Luk Bettale

Orcid: 0000-0002-8799-8568

According to our database1, Luk Bettale authored at least 18 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials.
IACR Cryptol. ePrint Arch., 2023

2022
Post-Quantum Protocols for Banking Applications.
Proceedings of the Smart Card Research and Advanced Applications, 2022

Security Assessment of NTRU Against Non-Profiled SCA.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
Safe-Error Analysis of Post-Quantum Cryptography Mechanisms.
IACR Cryptol. ePrint Arch., 2021

Safe-Error Analysis of Post-Quantum Cryptography Mechanisms - Short Paper-.
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021

A High-Order Infective Countermeasure Framework.
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021

2018
Improved High-Order Conversion From Boolean to Arithmetic Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Algebraic Side-Channel Attacks on Masked Implementations of AES.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2014
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic.
Des. Codes Cryptogr., 2013

Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the SECRYPT 2013, 2013

2012
Solving polynomial systems over finite fields: improved analysis of the hybrid approach.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2012

Secure Multiple SBoxes Implementation with Arithmetically Masked Input.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

2009
Hybrid approach for solving multivariate systems over finite fields.
J. Math. Cryptol., 2009

2008
Security Analysis of Multivariate Polynomials for Hashing.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Cryptanalysis of the TRMS Signature Scheme of PKC'05.
Proceedings of the Progress in Cryptology, 2008


  Loading...