Emmanuel Prouff

According to our database1, Emmanuel Prouff authored at least 78 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Comprehensive Study of Deep Learning for Side-Channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2020

Deep learning for side-channel analysis and introduction to ASCAD database.
J. Cryptogr. Eng., 2020

2019
Deep Learning to Evaluate Secure RSA Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Horizontal Collision Correlation Attack on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2019

Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations.
Proceedings of the Information Security Theory and Practice, 2019

Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

2018
Linear Repairing Codes and Side-Channel Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database.
IACR Cryptol. ePrint Arch., 2018

Gradient Visualization for General Characterization in Profiling Attacks.
IACR Cryptol. ePrint Arch., 2018

On the Use of Independent Component Analysis to Denoise Side-Channel Measurements.
IACR Cryptol. ePrint Arch., 2018

Recognition Over Encrypted Faces.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018

Outsourcing Signatures of Confidential Documents.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
Stochastic Collision Attack.
IEEE Trans. Information Forensics and Security, 2017

Privacy-Preserving Classification on Deep Neural Network.
IACR Cryptol. ePrint Arch., 2017

Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures - Profiling Attacks without Pre-Processing -.
IACR Cryptol. ePrint Arch., 2017

Redefining the transparency order.
Des. Codes Cryptogr., 2017

Private Multiplication over Finite Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Breaking Cryptographic Implementations Using Deep Learning Techniques.
IACR Cryptol. ePrint Arch., 2016

Faster Evaluation of SBoxes via Common Shares.
IACR Cryptol. ePrint Arch., 2016

Algebraic Decomposition for Probing Security.
IACR Cryptol. ePrint Arch., 2016

Randomness Complexity of Private Circuits for Multiplication.
IACR Cryptol. ePrint Arch., 2016

Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme.
IACR Cryptol. ePrint Arch., 2016

Kernel Discriminant Analysis for Information Extraction in the Presence of Masking.
Proceedings of the Smart Card Research and Advanced Applications, 2016

Polynomial Evaluation and Side Channel Analysis.
Proceedings of the New Codebreakers, 2016

2015
Success through confidence: Evaluating the effectiveness of a side-channel attack.
IACR Cryptol. ePrint Arch., 2015

Higher-Order Side Channel Security and Mask Refreshing.
IACR Cryptol. ePrint Arch., 2015

Improved Side-Channel Analysis of Finite-Field Multiplication.
IACR Cryptol. ePrint Arch., 2015

Horizontal collision correlation attack on elliptic curves - - Extended Version -.
Cryptogr. Commun., 2015

Enhancing Dimensionality Reduction Methods for Side-Channel Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Achieving side-channel high-order correlation immunity with leakage squeezing.
J. Cryptogr. Eng., 2014

How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

Side-Channel Analysis of Montgomery's Representation Randomization.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Side-Channel Attack against RSA Key Generation Algorithms.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Efficient Masked S-Boxes Processing - A Step Forward -.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
A New Second-Order Side Channel Attack Based on Linear Regression.
IEEE Trans. Computers, 2013

Introduction to the CHES 2012 special issue.
J. Cryptogr. Eng., 2013

On the Practical Security of a Leakage Resilient Masking Scheme.
IACR Cryptol. ePrint Arch., 2013

Behind the Scene of Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2013

Horizontal Collision Correlation Attack on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Masking against Side-Channel Attacks: A Formal Security Proof.
Proceedings of the Advances in Cryptology, 2013

Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Low Entropy Masking Schemes, Revisited.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version.
J. Cryptogr. Eng., 2012

A First-Order Leak-Free Masking Countermeasure.
IACR Cryptol. ePrint Arch., 2012

Register leakage masking using Gray code.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

Higher-Order Masking Schemes for S-Boxes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Conversion of Security Proofs from One Leakage Model to Another: A New Issue.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

On the Use of Shamir's Secret Sharing against Side-Channel Analysis.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
Mutual Information Analysis: a Comprehensive Study.
J. Cryptology, 2011

Univariate side channel attacks and leakage modeling.
J. Cryptogr. Eng., 2011

Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2011

Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings.
IACR Cryptol. ePrint Arch., 2011

Defeat Masking With a (Very) Few Knowledge About the Leakage.
IACR Cryptol. ePrint Arch., 2011

Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Montgomery's Trick and Fast Implementation of Masked AES.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Theoretical and practical aspects of mutual information-based side channel analysis.
IJACT, 2010

Provably Secure Higher-Order Masking of AES.
IACR Cryptol. ePrint Arch., 2010

First-Order Side-Channel Attacks on the Permutation Tables Countermeasure - Extended Version -.
IACR Cryptol. ePrint Arch., 2010

Affine Masking against Higher-Order Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2010

Attack on a Higher-Order Masking of the AES Based on Homographic Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Secure Multiplicative Masking of Power Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Statistical Analysis of Second Order Differential Power Analysis.
IEEE Trans. Computers, 2009

Higher-order Masking and Shuffling for Software Implementations of Block Ciphers.
IACR Cryptol. ePrint Arch., 2009

Securing AES Implementation against Fault Attacks.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

First-Order Side-Channel Attacks on the Permutation Tables Countermeasure.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2008

Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
CRT RSA Algorithm Protected Against Fault Attacks.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

A Generic Method for Secure SBox Implementation.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Side Channel Cryptanalysis of a Higher Order Masking Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
Provably Secure S-Box Implementation Based on Fourier Transform.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Off-Line Group Signatures with Smart Cards.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
DPA Attacks and S-Boxes.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2003
On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

On Plateaued Functions and Their Constructions.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Vectorial Functions and Covering Sequences.
Proceedings of the Finite Fields and Applications, 2003


  Loading...