Romain Poussier

According to our database1, Romain Poussier authored at least 19 papers between 2014 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Mitigating Power Attacks through Fine-Grained Instruction Reordering.
CoRR, 2021

2020
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2020

On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices.
IACR Cryptol. ePrint Arch., 2020

Secure Your SoC: Building System-an-Chip Designs for Security.
Proceedings of the 33rd IEEE International System-on-Chip Conference, 2020

2019
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
IACR Cryptol. ePrint Arch., 2019

Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder.
IACR Cryptol. ePrint Arch., 2019

Key Enumeration from the Adversarial Viewpoint.
Proceedings of the Smart Card Research and Advanced Applications, 2019

2018
Key enumeration, rank estimation and horizontal side-channel attacks.
PhD thesis, 2018

Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version.
J. Cryptogr. Eng., 2018

2017
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks.
IACR Cryptol. ePrint Arch., 2017

Connecting and Improving Direct Sum Masking and Inner Product Masking.
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach.
IACR Cryptol. ePrint Arch., 2016

Score-Based vs. Probability-Based Enumeration - A Cautionary Note.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

2015
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices).
IACR Cryptol. ePrint Arch., 2014

Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment.
IACR Cryptol. ePrint Arch., 2014


  Loading...