Name
Papers
Collaborators
MATTHIEU RIVAIN
51
64
Citations 
PageRank 
Referers 
1068
49.42
1197
Referees 
References 
553
719
Search Limit
1001000
Title
Citations
PageRank
Year
Probing Security through Input-Output Separation and Revisited Quasilinear Masking.00.342022
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.00.342022
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.00.342022
IronMask: Versatile Verification of Masking Security00.342022
Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature.00.342021
IronMask: Versatile Verification of Masking Security.00.342021
Probing Security through Input-Output Separation and Revisited Quasilinear Masking.00.342021
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.00.342021
High Order Countermeasures for Elliptic-Curve Implementations with Noisy Leakage Security.00.342021
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.00.342021
Pyjamask: Block Cipher And Authenticated Encryption With Highly Efficient Masked Implementation00.342020
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks.00.342020
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations.00.342019
Higher-Order DCA against Standard Side-Channel Countermeasures.00.342019
How to Reveal the Secrets of an Obscure White-Box Implementation.00.342018
Tight Private Circuits: Achieving Probing Security with the Least Refreshing.00.342018
Preface to TCHES 2018.00.342018
How to Securely Compute with Noisy Leakage in Quasilinear Complexity.00.342018
How Fast Can Higher-Order Masking Be in Software?100.512017
Generalized Polynomial Decomposition For S-Boxes With Application To Side-Channel Countermeasures10.362017
Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication.00.342016
Trap Me If You Can - Million Dollar Curve.50.452015
Algebraic Decomposition for Probing Security.140.652015
On Double Exponentiation for Securing RSA against Fault Analysis.30.382014
On the Practical Security of a Leakage Resilient Masking Scheme.50.432014
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks110.542014
White-Box Security Notions for Symmetric Encryption Schemes.150.692013
Another Nail in the Coffin of White-Box AES Implementations.30.462013
SCARE of Secret Ciphers with SPN Structures90.722013
Higher-Order Side Channel Security and Mask Refreshing.441.212013
Masking against Side-Channel Attacks: A Formal Security Proof.731.712013
Two Attacks on a White-Box AES Implementation.210.782013
Higher-Order masking schemes for s-boxes471.492012
Conversion of security proofs from one leakage model to another: a new issue160.552012
Univariate Side Channel Attacks and Leakage Modeling.692.152011
Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves.140.792011
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic.190.812011
Mutual Information Analysis: a Comprehensive Study803.332011
Affine masking against higher-order side channel analysis210.872010
Provably secure higher-order masking of AES1844.952010
Differential Fault Analysis on DES Middle Rounds130.592009
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers371.482009
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation230.932009
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations160.822009
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis513.622009
Statistical Analysis of Second Order Differential Power Analysis1084.332009
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis401.912008
On the Exact Success Rate of Side Channel Analysis in the Gaussian Model130.762008
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform90.672008
A generic method for secure Sbox implementation441.902007
  • 1
  • 2