Research
We are active researchers in the fields of cryptology and embedded systems security:
- we love to partner in collaborative projects and work on exciting research topics
- we continuously contribute and learn from research to give you an edge, and bring you the state-of-the-art
Collaborative Research Projects
We have been involved in the following collaborative research projects:
- project VERISICC
Goal: the project VERISICC aims to build new methods to automatically verify and generate proven masked cryptographic implementations.
- project SCATTER
Goal: the project SCATTER aims to study the practical effectiveness of the side-channel attack method called SCATTER in different contexts.
Publications
Since the creation of NinjaLab:
- Inspector Gadget
Camille Mutschler, Laurent Imbert, Thomas RocheIACR Communications in Cryptology - Volume 1 / Issue 2
- A Side Journey to Titan
Thomas Roche, Victor Lomné, Camille Mutschler, Laurent ImbertUsenix Security 2021
- Side-channel Attacks on Blinded Scalar Multiplications Revisited
Thomas Roche, Laurent Imbert, Victor LomnéCARDIS 2019
- An Industrial Outlook on Challenges of Hardware Security in Digital Economy
Shivam Bhasin, Victor Lomné, Karim TobichSPACE 2017
Main publications of the founders before the creation of NinjaLab:
- Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian MendelASIACRYPT 2016
- Cost-Effective Design Strategies for Securing Embedded Processors
Florent Bruguier, Pascal Benoit, Lionel Torres, Lyonel Barthe, Morgan Bourree, Victor LomnéIEEE Transactions on Emerging Topics Computing 2016
- Algebraic Decomposition for Probing Security
Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas RocheCRYPTO 2015
- Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine WurckerJournal of Cryptographic Engineering 2015
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian ThillardCHES 2014
- Side-Channel Attack against RSA Key Generation Algorithms
Aurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas RocheCHES 2014
- On the Practical Security of a Leakage Resilient Masking Scheme
Emmanuel Prouff, Matthieu Rivain, Thomas RocheCT-RSA 2014
- Behind the Scene of Side Channel Attacks
Victor Lomné, Emmanuel Prouff, Thomas RocheASIACRYPT 2013
- Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices
Thomas Roche, Victor LomnéCOSADE 2013
- Fault Attacks on AES with Faulty Ciphertexts Only
Thomas Fuhr, Éliane Jaulmes, Victor Lomné, Adrian ThillardFDTC 2013
- SCARE of Secret Ciphers with SPN Structures
Matthieu Rivain, Thomas RocheASIACRYPT 2013
- Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
Adrian Thillard, Emmanuel Prouff, Thomas RocheCHES 2013
- Higher-Order Side Channel Security and Mask Refreshing
Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas RocheFSE 2013
- Enhancing Electromagnetic Analysis Using Magnitude Squared Incoherence
Amine Dehbaoui, Victor Lomné, Thomas Ordas, Lionel Torres, Michel Robert, Philippe MaurineIEEE Transactions on VLSI Systems 2012
- On the Need of Randomness in Fault Attack Countermeasures - Application to AES
Victor Lomné, Thomas Roche, Adrian ThillardFDTC 2012
- Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version
Thomas Roche, Emmanuel ProuffJournal of Cryptographic Engineering 2012
- PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
Gilles Piret, Thomas Roche, Claude CarletACNS 2012
- On the Use of Shamir's Secret Sharing against Side-Channel Analysis
Jean-Sébastien Coron, Emmanuel Prouff, Thomas RocheCARDIS 2012
- Combined Fault and Side-Channel Attack on Protected Implementations of AES
Thomas Roche, Victor Lomné, Karim KhalfallahCARDIS 2011
- Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc DangerWISTP 2011
- Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols
Emmanuel Prouff, Thomas RocheCHES 2011
- Differential Power Analysis Enhancement with Statistical Preprocessing
Victor Lomné, Amine Dehbaoui, Philippe Maurine, Lionel Torres, Michel RobertDATE 2010
- Modeling Time Domain Magnetic Emissions of ICs
Victor Lomné, Philippe Maurine, Lionel Torres, Thomas Ordas, Mathieu Lisart, Jérome ToublancPATMOS 2010
- A GALS Pipeline DES Architecture to Increase Robustness against DPA and DEMA Attacks
Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine, Lionel TorresSBCCI 2010
- Attack on a Higher-Order Masking of the AES Based on Homographic Functions
Emmanuel Prouff, Thomas Roche,INDOCRYPT 2010
- Output-sensitive Decoding for Redundant Residue Systems
Majid Khonji, Clément Pernet, Jean-Louis Roch, Thomas Roche, Thomas StalinskiISSAC 2010
- Evaluation on FPGA of Triple Rail Logic Robustness against DPA and DEMA
Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert, Rafael Soares, Ney CalazansDATE 2009
- Enhancing Electromagnetic Attacks Using Spectral Coherence Based Cartography
Amine Dehbaoui, Victor Lomné, Philippe Maurine, Lionel Torres, Michel RobertVLSI-SoC 2009
- Algorithm-Based Fault Tolerance Applied to P2P Computing Networks
Thomas Roche, Mathieu Cunche, Jean-Louis RochAP2PS 2009
- Multi-Linear cryptanalysis in Power Analysis Attacks MLPA
Thomas Roche, Cédric TavernierCoRR abs 2009
- Side-Channel Attacks based on Linear Approximations
Thomas Roche, Cédric TavernierIACR Cryptology ePrint Archive 2009
- Triple Rail Logic Robustness against DPA
Victor Lomné, Thomas Ordas, Philippe Maurine, Lionel Torres, Michel Robert, Rafael Soares, Ney CalazansReConFig 2008
- Evaluating the Robustness of Secure Triple Track Logic through Prototyping
Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Philippe Maurine, Lionel Torres, Michel RobertSBCCI 2008
- Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher
Thomas Roche, Roland Gillard, Jean-Louis RochMCO 2008
- Adaptive Loops with Kaapi on Multicore and Grid: Applications in Symmetric Cryptography
Vincent Danjean, Roland Gillard, Serge Guelton, Jean-Louis Roch, Thomas RochePASCO 2007