Research
We are active researchers in the fields of cryptology and embedded systems security:
  • we love to partner in collaborative projects and work on exciting research topics
  • we continuously contribute and learn from research to give you an edge, and bring you the state-of-the-art
Feel free to contact us for research related work!
Collaborative Research Projects
We have been involved in the following collaborative research projects:
  • project VERISICC
    Goal: the project VERISICC aims to build new methods to automatically verify and generate proven masked cryptographic implementations.
    Partners: ANSSI, CryptoExperts (project leader), IDEMIA, INRIA, university of Luxembourg.
  • project SCATTER
    Goal: the project SCATTER aims to study the practical effectiveness of the side-channel attack method called SCATTER in different contexts.
    Partners: eShard (project leader), XLIM.
Publications
Since the creation of NinjaLab:
  • An Industrial Outlook on Challenges of Hardware Security in Digital Economy
    Shivam Bhasin, Victor Lomné, Karim Tobich
    SPACE 2017
Main publications of the founders before the creation of NinjaLab:
  • Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
    Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel
    ASIACRYPT 2016
  • Cost-Effective Design Strategies for Securing Embedded Processors
    Florent Bruguier, Pascal Benoit, Lionel Torres, Lyonel Barthe, Morgan Bourree, Victor Lomné
    IEEE Transactions on Emerging Topics Computing 2016
  • Algebraic Decomposition for Probing Security
    Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
    CRYPTO 2015
  • Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
    Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker
    Journal of Cryptographic Engineering 2015
  • How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
    Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard
    CHES 2014
  • Side-Channel Attack against RSA Key Generation Algorithms
    Aurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche
    CHES 2014
  • On the Practical Security of a Leakage Resilient Masking Scheme
    Emmanuel Prouff, Matthieu Rivain, Thomas Roche
    CT-RSA 2014
  • Behind the Scene of Side Channel Attacks
    Victor Lomné, Emmanuel Prouff, Thomas Roche
    ASIACRYPT 2013
  • Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices
    Thomas Roche, Victor Lomné
    COSADE 2013
  • Fault Attacks on AES with Faulty Ciphertexts Only
    Thomas Fuhr, Éliane Jaulmes, Victor Lomné, Adrian Thillard
    FDTC 2013
  • SCARE of Secret Ciphers with SPN Structures
    Matthieu Rivain, Thomas Roche
    ASIACRYPT 2013
  • Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
    Adrian Thillard, Emmanuel Prouff, Thomas Roche
    CHES 2013
  • Higher-Order Side Channel Security and Mask Refreshing
    Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
    FSE 2013
  • Enhancing Electromagnetic Analysis Using Magnitude Squared Incoherence
    Amine Dehbaoui, Victor Lomné, Thomas Ordas, Lionel Torres, Michel Robert, Philippe Maurine
    IEEE Transactions on VLSI Systems 2012
  • On the Need of Randomness in Fault Attack Countermeasures - Application to AES
    Victor Lomné, Thomas Roche, Adrian Thillard
    FDTC 2012
  • Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version
    Thomas Roche, Emmanuel Prouff
    Journal of Cryptographic Engineering 2012
  • PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
    Gilles Piret, Thomas Roche, Claude Carlet
    ACNS 2012
  • On the Use of Shamir's Secret Sharing against Side-Channel Analysis
    Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche
    CARDIS 2012
  • Combined Fault and Side-Channel Attack on Protected Implementations of AES
    Thomas Roche, Victor Lomné, Karim Khalfallah
    CARDIS 2011
  • Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
    Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger
    WISTP 2011
  • Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
    Emmanuel Prouff, Thomas Roche
    CHES 2011
  • Differential Power Analysis Enhancement with Statistical Preprocessing
    Victor Lomné, Amine Dehbaoui, Philippe Maurine, Lionel Torres, Michel Robert
    DATE 2010
  • Modeling Time Domain Magnetic Emissions of ICs
    Victor Lomné, Philippe Maurine, Lionel Torres, Thomas Ordas, Mathieu Lisart, Jérome Toublanc
    PATMOS 2010
  • A GALS Pipeline DES Architecture to Increase Robustness against DPA and DEMA Attacks
    Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine, Lionel Torres
    SBCCI 2010
  • Attack on a Higher-Order Masking of the AES Based on Homographic Functions
    Emmanuel Prouff, Thomas Roche,
    INDOCRYPT 2010
  • Output-sensitive Decoding for Redundant Residue Systems
    Majid Khonji, Clément Pernet, Jean-Louis Roch, Thomas Roche, Thomas Stalinski
    ISSAC 2010
  • Evaluation on FPGA of Triple Rail Logic Robustness against DPA and DEMA
    Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert, Rafael Soares, Ney Calazans
    DATE 2009
  • Enhancing Electromagnetic Attacks Using Spectral Coherence Based Cartography
    Amine Dehbaoui, Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert
    VLSI-SoC 2009
  • Algorithm-Based Fault Tolerance Applied to P2P Computing Networks
    Thomas Roche, Mathieu Cunche, Jean-Louis Roch
    AP2PS 2009
  • Multi-Linear cryptanalysis in Power Analysis Attacks MLPA
    Thomas Roche, Cédric Tavernier
    CoRR abs 2009
  • Side-Channel Attacks based on Linear Approximations
    Thomas Roche, Cédric Tavernier
    IACR Cryptology ePrint Archive 2009
  • Triple Rail Logic Robustness against DPA
    Victor Lomné, Thomas Ordas, Philippe Maurine, Lionel Torres, Michel Robert, Rafael Soares, Ney Calazans
    ReConFig 2008
  • Evaluating the Robustness of Secure Triple Track Logic through Prototyping
    Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert
    SBCCI 2008
  • Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher
    Thomas Roche, Roland Gillard, Jean-Louis Roch
    MCO 2008
  • Adaptive Loops with Kaapi on Multicore and Grid: Applications in Symmetric Cryptography
    Vincent Danjean, Roland Gillard, Serge Guelton, Jean-Louis Roch, Thomas Roche
    PASCO 2007