Author of the publication

Generalized Feistel Ciphers for Efficient Prime Field Masking.

, , , , and . EUROCRYPT (3), volume 14653 of Lecture Notes in Computer Science, page 188-220. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (2): 482-518 (2023)Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model., and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 343-376. Springer, (2023)Information Bounds and Convergence Rates for Side-Channel Security Evaluators., , , and . IACR Cryptol. ePrint Arch., (2022)Information Bounds and Convergence Rates for Side-Channel Security Evaluators., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (3): 522-569 (2023)Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking., , , , and . EUROCRYPT (4), volume 14654 of Lecture Notes in Computer Science, page 316-344. Springer, (2024)Side-channel analysis against ANSSI's protected AES implementation on ARM: end-to-end attacks with multi-task learning., and . J. Cryptogr. Eng., 13 (2): 129-147 (June 2023)Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue., , , , , and . IACR Cryptol. ePrint Arch., (2023)Prouff & Rivain's Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model., and . IACR Cryptol. ePrint Arch., (2023)Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings., , , , , , and . IACR Cryptol. ePrint Arch., (2022)Gradient Visualization for General Characterization in Profiling Attacks., , and . IACR Cryptology ePrint Archive, (2018)