Research
We are active researchers in the fields of cryptology and embedded systems security:
  • we love to partner in collaborative projects and work on exciting research topics
  • we continuously contribute and learn from research to give you an edge, and bring you the state-of-the-art
Feel free to contact us for research related work!
Current Collaborative Research Projects
We are currently involved in the following collaborative research projects:
  • project VERISICC
    Goal: the project VERISICC aims to build new methods to automatically verify and generate proven masked cryptographic implementations.
    Partners: ANSSI, CryptoExperts (project leader), IDEMIA, INRIA, university of Luxembourg.
  • project SCATTER
    Goal: the project SCATTER aims to study the practical effectiveness of the side-channel attack method called SCATTER in different contexts.
    Partners: eShard (project leader), XLIM.
Publications
  • Side-channel Attacks on Blinded Scalar Multiplications Revisited
    Thomas Roche, Laurent Imbert, Victor Lomné,
    CARDIS 2019
  • An Industrial Outlook on Challenges of Hardware Security in Digital Economy
    Shivam Bhasin, Victor Lomné, Karim Tobich,
    SPACE 2017
  • Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
    Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel,
    ASIACRYPT 2016
  • Cost-Effective Design Strategies for Securing Embedded Processors
    Florent Bruguier, Pascal Benoit, Lionel Torres, Lyonel Barthe, Morgan Bourree, Victor Lomné,
    IEEE Transactions on Emerging Topics Computing 2016
  • Algebraic Decomposition for Probing Security
    Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche,
    CRYPTO 2015
  • Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
    Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker,
    Journal of Cryptographic Engineering 2015
  • How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
    Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard,
    CHES 2014
  • Side-Channel Attack against RSA Key Generation Algorithms
    Aurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche,
    CHES 2014
  • On the Practical Security of a Leakage Resilient Masking Scheme
    Emmanuel Prouff, Matthieu Rivain, Thomas Roche,
    CT-RSA 2014
  • Behind the Scene of Side Channel Attacks
    Victor Lomné, Emmanuel Prouff, Thomas Roche,
    ASIACRYPT 2013
  • Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices
    Thomas Roche, Victor Lomné,
    COSADE 2013
  • Fault Attacks on AES with Faulty Ciphertexts Only
    Thomas Fuhr, Éliane Jaulmes, Victor Lomné, Adrian Thillard,
    FDTC 2013
  • SCARE of Secret Ciphers with SPN Structures
    Matthieu Rivain, Thomas Roche,
    ASIACRYPT 2013
  • Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
    Adrian Thillard, Emmanuel Prouff, Thomas Roche,
    CHES 2013
  • Higher-Order Side Channel Security and Mask Refreshing
    Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche,
    FSE 2013
  • Enhancing Electromagnetic Analysis Using Magnitude Squared Incoherence
    Amine Dehbaoui, Victor Lomné, Thomas Ordas, Lionel Torres, Michel Robert, Philippe Maurine,
    IEEE Transactions on VLSI Systems 2012
  • On the Need of Randomness in Fault Attack Countermeasures - Application to AES
    Victor Lomné, Thomas Roche, Adrian Thillard,
    FDTC 2012
  • Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version
    Thomas Roche, Emmanuel Prouff,
    Journal of Cryptographic Engineering 2012
  • PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
    Gilles Piret, Thomas Roche, Claude Carlet,
    ACNS 2012
  • On the Use of Shamir's Secret Sharing against Side-Channel Analysis
    Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche,
    CARDIS 2012
  • Combined Fault and Side-Channel Attack on Protected Implementations of AES
    Thomas Roche, Victor Lomné, Karim Khalfallah,
    CARDIS 2011
  • Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
    Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger,
    WISTP 2011
  • Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
    Emmanuel Prouff, Thomas Roche,
    CHES 2011
  • Differential Power Analysis Enhancement with Statistical Preprocessing
    Victor Lomné, Amine Dehbaoui, Philippe Maurine, Lionel Torres, Michel Robert,
    DATE 2010
  • Modeling Time Domain Magnetic Emissions of ICs
    Victor Lomné, Philippe Maurine, Lionel Torres, Thomas Ordas, Mathieu Lisart, Jérome Toublanc,
    PATMOS 2010
  • A GALS Pipeline DES Architecture to Increase Robustness against DPA and DEMA Attacks
    Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine, Lionel Torres,
    SBCCI 2010
  • Attack on a Higher-Order Masking of the AES Based on Homographic Functions
    Emmanuel Prouff, Thomas Roche,
    INDOCRYPT 2010
  • Output-sensitive Decoding for Redundant Residue Systems
    Majid Khonji, Clément Pernet, Jean-Louis Roch, Thomas Roche, Thomas Stalinski,
    ISSAC 2010
  • Evaluation on FPGA of Triple Rail Logic Robustness against DPA and DEMA
    Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert, Rafael Soares, Ney Calazans,
    DATE 2009
  • Enhancing Electromagnetic Attacks Using Spectral Coherence Based Cartography
    Amine Dehbaoui, Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert,
    VLSI-SoC 2009
  • Algorithm-Based Fault Tolerance Applied to P2P Computing Networks
    Thomas Roche, Mathieu Cunche, Jean-Louis Roch,
    AP2PS 2009
  • Multi-Linear cryptanalysis in Power Analysis Attacks MLPA
    Thomas Roche, Cédric Tavernier,
    CoRR abs 2009
  • Side-Channel Attacks based on Linear Approximations
    Thomas Roche, Cédric Tavernier,
    IACR Cryptology ePrint Archive 2009
  • Triple Rail Logic Robustness against DPA
    Victor Lomné, Thomas Ordas, Philippe Maurine, Lionel Torres, Michel Robert, Rafael Soares, Ney Calazans,
    ReConFig 2008
  • Evaluating the Robustness of Secure Triple Track Logic through Prototyping
    Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert,
    SBCCI 2008
  • Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher
    Thomas Roche, Roland Gillard, Jean-Louis Roch,
    MCO 2008
  • Adaptive Loops with Kaapi on Multicore and Grid: Applications in Symmetric Cryptography
    Vincent Danjean, Roland Gillard, Serge Guelton, Jean-Louis Roch, Thomas Roche,
    PASCO 2007