BibTeX records: Emmanuel Prouff

download as .bib file

@article{DBLP:journals/ccds/LandryLP21,
  author       = {Simon Landry and
                  Yanis Linge and
                  Emmanuel Prouff},
  title        = {Monomial evaluation of polynomial functions protected by threshold
                  implementations - with an illustration on {AES} -},
  journal      = {Cryptogr. Commun.},
  volume       = {13},
  number       = {4},
  pages        = {543--572},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12095-021-00497-9},
  doi          = {10.1007/S12095-021-00497-9},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LandryLP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/KushilevitzOPRT21,
  author       = {Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Emmanuel Prouff and
                  Adi Ros{\'{e}}n and
                  Adrian Thillard and
                  Damien Vergnaud},
  title        = {Lower and Upper Bounds on the Randomness Complexity of Private Computations
                  of {AND}},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {35},
  number       = {1},
  pages        = {465--484},
  year         = {2021},
  url          = {https://doi.org/10.1137/20M1314197},
  doi          = {10.1137/20M1314197},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamdm/KushilevitzOPRT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BenadjilaPSCD20,
  author       = {Ryad Benadjila and
                  Emmanuel Prouff and
                  R{\'{e}}mi Strullu and
                  Eleonora Cagli and
                  C{\'{e}}cile Dumas},
  title        = {Deep learning for side-channel analysis and introduction to {ASCAD}
                  database},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {163--188},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00220-8},
  doi          = {10.1007/S13389-019-00220-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BenadjilaPSCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/GuoTPLY20,
  author       = {Zhipeng Guo and
                  Ming Tang and
                  Emmanuel Prouff and
                  Maixing Luo and
                  Fei Yan},
  title        = {Table Recomputation-Based Higher-Order Masking Against Horizontal
                  Attacks},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {39},
  number       = {1},
  pages        = {34--44},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCAD.2018.2883900},
  doi          = {10.1109/TCAD.2018.2883900},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/GuoTPLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MasureDP20,
  author       = {Lo{\"{\i}}c Masure and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  title        = {A Comprehensive Study of Deep Learning for Side-Channel Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {348--375},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.348-375},
  doi          = {10.13154/TCHES.V2020.I1.348-375},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/MasureDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/OuladjGP20,
  author       = {Maamar Ouladj and
                  Sylvain Guilley and
                  Emmanuel Prouff},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {On the Implementation Efficiency of Linear Regression-Based Side-Channel
                  Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {147--172},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_8},
  doi          = {10.1007/978-3-030-68773-1\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/OuladjGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelaidCPRT20,
  author       = {Sonia Bela{\"{\i}}d and
                  Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Abdul Rahman Taleb},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Random Probing Security: Verification, Composition, Expansion and
                  New Constructions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {339--368},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_12},
  doi          = {10.1007/978-3-030-56784-2\_12},
  timestamp    = {Wed, 12 Aug 2020 14:16:56 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BelaidCPRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidCPRT20,
  author       = {Sonia Bela{\"{\i}}d and
                  Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Abdul Rahman Taleb},
  title        = {Random Probing Security: Verification, Composition, Expansion and
                  New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/786},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidCPRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarboneCCDDDPV19,
  author       = {Mathieu Carbone and
                  Vincent Conin and
                  Marie{-}Angela Cornelie and
                  Fran{\c{c}}ois Dassance and
                  Guillaume Dufresne and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff and
                  Alexandre Venelli},
  title        = {Deep Learning to Evaluate Secure {RSA} Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {132--161},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.132-161},
  doi          = {10.13154/TCHES.V2019.I2.132-161},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CarboneCCDDDPV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MasureDP19,
  author       = {Lo{\"{\i}}c Masure and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  editor       = {Ilia Polian and
                  Marc St{\"{o}}ttinger},
  title        = {Gradient Visualization for General Characterization in Profiling Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 10th International
                  Workshop, {COSADE} 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11421},
  pages        = {145--167},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16350-1\_9},
  doi          = {10.1007/978-3-030-16350-1\_9},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/MasureDP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KushilevitzOPRT19,
  author       = {Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Emmanuel Prouff and
                  Adi Ros{\'{e}}n and
                  Adrian Thillard and
                  Damien Vergnaud},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Lower and Upper Bounds on the Randomness Complexity of Private Computations
                  of {AND}},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11892},
  pages        = {386--406},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36033-7\_15},
  doi          = {10.1007/978-3-030-36033-7\_15},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KushilevitzOPRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/LandryLP19,
  author       = {Simon Landry and
                  Yanis Linge and
                  Emmanuel Prouff},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Monomial Evaluation of Polynomial Functions Protected by Threshold
                  Implementations},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {66--84},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_5},
  doi          = {10.1007/978-3-030-41702-4\_5},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/LandryLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarboneCCDDDPV19,
  author       = {Mathieu Carbone and
                  Vincent Conin and
                  Marie{-}Angela Cornelie and
                  Fran{\c{c}}ois Dassance and
                  Guillaume Dufresne and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff and
                  Alexandre Venelli},
  title        = {Deep Learning to Evaluate Secure {RSA} Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarboneCCDDDPV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauerJPRW19,
  author       = {Aur{\'{e}}lie Bauer and
                  {\'{E}}liane Jaulmes and
                  Emmanuel Prouff and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Justine Wild},
  title        = {Horizontal Collision Correlation Attack on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauerJPRW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MasureDP19,
  author       = {Lo{\"{\i}}c Masure and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  title        = {A Comprehensive Study of Deep Learning for Side-Channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MasureDP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChabanneMP18,
  author       = {Herv{\'{e}} Chabanne and
                  Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {Linear Repairing Codes and Side-Channel Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {118--141},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.118-141},
  doi          = {10.13154/TCHES.V2018.I1.118-141},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChabanneMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MaghrebiP18,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff},
  editor       = {Junfeng Fan and
                  Benedikt Gierlichs},
  title        = {On the Use of Independent Component Analysis to Denoise Side-Channel
                  Measurements},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 9th International
                  Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10815},
  pages        = {61--81},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89641-0\_4},
  doi          = {10.1007/978-3-319-89641-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MaghrebiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/ChabanneKP18,
  author       = {Herv{\'{e}} Chabanne and
                  Julien Keuffer and
                  Emmanuel Prouff},
  editor       = {Akka Zemmari and
                  Mohamed Mosbah and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Outsourcing Signatures of Confidential Documents},
  booktitle    = {Risks and Security of Internet and Systems - 13th International Conference,
                  CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11391},
  pages        = {41--47},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_4},
  doi          = {10.1007/978-3-030-12143-3\_4},
  timestamp    = {Tue, 11 Oct 2022 14:59:07 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/ChabanneKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mspn/ChabanneLMMP18,
  author       = {Herv{\'{e}} Chabanne and
                  Roch Lescuyer and
                  Jonathan Milgram and
                  Constance Morel and
                  Emmanuel Prouff},
  editor       = {{\'{E}}ric Renault and
                  Selma Boumerdassi and
                  Samia Bouzefrane},
  title        = {Recognition Over Encrypted Faces},
  booktitle    = {Mobile, Secure, and Programmable Networking - 4th International Conference,
                  {MSPN} 2018, Paris, France, June 18-20, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11005},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03101-5\_16},
  doi          = {10.1007/978-3-030-03101-5\_16},
  timestamp    = {Mon, 26 Apr 2021 09:27:03 +0200},
  biburl       = {https://dblp.org/rec/conf/mspn/ChabanneLMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffSBCD18,
  author       = {Emmanuel Prouff and
                  R{\'{e}}mi Strullu and
                  Ryad Benadjila and
                  Eleonora Cagli and
                  C{\'{e}}cile Dumas},
  title        = {Study of Deep Learning Techniques for Side-Channel Analysis and Introduction
                  to {ASCAD} Database},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ProuffSBCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiP18,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {On the Use of Independent Component Analysis to Denoise Side-Channel
                  Measurements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MasureDP18,
  author       = {Lo{\"{\i}}c Masure and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  title        = {Gradient Visualization for General Characterization in Profiling Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1196},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MasureDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChakrabortySMMM17,
  author       = {Kaushik Chakraborty and
                  Sumanta Sarkar and
                  Subhamoy Maitra and
                  Bodhisatwa Mazumdar and
                  Debdeep Mukhopadhyay and
                  Emmanuel Prouff},
  title        = {Redefining the transparency order},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {95--115},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0250-3},
  doi          = {10.1007/S10623-016-0250-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChakrabortySMMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BruneauCGHPR17,
  author       = {Nicolas Bruneau and
                  Claude Carlet and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Emmanuel Prouff and
                  Olivier Rioul},
  title        = {Stochastic Collision Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2090--2104},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2697401},
  doi          = {10.1109/TIFS.2017.2697401},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CagliDP17,
  author       = {Eleonora Cagli and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Convolutional Neural Networks with Data Augmentation Against Jitter-Based
                  Countermeasures - Profiling Attacks Without Pre-processing},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {45--68},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_3},
  doi          = {10.1007/978-3-319-66787-4\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CagliDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelaidBPPTV17,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Emmanuel Prouff and
                  Adrian Thillard and
                  Damien Vergnaud},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Private Multiplication over Finite Fields},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {397--426},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_14},
  doi          = {10.1007/978-3-319-63697-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BelaidBPPTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChabanneWMMP17,
  author       = {Herv{\'{e}} Chabanne and
                  Amaury de Wargny and
                  Jonathan Milgram and
                  Constance Morel and
                  Emmanuel Prouff},
  title        = {Privacy-Preserving Classification on Deep Neural Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChabanneWMMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CagliDP17,
  author       = {Eleonora Cagli and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  title        = {Convolutional Neural Networks with Data Augmentation against Jitter-Based
                  Countermeasures - Profiling Attacks without Pre-Processing -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {740},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/740},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CagliDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChabanneMP17,
  author       = {Herv{\'{e}} Chabanne and
                  Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {Linear Repairing Codes and Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {918},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/918},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChabanneMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/CarletP16,
  author       = {Claude Carlet and
                  Emmanuel Prouff},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Polynomial Evaluation and Side Channel Analysis},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {315--341},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_20},
  doi          = {10.1007/978-3-662-49301-4\_20},
  timestamp    = {Sat, 19 Oct 2019 20:29:10 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/CarletP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CagliDP16,
  author       = {Eleonora Cagli and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  editor       = {Kerstin Lemke{-}Rust and
                  Michael Tunstall},
  title        = {Kernel Discriminant Analysis for Information Extraction in the Presence
                  of Masking},
  booktitle    = {Smart Card Research and Advanced Applications - 15th International
                  Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10146},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54669-8\_1},
  doi          = {10.1007/978-3-319-54669-8\_1},
  timestamp    = {Fri, 27 Mar 2020 08:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/CagliDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BattistelloCPZ16,
  author       = {Alberto Battistello and
                  Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Rina Zeitoun},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Horizontal Side-Channel Attacks and Countermeasures on the {ISW} Masking
                  Scheme},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {23--39},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_2},
  doi          = {10.1007/978-3-662-53140-2\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BattistelloCPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronGPZ16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Aur{\'{e}}lien Greuet and
                  Emmanuel Prouff and
                  Rina Zeitoun},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Faster Evaluation of SBoxes via Common Shares},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {498--514},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_24},
  doi          = {10.1007/978-3-662-53140-2\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronGPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BelaidBPPTV16,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Emmanuel Prouff and
                  Adrian Thillard and
                  Damien Vergnaud},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Randomness Complexity of Private Circuits for Multiplication},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {616--648},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_22},
  doi          = {10.1007/978-3-662-49896-5\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BelaidBPPTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/MaghrebiPP16,
  author       = {Houssem Maghrebi and
                  Thibault Portigliatti and
                  Emmanuel Prouff},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Breaking Cryptographic Implementations Using Deep Learning Techniques},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {3--26},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_1},
  doi          = {10.1007/978-3-319-49445-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/MaghrebiPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidBPPTV16,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Emmanuel Prouff and
                  Adrian Thillard and
                  Damien Vergnaud},
  title        = {Randomness Complexity of Private Circuits for Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidBPPTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletPRR16,
  author       = {Claude Carlet and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  title        = {Algebraic Decomposition for Probing Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletPRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BattistelloCPZ16,
  author       = {Alberto Battistello and
                  Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Rina Zeitoun},
  title        = {Horizontal Side-Channel Attacks and Countermeasures on the {ISW} Masking
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/540},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BattistelloCPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronGPZ16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Aur{\'{e}}lien Greuet and
                  Emmanuel Prouff and
                  Rina Zeitoun},
  title        = {Faster Evaluation of SBoxes via Common Shares},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronGPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiPP16,
  author       = {Houssem Maghrebi and
                  Thibault Portigliatti and
                  Emmanuel Prouff},
  title        = {Breaking Cryptographic Implementations Using Deep Learning Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {921},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/921},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BauerJPRW15,
  author       = {Aur{\'{e}}lie Bauer and
                  {\'{E}}liane Jaulmes and
                  Emmanuel Prouff and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Justine Wild},
  title        = {Horizontal collision correlation attack on elliptic curves - - Extended
                  Version -},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {91--119},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0111-8},
  doi          = {10.1007/S12095-014-0111-8},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BauerJPRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CagliDP15,
  author       = {Eleonora Cagli and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  editor       = {Naofumi Homma and
                  Marcel Medwed},
  title        = {Enhancing Dimensionality Reduction Methods for Side-Channel Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 14th International
                  Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9514},
  pages        = {15--33},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31271-2\_2},
  doi          = {10.1007/978-3-319-31271-2\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/CagliDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BelaidCFGKP15,
  author       = {Sonia Bela{\"{\i}}d and
                  Jean{-}S{\'{e}}bastien Coron and
                  Pierre{-}Alain Fouque and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Jean{-}Gabriel Kammerer and
                  Emmanuel Prouff},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Improved Side-Channel Analysis of Finite-Field Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {395--415},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_20},
  doi          = {10.1007/978-3-662-48324-4\_20},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BelaidCFGKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CarletPRR15,
  author       = {Claude Carlet and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Algebraic Decomposition for Probing Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {742--763},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_36},
  doi          = {10.1007/978-3-662-47989-6\_36},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CarletPRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronPRR15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  title        = {Higher-Order Side Channel Security and Mask Refreshing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronPRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ThillardPR15,
  author       = {Adrian Thillard and
                  Emmanuel Prouff and
                  Thomas Roche},
  title        = {Success through confidence: Evaluating the effectiveness of a side-channel
                  attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ThillardPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidCFGKP15,
  author       = {Sonia Bela{\"{\i}}d and
                  Jean{-}S{\'{e}}bastien Coron and
                  Pierre{-}Alain Fouque and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Jean{-}Gabriel Kammerer and
                  Emmanuel Prouff},
  title        = {Improved Side-Channel Analysis of Finite-Field Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidCFGKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGMP14,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {Achieving side-channel high-order correlation immunity with leakage
                  squeezing},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {107--121},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0067-1},
  doi          = {10.1007/S13389-013-0067-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GrossoPS14,
  author       = {Vincent Grosso and
                  Emmanuel Prouff and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Efficient Masked S-Boxes Processing - {A} Step Forward -},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {251--266},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_16},
  doi          = {10.1007/978-3-319-06734-6\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GrossoPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LomnePRRT14,
  author       = {Victor Lomn{\'{e}} and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche and
                  Adrian Thillard},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {How to Estimate the Success Rate of Higher-Order Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {35--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_3},
  doi          = {10.1007/978-3-662-44709-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LomnePRRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BauerJLPR14,
  author       = {Aur{\'{e}}lie Bauer and
                  {\'{E}}liane Jaulmes and
                  Victor Lomn{\'{e}} and
                  Emmanuel Prouff and
                  Thomas Roche},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Side-Channel Attack against {RSA} Key Generation Algorithms},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {223--241},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_13},
  doi          = {10.1007/978-3-662-44709-3\_13},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BauerJLPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ProuffRR14,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  editor       = {Josh Benaloh},
  title        = {On the Practical Security of a Leakage Resilient Masking Scheme},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {169--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_9},
  doi          = {10.1007/978-3-319-04852-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ProuffRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JaulmesPW14,
  author       = {{\'{E}}liane Jaulmes and
                  Emmanuel Prouff and
                  Justine Wild},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Side-Channel Analysis of Montgomery's Representation Randomization},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {212--227},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_13},
  doi          = {10.1007/978-3-319-13051-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JaulmesPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2014,
  editor       = {Emmanuel Prouff},
  title        = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0},
  doi          = {10.1007/978-3-319-10175-0},
  isbn         = {978-3-319-10174-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LomnePRRT14a,
  author       = {Victor Lomn{\'{e}} and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche and
                  Adrian Thillard},
  title        = {How to Estimate the Success Rate of Higher-Order Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LomnePRRT14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ProuffS13,
  author       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Introduction to the {CHES} 2012 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0055-5},
  doi          = {10.1007/S13389-013-0055-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ProuffS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/DabosvilleDP13,
  author       = {Guillaume Dabosville and
                  Julien Doget and
                  Emmanuel Prouff},
  title        = {A New Second-Order Side Channel Attack Based on Linear Regression},
  journal      = {{IEEE} Trans. Computers},
  volume       = {62},
  number       = {8},
  pages        = {1629--1640},
  year         = {2013},
  url          = {https://doi.org/10.1109/TC.2012.112},
  doi          = {10.1109/TC.2012.112},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/DabosvilleDP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LomnePR13,
  author       = {Victor Lomn{\'{e}} and
                  Emmanuel Prouff and
                  Thomas Roche},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Behind the Scene of Side Channel Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {506--525},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_26},
  doi          = {10.1007/978-3-642-42033-7\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LomnePR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GrossoSP13,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Emmanuel Prouff},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Low Entropy Masking Schemes, Revisited},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {33--43},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_3},
  doi          = {10.1007/978-3-319-08302-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/GrossoSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ThillardPR13,
  author       = {Adrian Thillard and
                  Emmanuel Prouff and
                  Thomas Roche},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Success through Confidence: Evaluating the Effectiveness of a Side-Channel
                  Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_2},
  doi          = {10.1007/978-3-642-40349-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ThillardPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BauerJPW13,
  author       = {Aur{\'{e}}lie Bauer and
                  {\'{E}}liane Jaulmes and
                  Emmanuel Prouff and
                  Justine Wild},
  editor       = {Ed Dawson},
  title        = {Horizontal and Vertical Side-Channel Attacks against Secure {RSA}
                  Implementations},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_1},
  doi          = {10.1007/978-3-642-36095-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BauerJPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ProuffR13,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Masking against Side-Channel Attacks: {A} Formal Security Proof},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {142--159},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_9},
  doi          = {10.1007/978-3-642-38348-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ProuffR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CoronPRR13,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  editor       = {Shiho Moriai},
  title        = {Higher-Order Side Channel Security and Mask Refreshing},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {410--424},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_21},
  doi          = {10.1007/978-3-662-43933-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CoronPRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BauerJPW13,
  author       = {Aur{\'{e}}lie Bauer and
                  {\'{E}}liane Jaulmes and
                  Emmanuel Prouff and
                  Justine Wild},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Horizontal Collision Correlation Attack on Elliptic Curves},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {553--570},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_28},
  doi          = {10.1007/978-3-662-43414-7\_28},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BauerJPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2013,
  editor       = {Emmanuel Prouff},
  title        = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1},
  doi          = {10.1007/978-3-642-40026-1},
  isbn         = {978-3-642-40025-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffRR13,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  title        = {On the Practical Security of a Leakage Resilient Masking Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ProuffRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LomnePR13,
  author       = {Victor Lomn{\'{e}} and
                  Emmanuel Prouff and
                  Thomas Roche},
  title        = {Behind the Scene of Side Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LomnePR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RocheP12,
  author       = {Thomas Roche and
                  Emmanuel Prouff},
  title        = {Higher-order glitch free implementation of the {AES} using Secure
                  Multi-Party Computation protocols - Extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {2},
  pages        = {111--127},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0033-3},
  doi          = {10.1007/S13389-012-0033-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RocheP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CoronPR12,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Thomas Roche},
  editor       = {Stefan Mangard},
  title        = {On the Use of Shamir's Secret Sharing against Side-Channel Analysis},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {77--90},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_6},
  doi          = {10.1007/978-3-642-37288-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/CoronPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CoronGPRRV12,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Christophe Giraud and
                  Emmanuel Prouff and
                  Soline Renner and
                  Matthieu Rivain and
                  Praveen Kumar Vadnala},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Conversion of Security Proofs from One Leakage Model to Another: {A}
                  New Issue},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {69--81},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_6},
  doi          = {10.1007/978-3-642-29912-4\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/CoronGPRRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MaghrebiPGD12,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Orr Dunkelman},
  title        = {A First-Order Leak-Free Masking Countermeasure},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_10},
  doi          = {10.1007/978-3-642-27954-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MaghrebiPGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CarletGPQR12,
  author       = {Claude Carlet and
                  Louis Goubin and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater and
                  Matthieu Rivain},
  editor       = {Anne Canteaut},
  title        = {Higher-Order Masking Schemes for S-Boxes},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {366--384},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_21},
  doi          = {10.1007/978-3-642-34047-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CarletGPQR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MaghrebiGPD12,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Emmanuel Prouff and
                  Jean{-}Luc Danger},
  title        = {Register leakage masking using Gray code},
  booktitle    = {2012 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012},
  pages        = {37--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HST.2012.6224316},
  doi          = {10.1109/HST.2012.6224316},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MaghrebiGPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2012,
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8},
  doi          = {10.1007/978-3-642-33027-8},
  isbn         = {978-3-642-33026-1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiPGD12,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {A First-Order Leak-Free Masking Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiPGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DogetPRS11,
  author       = {Julien Doget and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Univariate side channel attacks and leakage modeling},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {123--144},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0010-2},
  doi          = {10.1007/S13389-011-0010-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DogetPRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BatinaGPRSV11,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Mutual Information Analysis: a Comprehensive Study},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {269--291},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9084-8},
  doi          = {10.1007/S00145-010-9084-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GenellePQ11,
  author       = {Laurie Genelle and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Montgomery's Trick and Fast Implementation of Masked {AES}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {153--169},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_10},
  doi          = {10.1007/978-3-642-21969-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GenellePQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ProuffR11,
  author       = {Emmanuel Prouff and
                  Thomas Roche},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Higher-Order Glitches Free Implementation of the {AES} Using Secure
                  Multi-party Computation Protocols},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_5},
  doi          = {10.1007/978-3-642-23951-9\_5},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ProuffR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GenellePQ11,
  author       = {Laurie Genelle and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative
                  Maskings},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {240--255},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_16},
  doi          = {10.1007/978-3-642-23951-9\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GenellePQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2011,
  editor       = {Emmanuel Prouff},
  title        = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2011, Leuven, Belgium, September
                  14-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7079},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27257-8},
  doi          = {10.1007/978-3-642-27257-8},
  isbn         = {978-3-642-27256-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DogetPRS11,
  author       = {Julien Doget and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Univariate Side Channel Attacks and Leakage Modeling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DogetPRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffR11,
  author       = {Emmanuel Prouff and
                  Thomas Roche},
  title        = {Higher-Order Glitches Free Implementation of the {AES} using Secure
                  Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ProuffR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenellePQ11,
  author       = {Laurie Genelle and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater},
  title        = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative
                  Maskings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenellePQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DogetDP11,
  author       = {Julien Doget and
                  Guillaume Dabosville and
                  Emmanuel Prouff},
  title        = {Defeat Masking With a (Very) Few Knowledge About the Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/505},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DogetDP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ProuffR10,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain},
  title        = {Theoretical and practical aspects of mutual information-based side
                  channel analysis},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {121--138},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038306},
  doi          = {10.1504/IJACT.2010.038306},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ProuffR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GenellePQ10,
  author       = {Laurie Genelle and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Secure Multiplicative Masking of Power Functions},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {200--217},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_13},
  doi          = {10.1007/978-3-642-13708-2\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GenellePQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RivainP10,
  author       = {Matthieu Rivain and
                  Emmanuel Prouff},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Provably Secure Higher-Order Masking of {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {413--427},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_28},
  doi          = {10.1007/978-3-642-15031-9\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RivainP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ProuffR10,
  author       = {Emmanuel Prouff and
                  Thomas Roche},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Attack on a Higher-Order Masking of the {AES} Based on Homographic
                  Functions},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {262--281},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_19},
  doi          = {10.1007/978-3-642-17401-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ProuffR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FumaroliMPR10,
  author       = {Guillaume Fumaroli and
                  Ange Martinelli and
                  Emmanuel Prouff and
                  Matthieu Rivain},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Affine Masking against Higher-Order Side Channel Analysis},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {262--280},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_18},
  doi          = {10.1007/978-3-642-19574-7\_18},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FumaroliMPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffM10,
  author       = {Emmanuel Prouff and
                  Robert P. McEvoy},
  title        = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
                  - Extended Version -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ProuffM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RivainP10,
  author       = {Matthieu Rivain and
                  Emmanuel Prouff},
  title        = {Provably Secure Higher-Order Masking of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RivainP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FumaroliMPR10,
  author       = {Guillaume Fumaroli and
                  Ange Martinelli and
                  Emmanuel Prouff and
                  Matthieu Rivain},
  title        = {Affine Masking against Higher-Order Side Channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FumaroliMPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffRB10,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain and
                  R{\'{e}}gis Bevan},
  title        = {Statistical Analysis of Second Order Differential Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ProuffRB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ProuffRB09,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain and
                  R{\'{e}}gis Bevan},
  title        = {Statistical Analysis of Second Order Differential Power Analysis},
  journal      = {{IEEE} Trans. Computers},
  volume       = {58},
  number       = {6},
  pages        = {799--811},
  year         = {2009},
  url          = {https://doi.org/10.1109/TC.2009.15},
  doi          = {10.1109/TC.2009.15},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ProuffRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ProuffR09,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Theoretical and Practical Aspects of Mutual Information Based Side
                  Channel Analysis},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {499--518},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_31},
  doi          = {10.1007/978-3-642-01957-9\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ProuffR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ProuffM09,
  author       = {Emmanuel Prouff and
                  Robert P. McEvoy},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {81--96},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_7},
  doi          = {10.1007/978-3-642-04138-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ProuffM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RivainPD09,
  author       = {Matthieu Rivain and
                  Emmanuel Prouff and
                  Julien Doget},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Higher-Order Masking and Shuffling for Software Implementations of
                  Block Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_13},
  doi          = {10.1007/978-3-642-04138-9\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RivainPD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/GenelleGP09,
  author       = {Laurie Genelle and
                  Christophe Giraud and
                  Emmanuel Prouff},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {Securing {AES} Implementation against Fault Attacks},
  booktitle    = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  pages        = {51--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FDTC.2009.29},
  doi          = {10.1109/FDTC.2009.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/GenelleGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RivainPD09,
  author       = {Matthieu Rivain and
                  Emmanuel Prouff and
                  Julien Doget},
  title        = {Higher-order Masking and Shuffling for Software Implementations of
                  Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RivainPD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CayrelGP08,
  author       = {Pierre{-}Louis Cayrel and
                  Philippe Gaborit and
                  Emmanuel Prouff},
  editor       = {Gilles Grimaud and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Secure Implementation of the Stern Authentication and Signature Schemes
                  for Low-Resource Devices},
  booktitle    = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2008, London, UK, September 8-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5189},
  pages        = {191--205},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85893-5\_14},
  doi          = {10.1007/978-3-540-85893-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/CayrelGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronGPR08,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Christophe Giraud and
                  Emmanuel Prouff and
                  Matthieu Rivain},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Attack and Improvement of a Secure S-Box Calculation Based on the
                  Fourier Transform},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_1},
  doi          = {10.1007/978-3-540-85053-3\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronGPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RivainDP08,
  author       = {Matthieu Rivain and
                  Emmanuelle Dottax and
                  Emmanuel Prouff},
  editor       = {Kaisa Nyberg},
  title        = {Block Ciphers Implementations Provably Secure Against Second Order
                  Side Channel Analysis},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {127--143},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_8},
  doi          = {10.1007/978-3-540-71039-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RivainDP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RivainDP08,
  author       = {Matthieu Rivain and
                  Emmanuelle Dottax and
                  Emmanuel Prouff},
  title        = {Block Ciphers Implementations Provably Secure Against Second Order
                  Side Channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/021},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RivainDP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronPR07,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Matthieu Rivain},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Side Channel Cryptanalysis of a Higher Order Masking Scheme},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {28--44},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_3},
  doi          = {10.1007/978-3-540-74735-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ProuffR07,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {A Generic Method for Secure SBox Implementation},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {227--244},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_17},
  doi          = {10.1007/978-3-540-77535-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ProuffR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/BoscherNP07,
  author       = {Arnaud Boscher and
                  Robert Naciri and
                  Emmanuel Prouff},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {{CRT} {RSA} Algorithm Protected Against Fault Attacks},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {229--243},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_19},
  doi          = {10.1007/978-3-540-72354-7\_19},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/BoscherNP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/FischerP06,
  author       = {Jean{-}Bernard Fischer and
                  Emmanuel Prouff},
  editor       = {Josep Domingo{-}Ferrer and
                  Joachim Posegga and
                  Daniel Schreckling},
  title        = {Off-Line Group Signatures with Smart Cards},
  booktitle    = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3928},
  pages        = {263--277},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11733447\_19},
  doi          = {10.1007/11733447\_19},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/FischerP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ProuffGA06,
  author       = {Emmanuel Prouff and
                  Christophe Giraud and
                  S{\'{e}}bastien Aum{\^{o}}nier},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Provably Secure S-Box Implementation Based on Fourier Transform},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_17},
  doi          = {10.1007/11894063\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ProuffGA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Prouff05,
  author       = {Emmanuel Prouff},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {{DPA} Attacks and S-Boxes},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {424--441},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_29},
  doi          = {10.1007/11502760\_29},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Prouff05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fq/CarletP03,
  author       = {Claude Carlet and
                  Emmanuel Prouff},
  editor       = {Gary L. Mullen and
                  Alain Poli and
                  Henning Stichtenoth},
  title        = {Vectorial Functions and Covering Sequences},
  booktitle    = {Finite Fields and Applications, 7th International Conference, Fq7,
                  Toulouse, France, May 5-9, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2948},
  pages        = {215--248},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24633-6\_17},
  doi          = {10.1007/978-3-540-24633-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/fq/CarletP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CarletP03,
  author       = {Claude Carlet and
                  Emmanuel Prouff},
  editor       = {Thomas Johansson},
  title        = {On Plateaued Functions and Their Constructions},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {54--73},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_6},
  doi          = {10.1007/978-3-540-39887-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CarletP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CarletP03,
  author       = {Claude Carlet and
                  Emmanuel Prouff},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random
                  Generators},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {291--305},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_21},
  doi          = {10.1007/978-3-540-24654-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CarletP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics