default search action
Brice Colombier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j10]Vlad-Florin Dragoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso:
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(1): 367-391 (2025) - 2024
- [j9]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer syndrome decoding in the presence of noise. Cryptogr. Commun. 16(5): 1103-1134 (2024) - [j8]Ihab Alshaer, Gijs Burghoorn, Brice Colombier, Christophe Deleuze, Vincent Beroulle, Paolo Maistri:
Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions. J. Cryptogr. Eng. 14(2): 325-342 (2024) - [j7]Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso:
Switching Off your Device Does Not Protect Against Fault Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 425-450 (2024) - [i11]Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso:
Switching Off your Device Does Not Protect Against Fault Attacks. IACR Cryptol. ePrint Arch. 2024: 1123 (2024) - [i10]Vlad-Florin Dragoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso:
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation. IACR Cryptol. ePrint Arch. 2024: 1694 (2024) - 2023
- [c21]Boly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso, Brice Colombier:
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial. AFRICACRYPT 2023: 105-125 - [c20]Raphaële Milan, Lilian Bossuet, Loïc Lagadec, Carlos Andres Lara-Nino, Brice Colombier:
TrustSoC: Light and Efficient Heterogeneous SoC Architecture, Secure-by-design. AsianHOST 2023: 1-6 - [c19]Ihab Alshaer, Brice Colombier, Christophe Deleuze, Vincent Beroulle, Paolo Maistri:
Microarchitectural Insights into Unexplained Behaviors Under Clock Glitch Fault Injection. CARDIS 2023: 3-22 - [c18]Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece. COSADE 2023: 170-192 - [i9]Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece. IACR Cryptol. ePrint Arch. 2023: 308 (2023) - [i8]Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Dragoi:
Horizontal Correlation Attack on Classic McEliece. IACR Cryptol. ePrint Arch. 2023: 546 (2023) - 2022
- [j6]Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem. IEEE Trans. Inf. Forensics Secur. 17: 3407-3420 (2022) - [c17]Ihab Alshaer, Brice Colombier, Christophe Deleuze, Vincent Beroulle, Paolo Maistri:
Variable-Length Instruction Set: Feature or Bug? DSD 2022: 464-471 - [c16]Boly Seck, Pierre-Louis Cayrel, Idy Diop, Vlad-Florin Dragoi, Kalen Couzon, Brice Colombier, Vincent Grosso:
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems. ICISC 2022: 219-234 - [c15]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. ITW 2022: 482-487 - [i7]Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem. IACR Cryptol. ePrint Arch. 2022: 125 (2022) - [i6]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. IACR Cryptol. ePrint Arch. 2022: 636 (2022) - 2021
- [c14]Brice Colombier, Paul Grandamme, Julien Vernay, Émilie Chanavat, Lilian Bossuet, Lucie de Laulanié, Bruno Chassagne:
Multi-Spot Laser Fault Injection Setup: New Possibilities for Fault Injection Attacks. CARDIS 2021: 151-166 - [c13]Ihab Alshaer, Brice Colombier, Christophe Deleuze, Vincent Beroulle, Paolo Maistri:
Microarchitecture-aware Fault Models: Experimental Evidence and Cross-Layer Inference Methodology. DTIS 2021: 1-6 - [c12]Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet:
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem. EUROCRYPT (2) 2021: 438-467 - 2020
- [j5]Vlad-Florin Dragoi, Pierre-Louis Cayrel, Brice Colombier, Dominic Bucerzan, Sorin Hoara:
Solving a Modified Syndrome Decoding Problem using Integer Programming. Int. J. Comput. Commun. Control 15(5) (2020) - [c11]Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard:
Online Performance Evaluation of Deep Learning Networks for Profiled Side-Channel Analysis. COSADE 2020: 200-218 - [c10]Brice Colombier, Nathalie Bochard, Florent Bernard, Lilian Bossuet:
Backtracking Search for Optimal Parameters of a PLL-based True Random Number Generator. DATE 2020: 1-6 - [c9]Alexandre Menu, Jean-Max Dutertre, Jean-Baptiste Rigaud, Brice Colombier, Pierre-Alain Moëllic, Jean-Luc Danger:
Single-bit Laser Fault Model in NOR Flash Memories: Analysis and Exploitation. FDTC 2020: 41-48 - [i5]Damien Robissout, Gabriel Zaid, Brice Colombier, Lilian Bossuet, Amaury Habrard:
Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2020: 39 (2020) - [i4]Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu, Lilian Bossuet:
Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 900 (2020)
2010 – 2019
- 2019
- [c8]Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger:
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller. HOST 2019: 1-10 - [c7]Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer:
Transient Effect Ring Oscillators Leak Too. ISVLSI 2019: 37-42 - [i3]Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer:
Transient Effect Ring Oscillators Leak Too. IACR Cryptol. ePrint Arch. 2019: 300 (2019) - 2018
- [i2]Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Moëllic, Jean-Baptiste Rigaud, Jean-Luc Danger:
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller. IACR Cryptol. ePrint Arch. 2018: 1042 (2018) - 2017
- [j4]Brice Colombier, Lilian Bossuet, Viktor Fischer, David Hély:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. IEEE Trans. Inf. Forensics Secur. 12(8): 1988-2002 (2017) - [c6]Brice Colombier, Ugo Mureddu, Marek Laban, Oto Petura, Lilian Bossuet, Viktor Fischer:
Complete activation scheme for FPGA-oriented IP cores design protection. FPL 2017: 1 - [c5]Brice Colombier, Lilian Bossuet, Ugo Mureddu, David Hély:
A comprehensive hardware/software infrastructure for IP cores design protection. FPT 2017: 263-266 - [c4]Brice Colombier, Lilian Bossuet, David Hély:
Centrality Indicators for Efficient and Scalable Logic Masking. ISVLSI 2017: 98-103 - 2016
- [j3]Brice Colombier, Lilian Bossuet, David Hély:
From secured logic to IP protection. Microprocess. Microsystems 47: 44-54 (2016) - [j2]Lilian Bossuet, Brice Colombier:
Comments on "A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-per-Device Licensing". IEEE Trans. Inf. Forensics Secur. 11(11): 2624-2625 (2016) - [i1]Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. IACR Cryptol. ePrint Arch. 2016: 939 (2016) - 2015
- [c3]Brice Colombier, Lilian Bossuet:
Functional Locking Modules for Design Protection of Intellectual Property Cores. FCCM 2015: 233 - [c2]Brice Colombier, Lilian Bossuet, David Hély:
Reversible Denial-of-Service by Locking Gates Insertion for IP Cores Design Protection. ISVLSI 2015: 210-215 - 2014
- [j1]Brice Colombier, Lilian Bossuet:
Survey of hardware protection of design data for integrated circuits and intellectual properties. IET Comput. Digit. Tech. 8(6): 274-287 (2014) - 2013
- [c1]Vlad Dragoi, Pierre-Louis Cayrel, Brice Colombier, Tania Richmond:
Polynomial Structures in Code-Based Cryptography. INDOCRYPT 2013: 286-296
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-16 22:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint