Thomas Roche

Orcid: 0000-0002-3736-7100

According to our database1, Thomas Roche authored at least 38 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards Achieving Provable Side-Channel Security in Practice.
IACR Cryptol. ePrint Arch., 2023

2021
A Side Journey to Titan.
IACR Cryptol. ePrint Arch., 2021

Making the connection: Examining the relationship between undergraduate students' digital literacy and academic success in an English medium instruction (EMI) university.
Educ. Inf. Technol., 2021

A Side Journey To Titan.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
Side-channel Attacks on Blinded Scalar Multiplications Revisited.
IACR Cryptol. ePrint Arch., 2019

2016
Algebraic Decomposition for Probing Security.
IACR Cryptol. ePrint Arch., 2016

2015
Suitability of Adaptive Self-Regulated e-Learning to Vocational Training: A Pilot Study in Heat Pump System Installation.
Int. J. Online Pedagog. Course Des., 2015

Success through confidence: Evaluating the effectiveness of a side-channel attack.
IACR Cryptol. ePrint Arch., 2015

Higher-Order Side Channel Security and Mask Refreshing.
IACR Cryptol. ePrint Arch., 2015

2014
Stability Results for Doubly Nonlinear Differential Inclusions by Variational Convergence.
SIAM J. Control. Optim., 2014

How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

Combining Self-Regulation and Competence-Based Guidance to Personalise the Learning Experience in Moodle.
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014

Side-Channel Attack against RSA Key Generation Algorithms.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
SCARE of Secret Ciphers with SPN Structures.
IACR Cryptol. ePrint Arch., 2013

On the Practical Security of a Leakage Resilient Masking Scheme.
IACR Cryptol. ePrint Arch., 2013

Behind the Scene of Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2013

Applying Pedagogical Approaches to Enhance Learning: Linking Self-Regulated and Skills-Based Learning with Support from Moodle Extensions.
Proceedings of the 2013 Second IIAI International Conference on Advanced Applied Informatics, 2013

Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version.
J. Cryptogr. Eng., 2012

PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -.
IACR Cryptol. ePrint Arch., 2012

On the Need of Randomness in Fault Attack Countermeasures - Application to AES.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

On the Use of Shamir's Secret Sharing against Side-Channel Analysis.
Proceedings of the Smart Card Research and Advanced Applications, 2012

PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2011

Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Combined Fault and Side-Channel Attack on Protected Implementations of AES.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
Dimensionnement et intégration d'un chiffre symétrique dans le contexte d'un système d'information distribué de grande taille. (Capacity planning and integration of a symmetric cipher within the framework of a large distributed information system).
PhD thesis, 2010

Output-sensitive decoding for redundant residue systems.
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2010

Attack on a Higher-Order Masking of the AES Based on Homographic Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Side-channel attacks based on linear approximations.
IACR Cryptol. ePrint Arch., 2009

Multi-Linear cryptanalysis in Power Analysis Attacks MLPA
CoRR, 2009

Algorithm-Based Fault Tolerance Applied to P2P Computing Networks.
Proceedings of the First International Conference on Advances in P2P Systems, 2009

2008
Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher.
Proceedings of the Modelling, 2008

2007
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography.
Proceedings of the Parallel Symbolic Computation, 2007

2006
An agent-based approach to knowledge management in distributed design.
J. Intell. Manuf., 2006

2005
Multi-agent Support for Distributed Engineering Design.
Proceedings of the Innovations in Applied Artificial Intelligence, 2005

2003
A Multi-agent Architecture for Distributed Design.
Proceedings of the Holonic and Multi-Agent Systems for Manufacturing, 2003

2002
Product Life Cycle Design Using the DFE Workbench.
Proceedings of the Knowledge and Technology Integration in Production and Services: Balancing Knowledge in Product and Service Life Cycle, 2002


  Loading...