Inner Product Masking Revisited, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.9056, pp.486-510, 2015. ,
Consolidating Inner Product Masking, Advances in Cryptology -ASIACRYPT 2017 -23rd International Conference on the Theory and Applications of Cryptology and Information Security, vol.10624, pp.724-754, 2017. ,
Theory and Practice of a Leakage Resilient Masking Scheme, Advances in Cryptology -ASIACRYPT 2012 -18th International Conference on the Theory and Application of Cryptology and Information Security, vol.7658, pp.758-775, 2012. ,
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, Advances in Cryptology -EUROCRYPT 2017 -36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.10210, pp.535-566, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01414009
Correlation Power Analysis with a Leakage Model, CHES, vol.3156, pp.16-29, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-02487026
Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems -CHES 2004: 6th International Workshop, vol.3156, pp.16-29, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-02487026
Orthogonal Direct Sum Masking -A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks, Information Security Theory and Practice. Securing the Internet of Things -8th IFIP WG 11.2 International Workshop, vol.8501, pp.40-56, 2014. ,
Masks Will Fall Off -Higher-Order Optimal Distinguishers, Advances in Cryptology -ASIACRYPT 2014 -20th International Conference on the Theory and Application of Cryptology and Information Security, vol.8874, pp.344-365, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02287072
Correlation and Gaussianity in Independent Component Analysis, Journal of Machine Learning Research, vol.4, pp.1177-1203, 2003. ,
Boolean Functions for Cryptography and Error Correcting Codes, Chapter of the monography Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp.257-397 ,
, Preliminary version is, 2010.
Achieving side-channel high-order correlation immunity with leakage squeezing, J. Cryptographic Engineering, vol.4, issue.2, pp.107-121, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02286851
Statistical properties of side-channel and fault injection attacks using coding theory. Cryptography and Communications, vol.10, pp.909-933, 2018. ,
A New Representation of Boolean Functions, Lecture Notes in Computer Science, vol.1719, pp.94-103, 1999. ,
Optimal Linear Codes for IPM, 2020. ,
, Application of Attack Potential to Smartcards, Mandatory Technical Document, Version 2.9, vol.2, 2013.
Affine Masking against Higher-Order Side Channel Analysis, Selected Areas in Cryptography, vol.6544, pp.262-280, 2010. ,
Multiplicative Masking and Power Analysis of AES, CHES, vol.2523, pp.198-212, 2002. ,
Protecting AES with Shamir's Secret Sharing Scheme, vol.29, pp.79-94 ,
Masking vs. multiparty computation: How large is the gap for aes, Cryptographic Hardware and Embedded Systems -CHES 2013 -15th International Workshop, vol.8086, pp.400-416, 2013. ,
Private Circuits: Securing Hardware against Probing Attacks, CRYPTO, vol.2729, pp.463-481, 2003. ,
Differential power analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999. ,
Mutual Information Analysis under the View of Higher-Order Statistics, Lecture Notes in Computer Science, vol.6434, pp.285-300, 2010. ,
The Theory of Error-Correcting Codes, 1977. ,
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Handbook of Finite Fields, 2013. ,
On the degree of boolean functions as real polynomials, Computational Complexity, vol.4, pp.301-313, 1994. ,
Probability Random Variables and Stochastic Processes, 2002. ,
Connecting and Improving Direct Sum Masking and Inner Product Masking, Smart Card Research and Advanced Applications -16th International Conference, vol.10728, pp.123-141, 2017. ,
, Cryptographic Hardware and Embedded Systems -CHES 2011 -13th International Workshop, vol.6917, 2011.
Masking against Side-Channel Attacks: A Formal Security Proof, Advances in Cryptology -EUROCRYPT 2013, p.32 ,
, Proceedings, Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.7881, pp.142-159, 2013.
Statistical Analysis of Second Order Differential Power Analysis, IEEE Trans. Computers, vol.58, issue.6, pp.799-811, 2009. ,
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols, vol.29, pp.63-78 ,
Federal Information Processing Standards) publication 140-3. Security Requirements for Cryptographic Modules (Draft, Revised), vol.63, p.9, 2009. ,
Provably Secure Higher-Order Masking of AES, LNCS, vol.6225, pp.413-427, 2010. ,
A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005. ,
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, vol.5479, pp.443-461, 2009. ,
Security Requirements for Cryptographic Modules publication 140-2, Federal Information Processing Standards), 2001. ,
, Magma Computational Algebra System, pp.2014-2022
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages, Smart Card Research and Advanced Applications -15th International Conference, vol.10146, pp.174-191, 2016. ,
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers, Lecture Notes in Computer Science, vol.7863, pp.336-352, 2013. ,