| Publication | Date of Publication | Type |
|---|
| Masked circuit compiler in the cardinal random probing composability framework | 2026-03-31 | Paper |
| Threshold linear secret sharing to the rescue of MPC-in-the-head | 2024-08-30 | Paper |
Unifying freedom and separation for tight probing-secure composition Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Higher-order DCA against standard side-channel countermeasures Constructive Side-Channel Analysis and Secure Design | 2023-10-20 | Paper |
Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection Advances in Cryptology – ASIACRYPT 2022 | 2023-08-16 | Paper |
Syndrome decoding in the head: shorter signatures from zero-knowledge proofs Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
Dynamic random probing expansion with quasi linear asymptotic complexity Lecture Notes in Computer Science | 2023-05-12 | Paper |
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature Designs, Codes and Cryptography | 2023-04-21 | Paper |
| Random probing security: verification, composition, expansion and new constructions | 2022-11-09 | Paper |
| On the power of expansion: more efficient constructions in the random probing model | 2021-12-08 | Paper |
| Tornado: automatic generation of probing-secure masked bitsliced implementations | 2021-12-01 | Paper |
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison Constructive Side-Channel Analysis and Secure Design | 2020-07-20 | Paper |
Generalized polynomial decomposition for S-boxes with application to side-channel countermeasures Lecture Notes in Computer Science | 2020-06-24 | Paper |
| Tight private circuits: achieving probing security with the least refreshing | 2019-01-23 | Paper |
| How to securely compute with noisy leakage in quasilinear complexity | 2019-01-23 | Paper |
| Lattice attacks against elliptic-curve signatures with blinded scalar multiplication | 2018-02-16 | Paper |
| On the multiplicative complexity of Boolean functions and bitsliced higher-order masking | 2018-02-14 | Paper |
Statistical Analysis of Second Order Differential Power Analysis IEEE Transactions on Computers | 2017-08-08 | Paper |
How fast can higher-order masking be in software? Lecture Notes in Computer Science | 2017-06-13 | Paper |
Algebraic decomposition for probing security Lecture Notes in Computer Science | 2015-12-10 | Paper |
Two attacks on a white-box AES implementation Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
White-box security notions for symmetric encryption schemes Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Higher-order side channel security and mask refreshing Fast Software Encryption | 2015-09-18 | Paper |
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks Advanced Information Systems Engineering | 2015-07-21 | Paper |
On the practical security of a leakage resilient masking scheme Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
On double exponentiation for securing RSA against fault analysis Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
SCARE of secret ciphers with SPN structures Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Differential fault analysis of DES Information Security and Cryptography | 2013-07-09 | Paper |
Masking against Side-Channel Attacks: A Formal Security Proof Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Conversion of security proofs from one leakage model to another: a new issue Constructive Side-Channel Analysis and Secure Design | 2013-02-14 | Paper |
Higher-order masking schemes for S-boxes Fast Software Encryption | 2013-01-08 | Paper |
Mutual information analysis: a comprehensive study Journal of Cryptology | 2012-01-18 | Paper |
Theoretical and practical aspects of mutual information-based side channel analysis International Journal of Applied Cryptography | 2011-04-05 | Paper |
Affine Masking against Higher-Order Side Channel Analysis Selected Areas in Cryptography | 2011-03-15 | Paper |
Provably secure higher-order masking of AES Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers Lecture Notes in Computer Science | 2009-11-10 | Paper |
Differential Fault Analysis on DES Middle Rounds Lecture Notes in Computer Science | 2009-11-10 | Paper |
On the Exact Success Rate of Side Channel Analysis in the Gaussian Model Selected Areas in Cryptography | 2009-11-03 | Paper |
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis Fast Software Encryption | 2008-09-18 | Paper |
Side Channel Cryptanalysis of a Higher Order Masking Scheme Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |