Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Emmanuel Prouff
@article{DBLP:journals/ccds/LandryLP21, author = {Simon Landry and Yanis Linge and Emmanuel Prouff}, title = {Monomial evaluation of polynomial functions protected by threshold implementations - with an illustration on {AES} -}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {543--572}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00497-9}, doi = {10.1007/S12095-021-00497-9}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LandryLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/KushilevitzOPRT21, author = {Eyal Kushilevitz and Rafail Ostrovsky and Emmanuel Prouff and Adi Ros{\'{e}}n and Adrian Thillard and Damien Vergnaud}, title = {Lower and Upper Bounds on the Randomness Complexity of Private Computations of {AND}}, journal = {{SIAM} J. Discret. Math.}, volume = {35}, number = {1}, pages = {465--484}, year = {2021}, url = {https://doi.org/10.1137/20M1314197}, doi = {10.1137/20M1314197}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamdm/KushilevitzOPRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BenadjilaPSCD20, author = {Ryad Benadjila and Emmanuel Prouff and R{\'{e}}mi Strullu and Eleonora Cagli and C{\'{e}}cile Dumas}, title = {Deep learning for side-channel analysis and introduction to {ASCAD} database}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {163--188}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00220-8}, doi = {10.1007/S13389-019-00220-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BenadjilaPSCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/GuoTPLY20, author = {Zhipeng Guo and Ming Tang and Emmanuel Prouff and Maixing Luo and Fei Yan}, title = {Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {39}, number = {1}, pages = {34--44}, year = {2020}, url = {https://doi.org/10.1109/TCAD.2018.2883900}, doi = {10.1109/TCAD.2018.2883900}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/GuoTPLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MasureDP20, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {A Comprehensive Study of Deep Learning for Side-Channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {348--375}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.348-375}, doi = {10.13154/TCHES.V2020.I1.348-375}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/MasureDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/OuladjGP20, author = {Maamar Ouladj and Sylvain Guilley and Emmanuel Prouff}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {147--172}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_8}, doi = {10.1007/978-3-030-68773-1\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/OuladjGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BelaidCPRT20, author = {Sonia Bela{\"{\i}}d and Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Matthieu Rivain and Abdul Rahman Taleb}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Random Probing Security: Verification, Composition, Expansion and New Constructions}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {339--368}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_12}, doi = {10.1007/978-3-030-56784-2\_12}, timestamp = {Wed, 12 Aug 2020 14:16:56 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BelaidCPRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidCPRT20, author = {Sonia Bela{\"{\i}}d and Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Matthieu Rivain and Abdul Rahman Taleb}, title = {Random Probing Security: Verification, Composition, Expansion and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {786}, year = {2020}, url = {https://eprint.iacr.org/2020/786}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidCPRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CarboneCCDDDPV19, author = {Mathieu Carbone and Vincent Conin and Marie{-}Angela Cornelie and Fran{\c{c}}ois Dassance and Guillaume Dufresne and C{\'{e}}cile Dumas and Emmanuel Prouff and Alexandre Venelli}, title = {Deep Learning to Evaluate Secure {RSA} Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {132--161}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.132-161}, doi = {10.13154/TCHES.V2019.I2.132-161}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CarboneCCDDDPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MasureDP19, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, editor = {Ilia Polian and Marc St{\"{o}}ttinger}, title = {Gradient Visualization for General Characterization in Profiling Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, {COSADE} 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11421}, pages = {145--167}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16350-1\_9}, doi = {10.1007/978-3-030-16350-1\_9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/MasureDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KushilevitzOPRT19, author = {Eyal Kushilevitz and Rafail Ostrovsky and Emmanuel Prouff and Adi Ros{\'{e}}n and Adrian Thillard and Damien Vergnaud}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Lower and Upper Bounds on the Randomness Complexity of Private Computations of {AND}}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11892}, pages = {386--406}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36033-7\_15}, doi = {10.1007/978-3-030-36033-7\_15}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KushilevitzOPRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/LandryLP19, author = {Simon Landry and Yanis Linge and Emmanuel Prouff}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {66--84}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_5}, doi = {10.1007/978-3-030-41702-4\_5}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/LandryLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarboneCCDDDPV19, author = {Mathieu Carbone and Vincent Conin and Marie{-}Angela Cornelie and Fran{\c{c}}ois Dassance and Guillaume Dufresne and C{\'{e}}cile Dumas and Emmanuel Prouff and Alexandre Venelli}, title = {Deep Learning to Evaluate Secure {RSA} Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2019}, url = {https://eprint.iacr.org/2019/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarboneCCDDDPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BauerJPRW19, author = {Aur{\'{e}}lie Bauer and {\'{E}}liane Jaulmes and Emmanuel Prouff and Jean{-}Ren{\'{e}} Reinhard and Justine Wild}, title = {Horizontal Collision Correlation Attack on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2019}, url = {https://eprint.iacr.org/2019/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BauerJPRW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureDP19, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {A Comprehensive Study of Deep Learning for Side-Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2019}, url = {https://eprint.iacr.org/2019/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChabanneMP18, author = {Herv{\'{e}} Chabanne and Houssem Maghrebi and Emmanuel Prouff}, title = {Linear Repairing Codes and Side-Channel Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {118--141}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.118-141}, doi = {10.13154/TCHES.V2018.I1.118-141}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChabanneMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MaghrebiP18, author = {Houssem Maghrebi and Emmanuel Prouff}, editor = {Junfeng Fan and Benedikt Gierlichs}, title = {On the Use of Independent Component Analysis to Denoise Side-Channel Measurements}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10815}, pages = {61--81}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89641-0\_4}, doi = {10.1007/978-3-319-89641-0\_4}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MaghrebiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/ChabanneKP18, author = {Herv{\'{e}} Chabanne and Julien Keuffer and Emmanuel Prouff}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Outsourcing Signatures of Confidential Documents}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {41--47}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_4}, doi = {10.1007/978-3-030-12143-3\_4}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/ChabanneKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mspn/ChabanneLMMP18, author = {Herv{\'{e}} Chabanne and Roch Lescuyer and Jonathan Milgram and Constance Morel and Emmanuel Prouff}, editor = {{\'{E}}ric Renault and Selma Boumerdassi and Samia Bouzefrane}, title = {Recognition Over Encrypted Faces}, booktitle = {Mobile, Secure, and Programmable Networking - 4th International Conference, {MSPN} 2018, Paris, France, June 18-20, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11005}, pages = {174--191}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03101-5\_16}, doi = {10.1007/978-3-030-03101-5\_16}, timestamp = {Mon, 26 Apr 2021 09:27:03 +0200}, biburl = {https://dblp.org/rec/conf/mspn/ChabanneLMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffSBCD18, author = {Emmanuel Prouff and R{\'{e}}mi Strullu and Ryad Benadjila and Eleonora Cagli and C{\'{e}}cile Dumas}, title = {Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to {ASCAD} Database}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2018}, url = {http://eprint.iacr.org/2018/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffSBCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiP18, author = {Houssem Maghrebi and Emmanuel Prouff}, title = {On the Use of Independent Component Analysis to Denoise Side-Channel Measurements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2018}, url = {http://eprint.iacr.org/2018/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureDP18, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {Gradient Visualization for General Characterization in Profiling Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2018}, url = {https://eprint.iacr.org/2018/1196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChakrabortySMMM17, author = {Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff}, title = {Redefining the transparency order}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {95--115}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0250-3}, doi = {10.1007/S10623-016-0250-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChakrabortySMMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BruneauCGHPR17, author = {Nicolas Bruneau and Claude Carlet and Sylvain Guilley and Annelie Heuser and Emmanuel Prouff and Olivier Rioul}, title = {Stochastic Collision Attack}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2090--2104}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2697401}, doi = {10.1109/TIFS.2017.2697401}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CagliDP17, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, editor = {Wieland Fischer and Naofumi Homma}, title = {Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {45--68}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_3}, doi = {10.1007/978-3-319-66787-4\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CagliDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BelaidBPPTV17, author = {Sonia Bela{\"{\i}}d and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Emmanuel Prouff and Adrian Thillard and Damien Vergnaud}, editor = {Jonathan Katz and Hovav Shacham}, title = {Private Multiplication over Finite Fields}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {397--426}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_14}, doi = {10.1007/978-3-319-63697-9\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BelaidBPPTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChabanneWMMP17, author = {Herv{\'{e}} Chabanne and Amaury de Wargny and Jonathan Milgram and Constance Morel and Emmanuel Prouff}, title = {Privacy-Preserving Classification on Deep Neural Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2017}, url = {http://eprint.iacr.org/2017/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChabanneWMMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CagliDP17, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures - Profiling Attacks without Pre-Processing -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2017}, url = {http://eprint.iacr.org/2017/740}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CagliDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChabanneMP17, author = {Herv{\'{e}} Chabanne and Houssem Maghrebi and Emmanuel Prouff}, title = {Linear Repairing Codes and Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {918}, year = {2017}, url = {http://eprint.iacr.org/2017/918}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChabanneMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/CarletP16, author = {Claude Carlet and Emmanuel Prouff}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Polynomial Evaluation and Side Channel Analysis}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {315--341}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_20}, doi = {10.1007/978-3-662-49301-4\_20}, timestamp = {Sat, 19 Oct 2019 20:29:10 +0200}, biburl = {https://dblp.org/rec/conf/birthday/CarletP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CagliDP16, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, editor = {Kerstin Lemke{-}Rust and Michael Tunstall}, title = {Kernel Discriminant Analysis for Information Extraction in the Presence of Masking}, booktitle = {Smart Card Research and Advanced Applications - 15th International Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10146}, pages = {1--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54669-8\_1}, doi = {10.1007/978-3-319-54669-8\_1}, timestamp = {Fri, 27 Mar 2020 08:58:07 +0100}, biburl = {https://dblp.org/rec/conf/cardis/CagliDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BattistelloCPZ16, author = {Alberto Battistello and Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Rina Zeitoun}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Horizontal Side-Channel Attacks and Countermeasures on the {ISW} Masking Scheme}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {23--39}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_2}, doi = {10.1007/978-3-662-53140-2\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BattistelloCPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronGPZ16, author = {Jean{-}S{\'{e}}bastien Coron and Aur{\'{e}}lien Greuet and Emmanuel Prouff and Rina Zeitoun}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Faster Evaluation of SBoxes via Common Shares}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {498--514}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_24}, doi = {10.1007/978-3-662-53140-2\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronGPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BelaidBPPTV16, author = {Sonia Bela{\"{\i}}d and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Emmanuel Prouff and Adrian Thillard and Damien Vergnaud}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Randomness Complexity of Private Circuits for Multiplication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {616--648}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_22}, doi = {10.1007/978-3-662-49896-5\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BelaidBPPTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/MaghrebiPP16, author = {Houssem Maghrebi and Thibault Portigliatti and Emmanuel Prouff}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Breaking Cryptographic Implementations Using Deep Learning Techniques}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {3--26}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_1}, doi = {10.1007/978-3-319-49445-6\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/MaghrebiPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidBPPTV16, author = {Sonia Bela{\"{\i}}d and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Emmanuel Prouff and Adrian Thillard and Damien Vergnaud}, title = {Randomness Complexity of Private Circuits for Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2016}, url = {http://eprint.iacr.org/2016/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidBPPTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletPRR16, author = {Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {Algebraic Decomposition for Probing Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2016}, url = {http://eprint.iacr.org/2016/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletPRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BattistelloCPZ16, author = {Alberto Battistello and Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Rina Zeitoun}, title = {Horizontal Side-Channel Attacks and Countermeasures on the {ISW} Masking Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2016}, url = {http://eprint.iacr.org/2016/540}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BattistelloCPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronGPZ16, author = {Jean{-}S{\'{e}}bastien Coron and Aur{\'{e}}lien Greuet and Emmanuel Prouff and Rina Zeitoun}, title = {Faster Evaluation of SBoxes via Common Shares}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2016}, url = {http://eprint.iacr.org/2016/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronGPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiPP16, author = {Houssem Maghrebi and Thibault Portigliatti and Emmanuel Prouff}, title = {Breaking Cryptographic Implementations Using Deep Learning Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {921}, year = {2016}, url = {http://eprint.iacr.org/2016/921}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BauerJPRW15, author = {Aur{\'{e}}lie Bauer and {\'{E}}liane Jaulmes and Emmanuel Prouff and Jean{-}Ren{\'{e}} Reinhard and Justine Wild}, title = {Horizontal collision correlation attack on elliptic curves - - Extended Version -}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {91--119}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0111-8}, doi = {10.1007/S12095-014-0111-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BauerJPRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CagliDP15, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, editor = {Naofumi Homma and Marcel Medwed}, title = {Enhancing Dimensionality Reduction Methods for Side-Channel Attacks}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {15--33}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_2}, doi = {10.1007/978-3-319-31271-2\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/CagliDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BelaidCFGKP15, author = {Sonia Bela{\"{\i}}d and Jean{-}S{\'{e}}bastien Coron and Pierre{-}Alain Fouque and Beno{\^{\i}}t G{\'{e}}rard and Jean{-}Gabriel Kammerer and Emmanuel Prouff}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Improved Side-Channel Analysis of Finite-Field Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {395--415}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_20}, doi = {10.1007/978-3-662-48324-4\_20}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BelaidCFGKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CarletPRR15, author = {Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Algebraic Decomposition for Probing Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {742--763}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_36}, doi = {10.1007/978-3-662-47989-6\_36}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CarletPRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronPRR15, author = {Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {Higher-Order Side Channel Security and Mask Refreshing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2015}, url = {http://eprint.iacr.org/2015/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronPRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ThillardPR15, author = {Adrian Thillard and Emmanuel Prouff and Thomas Roche}, title = {Success through confidence: Evaluating the effectiveness of a side-channel attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2015}, url = {http://eprint.iacr.org/2015/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ThillardPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidCFGKP15, author = {Sonia Bela{\"{\i}}d and Jean{-}S{\'{e}}bastien Coron and Pierre{-}Alain Fouque and Beno{\^{\i}}t G{\'{e}}rard and Jean{-}Gabriel Kammerer and Emmanuel Prouff}, title = {Improved Side-Channel Analysis of Finite-Field Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2015}, url = {http://eprint.iacr.org/2015/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidCFGKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletDGMP14, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi and Emmanuel Prouff}, title = {Achieving side-channel high-order correlation immunity with leakage squeezing}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {2}, pages = {107--121}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0067-1}, doi = {10.1007/S13389-013-0067-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GrossoPS14, author = {Vincent Grosso and Emmanuel Prouff and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {David Pointcheval and Damien Vergnaud}, title = {Efficient Masked S-Boxes Processing - {A} Step Forward -}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {251--266}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_16}, doi = {10.1007/978-3-319-06734-6\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GrossoPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LomnePRRT14, author = {Victor Lomn{\'{e}} and Emmanuel Prouff and Matthieu Rivain and Thomas Roche and Adrian Thillard}, editor = {Lejla Batina and Matthew Robshaw}, title = {How to Estimate the Success Rate of Higher-Order Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {35--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_3}, doi = {10.1007/978-3-662-44709-3\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/LomnePRRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BauerJLPR14, author = {Aur{\'{e}}lie Bauer and {\'{E}}liane Jaulmes and Victor Lomn{\'{e}} and Emmanuel Prouff and Thomas Roche}, editor = {Lejla Batina and Matthew Robshaw}, title = {Side-Channel Attack against {RSA} Key Generation Algorithms}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {223--241}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_13}, doi = {10.1007/978-3-662-44709-3\_13}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BauerJLPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ProuffRR14, author = {Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, editor = {Josh Benaloh}, title = {On the Practical Security of a Leakage Resilient Masking Scheme}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {169--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_9}, doi = {10.1007/978-3-319-04852-9\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ProuffRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JaulmesPW14, author = {{\'{E}}liane Jaulmes and Emmanuel Prouff and Justine Wild}, editor = {Antoine Joux and Amr M. Youssef}, title = {Side-Channel Analysis of Montgomery's Representation Randomization}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {212--227}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_13}, doi = {10.1007/978-3-319-13051-4\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JaulmesPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2014, editor = {Emmanuel Prouff}, title = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0}, doi = {10.1007/978-3-319-10175-0}, isbn = {978-3-319-10174-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LomnePRRT14a, author = {Victor Lomn{\'{e}} and Emmanuel Prouff and Matthieu Rivain and Thomas Roche and Adrian Thillard}, title = {How to Estimate the Success Rate of Higher-Order Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2014}, url = {http://eprint.iacr.org/2014/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LomnePRRT14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ProuffS13, author = {Emmanuel Prouff and Patrick Schaumont}, title = {Introduction to the {CHES} 2012 special issue}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0055-5}, doi = {10.1007/S13389-013-0055-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ProuffS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/DabosvilleDP13, author = {Guillaume Dabosville and Julien Doget and Emmanuel Prouff}, title = {A New Second-Order Side Channel Attack Based on Linear Regression}, journal = {{IEEE} Trans. Computers}, volume = {62}, number = {8}, pages = {1629--1640}, year = {2013}, url = {https://doi.org/10.1109/TC.2012.112}, doi = {10.1109/TC.2012.112}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/DabosvilleDP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LomnePR13, author = {Victor Lomn{\'{e}} and Emmanuel Prouff and Thomas Roche}, editor = {Kazue Sako and Palash Sarkar}, title = {Behind the Scene of Side Channel Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {506--525}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_26}, doi = {10.1007/978-3-642-42033-7\_26}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LomnePR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GrossoSP13, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Emmanuel Prouff}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Low Entropy Masking Schemes, Revisited}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {33--43}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_3}, doi = {10.1007/978-3-319-08302-5\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/GrossoSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ThillardPR13, author = {Adrian Thillard and Emmanuel Prouff and Thomas Roche}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {21--36}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_2}, doi = {10.1007/978-3-642-40349-1\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ThillardPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BauerJPW13, author = {Aur{\'{e}}lie Bauer and {\'{E}}liane Jaulmes and Emmanuel Prouff and Justine Wild}, editor = {Ed Dawson}, title = {Horizontal and Vertical Side-Channel Attacks against Secure {RSA} Implementations}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {1--17}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_1}, doi = {10.1007/978-3-642-36095-4\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BauerJPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ProuffR13, author = {Emmanuel Prouff and Matthieu Rivain}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Masking against Side-Channel Attacks: {A} Formal Security Proof}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {142--159}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_9}, doi = {10.1007/978-3-642-38348-9\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ProuffR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CoronPRR13, author = {Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, editor = {Shiho Moriai}, title = {Higher-Order Side Channel Security and Mask Refreshing}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {410--424}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_21}, doi = {10.1007/978-3-662-43933-3\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CoronPRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BauerJPW13, author = {Aur{\'{e}}lie Bauer and {\'{E}}liane Jaulmes and Emmanuel Prouff and Justine Wild}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Horizontal Collision Correlation Attack on Elliptic Curves}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {553--570}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_28}, doi = {10.1007/978-3-662-43414-7\_28}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BauerJPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2013, editor = {Emmanuel Prouff}, title = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1}, doi = {10.1007/978-3-642-40026-1}, isbn = {978-3-642-40025-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffRR13, author = {Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {On the Practical Security of a Leakage Resilient Masking Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2013}, url = {http://eprint.iacr.org/2013/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LomnePR13, author = {Victor Lomn{\'{e}} and Emmanuel Prouff and Thomas Roche}, title = {Behind the Scene of Side Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2013}, url = {http://eprint.iacr.org/2013/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LomnePR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RocheP12, author = {Thomas Roche and Emmanuel Prouff}, title = {Higher-order glitch free implementation of the {AES} using Secure Multi-Party Computation protocols - Extended version}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {2}, pages = {111--127}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0033-3}, doi = {10.1007/S13389-012-0033-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RocheP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CoronPR12, author = {Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Thomas Roche}, editor = {Stefan Mangard}, title = {On the Use of Shamir's Secret Sharing against Side-Channel Analysis}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {77--90}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_6}, doi = {10.1007/978-3-642-37288-9\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/CoronPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/CoronGPRRV12, author = {Jean{-}S{\'{e}}bastien Coron and Christophe Giraud and Emmanuel Prouff and Soline Renner and Matthieu Rivain and Praveen Kumar Vadnala}, editor = {Werner Schindler and Sorin A. Huss}, title = {Conversion of Security Proofs from One Leakage Model to Another: {A} New Issue}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {69--81}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_6}, doi = {10.1007/978-3-642-29912-4\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/CoronGPRRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MaghrebiPGD12, author = {Houssem Maghrebi and Emmanuel Prouff and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Orr Dunkelman}, title = {A First-Order Leak-Free Masking Countermeasure}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {156--170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_10}, doi = {10.1007/978-3-642-27954-6\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MaghrebiPGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CarletGPQR12, author = {Claude Carlet and Louis Goubin and Emmanuel Prouff and Micha{\"{e}}l Quisquater and Matthieu Rivain}, editor = {Anne Canteaut}, title = {Higher-Order Masking Schemes for S-Boxes}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {366--384}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_21}, doi = {10.1007/978-3-642-34047-5\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CarletGPQR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MaghrebiGPD12, author = {Houssem Maghrebi and Sylvain Guilley and Emmanuel Prouff and Jean{-}Luc Danger}, title = {Register leakage masking using Gray code}, booktitle = {2012 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012}, pages = {37--42}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HST.2012.6224316}, doi = {10.1109/HST.2012.6224316}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MaghrebiGPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2012, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8}, doi = {10.1007/978-3-642-33027-8}, isbn = {978-3-642-33026-1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiPGD12, author = {Houssem Maghrebi and Emmanuel Prouff and Sylvain Guilley and Jean{-}Luc Danger}, title = {A First-Order Leak-Free Masking Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2012}, url = {http://eprint.iacr.org/2012/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiPGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DogetPRS11, author = {Julien Doget and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Univariate side channel attacks and leakage modeling}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {123--144}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0010-2}, doi = {10.1007/S13389-011-0010-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DogetPRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BatinaGPRSV11, author = {Lejla Batina and Benedikt Gierlichs and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, title = {Mutual Information Analysis: a Comprehensive Study}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {269--291}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9084-8}, doi = {10.1007/S00145-010-9084-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GenellePQ11, author = {Laurie Genelle and Emmanuel Prouff and Micha{\"{e}}l Quisquater}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Montgomery's Trick and Fast Implementation of Masked {AES}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {153--169}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_10}, doi = {10.1007/978-3-642-21969-6\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GenellePQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ProuffR11, author = {Emmanuel Prouff and Thomas Roche}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Higher-Order Glitches Free Implementation of the {AES} Using Secure Multi-party Computation Protocols}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {63--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_5}, doi = {10.1007/978-3-642-23951-9\_5}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/ProuffR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GenellePQ11, author = {Laurie Genelle and Emmanuel Prouff and Micha{\"{e}}l Quisquater}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {240--255}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_16}, doi = {10.1007/978-3-642-23951-9\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GenellePQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2011, editor = {Emmanuel Prouff}, title = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7079}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27257-8}, doi = {10.1007/978-3-642-27257-8}, isbn = {978-3-642-27256-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DogetPRS11, author = {Julien Doget and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Univariate Side Channel Attacks and Leakage Modeling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2011}, url = {http://eprint.iacr.org/2011/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DogetPRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffR11, author = {Emmanuel Prouff and Thomas Roche}, title = {Higher-Order Glitches Free Implementation of the {AES} using Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2011}, url = {http://eprint.iacr.org/2011/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenellePQ11, author = {Laurie Genelle and Emmanuel Prouff and Micha{\"{e}}l Quisquater}, title = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2011}, url = {http://eprint.iacr.org/2011/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenellePQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DogetDP11, author = {Julien Doget and Guillaume Dabosville and Emmanuel Prouff}, title = {Defeat Masking With a (Very) Few Knowledge About the Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2011}, url = {http://eprint.iacr.org/2011/505}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DogetDP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ProuffR10, author = {Emmanuel Prouff and Matthieu Rivain}, title = {Theoretical and practical aspects of mutual information-based side channel analysis}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {121--138}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038306}, doi = {10.1504/IJACT.2010.038306}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ProuffR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GenellePQ10, author = {Laurie Genelle and Emmanuel Prouff and Micha{\"{e}}l Quisquater}, editor = {Jianying Zhou and Moti Yung}, title = {Secure Multiplicative Masking of Power Functions}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {200--217}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_13}, doi = {10.1007/978-3-642-13708-2\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GenellePQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RivainP10, author = {Matthieu Rivain and Emmanuel Prouff}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Provably Secure Higher-Order Masking of {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {413--427}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_28}, doi = {10.1007/978-3-642-15031-9\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/RivainP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ProuffR10, author = {Emmanuel Prouff and Thomas Roche}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Attack on a Higher-Order Masking of the {AES} Based on Homographic Functions}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {262--281}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_19}, doi = {10.1007/978-3-642-17401-8\_19}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ProuffR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FumaroliMPR10, author = {Guillaume Fumaroli and Ange Martinelli and Emmanuel Prouff and Matthieu Rivain}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Affine Masking against Higher-Order Side Channel Analysis}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {262--280}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_18}, doi = {10.1007/978-3-642-19574-7\_18}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/FumaroliMPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffM10, author = {Emmanuel Prouff and Robert P. McEvoy}, title = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure - Extended Version -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2010}, url = {http://eprint.iacr.org/2010/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RivainP10, author = {Matthieu Rivain and Emmanuel Prouff}, title = {Provably Secure Higher-Order Masking of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2010}, url = {http://eprint.iacr.org/2010/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RivainP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FumaroliMPR10, author = {Guillaume Fumaroli and Ange Martinelli and Emmanuel Prouff and Matthieu Rivain}, title = {Affine Masking against Higher-Order Side Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2010}, url = {http://eprint.iacr.org/2010/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FumaroliMPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffRB10, author = {Emmanuel Prouff and Matthieu Rivain and R{\'{e}}gis Bevan}, title = {Statistical Analysis of Second Order Differential Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2010}, url = {http://eprint.iacr.org/2010/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffRB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ProuffRB09, author = {Emmanuel Prouff and Matthieu Rivain and R{\'{e}}gis Bevan}, title = {Statistical Analysis of Second Order Differential Power Analysis}, journal = {{IEEE} Trans. Computers}, volume = {58}, number = {6}, pages = {799--811}, year = {2009}, url = {https://doi.org/10.1109/TC.2009.15}, doi = {10.1109/TC.2009.15}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ProuffRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ProuffR09, author = {Emmanuel Prouff and Matthieu Rivain}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {499--518}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_31}, doi = {10.1007/978-3-642-01957-9\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ProuffR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ProuffM09, author = {Emmanuel Prouff and Robert P. McEvoy}, editor = {Christophe Clavier and Kris Gaj}, title = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {81--96}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_7}, doi = {10.1007/978-3-642-04138-9\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ProuffM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RivainPD09, author = {Matthieu Rivain and Emmanuel Prouff and Julien Doget}, editor = {Christophe Clavier and Kris Gaj}, title = {Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {171--188}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_13}, doi = {10.1007/978-3-642-04138-9\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RivainPD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/GenelleGP09, author = {Laurie Genelle and Christophe Giraud and Emmanuel Prouff}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {Securing {AES} Implementation against Fault Attacks}, booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, pages = {51--62}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FDTC.2009.29}, doi = {10.1109/FDTC.2009.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/GenelleGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RivainPD09, author = {Matthieu Rivain and Emmanuel Prouff and Julien Doget}, title = {Higher-order Masking and Shuffling for Software Implementations of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2009}, url = {http://eprint.iacr.org/2009/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RivainPD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CayrelGP08, author = {Pierre{-}Louis Cayrel and Philippe Gaborit and Emmanuel Prouff}, editor = {Gilles Grimaud and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices}, booktitle = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2008, London, UK, September 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5189}, pages = {191--205}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85893-5\_14}, doi = {10.1007/978-3-540-85893-5\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/CayrelGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronGPR08, author = {Jean{-}S{\'{e}}bastien Coron and Christophe Giraud and Emmanuel Prouff and Matthieu Rivain}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {1--14}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_1}, doi = {10.1007/978-3-540-85053-3\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronGPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RivainDP08, author = {Matthieu Rivain and Emmanuelle Dottax and Emmanuel Prouff}, editor = {Kaisa Nyberg}, title = {Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {127--143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_8}, doi = {10.1007/978-3-540-71039-4\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/RivainDP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RivainDP08, author = {Matthieu Rivain and Emmanuelle Dottax and Emmanuel Prouff}, title = {Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2008}, url = {http://eprint.iacr.org/2008/021}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RivainDP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronPR07, author = {Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Matthieu Rivain}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Side Channel Cryptanalysis of a Higher Order Masking Scheme}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {28--44}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_3}, doi = {10.1007/978-3-540-74735-2\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ProuffR07, author = {Emmanuel Prouff and Matthieu Rivain}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {A Generic Method for Secure SBox Implementation}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {227--244}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_17}, doi = {10.1007/978-3-540-77535-5\_17}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ProuffR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/BoscherNP07, author = {Arnaud Boscher and Robert Naciri and Emmanuel Prouff}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {{CRT} {RSA} Algorithm Protected Against Fault Attacks}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {229--243}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_19}, doi = {10.1007/978-3-540-72354-7\_19}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/BoscherNP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/FischerP06, author = {Jean{-}Bernard Fischer and Emmanuel Prouff}, editor = {Josep Domingo{-}Ferrer and Joachim Posegga and Daniel Schreckling}, title = {Off-Line Group Signatures with Smart Cards}, booktitle = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3928}, pages = {263--277}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11733447\_19}, doi = {10.1007/11733447\_19}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/FischerP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ProuffGA06, author = {Emmanuel Prouff and Christophe Giraud and S{\'{e}}bastien Aum{\^{o}}nier}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Provably Secure S-Box Implementation Based on Fourier Transform}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {216--230}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_17}, doi = {10.1007/11894063\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ProuffGA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Prouff05, author = {Emmanuel Prouff}, editor = {Henri Gilbert and Helena Handschuh}, title = {{DPA} Attacks and S-Boxes}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {424--441}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_29}, doi = {10.1007/11502760\_29}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Prouff05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fq/CarletP03, author = {Claude Carlet and Emmanuel Prouff}, editor = {Gary L. Mullen and Alain Poli and Henning Stichtenoth}, title = {Vectorial Functions and Covering Sequences}, booktitle = {Finite Fields and Applications, 7th International Conference, Fq7, Toulouse, France, May 5-9, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2948}, pages = {215--248}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24633-6\_17}, doi = {10.1007/978-3-540-24633-6\_17}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/fq/CarletP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CarletP03, author = {Claude Carlet and Emmanuel Prouff}, editor = {Thomas Johansson}, title = {On Plateaued Functions and Their Constructions}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {54--73}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_6}, doi = {10.1007/978-3-540-39887-5\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CarletP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CarletP03, author = {Claude Carlet and Emmanuel Prouff}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {291--305}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_21}, doi = {10.1007/978-3-540-24654-1\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/CarletP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.