| Publication | Date of Publication | Type |
|---|
Gradient visualization for general characterization in profiling attacks Constructive Side-Channel Analysis and Secure Design | 2023-10-20 | Paper |
| On the implementation efficiency of linear regression-based side-channel attacks | 2022-12-16 | Paper |
| Random probing security: verification, composition, expansion and new constructions | 2022-11-09 | Paper |
Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version Cryptography and Communications | 2022-04-01 | Paper |
Lower and upper bounds on the randomness complexity of private computations of AND SIAM Journal on Discrete Mathematics | 2021-03-30 | Paper |
On the use of independent component analysis to denoise side-channel measurements Constructive Side-Channel Analysis and Secure Design | 2020-07-20 | Paper |
Convolutional neural networks with data augmentation against jitter-based countermeasures. Profiling attacks without pre-processing Lecture Notes in Computer Science | 2020-06-24 | Paper |
| Lower and upper bounds on the randomness complexity of private computations of AND | 2020-04-30 | Paper |
| Breaking cryptographic implementations using deep learning techniques | 2018-10-26 | Paper |
| Horizontal side-channel attacks and countermeasures on the ISW masking scheme | 2018-02-14 | Paper |
| Faster evaluation of sboxes via common shares | 2018-02-14 | Paper |
| Improved side-channel analysis of finite-field multiplication | 2018-02-14 | Paper |
| Private multiplication over finite fields | 2017-10-27 | Paper |
Statistical Analysis of Second Order Differential Power Analysis IEEE Transactions on Computers | 2017-08-08 | Paper |
A New Second-Order Side Channel Attack Based on Linear Regression IEEE Transactions on Computers | 2017-07-12 | Paper |
Redefining the transparency order Designs, Codes and Cryptography | 2017-02-10 | Paper |
Randomness complexity of private circuits for multiplication Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Polynomial evaluation and side channel analysis The New Codebreakers | 2016-05-02 | Paper |
Side-channel analysis of Montgomery's representation randomization Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Algebraic decomposition for probing security Lecture Notes in Computer Science | 2015-12-10 | Paper |
Horizontal collision correlation attack on elliptic curves Cryptography and Communications | 2015-11-18 | Paper |
Off-line group signatures with smart cards Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
Horizontal collision correlation attack on elliptic curves Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Higher-order side channel security and mask refreshing Fast Software Encryption | 2015-09-18 | Paper |
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks Advanced Information Systems Engineering | 2015-07-21 | Paper |
Side-Channel Attack against RSA Key Generation Algorithms Advanced Information Systems Engineering | 2015-07-21 | Paper |
Efficient masked S-boxes processing -- a step forward Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
On the practical security of a leakage resilient masking scheme Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Behind the scene of side channel attacks Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Masking against Side-Channel Attacks: A Formal Security Proof Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Conversion of security proofs from one leakage model to another: a new issue Constructive Side-Channel Analysis and Secure Design | 2013-02-14 | Paper |
Higher-order masking schemes for S-boxes Fast Software Encryption | 2013-01-08 | Paper |
A first-order leak-free masking countermeasure Lecture Notes in Computer Science | 2012-06-08 | Paper |
Mutual information analysis: a comprehensive study Journal of Cryptology | 2012-01-18 | Paper |
Higher-order glitches free implementation of the AES using secure multi-party computation protocols Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
Montgomery’s Trick and Fast Implementation of Masked AES Lecture Notes in Computer Science | 2011-06-29 | Paper |
Theoretical and practical aspects of mutual information-based side channel analysis International Journal of Applied Cryptography | 2011-04-05 | Paper |
Affine Masking against Higher-Order Side Channel Analysis Selected Areas in Cryptography | 2011-03-15 | Paper |
Attack on a higher-order masking of the AES based on homographic functions Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Provably secure higher-order masking of AES Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
Secure multiplicative masking of power functions Applied Cryptography and Network Security | 2010-07-06 | Paper |
On plateaued functions and their constructions. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers Lecture Notes in Computer Science | 2009-11-10 | Paper |
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis Fast Software Encryption | 2008-09-18 | Paper |
Side Channel Cryptanalysis of a Higher Order Masking Scheme Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
| scientific article; zbMATH DE number 2124963 (Why is no real title available?) | 2005-01-04 | Paper |