Matthieu Rivain

According to our database1, Matthieu Rivain authored at least 42 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2018
Preface to TCHES 2018.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
IACR Cryptology ePrint Archive, 2018

How to Reveal the Secrets of an Obscure White-Box Implementation.
IACR Cryptology ePrint Archive, 2018

Higher-Order DCA against Standard Side-Channel Countermeasures.
IACR Cryptology ePrint Archive, 2018

Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
IACR Cryptology ePrint Archive, 2018

2017
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures.
IACR Cryptology ePrint Archive, 2017

How to Securely Compute with Noisy Leakage in Quasilinear Complexity.
IACR Cryptology ePrint Archive, 2017

2016
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking.
IACR Cryptology ePrint Archive, 2016

How Fast Can Higher-Order Masking Be in Software?
IACR Cryptology ePrint Archive, 2016

Algebraic Decomposition for Probing Security.
IACR Cryptology ePrint Archive, 2016

Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2015
Higher-Order Side Channel Security and Mask Refreshing.
IACR Cryptology ePrint Archive, 2015

Trap Me If You Can - Million Dollar Curve.
IACR Cryptology ePrint Archive, 2015

2014
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.
IACR Cryptology ePrint Archive, 2014

On Double Exponentiation for Securing RSA against Fault Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2013
SCARE of Secret Ciphers with SPN Structures.
IACR Cryptology ePrint Archive, 2013

On the Practical Security of a Leakage Resilient Masking Scheme.
IACR Cryptology ePrint Archive, 2013

Another Nail in the Coffin of White-Box AES Implementations.
IACR Cryptology ePrint Archive, 2013

White-Box Security Notions for Symmetric Encryption Schemes.
IACR Cryptology ePrint Archive, 2013

Two Attacks on a White-Box AES Implementation.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Masking against Side-Channel Attacks: A Formal Security Proof.
Proceedings of the Advances in Cryptology, 2013

2012
Differential Fault Analysis of DES.
Proceedings of the Fault Analysis in Cryptography, 2012

Higher-Order Masking Schemes for S-Boxes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Conversion of Security Proofs from One Leakage Model to Another: A New Issue.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2011
Mutual Information Analysis: a Comprehensive Study.
J. Cryptology, 2011

Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic.
J. Cryptographic Engineering, 2011

Univariate side channel attacks and leakage modeling.
J. Cryptographic Engineering, 2011

Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves.
IACR Cryptology ePrint Archive, 2011

2010
Theoretical and practical aspects of mutual information-based side channel analysis.
IJACT, 2010

Provably Secure Higher-Order Masking of AES.
IACR Cryptology ePrint Archive, 2010

Affine Masking against Higher-Order Side Channel Analysis.
IACR Cryptology ePrint Archive, 2010

2009
Statistical Analysis of Second Order Differential Power Analysis.
IEEE Trans. Computers, 2009

Higher-order Masking and Shuffling for Software Implementations of Block Ciphers.
IACR Cryptology ePrint Archive, 2009

Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.
IACR Cryptology ePrint Archive, 2009

On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.
IACR Cryptology ePrint Archive, 2009

Differential Fault Analysis on DES Middle Rounds.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
IACR Cryptology ePrint Archive, 2008

On the Exact Success Rate of Side Channel Analysis in the Gaussian Model.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
A Generic Method for Secure SBox Implementation.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Side Channel Cryptanalysis of a Higher Order Masking Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007


  Loading...