| Publication | Date of Publication | Type |
|---|
| Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing | 2024-12-13 | Paper |
| Mathematical foundations for side-channel analysis of cryptographic systems | 2024-11-08 | Paper |
| From substitution box to threshold | 2024-10-23 | Paper |
| Practical aspects of vertical side-channel analyses on HMAC-SHA-2 | 2024-10-23 | Paper |
| Improving side-channel attacks by exploiting substitution bpxes properties | 2024-09-18 | Paper |
| Cache-timing attack detection and prevention. Application to crypto libs and PQC | 2023-10-20 | Paper |
| Persistent fault analysis with few encryptions | 2022-12-16 | Paper |
| On the implementation efficiency of linear regression-based side-channel attacks | 2022-12-16 | Paper |
| Processor anchor to increase the robustness against fault injection and cyber attacks | 2022-12-16 | Paper |
| Side-Channel Analysis of Embedded Systems | 2022-08-11 | Paper |
| Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) | 2022-04-01 | Paper |
| Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods | 2021-08-05 | Paper |
| Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE | 2020-12-14 | Paper |
| Lightweight Ciphers and Their Side-Channel Resilience | 2020-10-02 | Paper |
| Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem | 2020-08-26 | Paper |
| Security Evaluation Against Side-Channel Analysis at Compilation Time | 2020-06-29 | Paper |
| Recovering secrets from prefix-dependent leakage | 2020-06-24 | Paper |
| Confused yet successful: theoretical comparison of distinguishers for monobit leakages in terms of confusion coefficient and SNR | 2019-10-31 | Paper |
| Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level | 2019-10-14 | Paper |
| Cache-timing attacks still threaten IoT devices | 2019-10-14 | Paper |
| Speed-up of SCA attacks on 32-bit multiplications | 2019-10-14 | Paper |
| CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis | 2019-03-29 | Paper |
| Predictive aging of reliability of two delay PUFs | 2018-10-26 | Paper |
| Statistical properties of side-channel and fault injection attacks using coding theory | 2018-05-28 | Paper |
| Multivariate high-order attacks of shuffled tables recomputation | 2018-05-28 | Paper |
| Less is more: dimensionality reduction from a theoretical perspective | 2018-02-14 | Paper |
| Multi-variate high-order attacks of shuffled tables recomputation | 2018-02-14 | Paper |
| Correlated extra-reductions defeat blinded regular exponentiation | 2018-02-14 | Paper |
| On the optimality and practicability of mutual information analysis in some scenarios | 2018-01-29 | Paper |
| Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks | 2017-08-08 | Paper |
| Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics | 2017-07-27 | Paper |
| Cryptographically Secure Shield for Security IPs Protection | 2017-06-08 | Paper |
| Codes for Side-Channel Attacks and Protections | 2017-06-01 | Paper |
| Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions | 2017-05-16 | Paper |
| Higher-Order CIS Codes | 2017-05-16 | Paper |
| Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations | 2017-02-01 | Paper |
| Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter | 2016-05-02 | Paper |
| Improving the Big Mac Attack on Elliptic Curve Cryptography | 2016-05-02 | Paper |
| Safe-Errors on SPA Protected Implementations with the Atomicity Technique | 2016-05-02 | Paper |
| Complementary dual codes for counter-measures to side-channel attacks | 2016-03-11 | Paper |
| A Theoretical Study of Kolmogorov-Smirnov Distinguishers | 2016-03-10 | Paper |
| A Key to Success | 2016-01-12 | Paper |
| Complementary Dual Codes for Counter-Measures to Side-Channel Attacks | 2016-01-07 | Paper |
| Analysis and Improvements of the DPA Contest v4 Implementation | 2015-09-18 | Paper |
| Boosting Higher-Order Correlation Attacks by Dimensionality Reduction | 2015-09-18 | Paper |
| Good Is Not Good Enough | 2015-07-21 | Paper |
| Masks Will Fall Off | 2015-01-06 | Paper |
| Leakage squeezing: optimal implementation and security evaluation | 2014-09-17 | Paper |
| Leakage Squeezing of Order Two | 2014-08-20 | Paper |
| Detecting Hidden Leakages | 2014-07-07 | Paper |
| DRECON: DPA Resistant Encryption by Construction | 2014-06-24 | Paper |
| Optimal First-Order Masking with Linear and Non-linear Bijections | 2012-07-23 | Paper |
| A First-Order Leak-Free Masking Countermeasure | 2012-06-08 | Paper |
| Towards Different Flavors of Combined Side Channel Attacks | 2012-06-08 | Paper |
| Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks | 2011-12-16 | Paper |
| First Principal Components Analysis: A New Side Channel Distinguisher | 2011-10-27 | Paper |
| Characterization of the Electromagnetic Side Channel in Frequency Domain | 2011-07-29 | Paper |
| Defeating Any Secret Cryptography with SCARE Attacks | 2010-08-31 | Paper |
| Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator | 2010-05-04 | Paper |
| Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks | 2010-03-16 | Paper |