Oscar Reparaz

Orcid: 0000-0003-4585-7086

According to our database1, Oscar Reparaz authored at least 30 papers between 2012 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2020

2019
Consolidating Security Notions in Hardware Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2018
Multiplicative Masking for AES in Hardware.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Constant-Time Discrete Gaussian Sampling.
IEEE Trans. Computers, 2018

2017
A 5.1<i>μ</i><i>J</i> per point-multiplication elliptic curve cryptographic processor.
Int. J. Circuit Theory Appl., 2017

CAPA: The Spirit of Beaver against Physical Attacks.
IACR Cryptol. ePrint Arch., 2017

Fast Leakage Assessment.
IACR Cryptol. ePrint Arch., 2017

A first-order chosen-plaintext DPA attack on the third round of DES.
IACR Cryptol. ePrint Arch., 2017

FourQ on embedded devices with strong countermeasures against side-channel attacks.
IACR Cryptol. ePrint Arch., 2017

Maximizing the throughput of threshold-protected AES-GCM implementations on FPGA.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017

Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Masking ring-LWE.
J. Cryptogr. Eng., 2016

Dude, is my code constant time?
IACR Cryptol. ePrint Arch., 2016

Detecting flawed masking schemes with leakage detection tests.
IACR Cryptol. ePrint Arch., 2016

Masking AES with d+1 Shares in Hardware.
IACR Cryptol. ePrint Arch., 2016

Additively Homomorphic Ring-LWE Masking.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

Hardware acceleration of a software-based VPN.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016

2015
A masked ring-LWE implementation.
IACR Cryptol. ePrint Arch., 2015

Consolidating masking schemes.
IACR Cryptol. ePrint Arch., 2015

A note on the security of Higher-Order Threshold Implementations.
IACR Cryptol. ePrint Arch., 2015

DPA, Bitslicing and Masking at 1 GHz.
IACR Cryptol. ePrint Arch., 2015

Higher-Order Threshold Implementation of the AES S-Box.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Compact and Side Channel Secure Discrete Gaussian Sampling.
IACR Cryptol. ePrint Arch., 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
IACR Cryptol. ePrint Arch., 2014

Generic DPA Attacks: Curse or Blessing?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

A Note on the Use of Margins to Compare Distinguishers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

Higher-Order Glitch Resistant Implementation of the PRESENT S-Box.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
Low-energy encryption for medical devices: security adds an extra design dimension.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

2012
Selecting Time Samples for Multivariate DPA Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012


  Loading...