| Publication | Date of Publication | Type |
|---|
Constructing optimal linear codes for code-based masking schemes of higher-orders (edit) Designs, Codes and Cryptography | 2026-03-31 | Paper |
| Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing | 2024-12-13 | Paper |
| Mathematical foundations for side-channel analysis of cryptographic systems | 2024-11-08 | Paper |
| From substitution box to threshold | 2024-10-23 | Paper |
| Practical aspects of vertical side-channel analyses on HMAC-SHA-2 | 2024-10-23 | Paper |
| Improving side-channel attacks by exploiting substitution bpxes properties | 2024-09-18 | Paper |
Cache-timing attack detection and prevention. Application to crypto libs and PQC Constructive Side-Channel Analysis and Secure Design | 2023-10-20 | Paper |
| Persistent fault analysis with few encryptions | 2022-12-16 | Paper |
| On the implementation efficiency of linear regression-based side-channel attacks | 2022-12-16 | Paper |
| Processor anchor to increase the robustness against fault injection and cyber attacks | 2022-12-16 | Paper |
| Side-channel analysis of embedded systems. An efficient algorithmic approach | 2022-08-11 | Paper |
Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) Cryptography and Communications | 2022-04-01 | Paper |
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods Journal of Mathematical Cryptology | 2021-08-05 | Paper |
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE IEEE Transactions on Computers | 2020-12-14 | Paper |
Lightweight Ciphers and Their Side-Channel Resilience IEEE Transactions on Computers | 2020-10-02 | Paper |
Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem Advances in Mathematics of Communications | 2020-08-26 | Paper |
Security evaluation against side-channel analysis at compilation time Algebra, Codes and Cryptology | 2020-06-29 | Paper |
Recovering secrets from prefix-dependent leakage Journal of Mathematical Cryptology | 2020-06-24 | Paper |
| Confused yet successful: theoretical comparison of distinguishers for monobit leakages in terms of confusion coefficient and SNR | 2019-10-31 | Paper |
| Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level | 2019-10-14 | Paper |
| Cache-timing attacks still threaten IoT devices | 2019-10-14 | Paper |
| Speed-up of SCA attacks on 32-bit multiplications | 2019-10-14 | Paper |
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis IEEE Transactions on Computers | 2019-03-29 | Paper |
| Predictive aging of reliability of two delay PUFs | 2018-10-26 | Paper |
Statistical properties of side-channel and fault injection attacks using coding theory Cryptography and Communications | 2018-05-28 | Paper |
Multivariate high-order attacks of shuffled tables recomputation Journal of Cryptology | 2018-05-28 | Paper |
| Less is more: dimensionality reduction from a theoretical perspective | 2018-02-14 | Paper |
| Multi-variate high-order attacks of shuffled tables recomputation | 2018-02-14 | Paper |
| Correlated extra-reductions defeat blinded regular exponentiation | 2018-02-14 | Paper |
On the optimality and practicability of mutual information analysis in some scenarios Cryptography and Communications | 2018-01-29 | Paper |
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks IEEE Transactions on Computers | 2017-08-08 | Paper |
Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics IEEE Transactions on Computers | 2017-07-27 | Paper |
Cryptographically Secure Shield for Security IPs Protection IEEE Transactions on Computers | 2017-06-08 | Paper |
Codes for side-channel attacks and protections Codes, Cryptology and Information Security | 2017-06-01 | Paper |
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Higher-Order CIS Codes IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Taylor expansion of maximum likelihood attacks for masked and shuffled implementations Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Hardware-enforced protection against buffer overflow using masked program counter The New Codebreakers | 2016-05-02 | Paper |
Improving the Big Mac attack on elliptic curve cryptography The New Codebreakers | 2016-05-02 | Paper |
Safe-errors on SPA protected implementations with the atomicity technique The New Codebreakers | 2016-05-02 | Paper |
Complementary dual codes for counter-measures to side-channel attacks Advances in Mathematics of Communications | 2016-03-11 | Paper |
A theoretical study of Kolmogorov-Smirnov distinguishers Constructive Side-Channel Analysis and Secure Design | 2016-03-10 | Paper |
A key to success. Success exponents for side-channel distinguishers Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Complementary dual codes for counter-measures to side-channel attacks Coding Theory and Applications | 2016-01-07 | Paper |
Analysis and improvements of the DPA contest v4 implementation Security, Privacy, and Applied Cryptography Engineering | 2015-09-18 | Paper |
Boosting higher-order correlation attacks by dimensionality reduction Security, Privacy, and Applied Cryptography Engineering | 2015-09-18 | Paper |
Good is not good enough. Deriving optimal distinguishers from communication theory Advanced Information Systems Engineering | 2015-07-21 | Paper |
Masks will fall off. Higher-order optimal distinguishers Lecture Notes in Computer Science | 2015-01-06 | Paper |
Leakage squeezing: optimal implementation and security evaluation Journal of Mathematical Cryptology | 2014-09-17 | Paper |
Leakage squeezing of order two Lecture Notes in Computer Science | 2014-08-20 | Paper |
Detecting hidden leakages Applied Cryptography and Network Security | 2014-07-07 | Paper |
DRECON: DPA resistant encryption by construction Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Optimal First-Order Masking with Linear and Non-linear Bijections Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
A first-order leak-free masking countermeasure Lecture Notes in Computer Science | 2012-06-08 | Paper |
Towards different flavors of combined side channel attacks Lecture Notes in Computer Science | 2012-06-08 | Paper |
Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks Lecture Notes in Computer Science | 2011-12-16 | Paper |
First principal components analysis: a new side channel distinguisher Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Characterization of the electromagnetic side channel in frequency domain Information Security and Cryptology | 2011-07-29 | Paper |
Defeating any secret cryptography with SCARE attacks Lecture Notes in Computer Science | 2010-08-31 | Paper |
Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |