Sonia Belaïd

According to our database1, Sonia Belaïd authored at least 20 papers between 2013 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited.
IACR Cryptology ePrint Archive, 2019

maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
IACR Cryptology ePrint Archive, 2018

maskVerif: a formal tool for analyzing software and hardware masked implementations.
IACR Cryptology ePrint Archive, 2018

Masking the GLP Lattice-Based Signature Scheme at Any Order.
IACR Cryptology ePrint Archive, 2018

Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptology ePrint Archive, 2018

2017
Private Multiplication over Finite Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Randomness Complexity of Private Circuits for Multiplication.
IACR Cryptology ePrint Archive, 2016

Strong Non-Interference and Type-Directed Higher-Order Masking.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Security of Cryptosystems Against Power-Analysis Attacks. (Sécurité des cryptosystèmes contre les attaques par analyse de courant).
PhD thesis, 2015

Improved Side-Channel Analysis of Finite-Field Multiplication.
IACR Cryptology ePrint Archive, 2015

Verified Proofs of Higher-Order Masking.
IACR Cryptology ePrint Archive, 2015

Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler.
IACR Cryptology ePrint Archive, 2015

Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
IACR Cryptology ePrint Archive, 2015

Leakage-Resilient Symmetric Encryption via Re-keying.
IACR Cryptology ePrint Archive, 2015

Masking and leakage-resilient primitives: One, the other(s) or both?
Cryptography and Communications, 2015

2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptographic Engineering, 2014

Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the SECRYPT 2013, 2013


  Loading...