default search action
Assia Tria
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria:
Photonic power firewalls. J. Cryptogr. Eng. 12(3): 245-254 (2022) - 2021
- [e2]Gabriela Nicolescu, Assia Tria, José M. Fernandez, Jean-Yves Marion, Joaquín García-Alfaro:
Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12637, Springer 2021, ISBN 978-3-030-70880-1 [contents]
2010 – 2019
- 2019
- [c38]Meriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria:
Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things. IPCCC 2019: 1-9 - [c37]Meriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria:
Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network. PST 2019: 1-5 - 2018
- [c36]Hélène Le Bouder, Gaël Thomas, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria:
An Evaluation Tool for Physical Attacks. ADHOC-NOW 2018: 112-119 - 2016
- [j5]Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria:
When organized crime applies academic results: a forensic analysis of an in-card listening device. J. Cryptogr. Eng. 6(1): 49-59 (2016) - [c35]Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria:
Photonic Power Firewalls. The New Codebreakers 2016: 342-354 - [c34]Meriem Smache, Nadia El Mrabet, Jesus-Javier Gilquijano, Assia Tria, Emmanuel Riou, Chaput Gregory:
Modeling a node capture attack in a secure wireless sensor networks. WF-IoT 2016: 188-193 - 2015
- [j4]Franck Courbon, Jacques J. A. Fournier, Philippe Loubet-Moundi, Assia Tria:
Combining Image Processing and Laser Fault Injections for Characterizing a Hardware AES. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 928-936 (2015) - [c33]Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
A high efficiency hardware trojan detection technique based on fast SEM imaging. DATE 2015: 788-793 - [c32]Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection. ECCTD 2015: 1-4 - [c31]Loïc Zussa, Ingrid Exurville, Jean-Max Dutertre, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria, Jessy Clédière:
Evidence of an information leakage between logically independent blocks. CS2@HiPEAC 2015: 25-30 - [i3]Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria:
When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device. IACR Cryptol. ePrint Arch. 2015: 963 (2015) - 2014
- [c30]Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
Adjusting Laser Injections for Fully Controlled Faults. COSADE 2014: 229-242 - [c29]Loïc Zussa, Amine Dehbaoui, Karim Tobich, Jean-Max Dutertre, Philippe Maurine, Ludovic Guillaume-Sage, Jessy Clédière, Assia Tria:
Efficiency of a glitch detector against electromagnetic fault injection. DATE 2014: 1-6 - [c28]Noemie Beringuier-Boher, Kamil Gomina, David Hély, Jean-Baptiste Rigaud, Vincent Beroulle, Assia Tria, Joel Damiens, Philippe Gendrier, Philippe Candelier:
Voltage Glitch Attacks on Mixed-Signal Systems. DSD 2014: 379-386 - [c27]Hélène Le Bouder, Gaël Thomas, Yanis Linge, Assia Tria:
On Fault Injections in Generalized Feistel Networks. FDTC 2014: 83-93 - [c26]Kamil Gomina, Philippe Gendrier, Philippe Candelier, Jean-Baptiste Rigaud, Assia Tria:
Detecting positive voltage attacks on CMOS circuits. CS2@HiPEAC 2014: 1-6 - [c25]Franck Courbon, Philippe Loubet-Moundi, Jacques J. A. Fournier, Assia Tria:
Increasing the efficiency of laser fault injections using fast gate level reverse engineering. HOST 2014: 60-63 - [c24]Kamil Gomina, Jean-Baptiste Rigaud, Philippe Gendrier, Philippe Candelier, Assia Tria:
Power supply glitch attacks: Design and evaluation of detection circuits. HOST 2014: 136-141 - [e1]Assia Tria, Dooho Choi:
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-6292-1 [contents] - [i2]Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Bruno Robisson, Assia Tria:
A Unified Formalism for Physical Attacks. IACR Cryptol. ePrint Arch. 2014: 682 (2014) - 2013
- [j3]Alexandre Sarafianos, Cyril Roscian, Jean-Max Dutertre, Mathieu Lisart, Assia Tria:
Electrical modeling of the photoelectric effect induced by a pulsed laser applied to an SRAM cell. Microelectron. Reliab. 53(9-11): 1300-1305 (2013) - [c23]Amine Dehbaoui, Amir-Pasha Mirbaha, Nicolas Moro, Jean-Max Dutertre, Assia Tria:
Electromagnetic Glitch on the AES Round Counter. COSADE 2013: 17-31 - [c22]Kamil Gomina, Jean-Baptiste Rigaud, Philippe Gendrier, Philippe Candelier, Assia Tria:
Power analysis methodology for secure circuits. DDECS 2013: 102-107 - [c21]Alexandre Sarafianos, Mathieu Lisart, Olivier Gagliano, Valerie Serradeil, Cyril Roscian, Jean-Max Dutertre, Assia Tria:
Robustness improvement of an SRAM cell against laser-induced fault injection. DFTS 2013: 149-154 - [c20]Amir-Pasha Mirbaha, Jean-Max Dutertre, Assia Tria:
Differential analysis of Round-Reduced AES faulty ciphertexts. DFTS 2013: 204-211 - [c19]Cyril Roscian, Alexandre Sarafianos, Jean-Max Dutertre, Assia Tria:
Fault Model Analysis of Laser-Induced Faults in SRAM Memory Cells. FDTC 2013: 89-98 - [c18]Hélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria:
Fault Injection to Reverse Engineer DES-Like Cryptosystems. FPS 2013: 105-121 - [c17]Cyril Roscian, Jean-Max Dutertre, Assia Tria:
Frontside laser fault injection on cryptosystems - Application to the AES' last round -. HOST 2013: 119-124 - [c16]Loïc Zussa, Jean-Max Dutertre, Jessy Clédière, Assia Tria:
Power supply glitch induced faults on FPGA: An in-depth analysis of the injection mechanism. IOLTS 2013: 110-115 - [c15]Ingrid Exurville, Jacques J. A. Fournier, Jean-Max Dutertre, Bruno Robisson, Assia Tria:
Practical measurements of data path delays for IP authentication & integrity verification. ReCoSoC 2013: 1-6 - 2012
- [j2]Alexandre Sarafianos, Roxane Llido, Jean-Max Dutertre, Olivier Gagliano, Valerie Serradeil, Mathieu Lisart, Vincent Goubier, Assia Tria, Vincent Pouget, Dean Lewis:
Building the electrical model of the Photoelectric Laser Stimulation of a PMOS transistor in 90 nm technology. Microelectron. Reliab. 52(9-10): 2035-2038 (2012) - [c14]Benjamin Mounier, Anne-Lise Ribotta, Jacques J. A. Fournier, Michel Agoyan, Assia Tria:
EM Probes Characterisation for Security Analysis. Cryptography and Security 2012: 248-264 - [c13]Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, Assia Tria:
Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES. FDTC 2012: 7-15 - [c12]Ronan Lashermes, Guillaume Reymond, Jean-Max Dutertre, Jacques J. A. Fournier, Bruno Robisson, Assia Tria:
A DFA on AES Based on the Entropy of Error Distributions. FDTC 2012: 34-43 - [c11]Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Anne-Lise Ribotta, Assia Tria, Thierry Vaschalde:
Fault Round Modification Analysis of the advanced encryption standard. HOST 2012: 140-145 - [i1]Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, P. Orsatelli, Philippe Maurine, Assia Tria:
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-. IACR Cryptol. ePrint Arch. 2012: 123 (2012) - 2011
- [j1]Jacques J. A. Fournier, Jean-Baptiste Rigaud, Sylvain Bouquet, Bruno Robisson, Assia Tria, Jean-Max Dutertre, Michel Agoyan:
Design and characterisation of an AES chip embedding countermeasures. Int. J. Intell. Eng. Informatics 1(3/4): 328-347 (2011) - [c10]Marion Doulcier-Verdier, Jean-Max Dutertre, Jacques J. A. Fournier, Jean-Baptiste Rigaud, Bruno Robisson, Assia Tria:
A side-channel and fault-attack resistant AES circuit working on duplicated complemented values. ISSCC 2011: 274-276 - [c9]Driss Aboulkassimi, Michel Agoyan, Laurent Freund, Jacques J. A. Fournier, Bruno Robisson, Assia Tria:
ElectroMagnetic analysis (EMA) of software AES on Java mobile phones. WIFS 2011: 1-6 - [r2]Assia Tria, Hamid Choukri:
Invasive Attacks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 623-629 - 2010
- [c8]Michel Agoyan, Jean-Max Dutertre, David Naccache, Bruno Robisson, Assia Tria:
When Clocks Fail: On Critical Paths and Clock Faults. CARDIS 2010: 182-193 - [c7]Michel Agoyan, Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Anne-Lise Ribotta, Assia Tria:
How to flip a bit? IOLTS 2010: 235-239 - [c6]Jean-Baptiste Rigaud, Jean-Max Dutertre, Michel Agoyan, Bruno Robisson, Assia Tria:
Experimental Fault Injection based on the Prototyping of an AES Cryptosystem. ReCoSoC 2010: 141-147
2000 – 2009
- 2009
- [c5]Claude Barral, Assia Tria:
Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin. Formal to Practical Security 2009: 57-69 - 2008
- [c4]Julien Francq, Jean-Baptiste Rigaud, Pascal Manet, Assia Tria, Arnaud Tisserand:
Error Detection for Borrow-Save Adders Dedicated to ECC Unit. FDTC 2008: 77-86 - 2007
- [c3]Régis Leveugle, Abdelaziz Ammari, V. Maingot, E. Teyssou, Pascal Moitrel, Christophe Mourtel, Nathalie Feyt, Jean-Baptiste Rigaud, Assia Tria:
Experimental evaluation of protections against laser-induced faults and consequences on fault modeling. DATE 2007: 1587-1592 - [c2]Olivier Faurax, Assia Tria, Laurent Freund, Frédéric Bancel:
Robustness of circuits under delay-induced faults : test of AES with the PAFI tool. IOLTS 2007: 185-186 - 2006
- [c1]Pascal Manet, Jean-Baptiste Rigaud, Julien Francq, Marc Jeambrun, Assia Tria, Bruno Robisson, Jerome Quartana, Selma Laabidi:
Integrated Evaluation Platform for Secured Devices. ReCoSoC 2006: 214-219 - 2005
- [r1]Assia Tria, Hamid Choukri:
Invasive Attacks. Encyclopedia of Cryptography and Security 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint