Matthieu Rivain

Orcid: 0000-0002-9855-4161

According to our database1, Matthieu Rivain authored at least 76 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
RYDE: a digital signature scheme based on rank syndrome decoding problem with MPC-in-the-Head paradigm.
Des. Codes Cryptogr., May, 2025

Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework.
IACR Cryptol. ePrint Arch., 2025

SmallWood: Hash-Based Polynomial Commitments and Zero-Knowledge Arguments for Relatively Small Instances.
IACR Cryptol. ePrint Arch., 2025

CAPSS: A Framework for SNARK-Friendly Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2025

Blinding Post-Quantum Hash-and-Sign Signatures.
IACR Cryptol. ePrint Arch., 2025

Masked Circuit Compiler in the Cardinal Random Probing Composability Framework.
IACR Cryptol. ePrint Arch., 2025

SoK: A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations.
IACR Commun. Cryptol., 2025

New Techniques for Random Probing Security and Application to Raccoon Signature Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Transistor: a TFHE-Friendly Stream Cipher.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element.
IACR Cryptol. ePrint Arch., 2024

MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Formal Definition and Verification for Combined Random Fault and Random Probing Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
High Order Side-Channel Security for Elliptic-Curve Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments.
IACR Cryptol. ePrint Arch., 2023

Optimized Homomorphic Evaluation of Boolean Functions.
IACR Cryptol. ePrint Arch., 2023

Towards Achieving Provable Side-Channel Security in Practice.
IACR Cryptol. ePrint Arch., 2023

RYDE: A Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm.
CoRR, 2023

MIRA: a Digital Signature Scheme based on the MinRank problem and the MPC-in-the-Head paradigm.
CoRR, 2023

Unifying Freedom and Separation for Tight Probing-Secure Composition.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Probing Security through Input-Output Separation and Revisited Quasilinear Masking.
IACR Cryptol. ePrint Arch., 2022

IronMask: Versatile Verification of Masking Security.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature.
IACR Cryptol. ePrint Arch., 2021

High Order Countermeasures for Elliptic-Curve Implementations with Noisy Leakage Security.
IACR Cryptol. ePrint Arch., 2021

On the Power of Expansion: More Efficient Constructions in the Random Probing Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

How to reveal the secrets of an obscure white-box implementation.
J. Cryptogr. Eng., 2020

Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks.
IACR Cryptol. ePrint Arch., 2020

Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Random Probing Security: Verification, Composition, Expansion and New Constructions.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations.
IACR Cryptol. ePrint Arch., 2019

Higher-Order DCA against Standard Side-Channel Countermeasures.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

2018
Preface to TCHES 2018.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

How to Securely Compute with Noisy Leakage in Quasilinear Complexity.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
How Fast Can Higher-Order Masking Be in Software?
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

2015
Trap Me If You Can - Million Dollar Curve.
IACR Cryptol. ePrint Arch., 2015

Algebraic Decomposition for Probing Security.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
On the Practical Security of a Leakage Resilient Masking Scheme.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

On Double Exponentiation for Securing RSA against Fault Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Another Nail in the Coffin of White-Box AES Implementations.
IACR Cryptol. ePrint Arch., 2013

Two Attacks on a White-Box AES Implementation.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

White-Box Security Notions for Symmetric Encryption Schemes.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Higher-Order Side Channel Security and Mask Refreshing.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Masking against Side-Channel Attacks: A Formal Security Proof.
Proceedings of the Advances in Cryptology, 2013

SCARE of Secret Ciphers with SPN Structures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Differential Fault Analysis of DES.
Proceedings of the Fault Analysis in Cryptography, 2012

Higher-Order Masking Schemes for S-Boxes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Conversion of Security Proofs from One Leakage Model to Another: A New Issue.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2011
Mutual Information Analysis: a Comprehensive Study.
J. Cryptol., 2011

Scalar multiplication on Weierstraß elliptic curves from Co-<i>Z</i> arithmetic.
J. Cryptogr. Eng., 2011

Univariate side channel attacks and leakage modeling.
J. Cryptogr. Eng., 2011

Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves.
IACR Cryptol. ePrint Arch., 2011

2010
Affine Masking against Higher-Order Side Channel Analysis.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Provably Secure Higher-Order Masking of AES.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
On the physical security of cryptographic implementations.
PhD thesis, 2009

Statistical Analysis of Second Order Differential Power Analysis.
IEEE Trans. Computers, 2009

On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.
Proceedings of the Topics in Cryptology, 2009

Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Differential Fault Analysis on DES Middle Rounds.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
On the Exact Success Rate of Side Channel Analysis in the Gaussian Model.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
A Generic Method for Secure SBox Implementation.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Side Channel Cryptanalysis of a Higher Order Masking Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007


  Loading...