H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 30 Citations 3,904 227 World Ranking 8721 National Ranking 222

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Cryptography
  • Statistics

His scientific interests lie mostly in Side channel attack, Cryptography, Embedded system, Field-programmable gate array and Power analysis. The various areas that he examines in his Side channel attack study include Dual polyhedron, Data mining, Computer engineering and Security level. His Cryptography study results in a more complete grasp of Computer security.

His research integrates issues of Computer hardware, Smart card, Logic gate and SIMPLE in his study of Embedded system. His Field-programmable gate array research is multidisciplinary, incorporating perspectives in Electronic engineering, Application-specific integrated circuit and Ring oscillator. His biological study spans a wide range of topics, including Order zero and Advanced Encryption Standard.

His most cited work include:

  • Practical Setup Time Violation Attacks on AES (95 citations)
  • RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs (93 citations)
  • Hardware Trojan Horses in Cryptographic IP Cores (81 citations)

What are the main themes of his work throughout his whole career to date?

Sylvain Guilley spends much of his time researching Cryptography, Side channel attack, Embedded system, Algorithm and Computer security. He is interested in Power analysis, which is a branch of Cryptography. His Side channel attack research incorporates elements of Key, Leakage, Cryptosystem, Secure cryptoprocessor and Computer network.

His Embedded system research is multidisciplinary, relying on both Hardware Trojan, Logic gate and Robustness. The concepts of his Algorithm study are interwoven with issues in Software, Mutual information and Masking. His study in the fields of Masking under the domain of Computer security overlaps with other disciplines such as Countermeasure.

He most often published in these fields:

  • Cryptography (44.57%)
  • Side channel attack (33.97%)
  • Embedded system (22.01%)

What were the highlights of his more recent work (between 2017-2021)?

  • Cryptography (44.57%)
  • Side channel attack (33.97%)
  • Computer security (19.57%)

In recent papers he was focusing on the following fields of study:

Sylvain Guilley mainly focuses on Cryptography, Side channel attack, Computer security, Algorithm and Embedded system. His Cryptography study combines topics from a wide range of disciplines, such as Process, Masking, Exploit, Software and Information sensitivity. His studies in Side channel attack integrate themes in fields like Computer network, Encryption and Fault injection.

His studies deal with areas such as Domain, Graph rewriting, Rotation formalisms in three dimensions and Source code as well as Computer security. His Algorithm study incorporates themes from Upper and lower bounds, Mutual information and Masking. In his study, which falls under the umbrella issue of Embedded system, Pipeline, Control flow graph, Software security assurance and Robustness is strongly linked to Cache.

Between 2017 and 2021, his most popular works were:

  • Best information is most successful: Mutual information and success rate in side-channel analysis (18 citations)
  • Lightweight Ciphers and Their Side-Channel Resilience (13 citations)
  • Statistical properties of side-channel and fault injection attacks using coding theory (11 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Statistics
  • Cryptography

Sylvain Guilley mostly deals with Side channel attack, Cryptography, Computer security, Computer network and Mutual information. His research investigates the connection between Side channel attack and topics such as Fault injection that intersect with problems in Block cipher, Masking countermeasure, Coding theory and Code. His research in Cryptography intersects with topics in Masking, Application-specific integrated circuit, Electronics, Software and Information sensitivity.

His Computer security research integrates issues from Graph rewriting and Source code. His study looks at the relationship between Mutual information and fields such as Computation, as well as how they intersect with chemical problems. His Leakage study which covers Cipher that intersects with Embedded system.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Practical Setup Time Violation Attacks on AES

N. Selmane;S. Guilley;J.-L. Danger.
european dependable computing conference (2008)

166 Citations

RSM: a small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs

Maxime Nassar;Youssef Souissi;Sylvain Guilley;Jean-Luc Danger.
design, automation, and test in europe (2012)

163 Citations

Differential Power Analysis Model and Some Results

Sylvain Guilley;Philippe Hoogvorst;Renaud Pacalet.
smart card research and advanced application conference (2004)

130 Citations

Hardware Trojan Horses in Cryptographic IP Cores

Shivam Bhasin;Jean-Luc Danger;Sylvain Guilley;Xuan Thuy Ngo.
workshop on fault diagnosis and tolerance in cryptography (2013)

129 Citations

High speed true random number generator based on open loop structures in FPGAs

J. L. Danger;S. Guilley;P. Hoogvorst.
Microelectronics Journal (2009)

117 Citations

BCDL: a high speed balanced DPL for FPGA with global precharge and no early evaluation

Maxime Nassar;Shivam Bhasin;Jean-Luc Danger;Guillaume Duc.
design, automation, and test in europe (2010)

104 Citations

Complementary dual codes for counter-measures to side-channel attacks

Claude Carlet;Sylvain Guilley.
Advances in Mathematics of Communications (2016)

97 Citations

Orthogonal Direct Sum Masking

Julien Bringer;Claude Carlet;Hervé Chabanne;Sylvain Guilley.
workshop in information security theory and practice (2014)

96 Citations

Good Is Not Good Enough

Annelie Heuser;Olivier Rioul;Sylvain Guilley.
cryptographic hardware and embedded systems (2014)

85 Citations

The “backend duplication” method

Sylvain Guilley;Philippe Hoogvorst;Yves Mathieu;Renaud Pacalet.
cryptographic hardware and embedded systems (2005)

83 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Sylvain Guilley

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 54

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 41

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Publications: 37

Claude Carlet

Claude Carlet

Paris 8 University

Publications: 31

Patrick Solé

Patrick Solé

Télécom ParisTech

Publications: 23

Tim Güneysu

Tim Güneysu

Ruhr University Bochum

Publications: 22

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 20

Elisabeth Oswald

Elisabeth Oswald

University of Klagenfurt

Publications: 18

Biplab Sikdar

Biplab Sikdar

National University of Singapore

Publications: 15

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 13

Kazuo Ohta

Kazuo Ohta

University of Electro-Communications

Publications: 12

Saibal Mukhopadhyay

Saibal Mukhopadhyay

Georgia Institute of Technology

Publications: 12

Ramesh Karri

Ramesh Karri

New York University

Publications: 12

Thomas Eisenbarth

Thomas Eisenbarth

University of Lübeck

Publications: 11

Emmanuel Prouff

Emmanuel Prouff

Université Paris Cité

Publications: 11

Mehul Motani

Mehul Motani

National University of Singapore

Publications: 10

Something went wrong. Please try again later.