Name
Papers
Collaborators
OLIVIER RIOUL
62
76
Citations 
PageRank 
Referers 
92
23.54
208
Referees 
References 
572
359
Search Limit
100572
Title
Citations
PageRank
Year
Side-Channel Information Leakage of Code-Based Masked Implementations00.342022
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations.00.342022
Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds.00.342022
Variations on a Theme by Massey00.342022
Side-Channel Expectation-Maximization Attacks.00.342022
Bent Sequences Over Hadamard Codes For Physically Unclonable Functions00.342021
On Conditional Alpha-Information and its Application to Side-Channel Analysis.00.342021
The Big Picture of Delay-PUF Dependability00.342020
Rényi Entropy Power and Normal Transport00.342020
Persistent Fault Analysis with Few Encryptions00.342020
Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem00.342020
How Relevant is Hick's Law for HCI?00.342020
A Feedback Information-Theoretic Transmission Scheme (Fitts) For Modeling Trajectory Variability In Aimed Movements20.362020
Asymptotic Normality of Q-Ary Linear Codes.00.342019
Regression To A Linear Lower Bound With Outliers: An Exponentially Modified Gaussian Noise Model00.342019
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis.00.342019
Transportation Proofs of Rényi Entropy Power Inequalities.00.342019
An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware10.352019
Best Information is Most Successful00.342019
Entropy Estimation of Physically Unclonable Functions via Chow Parameters00.342019
An Improved Analysis of Reliability and Entropy for Delay PUFs20.402018
Uniformly Projected RCQD QAM: A Low-Complexity Signal Space Diversity Solution Over Fading Channels With or Without Erasures.00.342018
Confused yet Successful - - Theoretical Comparison of Distinguishers for Monobit Leakages in Terms of Confusion Coefficient and SNR.00.342018
The Perils of Confounding Factors: How Fitts' Law Experiments can Lead to False Conclusions40.382018
Rényi Entropy Power Inequalities via Normal Transport and Rotation.00.342018
Information-Theoretic Analysis Of The Speed-Accuracy Tradeoff With Feedback00.342018
Speed-Accuracy Tradeoff: A Formal Information-Theoretic Transmission Scheme (FITTS).10.342018
On the optimality and practicability of mutual information analysis in some scenarios00.342018
BIGFile: Bayesian Information Gain for Fast File Retrieval.30.382018
A Feedback Information-Theoretic Transmission Scheme (FITTS) for Modelling Aimed Movements.00.342018
Optimal Transport to the Entropy-Power Inequality and a Reverse Inequality.10.372017
Stochastic Collision Attack.00.342017
BIGnav: Bayesian Information Gain for Guiding Multiscale Navigation.40.382017
Yet Another Proof of the Entropy Power Inequality.00.342017
Optimal Transport To Renyi Entropies00.342017
Codes For Side-Channel Attacks And Protections10.352017
To Miss is Human: Information-Theoretic Rationale for Target Misses in Fitts' Law.10.362017
At Every Corner: Determining Corner Points Of Two-User Gaussian Interference Channels10.372017
Optimal side-channel attacks for multivariate leakages and multiple models.40.482017
Template Attacks with Partial Profiles and Dirichlet Priors: Application to Timing Attacks.00.342016
Less is More - Dimensionality Reduction from a Theoretical Perspective.50.432016
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.00.342016
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation.00.342016
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version.10.352016
A Key to Success - Success Exponents for Side-Channel Distinguishers.00.342016
Almost there corner points of Gaussian interference channels20.392015
Masks Will Fall Off - Higher-Order Optimal Distinguishers.00.342015
Glass Plus Skin: An Empirical Evaluation Of The Added Value Of Finger Identification To Basic Single-Touch Interaction On Touch Screens70.452015
A mathematical description of the speed/accuracy trade-off of aimed movement70.732015
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms.10.352014
  • 1
  • 2