default search action
Jacques J. A. Fournier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Maxime Montoya, Simone Bacles-Min, Anca Molnos, Jacques J. A. Fournier:
Protecting integrated circuits against side-channel and fault attacks with dynamic encoding. Microprocess. Microsystems 97: 104761 (2023) - 2021
- [c40]Mathieu Escouteloup, Ronan Lashermes, Jacques Fournier, Jean-Louis Lanet:
Under the Dome: Preventing Hardware Timing Information Leakage. CARDIS 2021: 233-253 - 2020
- [j7]Damien Jauvart, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin:
Improving side-channel attacks against pairing-based cryptography. J. Cryptogr. Eng. 10(1): 1-16 (2020) - [c39]Maxime Montoya, Simone Bacles-Min, Anca Molnos, Jacques J. A. Fournier:
Dynamic encoding, a lightweight combined countermeasure against hardware attacks. DSD 2020: 185-192 - [c38]Antoine Loiseau, Maxime Lecomte, Jacques J. A. Fournier:
Template Attacks against ECC: practical implementation against Curve25519. HOST 2020: 13-22
2010 – 2019
- 2019
- [c37]Maxime Montoya, Thomas Hiscock, Simone Bacles-Min, Anca Molnos, Jacques Fournier:
Adaptive Masking: a Dynamic Trade-off between Energy Consumption and Hardware Security. ICCD 2019: 559-566 - [i9]Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier:
Practical Algebraic Side-Channel Attacks Against ACORN. IACR Cryptol. ePrint Arch. 2019: 305 (2019) - 2018
- [c36]Jacques Fournier, Josselin Garnier, George Papanicolaou, Chrysoula Tsogka:
Correlation-based imaging of fast moving objects using a sparse network of passive receivers. ACSSC 2018: 1618-1622 - [c35]Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson:
Hardware Security Threats Against Bluetooth Mesh Networks. CNS 2018: 1-9 - [c34]Maxime Montoya, Thomas Hiscock, Simone Bacles-Min, Anca Molnos, Jacques J. A. Fournier:
Energy-efficient Masking of the Trivium Stream Cipher. ICECS 2018: 393-396 - [c33]Antoine Loiseau, Jacques J. A. Fournier:
Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT. ICETE (2) 2018: 625-631 - [c32]Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier:
Practical Algebraic Side-Channel Attacks Against ACORN. ICISC 2018: 325-340 - [c31]Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey:
Thwarting Fault Attacks against Lightweight Cryptography using SIMD Instructions. ISCAS 2018: 1-5 - [c30]Maxime Montoya, Simone Bacles-Min, Anca Molnos, Jacques J. A. Fournier:
SWARD: A Secure WAke-up RaDio against Denial-of-Service on IoT devices. WISEC 2018: 190-195 - [i8]Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson:
Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software. IACR Cryptol. ePrint Arch. 2018: 708 (2018) - 2017
- [j6]Jacques Fournier, Josselin Garnier, George Papanicolaou, Chrysoula Tsogka:
Matched-Filter and Correlation-Based Imaging for Fast Moving Objects Using a Sparse Network of Receivers. SIAM J. Imaging Sci. 10(4): 2165-2216 (2017) - [j5]Maxime Lecomte, Jacques Fournier, Philippe Maurine:
An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification. IEEE Trans. Very Large Scale Integr. Syst. 25(12): 3317-3330 (2017) - [c29]Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
DFA on LS-Designs with a Practical Implementation on SCREAM. COSADE 2017: 223-247 - [c28]Damien Jauvart, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin:
Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack. ICETE (Selected Papers) 2017: 150-172 - [c27]Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson:
Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round. INDOCRYPT 2017: 65-84 - [c26]Damien Jauvart, Jacques J. A. Fournier, Louis Goubin:
First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography. SECRYPT 2017: 104-115 - [i7]Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
A First DFA on PRIDE: from Theory to Practice (extended version). IACR Cryptol. ePrint Arch. 2017: 75 (2017) - [i6]Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version). IACR Cryptol. ePrint Arch. 2017: 76 (2017) - [i5]Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey:
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC). IACR Cryptol. ePrint Arch. 2017: 910 (2017) - [i4]Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson:
Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round. IACR Cryptol. ePrint Arch. 2017: 1021 (2017) - 2016
- [c25]Karim M. Abdellatif, Christian Cornesse, Jacques J. A. Fournier, Bruno Robisson:
New Partitioning Approach for Hardware Trojan Detection Using Side-Channel Measurements. ARC 2016: 171-182 - [c24]Damien Jauvart, Jacques J. A. Fournier, Nadia El Mrabet, Louis Goubin:
Improving Side-Channel Attacks Against Pairing-Based Cryptography. CRiSIS 2016: 199-213 - [c23]Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey:
A First DFA on PRIDE: From Theory to Practice. CRiSIS 2016: 214-238 - [c22]Maxime Lecomte, Jacques J. A. Fournier, Philippe Maurine:
On-chip fingerprinting of IC topology for integrity verification. DATE 2016: 133-138 - [c21]Maxime Lecomte, Jacques J. A. Fournier, Philippe Maurine:
Granularity and detection capability of an adaptive embedded Hardware Trojan detection system. HOST 2016: 135-138 - 2015
- [j4]Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes:
A survey of fault attacks in pairing based cryptography. Cryptogr. Commun. 7(1): 185-205 (2015) - [j3]Franck Courbon, Jacques J. A. Fournier, Philippe Loubet-Moundi, Assia Tria:
Combining Image Processing and Laser Fault Injections for Characterizing a Hardware AES. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 928-936 (2015) - [c20]Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
A high efficiency hardware trojan detection technique based on fast SEM imaging. DATE 2015: 788-793 - [c19]Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection. ECCTD 2015: 1-4 - [c18]Maxime Lecomte, Jacques J. A. Fournier, Philippe Maurine:
Thoroughly analyzing the use of ring oscillators for on-chip hardware trojan detection. ReConFig 2015: 1-6 - [i3]Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin:
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults. IACR Cryptol. ePrint Arch. 2015: 152 (2015) - [i2]Maxime Lecomte, Jacques Fournier, Philippe Maurine:
Extraction of intrinsic structure for Hardware Trojan detection. IACR Cryptol. ePrint Arch. 2015: 912 (2015) - 2014
- [c17]Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
Adjusting Laser Injections for Fully Controlled Faults. COSADE 2014: 229-242 - [c16]Ronan Lashermes, Marie Paindavoine, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin:
Practical Validation of Several Fault Attacks against the Miller Algorithm. FDTC 2014: 115-122 - [c15]Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
Increasing the efficiency of laser fault injections using fast gate level reverse engineering. HOST 2014: 60-63 - [i1]Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes:
A survey of Fault Attacks in Pairing Based Cryptography. IACR Cryptol. ePrint Arch. 2014: 742 (2014) - 2013
- [c14]Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin:
Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults. CHES 2013: 365-382 - [c13]Ingrid Exurville, Jacques J. A. Fournier, Jean-Max Dutertre, Bruno Robisson, Assia Tria:
Practical measurements of data path delays for IP authentication & integrity verification. ReCoSoC 2013: 1-6 - 2012
- [c12]Benjamin Mounier, Anne-Lise Ribotta, Jacques J. A. Fournier, Michel Agoyan, Assia Tria:
EM Probes Characterisation for Security Analysis. Cryptography and Security 2012: 248-264 - [c11]Ronan Lashermes, Guillaume Reymond, Jean-Max Dutertre, Jacques J. A. Fournier, Bruno Robisson, Assia Tria:
A DFA on AES Based on the Entropy of Error Distributions. FDTC 2012: 34-43 - 2011
- [j2]Jacques J. A. Fournier, Jean-Baptiste Rigaud, Sylvain Bouquet, Bruno Robisson, Assia Tria, Jean-Max Dutertre, Michel Agoyan:
Design and characterisation of an AES chip embedding countermeasures. Int. J. Intell. Eng. Informatics 1(3/4): 328-347 (2011) - [c10]Marion Doulcier-Verdier, Jean-Max Dutertre, Jacques J. A. Fournier, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria:
A side-channel and fault-attack resistant AES circuit working on duplicated complemented values. ISSCC 2011: 274-276 - [c9]Driss Aboulkassimi, Michel Agoyan, Laurent Freund, Jacques J. A. Fournier, Bruno Robisson, Assia Tria:
ElectroMagnetic analysis (EMA) of software AES on Java mobile phones. WIFS 2011: 1-6 - 2010
- [c8]Jacques J. A. Fournier, Philippe Loubet-Moundi:
Memory Address Scrambling Revealed Using Fault Attacks. FDTC 2010: 30-36
2000 – 2009
- 2008
- [c7]Yves Stauffer, Yves Allemand, Mohamed Bouri, Jacques Fournier, Reymond Clavel, Patrick Metrailler, Roland Brodard, Fabienne Reynard:
Pelvic motion measurement during over ground walking, analysis and implementation on the WalkTrainer reeducation device. IROS 2008: 2362-2367 - 2007
- [b1]Jacques Jean-Alain Michael Fournier:
Vector microprocessors for cryptography. University of Cambridge, UK, 2007 - [c6]Yves Stauffer, Fabienne Reynard, Yves Allemand, Mohamed Bouri, Jacques Fournier, Reymond Clavel:
Pelvic motion implementation on the WalkTrainer. ROBIO 2007: 133-138 - 2006
- [c5]Jacques J. A. Fournier, Michael Tunstall:
Cache Based Power Analysis Attacks on AES. ACISP 2006: 17-28 - [c4]Petros Oikonomakos, Jacques J. A. Fournier, Simon W. Moore:
Implementing Cryptography on TFT Technology for Secure Display Applications. CARDIS 2006: 32-47 - [c3]Jacques J. A. Fournier, Simon W. Moore:
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography. DSD 2006: 439-446 - 2005
- [c2]Jacques J. A. Fournier, Simon W. Moore:
A Vector Approach to Cryptography Implementation. DRMTICS 2005: 277-297 - 2003
- [j1]Simon W. Moore, Ross J. Anderson, Robert D. Mullins, George S. Taylor, Jacques J. A. Fournier:
Balanced self-checking asynchronous logic for smart card applications. Microprocess. Microsystems 27(9): 421-430 (2003) - [c1]Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, George S. Taylor:
Security Evaluation of Asynchronous Circuits. CHES 2003: 137-151
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint