Author of the publication

Random Probing Security: Verification, Composition, Expansion and New Constructions.

, , , , and . CRYPTO (1), volume 12170 of Lecture Notes in Computer Science, page 339-368. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probing Security through Input-Output Separation and Revisited Quasilinear Masking., , , and . IACR Cryptol. ePrint Arch., (2022)OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element., , , and . IACR Cryptol. ePrint Arch., (2024)Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform., , , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 1-14. Springer, (2008)Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations., and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (2): 225-255 (2019)Differential Fault Analysis of DES.. Fault Analysis in Cryptography, Springer, (2012)On Double Exponentiation for Securing RSA against Fault Analysis., , and . CT-RSA, volume 8366 of Lecture Notes in Computer Science, page 152-168. Springer, (2014)Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head., and . ASIACRYPT (1), volume 14438 of Lecture Notes in Computer Science, page 441-473. Springer, (2023)Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection., , , and . ASIACRYPT (2), volume 13792 of Lecture Notes in Computer Science, page 371-402. Springer, (2022)On Second-Order Fault Analysis Resistance for CRT-RSA Implementations., , , and . WISTP, volume 5746 of Lecture Notes in Computer Science, page 68-83. Springer, (2009)Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation., , , , , , and . IACR Trans. Symmetric Cryptol., 2020 (S1): 31-59 (2020)