Login / Signup
Benoit Feix
Publication Activity (10 Years)
Years Active: 2007-2016
Publications (10 Years): 2
Top Topics
Cryptographic Protocols
Secret Key
Brute Force
Computer Chess
Top Venues
INDOCRYPT
IACR Cryptol. ePrint Arch.
COSADE
Public Key Cryptography
</>
Publications
</>
Benoit Feix
,
Andjy Ricart
,
Benjamin Timon
,
Lucille Tordella
Defeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force.
CARDIS
(2016)
Julien Allibert
,
Benoit Feix
,
Georges Gagnerot
,
Ismael Kane
,
Hugues Thiebeauld
,
Tiana Razafindralambo
Chicken or the Egg - Computational Data Attacks or Physical Attacks.
IACR Cryptol. ePrint Arch.
2015 (2015)
Benoit Feix
,
Hugues Thiebeauld
,
Lucille Tordella
Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis.
INDOCRYPT
(2014)
Benoit Feix
,
Mylène Roussellet
,
Alexandre Venelli
Side-Channel Analysis on Blinded Regular Scalar Multiplications.
INDOCRYPT
(2014)
Benoit Feix
,
Mylène Roussellet
,
Alexandre Venelli
Side-Channel Analysis on Blinded Regular Scalar Multiplications.
IACR Cryptol. ePrint Arch.
2014 (2014)
Benoit Feix
,
Hugues Thiebeauld
Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques.
IACR Cryptol. ePrint Arch.
2014 (2014)
Benoit Feix
,
Alexandre Venelli
Defeating with Fault Injection a Combined Attack Resistant Exponentiation.
COSADE
(2013)
Christophe Clavier
,
Benoit Feix
Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis.
COSADE
(2013)
Benoit Feix
,
Vincent Verneuil
There's Something about m-ary - Fixed-Point Scalar Multiplication Protected against Physical Attacks.
INDOCRYPT
(2013)
Christophe Clavier
,
Benoit Feix
,
Georges Gagnerot
,
Christophe Giraud
,
Mylène Roussellet
,
Vincent Verneuil
ROSETTA for Single Trace Analysis.
INDOCRYPT
(2012)
Christophe Clavier
,
Benoit Feix
,
Loïc Thierry
,
Pascal Paillier
Generating Provable Primes Efficiently on Embedded Devices.
Public Key Cryptography
(2012)
Christophe Clavier
,
Benoit Feix
,
Georges Gagnerot
,
Mylène Roussellet
,
Vincent Verneuil
Square Always Exponentiation.
INDOCRYPT
(2011)
Christophe Clavier
,
Benoit Feix
,
Georges Gagnerot
,
Mylène Roussellet
,
Vincent Verneuil
Improved Collision-Correlation Power Analysis on First Order Protected AES.
CHES
(2011)
Christophe Clavier
,
Benoit Feix
,
Georges Gagnerot
,
Mylène Roussellet
,
Vincent Verneuil
Horizontal Correlation Analysis on Exponentiation.
IACR Cryptol. ePrint Arch.
2010 (2010)
Jean-Christophe Courrège
,
Benoit Feix
,
Mylène Roussellet
Simple Power Analysis on Exponentiation Revisited.
CARDIS
(2010)
Christophe Clavier
,
Benoit Feix
,
Georges Gagnerot
,
Mylène Roussellet
Passive and Active Combined Attacks on AES???Combining Fault Attacks and Side Channel Analysis.
FDTC
(2010)
Christophe Clavier
,
Benoit Feix
,
Georges Gagnerot
,
Mylène Roussellet
,
Vincent Verneuil
Horizontal Correlation Analysis on Exponentiation.
ICICS
(2010)
Frédéric Amiel
,
Benoit Feix
,
Michael Tunstall
,
Claire Whelan
,
William P. Marnane
Distinguishing Multiplications from Squaring Operations.
Selected Areas in Cryptography
(2008)
Frédéric Amiel
,
Benoit Feix
On the BRIP Algorithms Security for RSA.
WISTP
(2008)
Frédéric Amiel
,
Karine Villegas
,
Benoit Feix
,
Louis Marcel
Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis.
FDTC
(2007)
Frédéric Amiel
,
Benoit Feix
,
Karine Villegas
Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms.
Selected Areas in Cryptography
(2007)