Oscar Reparaz

Orcid: 0000-0003-4585-7086

According to our database1, Oscar Reparaz authored at least 30 papers between 2012 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2020

2018
Constant-Time Discrete Gaussian Sampling.
IEEE Trans. Computers, 2018

Multiplicative Masking for AES in Hardware.
IACR Cryptol. ePrint Arch., 2018

Consolidating Security Notions in Hardware Masking.
IACR Cryptol. ePrint Arch., 2018

CAPA: The Spirit of Beaver Against Physical Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
A 5.1<i>μ</i><i>J</i> per point-multiplication elliptic curve cryptographic processor.
Int. J. Circuit Theory Appl., 2017

FourQ on embedded devices with strong countermeasures against side-channel attacks.
IACR Cryptol. ePrint Arch., 2017

Maximizing the throughput of threshold-protected AES-GCM implementations on FPGA.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017

Dude, is my code constant time?
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

Fast Leakage Assessment.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

A First-Order Chosen-Plaintext DPA Attack on the Third Round of DES.
Proceedings of the Smart Card Research and Advanced Applications, 2017

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Masking ring-LWE.
J. Cryptogr. Eng., 2016

Additively Homomorphic Ring-LWE Masking.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

Detecting Flawed Masking Schemes with Leakage Detection Tests.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Hardware acceleration of a software-based VPN.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016

Masking AES With d+1 Shares in Hardware.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016

2015
A note on the security of Higher-Order Threshold Implementations.
IACR Cryptol. ePrint Arch., 2015

Consolidating Masking Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

A Masked Ring-LWE Implementation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

DPA, Bitslicing and Masking at 1 GHz.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

Higher-Order Threshold Implementation of the AES S-Box.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Compact and Side Channel Secure Discrete Gaussian Sampling.
IACR Cryptol. ePrint Arch., 2014

Generic DPA Attacks: Curse or Blessing?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

A Note on the Use of Margins to Compare Distinguishers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
Proceedings of the Smart Card Research and Advanced Applications, 2014

Higher-Order Glitch Resistant Implementation of the PRESENT S-Box.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
Low-energy encryption for medical devices: security adds an extra design dimension.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

2012
Selecting Time Samples for Multivariate DPA Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012


  Loading...