| Publication | Date of Publication | Type |
|---|
| IP masking with generic security guarantees under minimum assumptions, and applications | 2026-03-31 | Paper |
| Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences | 2024-12-13 | Paper |
| Generalized Feistel ciphers for efficient prime field masking | 2024-11-13 | Paper |
| Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking | 2024-11-13 | Paper |
| The patching landscape of Elisabeth-4 and the mixed filter permutator paradigm | 2024-10-23 | Paper |
| Forgery attacks on several beyond-birthday-bound secure MACs | 2024-08-30 | Paper |
| SpookChain: chaining a sponge-based AEAD with beyond-birthday security | 2024-03-12 | Paper |
Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Learning with physical rounding for linear and quadratic leakage functions Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Systematic study of decryption and re-encryption leakage: the case of Kyber Constructive Side-Channel Analysis and Secure Design | 2023-12-12 | Paper |
Handcrafting: improving automated masking in hardware with manual optimizations Constructive Side-Channel Analysis and Secure Design | 2023-12-12 | Paper |
Effective and efficient masking with low noise using small-Mersenne-prime ciphers Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Fast side-channel security evaluation of ECC implementations. Shortcut formulas for horizontal side-channel attacks against ECSM with the Montgomery ladder Constructive Side-Channel Analysis and Secure Design | 2023-10-20 | Paper |
Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
| Packed multiplication: how to amortize the cost of side-channel masking? | 2023-03-21 | Paper |
| \textsf{Scatter}: a missing case? | 2022-12-16 | Paper |
| On the worst-case side-channel security of ECC point randomization in embedded devices | 2022-07-06 | Paper |
| Security analysis of deterministic re-keying with masking and shuffling: application to ISAP | 2022-06-17 | Paper |
| Towards tight random probing security | 2022-04-22 | Paper |
How to fool a black box machine learning based side-channel security evaluation Cryptography and Communications | 2022-04-01 | Paper |
A stealthy hardware Trojan based on a statistical fault attack Cryptography and Communications | 2022-04-01 | Paper |
Hardware Private Circuits: From Trivial Composition to Full Verification IEEE Transactions on Computers | 2022-03-23 | Paper |
| A systematic appraisal of side channel evaluation strategies | 2021-07-06 | Paper |
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison Constructive Side-Channel Analysis and Secure Design | 2020-07-20 | Paper |
Very high order masking: efficient implementation and security evaluation Lecture Notes in Computer Science | 2020-06-24 | Paper |
A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks Lecture Notes in Computer Science | 2020-06-24 | Paper |
| Leakage certification revisited: bounding model errors in side-channel security evaluations | 2020-05-20 | Paper |
| Improved filter permutators for efficient FHE: better instances and implementations | 2020-05-12 | Paper |
| Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher | 2020-05-06 | Paper |
| Revisiting location privacy from a side-channel analysis viewpoint | 2020-05-06 | Paper |
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version Journal of Cryptology | 2019-11-27 | Paper |
| Masking proofs are tight and how to exploit it in security evaluations | 2018-07-09 | Paper |
| Consolidating inner product masking | 2018-04-06 | Paper |
| Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms | 2018-02-16 | Paper |
| Blind source separation from single measurements using singular spectrum analysis | 2018-02-14 | Paper |
| Evaluation and improvement of generic-emulating DPA attacks | 2018-02-14 | Paper |
| Towards easy leakage certification | 2018-02-14 | Paper |
| Simple key enumeration (and rank estimation) using histograms: an integrated approach | 2018-02-14 | Paper |
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model Lecture Notes in Computer Science | 2017-06-13 | Paper |
Ridge-based profiled differential power analysis Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Improving the security and efficiency of block ciphers based on LS-designs Designs, Codes and Cryptography | 2017-02-10 | Paper |
Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Taylor expansion of maximum likelihood attacks for masked and shuffled implementations Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Score-Based vs. Probability-Based Enumeration – A Cautionary Note Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Towards sound fresh re-keying with hard (physical) learning problems Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Towards stream ciphers for efficient FHE with low-noise ciphertexts Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
From improved leakage detection to the detection of points of interests in leakage traces Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Support vector machines for improved IP detection with soft physical hash functions Constructive Side-Channel Analysis and Secure Design | 2016-03-10 | Paper |
An optimal key enumeration algorithm and its application to side-channel attacks Selected Areas in Cryptography | 2015-12-04 | Paper |
Masking and leakage-resilient primitives: one, the other(s) or both? Cryptography and Communications | 2015-11-18 | Paper |
SEA: A Scalable Encryption Algorithm for Small Embedded Applications Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
Making Masking Security Proofs Concrete Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
LS-designs: bitslice encryption for efficient masked software implementations Fast Software Encryption | 2015-09-18 | Paper |
Simpler and more efficient rank estimation for side-channel security assessment Fast Software Encryption | 2015-09-18 | Paper |
FPGA implementations of SPRING and their countermeasures against side-channel attacks Advanced Information Systems Engineering | 2015-07-21 | Paper |
Soft analytical side-channel attacks Lecture Notes in Computer Science | 2015-01-16 | Paper |
On a particular case of the bisymmetric equation for quasigroups Acta Mathematica Hungarica | 2014-08-14 | Paper |
| Experimenting linear cryptanalysis | 2014-08-07 | Paper |
Efficient masked S-boxes processing -- a step forward Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
How to certify the leakage of a chip? Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
The Myth of Generic DPA…and the Magic of Learning Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Hardware implementation and side-channel analysis of Lapin Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Block ciphers that are easier to mask: how far can we go? Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Leakage-resilient symmetric cryptography under empirically verifiable assumptions Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount? Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Shuffling against side-channel attacks: a comprehensive study with cautionary note Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Practical leakage-resilient pseudorandom objects with minimum public randomness Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Towards super-exponential side-channel security with efficient leakage-resilient PRFs Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Towards Green cryptography: a comparison of lightweight ciphers from the energy viewpoint Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Unified and optimized linear collision attacks and their application in a non-profiled setting Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation RFID. Security and Privacy | 2012-08-20 | Paper |
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract) Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Masking with randomized look up tables. Towards preventing side-channel attacks of all orders Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Mutual information analysis: a comprehensive study Journal of Cryptology | 2012-01-18 | Paper |
Generic side-channel distinguishers: improvements and limitations Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Leftover Hash Lemma, Revisited Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
FPGA implementation of a statistical saturation attack against PRESENT Lecture Notes in Computer Science | 2011-06-29 | Paper |
A formal study of power variability issues and side-channel attacks for nanoscale devices Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
The world is not enough: another look on second-order DPA Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Algebraic side-channel attacks Information Security and Cryptology | 2010-11-23 | Paper |
How leaky is an extractor? Lecture Notes in Computer Science | 2010-08-31 | Paper |
Adaptive chosen-message side-channel attacks Applied Cryptography and Network Security | 2010-07-06 | Paper |
Multi-trail statistical saturation attacks Applied Cryptography and Network Security | 2010-07-06 | Paper |
Fresh re-keying: security against side-channel and fault attacks for low-cost devices Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA Lecture Notes in Computer Science | 2009-11-10 | Paper |
Mutual Information Analysis: How, When and Why? Lecture Notes in Computer Science | 2009-11-10 | Paper |
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions Lecture Notes in Computer Science | 2009-11-10 | Paper |
How to Compare Profiled Side-Channel Attacks? Applied Cryptography and Network Security | 2009-06-03 | Paper |
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Provable security of block ciphers against linear cryptanalysis: a mission impossible? Designs, Codes and Cryptography | 2009-03-31 | Paper |
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent Fast Software Encryption | 2008-09-18 | Paper |
Implementation of the AES-128 on Virtex-5 FPGAs Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Improving the Time Complexity of Matsui’s Linear Cryptanalysis Lecture Notes in Computer Science | 2008-05-06 | Paper |
Foundations of Security Analysis and Design III Lecture Notes in Computer Science | 2006-11-01 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
| scientific article; zbMATH DE number 1979312 (Why is no real title available?) | 2003-09-11 | Paper |
| scientific article; zbMATH DE number 1941130 (Why is no real title available?) | 2003-06-29 | Paper |
| scientific article; zbMATH DE number 1941137 (Why is no real title available?) | 2003-06-29 | Paper |
Optimization of processes by equipartition Journal of Non-Equilibrium Thermodynamics | 2000-01-30 | Paper |