Sylvain Guilley

5.9k total citations
168 papers, 1.8k citations indexed

About

Sylvain Guilley is a scholar working on Artificial Intelligence, Hardware and Architecture and Computer Vision and Pattern Recognition. According to data from OpenAlex, Sylvain Guilley has authored 168 papers receiving a total of 1.8k indexed citations (citations by other indexed papers that have themselves been cited), including 135 papers in Artificial Intelligence, 121 papers in Hardware and Architecture and 58 papers in Computer Vision and Pattern Recognition. Recurrent topics in Sylvain Guilley's work include Cryptographic Implementations and Security (120 papers), Physical Unclonable Functions (PUFs) and Hardware Security (115 papers) and Chaos-based Image/Signal Encryption (57 papers). Sylvain Guilley is often cited by papers focused on Cryptographic Implementations and Security (120 papers), Physical Unclonable Functions (PUFs) and Hardware Security (115 papers) and Chaos-based Image/Signal Encryption (57 papers). Sylvain Guilley collaborates with scholars based in France, United States and China. Sylvain Guilley's co-authors include Jean‐Luc Danger, Claude Carlet, Shivam Bhasin, Philippe Hoogvorst, Laurent Sauvage, Nidhal Selmane, Annelie Heuser, Stjepan Picek, Renaud Pacalet and Xuan Thuy Ngo and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Information Theory and IEEE Transactions on Computers.

In The Last Decade

Sylvain Guilley

158 papers receiving 1.7k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Sylvain Guilley France 21 1.3k 1.1k 514 486 301 168 1.8k
Jean‐Luc Danger France 19 770 0.6× 850 0.8× 548 1.1× 322 0.7× 213 0.7× 130 1.3k
Tim Güneysu Germany 23 1.3k 1.0× 605 0.6× 333 0.6× 486 1.0× 205 0.7× 118 1.7k
David Naccache France 17 1.4k 1.1× 821 0.8× 444 0.9× 406 0.8× 353 1.2× 85 2.0k
Naofumi Homma Japan 18 919 0.7× 625 0.6× 359 0.7× 405 0.8× 140 0.5× 154 1.2k
Elisabeth Oswald United Kingdom 15 1.8k 1.4× 1.1k 1.0× 575 1.1× 778 1.6× 301 1.0× 48 2.4k
Máire O׳Neill United Kingdom 29 870 0.7× 1.0k 0.9× 1.2k 2.4× 359 0.7× 212 0.7× 120 2.3k
Kaijie Wu United States 24 743 0.6× 1.2k 1.1× 1.1k 2.2× 212 0.4× 192 0.6× 103 2.2k
Lilian Bossuet France 17 555 0.4× 744 0.7× 406 0.8× 204 0.4× 240 0.8× 81 1.0k
Viktor Fischer France 17 409 0.3× 547 0.5× 401 0.8× 415 0.9× 86 0.3× 72 928
Leonid Reyzin United States 14 1.0k 0.8× 295 0.3× 350 0.7× 427 0.9× 474 1.6× 37 1.9k

Countries citing papers authored by Sylvain Guilley

Since Specialization
Citations

This map shows the geographic impact of Sylvain Guilley's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sylvain Guilley with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sylvain Guilley more than expected).

Fields of papers citing papers by Sylvain Guilley

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sylvain Guilley. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sylvain Guilley. The network helps show where Sylvain Guilley may publish in the future.

Co-authorship network of co-authors of Sylvain Guilley

This figure shows the co-authorship network connecting the top 25 collaborators of Sylvain Guilley. A scholar is included among the top collaborators of Sylvain Guilley based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sylvain Guilley. Sylvain Guilley is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Danger, Jean‐Luc, et al.. (2024). On the Resiliency of Protected Masked S-Boxes Against Template Attack in the Presence of Temperature and Aging Misalignments. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 32(5). 911–924. 2 indexed citations
2.
Danger, Jean‐Luc, et al.. (2024). Multi-modal Pre-silicon Evaluation of Hardware Masking Styles. Journal of Electronic Testing. 40(6). 723–740.
3.
Danger, Jean‐Luc, et al.. (2023). Testing and reliability enhancement of security primitives: Methodology and experimental validation. Microelectronics Reliability. 147. 115055–115055. 1 indexed citations
4.
Danger, Jean‐Luc, et al.. (2023). Aging-Induced Failure Prognosis via Digital Sensors. SPIRE - Sciences Po Institutional REpository. 703–708. 2 indexed citations
5.
Carlet, Claude, et al.. (2023). A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost. Journal of Cryptographic Engineering. 14(2). 223–240.
6.
Danger, Jean‐Luc, et al.. (2023). Special Session: Security Verification & Testing for SR-Latch TRNGs. SPIRE - Sciences Po Institutional REpository. 1–10. 1 indexed citations
7.
Liu, Yi, et al.. (2023). Maximal Leakage of Masked Implementations Using Mrs. Gerber's Lemma for Min-Entropy. 654–659. 1 indexed citations
8.
Guilley, Sylvain, et al.. (2022). On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Transactions on Cryptographic Hardware and Embedded Systems. 192–222. 5 indexed citations
9.
Guilley, Sylvain, et al.. (2022). Toward finding best linear codes for side-channel protections (extended version). Journal of Cryptographic Engineering. 14(1). 131–145.
10.
Guilley, Sylvain, et al.. (2022). Side-Channel Expectation-Maximization Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems. 774–799.
11.
Danger, Jean‐Luc, et al.. (2021). Reducing Aging Impacts in Digital Sensors via Run-Time Calibration. Journal of Electronic Testing. 37(5-6). 653–673. 4 indexed citations
12.
Mrabet, Nadia El, et al.. (2020). On the power of template attacks in highly multivariate context. Journal of Cryptographic Engineering. 10(4). 337–354. 2 indexed citations
13.
Facon, Adrien, et al.. (2019). End-to-end automated cache-timing attack driven by Machine Learning. 11. 1. 2 indexed citations
14.
Carlet, Claude, et al.. (2019). Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection. SPIRE - Sciences Po Institutional REpository. 11. 17–0. 4 indexed citations
15.
Guilley, Sylvain, et al.. (2019). An Information-Theoretic Model for Side-Channel Attacks in Embedded Hardware. SPIRE - Sciences Po Institutional REpository. 310–315. 4 indexed citations
16.
Bhasin, Shivam, Claude Carlet, & Sylvain Guilley. (2014). Theory of masking with codewords in hardware: low-weight dth-order correlation-immune Boolean functions. SPIRE - Sciences Po Institutional REpository. 2 indexed citations
17.
Guilley, Sylvain, et al.. (2010). Far correlation-based EMA with a precharacterized leakage model. Design, Automation, and Test in Europe. 977–980. 11 indexed citations
18.
Nassar, Maxime, et al.. (2010). BCDL: a high speed balanced DPL for FPGA with global precharge and no early evaluation. Design, Automation, and Test in Europe. 849–854. 38 indexed citations
19.
Guilley, Sylvain, Philippe Hoogvorst, Yves Mathieu, & Renaud Pacalet. (2005). The backend duplication method : A leakage-proof place-and-route strategy for ASICs. 383–397. 5 indexed citations
20.
Guilley, Sylvain, et al.. (2004). CMOS structures suitable for secured hardware. Design, Automation, and Test in Europe. 2. 21414. 23 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026