Oscar Reparaz

According to our database1, Oscar Reparaz authored at least 29 papers between 2012 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Consolidating Security Notions in Hardware Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2018
Multiplicative Masking for AES in Hardware.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Constant-Time Discrete Gaussian Sampling.
IEEE Trans. Computers, 2018

2017
A 5.1μJ per point-multiplication elliptic curve cryptographic processor.
I. J. Circuit Theory and Applications, 2017

CAPA: The Spirit of Beaver against Physical Attacks.
IACR Cryptology ePrint Archive, 2017

Fast Leakage Assessment.
IACR Cryptology ePrint Archive, 2017

A first-order chosen-plaintext DPA attack on the third round of DES.
IACR Cryptology ePrint Archive, 2017

FourQ on embedded devices with strong countermeasures against side-channel attacks.
IACR Cryptology ePrint Archive, 2017

Maximizing the throughput of threshold-protected AES-GCM implementations on FPGA.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017

Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Masking ring-LWE.
J. Cryptographic Engineering, 2016

Dude, is my code constant time?
IACR Cryptology ePrint Archive, 2016

Detecting flawed masking schemes with leakage detection tests.
IACR Cryptology ePrint Archive, 2016

Masking AES with d+1 Shares in Hardware.
IACR Cryptology ePrint Archive, 2016

Additively Homomorphic Ring-LWE Masking.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

Hardware acceleration of a software-based VPN.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016

2015
A masked ring-LWE implementation.
IACR Cryptology ePrint Archive, 2015

Consolidating masking schemes.
IACR Cryptology ePrint Archive, 2015

A note on the security of Higher-Order Threshold Implementations.
IACR Cryptology ePrint Archive, 2015

DPA, Bitslicing and Masking at 1 GHz.
IACR Cryptology ePrint Archive, 2015

Higher-Order Threshold Implementation of the AES S-Box.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Compact and Side Channel Secure Discrete Gaussian Sampling.
IACR Cryptology ePrint Archive, 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
IACR Cryptology ePrint Archive, 2014

Generic DPA Attacks: Curse or Blessing?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

A Note on the Use of Margins to Compare Distinguishers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

Higher-Order Glitch Resistant Implementation of the PRESENT S-Box.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
Low-energy encryption for medical devices: security adds an extra design dimension.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

2012
Selecting Time Samples for Multivariate DPA Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012


  Loading...