Compositional verification of higher-order masking: Application to a verifying masking compiler, Cryptology ePrint Archive, vol.506, 2015. ,
Verified proofs of higher-order masking, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, Part I, pp.457-485, 2015. ,
Higher-order threshold implementations Safeguarding cryptographic keys, Advances in Cryptology -ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part II National Comp. Conf., volume, pp.326-343, 1979. ,
DOI : 10.1007/978-3-662-45608-8_18
URL : http://doc.utwente.nl/92489/1/chp_10.1007_978-3-662-45608-8_18.pdf
Higher-Order Masking Schemes for S-Boxes, Lecture Notes in Computer Science, vol.7549, pp.366-384, 2012. ,
DOI : 10.1007/978-3-642-34047-5_21
Faster evaluation of sboxes via common shares Cryptology ePrint Archive Towards sound approaches to counteract power-analysis attacks, CRYPTO, 1999. ,
Higher Order Masking of Look-Up Tables, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.441-458, 2014. ,
DOI : 10.1007/978-3-642-55220-5_25
Higher-Order Side Channel Security and Mask Refreshing, Fast Software Encryption -20th International Workshop, FSE 2013, pp.410-424, 2013. ,
DOI : 10.1007/978-3-662-43933-3_21
Algebraic Decomposition for Probing Security, Advances in Cryptology -CRYPTO 2015 - 35th Annual Cryptology Conference Proceedings, Part ICRV14] Jean-Sébastien Coron, Arnab Roy, and Srinivas Vivek Cryptographic Hardware and Embedded Systems -CHES 2014 -16th International Workshop Proceedings, pp.742-763, 2014. ,
DOI : 10.1007/978-3-662-47989-6_36
Unifying leakage models: From probing attacks to noisy leakage Homomorphic evaluation of the AES circuit Efficient masked s-boxes processing -A step forward - Private circuits: Securing hardware against probing attacks, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings Advances in Cryptology -CRYPTO 2012 -32nd Annual Cryptology Conference Proceedings Progress in Cryptology -AFRICACRYPT 2014 -7th International Conference on Cryptology in Africa Advances in Cryptology -CRYPTO 2003, 23rd Annual International Cryptology Conference ProceedingsKJJ99] P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M.J, pp.423-440, 2003. ,
Pinpointing the side-channel leakage of masked AES hardware implementations, Advances in Cryptology ? CRYPTO '99 Cryptographic Hardware and Embedded Systems -CHES 2006, 8th International Workshop Proceedings, volume 4249 of Lecture Notes in Computer Science, pp.388-397, 1999. ,
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, PR11] Emmanuel Prouff and Thomas Roche CHESPR13] Emmanuel Prouff and Matthieu Rivain. Higher-Order Side Channel Security and Mask Refreshing Advances in Cryptology -EUROCRYPT 2013 -32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.292-321, 2011. ,
DOI : 10.1007/s00145-010-9085-7
Consolidating Masking Schemes, Advances in Cryptology -CRYPTO 2015 - 35th Annual Cryptology Conference Proceedings, Part I Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, pp.764-783, 2010. ,
DOI : 10.1007/978-3-662-47989-6_37
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012, CHES, pp.417-434, 2013. ,
DOI : 10.1007/978-3-642-40349-1_24
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176