Sonia Belaïd

According to our database1, Sonia Belaïd authored at least 30 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Masking the GLP Lattice-Based Signature Scheme at Any Order.
J. Cryptol., March, 2024

2023
High Order Side-Channel Security for Elliptic-Curve Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Unifying Freedom and Separation for Tight Probing-Secure Composition.
IACR Cryptol. ePrint Arch., 2023

Towards Achieving Provable Side-Channel Security in Practice.
IACR Cryptol. ePrint Arch., 2023

2021
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.
IACR Cryptol. ePrint Arch., 2021

On the Power of Expansion: More Efficient Constructions in the Random Probing Model.
IACR Cryptol. ePrint Arch., 2021

High Order Countermeasures for Elliptic-Curve Implementations with Noisy Leakage Security.
IACR Cryptol. ePrint Arch., 2021

IronMask: Versatile Verification of Masking Security.
IACR Cryptol. ePrint Arch., 2021

2020
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
J. Cryptogr. Eng., 2020

Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations.
IACR Cryptol. ePrint Arch., 2020

Random Probing Security: Verification, Composition, Expansion and New Constructions.
IACR Cryptol. ePrint Arch., 2020

2019
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2019

maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
IACR Cryptol. ePrint Arch., 2018

maskVerif: a formal tool for analyzing software and hardware masked implementations.
IACR Cryptol. ePrint Arch., 2018

Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptol. ePrint Arch., 2018

2017
Private Multiplication over Finite Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Randomness Complexity of Private Circuits for Multiplication.
IACR Cryptol. ePrint Arch., 2016

Strong Non-Interference and Type-Directed Higher-Order Masking.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Security of Cryptosystems Against Power-Analysis Attacks. (Sécurité des cryptosystèmes contre les attaques par analyse de courant).
PhD thesis, 2015

Improved Side-Channel Analysis of Finite-Field Multiplication.
IACR Cryptol. ePrint Arch., 2015

Verified Proofs of Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2015

Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler.
IACR Cryptol. ePrint Arch., 2015

Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2015

Leakage-Resilient Symmetric Encryption via Re-keying.
IACR Cryptol. ePrint Arch., 2015

Masking and leakage-resilient primitives: One, the other(s) or both?
Cryptogr. Commun., 2015

2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptogr. Eng., 2014

Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the SECRYPT 2013, 2013


  Loading...