Pablo Rauzy

Orcid: 0000-0002-6293-3231

Affiliations:
  • Université Paris 8 - Vincennes à Saint-Denis, France
  • Inria, CITI Lab, Villeurbanne, France (former)


According to our database1, Pablo Rauzy authored at least 16 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
THC: Practical and Cost-Effective Verification of Delegated Computation.
IACR Cryptol. ePrint Arch., 2021

2018
Capacity: an Abstract Model of Control over Personal Data.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Using modular extension to provably protect Edwards curves against fault attacks.
J. Cryptogr. Eng., 2017

2016
Formally proved security of assembly code against power analysis - A case study on balanced logic.
J. Cryptogr. Eng., 2016

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
IACR Cryptol. ePrint Arch., 2016

2015
Formal Software Methods for Cryptosystems Implementation Security. (Méthodes logicielles formelles pour la sécurité des implémentations cryptographiques).
PhD thesis, 2015

High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures.
IACR Cryptol. ePrint Arch., 2015

A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography.
IACR Cryptol. ePrint Arch., 2015

2014
A formal proof of countermeasures against fault injection attacks on CRT-RSA.
J. Cryptogr. Eng., 2014

Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA.
IACR Cryptol. ePrint Arch., 2014

Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack: A Pledge for Formal Methods in the Field of Implementation Security.
Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2014, 2014

2013
Formally Proved Security of Assembly Code Against Leakage.
IACR Cryptol. ePrint Arch., 2013

Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack.
IACR Cryptol. ePrint Arch., 2013

2012
From Rational Number Reconstruction to Set Reconciliation and File Synchronization.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

2011
Can a Program Reverse-Engineer Itself?
IACR Cryptol. ePrint Arch., 2011

Can Code Polymorphism Limit Information Leakage?
IACR Cryptol. ePrint Arch., 2011


  Loading...