| Publication | Date of Publication | Type |
|---|
| Processor anchor to increase the robustness against fault injection and cyber attacks | 2022-12-16 | Paper |
| Analysis and protection of the two-metric helper data scheme | 2022-06-17 | Paper |
Categorizing all linear codes of IPM over \(\mathbb{F}_{2^8} \) Cryptography and Communications | 2022-04-01 | Paper |
High Throughput/Gate AES Hardware Architectures Based on Datapath Compression IEEE Transactions on Computers | 2020-10-02 | Paper |
Challenge codes for physically unclonable functions with Gaussian delays: a maximum entropy problem Advances in Mathematics of Communications | 2020-08-26 | Paper |
Security evaluation against side-channel analysis at compilation time Algebra, Codes and Cryptology | 2020-06-29 | Paper |
| Predictive aging of reliability of two delay PUFs | 2018-10-26 | Paper |
| Correlated extra-reductions defeat blinded regular exponentiation | 2018-02-14 | Paper |
Cryptographically Secure Shield for Security IPs Protection IEEE Transactions on Computers | 2017-06-08 | Paper |
Multiply Constant-Weight Codes and the Reliability of Loop Physically Unclonable Functions IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Hardware-enforced protection against buffer overflow using masked program counter The New Codebreakers | 2016-05-02 | Paper |
Improving the Big Mac attack on elliptic curve cryptography The New Codebreakers | 2016-05-02 | Paper |
Analysis and improvements of the DPA contest v4 implementation Security, Privacy, and Applied Cryptography Engineering | 2015-09-18 | Paper |
Boosting higher-order correlation attacks by dimensionality reduction Security, Privacy, and Applied Cryptography Engineering | 2015-09-18 | Paper |
Leakage squeezing: optimal implementation and security evaluation Journal of Mathematical Cryptology | 2014-09-17 | Paper |
Leakage squeezing of order two Lecture Notes in Computer Science | 2014-08-20 | Paper |
Optimal First-Order Masking with Linear and Non-linear Bijections Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
A first-order leak-free masking countermeasure Lecture Notes in Computer Science | 2012-06-08 | Paper |
Towards different flavors of combined side channel attacks Lecture Notes in Computer Science | 2012-06-08 | Paper |
Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks Lecture Notes in Computer Science | 2011-12-16 | Paper |
First principal components analysis: a new side channel distinguisher Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Characterization of the electromagnetic side channel in frequency domain Information Security and Cryptology | 2011-07-29 | Paper |
Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |