According to our database1, Gilles Piret authored at least 15 papers between 2003 and 2014.
Legend:Book In proceedings Article PhD thesis Other
Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -.
IACR Cryptology ePrint Archive, 2012
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance.
Proceedings of the Applied Cryptography and Network Security, 2012
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Des. Codes Cryptogr., 2009
Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking).
IET Information Security, 2008
FPGA implementations of the ICEBERG block cipher.
Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme.
Des. Codes Cryptogr., 2006
Pseudorandom Permutation Families over Abelian Groups.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
SEA: A Scalable Encryption Algorithm for Small Embedded Applications.
Proceedings of the Smart Card Research and Advanced Applications, 2006
Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
On the Security of the DeKaRT Primitive.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
Integral Cryptanalysis on reduced-round Safer++.
IACR Cryptology ePrint Archive, 2003
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003