Open Position
Open PhD position:
Open PhD position:
CVs:
[1] S. Pontie, P. Maistri, and R. Leveugle, “Dummy operations in scalar multiplication over elliptic curves: A tradeoff between security and performance,” Microprocessors and Microsystems, vols. 47, Part A, pp. 23–36, 2016. link.
[1] C. Gaine, D. Aboulkassimi, S. Pontie, J.-P. Nikolovski, and J.-M. Dutertre, “Electromagnetic fault injection as a new forensic approach for socs,” in 2020 ieee international workshop on information forensics and security (wifs), 2020. link.
[2] P. Leignac, O. Potin, J.-M. Dutertre, J.-B. Rigaud, and S. Pontie, “Comparaison of side-channel leakage on rich and trusted execution environments,” in 6th workshop on cryptography and security in computing systems, 2019. link.
[3] S. Pontie, A. Bourge, A. Prost-Boucle, P. Maistri, O. Muller, R. Leveugle, and F. Rousseau, “HLS-based methodology for fast iterative development applied to elliptic curve arithmetic,” in 19th euromicro conference on digital system design (dsd), 2016, pp. 511–518. link.
[4] T. Backenstrass, M. Blot, S. Pontie, and R. Leveugle, “Protection of ecc computations against side-channel attacks for lightweight implementations,” in 1st international verification and security workshop (ivsw), 2016, pp. 1–6. link.
[5] S. Pontie, P. Maistri, and R. Leveugle, “An elliptic curve crypto-processor secured by randomized windows,” in 17th euromicro conference on digital system design (dsd), 2014, pp. 535–542. link.
[6] S. Pontie and P. Maistri, “Randomized windows for secure scalar multiplication on elliptic curves,” in 25th international conference on application-specific systems, architectures, and processors (asap), 2014, pp. 78–79. link.
[7] S. Pontie and P. Maistri, “Design of a secure architecture for scalar multiplication on elliptic curves,” in 10th conference on ph. d. research in microelectronics and electronics (prime), 2014, pp. 1–4. link.
[1] S. Pontie and D. Aboulkassimi, “Attaque side-channel sur plateforme mobile android.” Séminaire à l’École des Mines de Saint-Etienne, Gardanne, 2018. link.
[2] S. Pontie and D. Aboulkassimi, “Hardware characterization for mobile devices a security perspective.” 1st Mobitrust International Workshop, Portugal, Aveiro, 2017. link.
[3] S. Pontie, “Étude de la sécurité des courbes quartiques de jacobi vis à vis des attaques par analyse de puissance consommée.” Séminaire à l’École des Mines de Saint-Etienne, Gardanne, 2016. link.
[4] S. Pontie, “Prise en compte des fuites d’informations par canaux auxiliaires dans une implémentation ecc.” Séminaire sécurité des systèmes électroniques embarqués, Rennes, 2016. link.
[5] S. Pontie, “Attaque par analyse de la puissance consommée contre un crypto-processeur basé sur les courbes jacobi quartiques.” Journées Codage et Cryptographie, Toulon, 2015. link.
[6] S. Pontie, P. Maistri, and R. Leveugle, “Tuning of randomized windows against simple power analysis for scalar multiplication on elliptic curves.” TRUDEVICE 2015: Workshop on Trustworthy Manufacturing; Utilization of Secure Devices, Grenoble, 2015. link.
[7] S. Pontie and M.-A. Cornelie, “Fast and secure crypto-processor based on elliptic curve cryptography.” 2eme Journée SCCyPhy: Security; Cryptology for CyberPhysical systems, Grenoble, 2015. link.
[8] S. Pontie, “Architecture d’un crypto processeur ecc sécurisé contre les attaques physiques.” Journées Nationales du Réseau Doctoral en Micro-nanoélectronique, Lille, pp. 1–4, 2014. link.
[9] S. Pontie, “Multiplication scalaire avec fenêtrage aléatoire pour la protection d’un coprocesseur de chiffrement basé sur les courbes elliptiques.” 1er Journée SCCyPhy: Security; Cryptology for CyberPhysical systems, Grenoble, 2014.