Secure computation with information leaking to an adversary, Proceedings of the 43rd annual ACM symposium on Theory of computing - STOC '11, pp.715-724, 2011. ,
Private Circuits: A Modular Approach, Lecture Notes in Computer Science, vol.10993, pp.427-455, 2018. ,
Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate, Advances in Cryptology ? EUROCRYPT 2016, vol.9666, pp.586-615, 2016. ,
Verified Proofs of Higher-Order Masking, Advances in Cryptology -- EUROCRYPT 2015, vol.9056, pp.457-485, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01216699
Strong Non-Interference and Type-Directed Higher-Order Masking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.116-129, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01410216
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, Lecture Notes in Computer Science, vol.10210, pp.535-566, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01414009
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme, Lecture Notes in Computer Science, vol.9813, pp.23-39, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01399577
Randomness Complexity of Private Circuits for Multiplication, Advances in Cryptology ? EUROCRYPT 2016, vol.9666, pp.616-648, 2016. ,
Private Multiplication over Finite Fields, Advances in Cryptology ? CRYPTO 2017, vol.10403, pp.397-426, 2017. ,
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations, Advances in Cryptology ? EUROCRYPT 2020, vol.12107, pp.311-341, 2020. ,
Tight Private Circuits: Achieving Probing Security with the Least Refreshing, Lecture Notes in Computer Science, vol.11273, pp.343-372, 2018. ,
Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology ? CRYPTO? 99, vol.1666, pp.398-412, 1999. ,
Efficient Multiparty Protocols via Log-Depth Threshold Formulae, Advances in Cryptology ? CRYPTO 2013, vol.8043, pp.185-202, 2013. ,
Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations, Applied Cryptography and Network Security, vol.10892, pp.65-82, 2018. ,
Higher-order side channel security and mask refreshing, Fast Software Encryption -FSE 2013, vol.8424, pp.410-424, 2014. ,
Secure Multiparty AES, Financial Cryptography and Data Security, vol.6052, pp.367-374, 2010. ,
Unifying Leakage Models: From Probing Attacks to Noisy Leakage., Advances in Cryptology ? EUROCRYPT 2014, vol.8441, pp.423-440, 2014. ,
DES and Differential Power Analysis The ?Duplication? Method, Cryptographic Hardware and Embedded Systems, vol.1717, pp.158-172, 1999. ,
Player Simulation and General Adversary Structures in Perfect Multiparty Computation, Journal of Cryptology, vol.13, issue.1, pp.31-60, 2000. ,
Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology - CRYPTO 2003, vol.2729, pp.463-481, 2003. ,
Differential power analysis, Advances in Cryptology -CRYPTO'99, vol.1666, pp.388-397, 1999. ,
Security in Communication Networks, SCN 02: 3rd International Conference on Security in Communication Networks, vol.2576, pp.14-28, 2003. ,
Physically Observable Cryptography, Theory of Cryptography, vol.2951, pp.278-296, 2004. ,
Masking against Side-Channel Attacks: A Formal Security Proof, Advances in Cryptology ? EUROCRYPT 2013, vol.7881, pp.142-159, 2013. ,
Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems, CHES 2010, vol.6225, pp.413-427, 2010. ,
, World Federation of Neurology, The British Journal of Radiology, vol.33, issue.392, pp.528-528, 1960.
, 23538, 1857-04-18, {0, vol.27, p.1