Third PQC Standardization Conference (NIST) 2021, 2021
182021
Resistance of isogeny-based cryptographic implementations to a fault attack
É Tasso, L De Feo, N El Mrabet, S Pontié
Constructive Side-Channel Analysis and Secure Design: 12th International …, 2021
182021
SIKE Channels: Zero-Value Side-Channel Attacks on SIKE
L De Feo, N El Mrabet, A Genet, N Kaluderovic, N Linard de Guertechin, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 264-289, 2022
112022
A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters
R Joud, PA Moëllic, S Pontié, JB Rigaud
Smart Card Research and Advanced Applications: 21st International Conference …, 2023
102023
Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design
D Bellizia, N El Mrabet, AP Fournaris, S Pontié, F Regazzoni, ...
2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2021
102021
Comparison of side-channel leakage on Rich and Trusted Execution Environments
P Leignac, O Potin, JB Rigaud, JM Dutertre, S Pontié
Proceedings of the Sixth Workshop on Cryptography and Security in Computing …, 2019
82019
Dummy operations in scalar multiplication over elliptic curves: A tradeoff between security and performance
S Pontie, P Maistri, R Leveugle
Microprocessors and Microsystems 47, 23-36, 2016
82016
Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing
C Fanjas, C Gaine, D Aboulkassimi, S Pontié, O Potin
International Conference on Smart Card Research and Advanced Applications, 25-44, 2022
72022
Design of a secure architecture for scalar multiplication on elliptic curves
S Pontie, P Maistri
10th Conference on Ph. D. Research in Microelectronics and Electronics …, 2014
72014
HLS-based methodology for fast iterative development applied to Elliptic Curve arithmetic
S Pontie, A Bourge, A Prost-Boucle, P Maistri, O Muller, R Leveugle, ...
2016 Euromicro Conference on Digital System Design (DSD), 511-518, 2016
62016
Protection of ECC Computations against Side-Channel Attacks for Lightweight Implementations
T Backenstrass, M Blot, S Pontié, R Leveugle
6*
Sécurisation matérielle pour la cryptographie à base de courbes elliptiques
S Pontie
Université Grenoble Alpes, 2016
42016
An Elliptic Curve Crypto-Processor Secured by Randomized Windows
S Pontie, P Maistri, R Leveugle
17th Euromicro Conference on Digital System Design (DSD), 535-542, 2014
42014
Evaluation of Parameter-based Attacks against Embedded Neural Networks with Laser Injection
M Dumont, K Hector, PA Moellic, JM Dutertre, S Pontié
International Conference on Computer Safety, Reliability, and Security, 259-272, 2023
22023
Randomized windows for secure scalar multiplication on elliptic curves
S Pontie, P Maistri
2014 IEEE 25th International Conference on Application-Specific Systems …, 2014
22014
Exploration of System-on-Chip Secure-Boot Vulnerability to Fault-Injection by Side-Channel Analysis
C Fanjas, D Aboulkassimi, S Pontié, J Clédière
2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2023
12023
Real-Time Frequency Detection to Synchronize Fault Injection on System-on-Chip.
C Fanjas, C Gaine, D Aboulkassimi, S Pontié, O Potin
IACR Cryptol. ePrint Arch. 2022, 602, 2022
12022
Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-Bit Microcontrollers
R Joud, PA Moëllic, S Pontié, JB Rigaud
International Conference on Smart Card Research and Advanced Applications …, 2023
2023
Zero-Value Side-Channel Attacks on SIKE
L De Feo, N El Mrabet, A Genêt, N Kaluđerović, NL de Guertechin, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20