Compositional verification of higher-order masking: Application to a verifying masking compiler, Cryptology ePrint Archive, vol.506, 2015. ,
Horizontal side-channel attacks and countermeasures on the ISW masking scheme Cryptology ePrint Archive http://eprint.iacr.org/. Full version of this paper Horizontal and vertical side-channel attacks against secure RSA implementations, Topics in Cryptology -CT-RSA 2013 -The Cryptographers' Track at the RSA Conference 2013 Proceedings Blakely. Safeguarding cryptographic keys. In National Comp. Conf., volume, pp.1-17, 1979. ,
Multiparty unconditionally secure protocols (extended abstract), Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp.11-19, 1988. ,
DOI : 10.1007/3-540-48184-2_43
Horizontal Correlation Analysis on Exponentiation, Information and Communications Security -12th International Conference Proceedings, pp.46-61, 2010. ,
DOI : 10.1007/978-3-642-17650-0_5
URL : https://hal.archives-ouvertes.fr/inria-00540384
Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference Proceedings, pp.398-412, 1999. ,
DOI : 10.1007/3-540-48405-1_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.8951
Unifying Leakage Models: From Probing Attacks to Noisy Leakage., Advances in Cryptology - EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, pp.423-440, 2014. ,
DOI : 10.1007/978-3-642-55220-5_24
Making masking security proofs concrete -or how to evaluate the security of any leaking device, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, Part I, pp.401-429, 2015. ,
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases, Advances in Cryptology -EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera. Proceedings, pp.135-156, 2010. ,
DOI : 10.1007/978-3-642-13190-5_7
A key to success -success exponents for side-channel distinguishers, Progress in Cryptology -INDOCRYPT 2015 -16th International Conference on Cryptology in India Proceedings, volume 9462 of Lecture Notes in Computer Science, pp.270-290, 2015. ,
Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology -CRYPTO 2003, 23rd Annual International Cryptology Conference Proceedings, pp.463-481, 2003. ,
DOI : 10.1007/978-3-540-45146-4_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9436
Algebraic side-channel attacks beyond the hamming weight leakage model Masking against side-channel attacks: A formal security proof Provably secure higher-order masking of AES, Cryptographic Hardware and Embedded Systems -CHES 2012 -14th International Workshop Proceedings, volume 7428 of Lecture Notes in Computer Science Advances in Cryptology -EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop Proceedings, pp.140-154, 2010. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
The World Is Not Enough: Another Look on Second-Order DPA, Advances in Cryptology -ASIACRYPT 2010 -16th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, pp.112-129, 2010. ,
DOI : 10.1007/978-3-642-17373-8_7
Soft Analytical Side-Channel Attacks, Advances in Cryptology -ASIACRYPT 2014 -20th International Conference on the Theory and Application of Cryptology and Information ,
DOI : 10.1007/978-3-662-45611-8_15
URL : https://hal.archives-ouvertes.fr/hal-01096218