Research

Recherche

Research / Recherche Cours / Teaching Livres / Books CPGE / UPS / LIESSE Divers / More

Copyright Information

The following statement applies to all publications downloaded from this site.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

See Licence de droits d'usage for all publications on this site that are published in IEEE Conferences or Journals.


Older Publications Here

Recent Publications:

M. H. M. Costa and O. Rioul, "From almost Gaussian to Gaussian: Bounding differences of differential entropies," IEEE Information Theory and Applications Workshop (ITA 2015), San Diego, USA, Feb. 1-6, 2015. [Full text (PDF)]

O. Rioul and M. H. M. Costa, "Almost there: Corner points of Gaussian interference channels," in Proc.
IEEE Information Theory and Applications Workshop (ITA 2015), pp. 32-35, San Diego, USA, Feb. 1-6, 2015. [Full text (PDF)]

J. Yang, K. Wan, B. Geller, C. Abdel Nour, O. Rioul and C. Douillard, "A low-complexity 2D signal space diversity solution for future broadcasting systems," in Proc. IEEE International Conference on Communications (ICC'15), Wireless Communications Symposium,  London, UK, June 8-12, 2015. [Full text (PDF)]

E. de Chérisey, A. Heuser, S. Guilley and O. Rioul, "On the optimality of mutual information analysis for discrete leakages,"
13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Leuven, Belgium, June 29-30, 2015. [Summary (PDF)][Slides (PDF)]

S. Guilley, A. Heuser, O. Rioul and F.-X. Standaert, "Template attacks, optimal distinguishers and the perceived information metric,"
13th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2015), Leuven, Belgium, June 29-30, 2015. [Summary (PDF)][Slides (PDF)]

Y. Guiard and O. Rioul, "A mathematical description of the speed/accuracy trade-off of aimed movement," in Proc. of the 2015 British Human Computer Interaction Conference (HCI 2015), Lincoln, UK, 13th-17th July 2015, pp. 91-100. [Full text (PDF)]

J. Gori, O. Rioul and Y. Guiard, "Reconciling Fitts' law with Shannon's information theory," European Mathematical Psychology Group Meeting (EMPG 2015), Padua, Italy, Sept. 1-3, 2015. [Summary (PDF)] [Slides (PDF)]

N. Bruneau, S. Guilley, A. Heuser, D. Marion and O. Rioul, "Less is more: Dimensionality reduction from a theoretical perspective,"
in Proc. 17th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015), Saint-Malo, France, September 13-16, 2015. Lecture Notes in Computer Science, vol. 9293, pp. 22-41, Springer, 2015. [Full text (PDF)]

Q. Roy, Y. Guiard, G. Bailly, E. Lecolinet and O. Rioul, "Glass+Skin: An empirical evaluation of the added value of finger identification to basic single-touch interaction on touch screens, " in Proc. 15th IFIP TC.13 International Conference on Human-Computer Interaction (INTERACT'15), Bamberg, Germany, Sept. 14-18, 2015.
Lecture Notes in Computer Science, Vol. 9299, Part IV, pp. 55-71, Springer, 2015. [Full text (PDF)]

S. Guilley, A. Heuser and O. Rioul, "A key to success: Success exponents for side-channel distinguishers," in Proc. 16th International Conference on Cryptology in India (IndoCrypt 2015), Bangalore, India, Dec. 6-9, 2015. Lecture Notes in Computer Science, vol. 9462, pp. 270-290, Springer, 2015. [Full text (PDF)]

O. Rioul and M. H. M. Costa, "On some almost properties," IEEE Information Theory and Applications Workshop (ITA 2016), San Diego, USA, Jan. 31 - Feb. 5, 2016. [Full text (PDF)]

E. de Chérisey, S. Guilley, O. Rioul and D. Jayasinghe, "Template attacks with partial profiles and Dirichlet priors: Application to timing attacks," in Hardware and Architectural Support for Security and Privacy (HASP 2016), Seoul, South Korea, June 18, 2016.
[Full text (PDF)]

O. Rioul, P. Solé, S. Guilley and J.-L. Danger, "A challenge code for maximizing the entropy of PUF responses,"
14th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Montpellier - La Grande-Motte, France, June 22-23, 2016. [Summary (PDF)] [Slides (PDF)]

E. de Chérisey, S. Guilley, O. Rioul and A. Heuser, "Defining perceived information based on Shannon’s communication theory,"
14th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Montpellier - La Grande-Motte, France, June 22-23, 2016. [Summary (PDF)] [Slides (PDF)]

O. Rioul, N. Bruneau, S. Guilley, A. Heuser and F.-X. Standaert, "Taylor expansion of maximum likelihood attacks,"
14th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2016), Montpellier - La Grande-Motte, France, June 22-23, 2016. [Summary (PDF)] [Slides (PDF)]

O. Rioul, A. Heuser, S. Guilley and J.-L. Danger, "Inter-class vs. mutual information as side-channel distinguishers," in Proc. 2016 IEEE International Symposium on Information Theory (ISIT'16), Barcelona, Spain, pp. 805-809, July 10-15, 2016.
[Full text (PDF)]

O. Rioul, P. Solé, S. Guilley and
J.-L. Danger, "On the entropy of physically unclonable functions," in Proc. 2016 IEEE International Symposium on Information Theory (ISIT'16), Barcelona, Spain, pp. 2928-2932, July 10-15, 2016. [Full text (PDF)]

E. de Chérisey, S. Guilley, A. Heuser and O. Rioul, "On the optimality and practicability of mutual information analysis in some scenarios," ArticCrypt 2016, Longyearbyen, Svalbard, July 17-22, 2016. [Full text (PDF)]

M. Dugardin, S. Guilley,
J.-L. Danger, Z. Najm and O. Rioul, "Correlated extra-reductions defeat blinded regular exponentiation," in Proc. 18th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2016), Santa Barbara, USA, August 17-19, 2016. Lecture Notes in Computer Science, vol. 9813, pp. 3-22,  Springer, 2016. [Full text (PDF)]

N. Bruneau, S. Guilley, A. Heuser, D. Marion and O. Rioul, "Optimal attacks for multivariate and multi-model side-channel leakages," Poster at
18th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2016), Santa Barbara, USA, August 17-19, 2016. [Poster (PDF)]

N. Bruneau, S. Guilley, A. Heuser, D. Marion and O. Rioul, "Optimal side-channel attacks for multivariate leakages and multiple models," in Proc. PROOFS 2016 Security Proofs for Embedded Systems,
Santa Barbara, USA, August 20th, 2016. [Full text (PDF)]

O. Rioul and J. C. Magossi, "A local-global principle for the real continuum," in Proc. Trends in Logic XVI (TRENDS 2016), Centre for Logic, Epistemology and the History of Science, Campinas, Brazil, Sept. 12th-15th, 2016. [Summary (PDF)]

J.-L. Danger, S. Guilley, P. Nguyen, and O. Rioul, "PUFs: Standardization and Evaluation," in Proc. 2nd IEEE Workshop on Mobile System Technologies (MST 2016), Milano, Italy, Sept. 23, 2016. [Full text (PDF)]

O. Rioul, "Shannon's formula W.log(1+SNR): A historical perspective," Colloque Théorie de l'Information: nouvelles frontières dans le cadre du centenaire de Claude Shannon, Insitut Henri Poincaré, Paris, 26-28 Octobre 2016. [Summary (PDF)] [Slides (PDF)] [Lien Vidéo] [Vidéo]

S. Joubert, Emission Autour de la question sur RFI du 28 octobre 2016: "Quel est l'héritage de Claude Shannon?" J.P. Delahaye et O. Rioul. [Lien Podcast] [Audio (MP3)]

P. Flandrin et O. Rioul, "Laplume, sous le masque", Note de l'Académie des Sciences, Évolution des disciplines et histoire des découvertes, Oct. 2016. [Lien sur le site de l'Académie des Sciences] [Texte complet (PDF)]

N. Bruneau, S. Guilley, A. Heuser, O. Rioul, F.-X. Standaert and Y. Teglia, "Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations," in Proc.
22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (AsiaCrypt 2016), Hanoi, Vietnam, Dec. 4-8, 2016. Lecture Notes in Computer Science, Vol. 10031, Part I, pp. 573-601, Springer, 2016. [Full text (PDF)]

W. Liu, R. Lucas d'Oliveira, M. Beaudouin-Lafon and O. Rioul, "A Bayesian experimental design approach maximizing information gain for human-computer interaction," IEEE Information Theory and Applications Workshop (ITA 2017), San Diego, USA, Feb. 12-17, 2017. [Poster (PDF)]

O. Rioul, "Optimal transportation to the entropy-power inequality,"
IEEE Information Theory and Applications Workshop (ITA 2017), San Diego, USA, Feb. 12-17, 2017. [Full text (PDF)]

S. Guilley, A. Heuser and O. Rioul, "Codes for side-channel attacks and protections," in Proc. 2nd Int. Conf. on Codes, Cryptology and Information Security, in honor of Claude Carlet, Rabat, Marocco, April 10-12, 2017. Lecture Notes in Computer Science, vol. 10194, Springer, 2017. [Full text (PDF)]

W. Liu, R. Lucas d'Oliveira, M. Beaudouin-Lafon and O. Rioul, "BIGnav: Bayesian information gain for guiding multiscale navigation," in Proc. ACM CHI Conference on Human Factors in Computing Systems (CHI 2017), Denver, USA, May 6-11th, 2017. Best paper award. [Full text (PDF)]

J. Gori, O. Rioul and Y. Guiard, "To miss is human: Information-theoretic rationale for target misses in Fitts' law," in Proc. ACM CHI Conference on Human Factors in Computing Systems (CHI 2017), Denver, USA, May 6-11th, 2017. [Full text (PDF)]

O. Rioul, "The local-global principle for real analysis," invited keynote presentation, XVIII Brazilian Logic Conference (EBL 2017), Pirenópolis, Brazil, May 8-12, 2017.
[Summary (PDF)]

O. Rioul, "At every corner: Determining corner points of two-user Gaussian interference channels," in Proc. IEEE International Conference on Communications (ICC'17), Paris, France, May 21-25, 2017. [Full text (PDF)]

O. Rioul, "Yet another proof of the entropy power inequality," IEEE Transactions on Information Theory, Vol. 63, No. 6, pp. 3595-3599, June 2017. [Full text (PDF)]

S. Guilley, A. Heuser, T. Ming and O. Rioul, "Stochastic side-channel leakage analysis via orthonormal decomposition," invited paperInt. Conf. Information Technology and Communications Security (SECITC 2017), Bucharest, Romania, June 8-9, 2017.
Lecture Notes in Computer Science, vol. , Springer, 2017. [Full text (PDF)]

J.-L. Danger, O. Rioul, S. Guilley and A. Schaub, "Formalism to assess the loop-PUF entropy and reliability," 15th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi 2017), Smolenice, Slovakia, June 18-21, 2017. [Summary (PDF)] [Slides (PDF)]

N. Bruneau, C. Carlet, S. Guilley, A. Heuser, E. Prouff and O. Rioul, "Stochastic Collision Attack," IEEE Transactions on Information Forensics & Security, Vol. 12, No. 7, pp. - .
[Full text (PDF)]

E. de Chérisey, S. Guilley, O. Rioul and A. Heuser, "On the optimality and practicability of mutual information analysis in some scenarios," Cryptography and Communications — Discrete Structures, Boolean Functions and Sequences, Special Issue on ArticCrypt 2016, to appear. [Full text (PDF)]

O. Rioul, La théorie de l'information, chapitre, Traitement de l'information, Fondation "La main à la pâte", Belin-Pour la Science, à paraître.
[Full text (PDF)]



last modified 2017-05-23