Emmanuel Prouff
Orcid: 0000-0002-3998-0478
According to our database1,
Emmanuel Prouff
authored at least 81 papers
between 2003 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Monomial evaluation of polynomial functions protected by threshold implementations - with an illustration on AES -.
Cryptogr. Commun., 2021
2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
J. Cryptogr. Eng., 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019
2018
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Mobile, Secure, and Programmable Networking, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
Proceedings of the Smart Card Research and Advanced Applications, 2016
Proceedings of the New Codebreakers, 2016
2015
Cryptogr. Commun., 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
2014
J. Cryptogr. Eng., 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
IEEE Trans. Computers, 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version.
J. Cryptogr. Eng., 2012
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
2011
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure - Extended Version -.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IEEE Trans. Computers, 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Finite Fields and Applications, 2003