Dahmun Goudarzi

According to our database1, Dahmun Goudarzi authored at least 14 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Short Signatures from Regular Syndrome Decoding, Revisited.
IACR Cryptol. ePrint Arch., 2024

Faster Signatures from MPC-in-the-Head.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2022
Probing Security through Input-Output Separation and Revisited Quasilinear Masking.
IACR Cryptol. ePrint Arch., 2022

Sharp: Short Relaxed Range Proofs.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

2019
Unifying Leakage Models on a Rényi Day.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Secure Implementation of Block Ciphers against Physical Attacks. (Implémentations Sécurisées de Chiffrement par Bloc contre les Attaques Physiques).
PhD thesis, 2018

Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

How to Securely Compute with Noisy Leakage in Quasilinear Complexity.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
How Fast Can Higher-Order Masking Be in Software?
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016


  Loading...