| Publication | Date of Publication | Type |
|---|
| Formal security proofs via Doeblin coefficients: optimal side-channel factorization from noisy leakage to random probing | 2024-12-13 | Paper |
| Mathematical foundations for side-channel analysis of cryptographic systems | 2024-11-08 | Paper |
| From substitution box to threshold | 2024-10-23 | Paper |
| Practical aspects of vertical side-channel analyses on HMAC-SHA-2 | 2024-10-23 | Paper |
| Improving side-channel attacks by exploiting substitution bpxes properties | 2024-09-18 | Paper |
| Cache-timing attack detection and prevention. Application to crypto libs and PQC | 2023-10-20 | Paper |
| Persistent fault analysis with few encryptions | 2022-12-16 | Paper |
| On the implementation efficiency of linear regression-based side-channel attacks | 2022-12-16 | Paper |
| Processor anchor to increase the robustness against fault injection and cyber attacks | 2022-12-16 | Paper |
| Side-channel analysis of embedded systems. An efficient algorithmic approach | 2022-08-11 | Paper |
| Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) | 2022-04-01 | Paper |
| Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods | 2021-08-05 | Paper |
| Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE | 2020-12-14 | Paper |
| Lightweight Ciphers and Their Side-Channel Resilience | 2020-10-02 | Paper |
| Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem | 2020-08-26 | Paper |
| Security evaluation against side-channel analysis at compilation time | 2020-06-29 | Paper |
| Recovering secrets from prefix-dependent leakage | 2020-06-24 | Paper |
| Confused yet successful: theoretical comparison of distinguishers for monobit leakages in terms of confusion coefficient and SNR | 2019-10-31 | Paper |
| Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level | 2019-10-14 | Paper |
| Cache-timing attacks still threaten IoT devices | 2019-10-14 | Paper |
| Speed-up of SCA attacks on 32-bit multiplications | 2019-10-14 | Paper |
| CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis | 2019-03-29 | Paper |
| Predictive aging of reliability of two delay PUFs | 2018-10-26 | Paper |
| Statistical properties of side-channel and fault injection attacks using coding theory | 2018-05-28 | Paper |
| Multivariate high-order attacks of shuffled tables recomputation | 2018-05-28 | Paper |
| Less is more: dimensionality reduction from a theoretical perspective | 2018-02-14 | Paper |
| Multi-variate high-order attacks of shuffled tables recomputation | 2018-02-14 | Paper |
| Correlated extra-reductions defeat blinded regular exponentiation | 2018-02-14 | Paper |
| On the optimality and practicability of mutual information analysis in some scenarios | 2018-01-29 | Paper |
| Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks | 2017-08-08 | Paper |
| Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics | 2017-07-27 | Paper |
| Cryptographically Secure Shield for Security IPs Protection | 2017-06-08 | Paper |
| Codes for side-channel attacks and protections | 2017-06-01 | Paper |
| Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions | 2017-05-16 | Paper |
| Higher-Order CIS Codes | 2017-05-16 | Paper |
| Taylor expansion of maximum likelihood attacks for masked and shuffled implementations | 2017-02-01 | Paper |
| Hardware-enforced protection against buffer overflow using masked program counter | 2016-05-02 | Paper |
| Improving the Big Mac attack on elliptic curve cryptography | 2016-05-02 | Paper |
| Safe-errors on SPA protected implementations with the atomicity technique | 2016-05-02 | Paper |
| Complementary dual codes for counter-measures to side-channel attacks | 2016-03-11 | Paper |
| A theoretical study of Kolmogorov-Smirnov distinguishers | 2016-03-10 | Paper |
| A key to success. Success exponents for side-channel distinguishers | 2016-01-12 | Paper |
| Complementary dual codes for counter-measures to side-channel attacks | 2016-01-07 | Paper |
| Analysis and improvements of the DPA contest v4 implementation | 2015-09-18 | Paper |
| Boosting higher-order correlation attacks by dimensionality reduction | 2015-09-18 | Paper |
| Good is not good enough. Deriving optimal distinguishers from communication theory | 2015-07-21 | Paper |
| Masks will fall off. Higher-order optimal distinguishers | 2015-01-06 | Paper |
| Leakage squeezing: optimal implementation and security evaluation | 2014-09-17 | Paper |
| Leakage squeezing of order two | 2014-08-20 | Paper |
| Detecting hidden leakages | 2014-07-07 | Paper |
| DRECON: DPA resistant encryption by construction | 2014-06-24 | Paper |
| Optimal First-Order Masking with Linear and Non-linear Bijections | 2012-07-23 | Paper |
| A first-order leak-free masking countermeasure | 2012-06-08 | Paper |
| Towards different flavors of combined side channel attacks | 2012-06-08 | Paper |
| Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks | 2011-12-16 | Paper |
| First principal components analysis: a new side channel distinguisher | 2011-10-27 | Paper |
| Characterization of the electromagnetic side channel in frequency domain | 2011-07-29 | Paper |
| Defeating any secret cryptography with SCARE attacks | 2010-08-31 | Paper |
| Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator | 2010-05-04 | Paper |
| Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks | 2010-03-16 | Paper |