Louis Goubin

According to our database1, Louis Goubin authored at least 61 papers between 1997 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Lightweight instruction-level encryption for embedded processors using stream ciphers.
Microprocessors and Microsystems - Embedded Hardware Design, 2019

2018
How to Reveal the Secrets of an Obscure White-Box Implementation.
IACR Cryptology ePrint Archive, 2018

Blending FHE-NTRU keys – The Excalibur Property.
IACR Cryptology ePrint Archive, 2018

Excalibur Key-Generation Protocols For DAG Hierarchic Decryption.
IACR Cryptology ePrint Archive, 2018

Excalibur Key-Generation Protocols for DAG Hierarchic Decryption.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

On the Design of a Processor Working Over Encrypted Data.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018

2017
First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

Lightweight Software Encryption for Embedded Processors.
Proceedings of the Euromicro Conference on Digital System Design, 2017

2016
Attacking FHE-based applications by software fault injections.
IACR Cryptology ePrint Archive, 2016

Blending FHE-NTRU Keys - The Excalibur Property.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Improving Side-Channel Attacks Against Pairing-Based Cryptography.
Proceedings of the Risks and Security of Internet and Systems, 2016

Defeating MBA-based Obfuscation.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

2015
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults.
IACR Cryptology ePrint Archive, 2015

Trap Me If You Can - Million Dollar Curve.
IACR Cryptology ePrint Archive, 2015

A survey of fault attacks in pairing based cryptography.
Cryptography and Communications, 2015

2014
A survey of Fault Attacks in Pairing Based Cryptography.
IACR Cryptology ePrint Archive, 2014

Practical Validation of Several Fault Attacks against the Miller Algorithm.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

2013
Formal verification of a CRT-RSA implementation against fault attacks.
J. Cryptographic Engineering, 2013

Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design.
Proceedings of the Progress in Cryptology, 2013

2012
A Survey of Differential Fault Analysis Against Classical RSA Implementations.
Proceedings of the Fault Analysis in Cryptography, 2012

Higher-Order Masking Schemes for S-Boxes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Multivariate Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Protecting AES with Shamir's Secret Sharing Scheme.
IACR Cryptology ePrint Archive, 2011

Protecting AES with Shamir's Secret Sharing Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems.
IACR Cryptology ePrint Archive, 2010

Public Key Perturbation of Randomized RSA Implementations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable
CoRR, 2009

Fault Analysis of Rabbit: Toward a Secret Key Leakage.
Proceedings of the Progress in Cryptology, 2009

Fault Analysis of Grain-128.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable.
Proceedings of the Topics in Cryptology, 2009

2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


SOSEMANUK: a fast software-oriented stream cipher
CoRR, 2008

Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

In(security) Against Fault Injection Attacks for CRT-RSA Implementations.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

Perturbating RSA Public Keys: An Improved Attack.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
Cryptanalysis of white box DES implementations.
IACR Cryptology ePrint Archive, 2007

Cryptanalysis of White Box DES Implementations.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2005
An Algebraic Masking Method to Protect AES Against Power Attacks.
IACR Cryptology ePrint Archive, 2005

An Algebraic Masking Method to Protect AES Against Power Attacks.
Proceedings of the Information Security and Cryptology, 2005

2004
Two Power Analysis Attacks against One-Mask Methods.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
SFLASHv3, a fast asymmetric signature scheme.
IACR Cryptology ePrint Archive, 2003

What do DES S-boxes Say to Each Other ?
IACR Cryptology ePrint Archive, 2003

A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems.
Proceedings of the Public Key Cryptography, 2003

A Fast and Secure Implementation of Sflash.
Proceedings of the Public Key Cryptography, 2003

A Generic Protection against High-Order Differential Power Analysis.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2002
Solving Underdefined Systems of Multivariate Quadratic Equations.
Proceedings of the Public Key Cryptography, 2002

2001
FLASH, a Fast Multivariate Signature Algorithm.
Proceedings of the Topics in Cryptology, 2001

QUARTZ, 128-Bit Long Digital Signatures.
Proceedings of the Topics in Cryptology, 2001

A Sound Method for Switching between Boolean and Arithmetic Masking.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
On Boolean and Arithmetic Masking against Differential Power Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000

Cryptanalysis of the TTM Cryptosystem.
Proceedings of the Advances in Cryptology, 2000

1999
Unbalanced Oil and Vinegar Signature Schemes.
Proceedings of the Advances in Cryptology, 1999

DES and Differential Power Analysis (The "Duplication" Method).
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

1998
Improved Algorithms for Isomorphisms of Polynomials.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai.
Proceedings of the Advances in Cryptology, 1998

1997
Asymmetric cryptography with S-Boxes.
Proceedings of the Information and Communication Security, First International Conference, 1997

Trapdoor one-way permutations and multivariate polynominals.
Proceedings of the Information and Communication Security, First International Conference, 1997


  Loading...