Melissa Azouaoui

Orcid: 0000-0003-2011-5633

According to our database1, Melissa Azouaoui authored at least 17 papers between 2019 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Post-Quantum Cryptography in eMRTDs: Evaluating PAKE and PKI for Travel Documents.
IACR Cryptol. ePrint Arch., 2025

2023
Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium.
IACR Cryptol. ePrint Arch., 2023

Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium.
IACR Cryptol. ePrint Arch., 2023

The Side-channel Metrics Cheat Sheet.
ACM Comput. Surv., 2023

2022
The Side-Channel Metric Cheat Sheet.
IACR Cryptol. ePrint Arch., 2022

Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2022

Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
IACR Cryptol. ePrint Arch., 2022

Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2022

2021
Shortcut side-channel security evaluations: application to elliptic curve cryptography, masking and shuffling.
PhD thesis, 2021

Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
IACR Cryptol. ePrint Arch., 2021

Blind Side-Channel SIFA.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
A Systematic Appraisal of Side Channel Evaluation Strategies.
Proceedings of the Security Standardisation Research - 6th International Conference, 2020

On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2019
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
IACR Cryptol. ePrint Arch., 2019

Fast Side-Channel Security Evaluation of ECC Implementations - Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

Key Enumeration from the Adversarial Viewpoint.
Proceedings of the Smart Card Research and Advanced Applications, 2019


  Loading...