Author of the publication

Random Probing Security: Verification, Composition, Expansion and New Constructions.

, , , , and . CRYPTO (1), volume 12170 of Lecture Notes in Computer Science, page 339-368. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Horizontal collision correlation attack on elliptic curves - - Extended Version -., , , , and . Cryptogr. Commun., 7 (1): 91-119 (2015)Montgomery's Trick and Fast Implementation of Masked AES., , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 153-169. Springer, (2011)Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations., , , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 1-17. Springer, (2013)Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices., , and . CARDIS, volume 5189 of Lecture Notes in Computer Science, page 191-205. Springer, (2008)Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform., , , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 1-14. Springer, (2008)Deep Learning to Evaluate Secure RSA Implementations., , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (2): 132-161 (2019)Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations., , and . WISTP, volume 12024 of Lecture Notes in Computer Science, page 66-84. Springer, (2019)First-Order Side-Channel Attacks on the Permutation Tables Countermeasure - Extended Version -., and . IACR Cryptology ePrint Archive, (2010)Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database., , , , and . IACR Cryptology ePrint Archive, (2018)Masking against Side-Channel Attacks: A Formal Security Proof., and . EUROCRYPT, volume 7881 of Lecture Notes in Computer Science, page 142-159. Springer, (2013)