Thomas Roche

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Algebraic decomposition for probing security
Lecture Notes in Computer Science
2015-12-10Paper
Higher-order side channel security and mask refreshing
Fast Software Encryption
2015-09-18Paper
Output-sensitive decoding for redundant residue systems
Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation
2015-09-17Paper
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Advanced Information Systems Engineering
2015-07-21Paper
Side-Channel Attack against RSA Key Generation Algorithms
Advanced Information Systems Engineering
2015-07-21Paper
Stability Results for Doubly Nonlinear Differential Inclusions by Variational Convergence
SIAM Journal on Control and Optimization
2014-07-30Paper
On the practical security of a leakage resilient masking scheme
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Behind the scene of side channel attacks
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
SCARE of secret ciphers with SPN structures
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
Rigorous derivation of a plate theory in linear elastoplasticity via \(\Gamma\)-convergence
NoDEA. Nonlinear Differential Equations and Applications
2012-12-06Paper
Uniqueness of a quasivariational sweeping process on functions of bounded variation
Annali della Scuola Normale Superiore di Pisa. Classe di Scienze. Serie V
2012-09-21Paper
Higher-order glitches free implementation of the AES using secure multi-party computation protocols
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
Lipschitz continuous data dependence of sweeping processes in BV spaces
Discrete and Continuous Dynamical Systems. Series B
2011-06-07Paper
Attack on a higher-order masking of the AES based on homographic functions
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher
Communications in Computer and Information Science
2009-05-13Paper


Research outcomes over time


This page was built for person: Thomas Roche