| Publication | Date of Publication | Type |
|---|
Energy consumption of protected cryptographic hardware cores. An experimental study Constructive Side-Channel Analysis and Secure Design | 2023-11-16 | Paper |
| SILVER -- statistical independence and leakage verification | 2023-03-21 | Paper |
Impeccable Circuits IEEE Transactions on Computers | 2020-10-02 | Paper |
A first-order SCA resistant AES without fresh randomness Constructive Side-Channel Analysis and Secure Design | 2020-07-20 | Paper |
Threshold implementation in software. Case study of PRESENT Constructive Side-Channel Analysis and Secure Design | 2020-07-20 | Paper |
Bit-sliding: a generic technique for bit-serial implementations of SPN-based primitives. Applications to AES, PRESENT and SKINNY Lecture Notes in Computer Science | 2020-06-24 | Paper |
Spin me right round rotational symmetry for FPGA-specific AES: extended version Journal of Cryptology | 2020-06-15 | Paper |
Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series Constructive Side-Channel Analysis and Secure Design | 2019-12-05 | Paper |
Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs IEEE Transactions on Computers | 2018-06-27 | Paper |
GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs IEEE Transactions on Computers | 2018-06-27 | Paper |
White-box cryptography in the gray box Fast Software Encryption | 2018-05-09 | Paper |
| The first thorough side-channel hardware Trojan | 2018-04-06 | Paper |
| Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms | 2018-02-16 | Paper |
| Assessment of hiding the higher-order leakages in hardware. What are the achievements versus overheads? | 2018-02-14 | Paper |
| Leakage assessment methodology. A clear roadmap for side-channel evaluations | 2018-02-14 | Paper |
| Strong 8-bit sboxes with efficient masking in hardware | 2018-02-14 | Paper |
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores IEEE Transactions on Computers | 2017-07-12 | Paper |
Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Affine equivalence and its application to tightening threshold implementations Lecture Notes in Computer Science | 2016-05-19 | Paper |
Arithmetic Addition over Boolean Masking Applied Cryptography and Network Security | 2016-03-10 | Paper |
Full-size high-security ECC implementation on MSP430 microcontrollers Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
Wire-tap codes as side-channel countermeasure Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Early propagation and imbalanced routing, how to diminish in FPGAs Advanced Information Systems Engineering | 2015-07-21 | Paper |
Comprehensive evaluation of AES dual ciphers as a side-channel countermeasure Information and Communications Security | 2014-09-29 | Paper |
Detecting hidden leakages Applied Cryptography and Network Security | 2014-07-07 | Paper |
On the simplicity of converting leakages from multivariate to univariate. (Case study of a glitch-resistant masking scheme) Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Side-channel resistant crypto for less than 2,300 GE Journal of Cryptology | 2012-01-18 | Paper |
Generic Side-Channel Countermeasures for Reconfigurable Devices Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
Pushing the limits: a very compact and a threshold implementation of AES Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Correlation-enhanced power analysis collision attack Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
Practical power analysis attacks on software implementations of McEliece Post-Quantum Cryptography | 2010-06-17 | Paper |
On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices Communications in Computer and Information Science | 2009-05-20 | Paper |
Dual-rail transition logic: A logic style for counteracting power analysis attacks Computers and Electrical Engineering | 2009-03-20 | Paper |
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme Lecture Notes in Computer Science | 2009-02-10 | Paper |