Emmanuel Prouff

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Gradient visualization for general characterization in profiling attacks
Constructive Side-Channel Analysis and Secure Design
2023-10-20Paper
On the implementation efficiency of linear regression-based side-channel attacks2022-12-16Paper
Random probing security: verification, composition, expansion and new constructions2022-11-09Paper
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
Cryptography and Communications
2022-04-01Paper
Lower and upper bounds on the randomness complexity of private computations of AND
SIAM Journal on Discrete Mathematics
2021-03-30Paper
On the use of independent component analysis to denoise side-channel measurements
Constructive Side-Channel Analysis and Secure Design
2020-07-20Paper
Convolutional neural networks with data augmentation against jitter-based countermeasures. Profiling attacks without pre-processing
Lecture Notes in Computer Science
2020-06-24Paper
Lower and upper bounds on the randomness complexity of private computations of AND2020-04-30Paper
Breaking cryptographic implementations using deep learning techniques2018-10-26Paper
Horizontal side-channel attacks and countermeasures on the ISW masking scheme2018-02-14Paper
Faster evaluation of sboxes via common shares2018-02-14Paper
Improved side-channel analysis of finite-field multiplication2018-02-14Paper
Private multiplication over finite fields2017-10-27Paper
Statistical Analysis of Second Order Differential Power Analysis
IEEE Transactions on Computers
2017-08-08Paper
A New Second-Order Side Channel Attack Based on Linear Regression
IEEE Transactions on Computers
2017-07-12Paper
Redefining the transparency order
Designs, Codes and Cryptography
2017-02-10Paper
Randomness complexity of private circuits for multiplication
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Polynomial evaluation and side channel analysis
The New Codebreakers
2016-05-02Paper
Side-channel analysis of Montgomery's representation randomization
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Algebraic decomposition for probing security
Lecture Notes in Computer Science
2015-12-10Paper
Horizontal collision correlation attack on elliptic curves
Cryptography and Communications
2015-11-18Paper
Off-line group signatures with smart cards
Smart Card Research and Advanced Applications
2015-11-11Paper
Horizontal collision correlation attack on elliptic curves
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Higher-order side channel security and mask refreshing
Fast Software Encryption
2015-09-18Paper
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Advanced Information Systems Engineering
2015-07-21Paper
Side-Channel Attack against RSA Key Generation Algorithms
Advanced Information Systems Engineering
2015-07-21Paper
Efficient masked S-boxes processing -- a step forward
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
On the practical security of a leakage resilient masking scheme
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Behind the scene of side channel attacks
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
Masking against Side-Channel Attacks: A Formal Security Proof
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Conversion of security proofs from one leakage model to another: a new issue
Constructive Side-Channel Analysis and Secure Design
2013-02-14Paper
Higher-order masking schemes for S-boxes
Fast Software Encryption
2013-01-08Paper
A first-order leak-free masking countermeasure
Lecture Notes in Computer Science
2012-06-08Paper
Mutual information analysis: a comprehensive study
Journal of Cryptology
2012-01-18Paper
Higher-order glitches free implementation of the AES using secure multi-party computation protocols
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
Montgomery’s Trick and Fast Implementation of Masked AES
Lecture Notes in Computer Science
2011-06-29Paper
Theoretical and practical aspects of mutual information-based side channel analysis
International Journal of Applied Cryptography
2011-04-05Paper
Affine Masking against Higher-Order Side Channel Analysis
Selected Areas in Cryptography
2011-03-15Paper
Attack on a higher-order masking of the AES based on homographic functions
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Provably secure higher-order masking of AES
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Secure multiplicative masking of power functions
Applied Cryptography and Network Security
2010-07-06Paper
On plateaued functions and their constructions.
Lecture Notes in Computer Science
2010-01-05Paper
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Lecture Notes in Computer Science
2009-11-10Paper
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Fast Software Encryption
2008-09-18Paper
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
scientific article; zbMATH DE number 2124963 (Why is no real title available?)2005-01-04Paper


Research outcomes over time


This page was built for person: Emmanuel Prouff