Matthieu Rivain

Orcid: 0000-0002-9855-4161

According to our database1, Matthieu Rivain authored at least 65 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank.
IACR Cryptol. ePrint Arch., 2024

2023
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature.
Des. Codes Cryptogr., February, 2023

High Order Side-Channel Security for Elliptic-Curve Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments.
IACR Cryptol. ePrint Arch., 2023

Optimized Homomorphic Evaluation of Boolean Functions.
IACR Cryptol. ePrint Arch., 2023

MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem.
IACR Cryptol. ePrint Arch., 2023

Unifying Freedom and Separation for Tight Probing-Secure Composition.
IACR Cryptol. ePrint Arch., 2023

Towards Achieving Provable Side-Channel Security in Practice.
IACR Cryptol. ePrint Arch., 2023

RYDE: A Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm.
CoRR, 2023

MIRA: a Digital Signature Scheme based on the MinRank problem and the MPC-in-the-Head paradigm.
CoRR, 2023

2022
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head.
IACR Cryptol. ePrint Arch., 2022

Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.
IACR Cryptol. ePrint Arch., 2022

Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2022

2021
Probing Security through Input-Output Separation and Revisited Quasilinear Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.
IACR Cryptol. ePrint Arch., 2021

On the Power of Expansion: More Efficient Constructions in the Random Probing Model.
IACR Cryptol. ePrint Arch., 2021

High Order Countermeasures for Elliptic-Curve Implementations with Noisy Leakage Security.
IACR Cryptol. ePrint Arch., 2021

IronMask: Versatile Verification of Masking Security.
IACR Cryptol. ePrint Arch., 2021

2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

How to reveal the secrets of an obscure white-box implementation.
J. Cryptogr. Eng., 2020

Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations.
IACR Cryptol. ePrint Arch., 2020

Random Probing Security: Verification, Composition, Expansion and New Constructions.
IACR Cryptol. ePrint Arch., 2020

2019
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2018
Preface to TCHES 2018.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
IACR Cryptol. ePrint Arch., 2018

Higher-Order DCA against Standard Side-Channel Countermeasures.
IACR Cryptol. ePrint Arch., 2018

Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
IACR Cryptol. ePrint Arch., 2018

2017
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures.
IACR Cryptol. ePrint Arch., 2017

How to Securely Compute with Noisy Leakage in Quasilinear Complexity.
IACR Cryptol. ePrint Arch., 2017

2016
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2016

How Fast Can Higher-Order Masking Be in Software?
IACR Cryptol. ePrint Arch., 2016

Algebraic Decomposition for Probing Security.
IACR Cryptol. ePrint Arch., 2016

Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2015
Higher-Order Side Channel Security and Mask Refreshing.
IACR Cryptol. ePrint Arch., 2015

Trap Me If You Can - Million Dollar Curve.
IACR Cryptol. ePrint Arch., 2015

2014
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

On Double Exponentiation for Securing RSA against Fault Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2013
SCARE of Secret Ciphers with SPN Structures.
IACR Cryptol. ePrint Arch., 2013

On the Practical Security of a Leakage Resilient Masking Scheme.
IACR Cryptol. ePrint Arch., 2013

Another Nail in the Coffin of White-Box AES Implementations.
IACR Cryptol. ePrint Arch., 2013

White-Box Security Notions for Symmetric Encryption Schemes.
IACR Cryptol. ePrint Arch., 2013

Two Attacks on a White-Box AES Implementation.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Masking against Side-Channel Attacks: A Formal Security Proof.
Proceedings of the Advances in Cryptology, 2013

2012
Differential Fault Analysis of DES.
Proceedings of the Fault Analysis in Cryptography, 2012

Higher-Order Masking Schemes for S-Boxes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Conversion of Security Proofs from One Leakage Model to Another: A New Issue.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2011
Mutual Information Analysis: a Comprehensive Study.
J. Cryptol., 2011

Scalar multiplication on Weierstraß elliptic curves from Co-<i>Z</i> arithmetic.
J. Cryptogr. Eng., 2011

Univariate side channel attacks and leakage modeling.
J. Cryptogr. Eng., 2011

Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves.
IACR Cryptol. ePrint Arch., 2011

2010
Theoretical and practical aspects of mutual information-based side channel analysis.
Int. J. Appl. Cryptogr., 2010

Provably Secure Higher-Order Masking of AES.
IACR Cryptol. ePrint Arch., 2010

Affine Masking against Higher-Order Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2010

2009
Statistical Analysis of Second Order Differential Power Analysis.
IEEE Trans. Computers, 2009

Higher-order Masking and Shuffling for Software Implementations of Block Ciphers.
IACR Cryptol. ePrint Arch., 2009

Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.
IACR Cryptol. ePrint Arch., 2009

On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.
IACR Cryptol. ePrint Arch., 2009

Differential Fault Analysis on DES Middle Rounds.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2008

On the Exact Success Rate of Side Channel Analysis in the Gaussian Model.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
A Generic Method for Secure SBox Implementation.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Side Channel Cryptanalysis of a Higher Order Masking Scheme.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007


  Loading...