Melissa Azouaoui

Orcid: 0000-0003-2011-5633

According to our database1, Melissa Azouaoui authored at least 16 papers between 2019 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks Application to CRYSTALS-Dilithium.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

The Side-channel Metrics Cheat Sheet.
ACM Comput. Surv., 2023

2022
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

The Side-Channel Metric Cheat Sheet.
IACR Cryptol. ePrint Arch., 2022

Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber.
IACR Cryptol. ePrint Arch., 2022

Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
IACR Cryptol. ePrint Arch., 2022

2021
Shortcut side-channel security evaluations: application to elliptic curve cryptography, masking and shuffling.
PhD thesis, 2021

Blind Side-Channel SIFA.
IACR Cryptol. ePrint Arch., 2021

2020
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices.
IACR Cryptol. ePrint Arch., 2020

A Systematic Appraisal of Side Channel Evaluation Strategies.
IACR Cryptol. ePrint Arch., 2020

2019
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
IACR Cryptol. ePrint Arch., 2019

Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder.
IACR Cryptol. ePrint Arch., 2019

Key Enumeration from the Adversarial Viewpoint.
Proceedings of the Smart Card Research and Advanced Applications, 2019


  Loading...