Alexandre Berzati

According to our database1, Alexandre Berzati authored at least 19 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification.
IACR Cryptol. ePrint Arch., 2023

PMNS revisited for consistent redundancy and equality test.
IACR Cryptol. ePrint Arch., 2023

A Practical Template Attack on CRYSTALS-Dilithium.
IACR Cryptol. ePrint Arch., 2023

2021
Hardware Implementation of Multiplication over Quartic Extension Fields.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

Hardware Implementations of Pairings at Updated Security Levels.
Proceedings of the Smart Card Research and Advanced Applications, 2021

2020
Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View.
IACR Cryptol. ePrint Arch., 2020

2019
Studying EM Pulse Effects on Superscalar Microarchitectures at ISA Level.
CoRR, 2019

A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2017
Compiler-Assisted Loop Hardening Against Fault Attacks.
ACM Trans. Archit. Code Optim., 2017

2012
A Survey of Differential Fault Analysis Against Classical RSA Implementations.
Proceedings of the Fault Analysis in Cryptography, 2012

2010
Analyse cryptographique des altérations d'algorithmes.
PhD thesis, 2010

Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems.
IACR Cryptol. ePrint Arch., 2010

Public Key Perturbation of Randomized RSA Implementations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Fault Analysis of Rabbit: Toward a Secret Key Leakage.
Proceedings of the Progress in Cryptology, 2009

Fault Analysis of Grain-128.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable.
Proceedings of the Topics in Cryptology, 2009

2008
In(security) Against Fault Injection Attacks for CRT-RSA Implementations.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

Perturbating RSA Public Keys: An Improved Attack.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008


  Loading...