Probing Security through Input-Output Separation and Revisited Quasilinear Masking. | 0 | 0.34 | 2022 |
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs. | 0 | 0.34 | 2022 |
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection. | 0 | 0.34 | 2022 |
IronMask: Versatile Verification of Masking Security | 0 | 0.34 | 2022 |
Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature. | 0 | 0.34 | 2021 |
IronMask: Versatile Verification of Masking Security. | 0 | 0.34 | 2021 |
Probing Security through Input-Output Separation and Revisited Quasilinear Masking. | 0 | 0.34 | 2021 |
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity. | 0 | 0.34 | 2021 |
High Order Countermeasures for Elliptic-Curve Implementations with Noisy Leakage Security. | 0 | 0.34 | 2021 |
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity. | 0 | 0.34 | 2021 |
Pyjamask: Block Cipher And Authenticated Encryption With Highly Efficient Masked Implementation | 0 | 0.34 | 2020 |
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks. | 0 | 0.34 | 2020 |
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations. | 0 | 0.34 | 2019 |
Higher-Order DCA against Standard Side-Channel Countermeasures. | 0 | 0.34 | 2019 |
How to Reveal the Secrets of an Obscure White-Box Implementation. | 0 | 0.34 | 2018 |
Tight Private Circuits: Achieving Probing Security with the Least Refreshing. | 0 | 0.34 | 2018 |
Preface to TCHES 2018. | 0 | 0.34 | 2018 |
How to Securely Compute with Noisy Leakage in Quasilinear Complexity. | 0 | 0.34 | 2018 |
How Fast Can Higher-Order Masking Be in Software? | 10 | 0.51 | 2017 |
Generalized Polynomial Decomposition For S-Boxes With Application To Side-Channel Countermeasures | 1 | 0.36 | 2017 |
Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication. | 0 | 0.34 | 2016 |
Trap Me If You Can - Million Dollar Curve. | 5 | 0.45 | 2015 |
Algebraic Decomposition for Probing Security. | 14 | 0.65 | 2015 |
On Double Exponentiation for Securing RSA against Fault Analysis. | 3 | 0.38 | 2014 |
On the Practical Security of a Leakage Resilient Masking Scheme. | 5 | 0.43 | 2014 |
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks | 11 | 0.54 | 2014 |
White-Box Security Notions for Symmetric Encryption Schemes. | 15 | 0.69 | 2013 |
Another Nail in the Coffin of White-Box AES Implementations. | 3 | 0.46 | 2013 |
SCARE of Secret Ciphers with SPN Structures | 9 | 0.72 | 2013 |
Higher-Order Side Channel Security and Mask Refreshing. | 44 | 1.21 | 2013 |
Masking against Side-Channel Attacks: A Formal Security Proof. | 73 | 1.71 | 2013 |
Two Attacks on a White-Box AES Implementation. | 21 | 0.78 | 2013 |
Higher-Order masking schemes for s-boxes | 47 | 1.49 | 2012 |
Conversion of security proofs from one leakage model to another: a new issue | 16 | 0.55 | 2012 |
Univariate Side Channel Attacks and Leakage Modeling. | 69 | 2.15 | 2011 |
Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves. | 14 | 0.79 | 2011 |
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic. | 19 | 0.81 | 2011 |
Mutual Information Analysis: a Comprehensive Study | 80 | 3.33 | 2011 |
Affine masking against higher-order side channel analysis | 21 | 0.87 | 2010 |
Provably secure higher-order masking of AES | 184 | 4.95 | 2010 |
Differential Fault Analysis on DES Middle Rounds | 13 | 0.59 | 2009 |
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers | 37 | 1.48 | 2009 |
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation | 23 | 0.93 | 2009 |
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations | 16 | 0.82 | 2009 |
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis | 51 | 3.62 | 2009 |
Statistical Analysis of Second Order Differential Power Analysis | 108 | 4.33 | 2009 |
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis | 40 | 1.91 | 2008 |
On the Exact Success Rate of Side Channel Analysis in the Gaussian Model | 13 | 0.76 | 2008 |
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform | 9 | 0.67 | 2008 |
A generic method for secure Sbox implementation | 44 | 1.90 | 2007 |