Robert Primas

Orcid: 0000-0002-9569-8477

According to our database1, Robert Primas authored at least 28 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM.
IACR Cryptol. ePrint Arch., 2025

2024
Quantile: Quantifying Information Leakage.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice.
IACR Cryptol. ePrint Arch., 2024

On Loopy Belief Propagation for SASCAs: An Analysis and Empirical Study of the Inference Problem.
IACR Commun. Cryptol., 2024

2023
Secure Context Switching of Masked Software Implementations.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Formal Verification of Arithmetic Masking in Hardware and Software.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Statistical Effective Fault Attacks: The Other Side of the Coin.
IEEE Trans. Inf. Forensics Secur., 2022

Riding the Waves Towards Generic Single-Cycle Masking in Hardware.
IACR Cryptol. ePrint Arch., 2022

Leakage and Tamper Resilient Permutation-Based Cryptography.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Power Contracts: Provably Complete Power Leakage Models for Processors.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.
IACR Cryptol. ePrint Arch., 2021

Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs.
Proceedings of the 30th USENIX Security Symposium, 2021

Proving SIFA Protection of Masked Redundant Circuits.
Proceedings of the Automated Technology for Verification and Analysis, 2021

Secure and Efficient Software Masking on Superscalar Pipelined Processors.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Isap v2.0.
IACR Trans. Symmetric Cryptol., 2020

A Fast and Compact Accelerator for Ascon and Friends.
IACR Cryptol. ePrint Arch., 2020

Single-Trace Attacks on Keccak.
IACR Cryptol. ePrint Arch., 2020

Exploring the Golden Mean Between Leakage and Fault Resilience and Practice.
IACR Cryptol. ePrint Arch., 2020

A Fast and Compact RISC-V Accelerator for Ascon and Friends.
Proceedings of the Smart Card Research and Advanced Applications, 2020

2019
Analyzing the Linear Keystream Biases in AEGIS.
IACR Cryptol. ePrint Arch., 2019

Protecting against Statistical Ineffective Fault Attacks.
IACR Cryptol. ePrint Arch., 2019

More Practical Single-Trace Attacks on the Number Theoretic Transform.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

2018
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2018

Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017


  Loading...