Vincent Grosso

Orcid: 0000-0002-3874-7527

According to our database1, Vincent Grosso authored at least 39 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
BALoo: First and Efficient Countermeasure dedicated to Persistent Fault Attacks.
IACR Cryptol. ePrint Arch., 2023

Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece.
IACR Cryptol. ePrint Arch., 2023

Horizontal Correlation Attack on Classic McEliece.
IACR Cryptol. ePrint Arch., 2023

Low-Latency Masking with Arbitrary Protection Order Based on Click Elements.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

Emulating Side Channel Attacks on gem5: lessons learned.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2023

A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem.
IEEE Trans. Inf. Forensics Secur., 2022

Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Self-Timed Masking: Implementing First-Order Masked S-Boxes Without Registers.
IACR Cryptol. ePrint Arch., 2022

Integer Syndrome Decoding in the Presence of Noise.
IACR Cryptol. ePrint Arch., 2022

Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem.
IACR Cryptol. ePrint Arch., 2022

Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Self-timed Masking: Implementing Masked S-Boxes Without Registers.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
Improving Deep Learning Networks for Profiled Side-channel Analysis Using Performance Improvement Techniques.
ACM J. Emerg. Technol. Comput. Syst., 2021

2020
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Friet: An Authenticated Encryption Scheme with Built-in Fault Detection.
IACR Cryptol. ePrint Arch., 2020

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.
IACR Cryptol. ePrint Arch., 2020

2019
Optimal Collision Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2019

2018
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
IACR Cryptol. ePrint Arch., 2018

Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys.
IACR Cryptol. ePrint Arch., 2018

2017
Strong 8-bit Sboxes with efficient masking in hardware extended version.
J. Cryptogr. Eng., 2017

Masking Proofs are Tight (and How to Exploit it in Security Evaluations).
IACR Cryptol. ePrint Arch., 2017

Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
IACR Cryptol. ePrint Arch., 2017

2016
Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach.
IACR Cryptol. ePrint Arch., 2016

Strong 8-bit Sboxes with Efficient Masking in Hardware.
IACR Cryptol. ePrint Arch., 2016

2015
Towards side-channel secure block ciphers.
PhD thesis, 2015

ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
IACR Cryptol. ePrint Arch., 2015

Masking and leakage-resilient primitives: One, the other(s) or both?
Cryptogr. Commun., 2015

Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Masking vs. multiparty computation: how large is the gap for AES?
J. Cryptogr. Eng., 2014

Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices).
IACR Cryptol. ePrint Arch., 2014

Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment.
IACR Cryptol. ePrint Arch., 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
IACR Cryptol. ePrint Arch., 2014

LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Efficient Masked S-Boxes Processing - A Step Forward -.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Block Ciphers that are Easier to Mask: How Far Can we Go?
IACR Cryptol. ePrint Arch., 2013

Low Entropy Masking Schemes, Revisited.
Proceedings of the Smart Card Research and Advanced Applications, 2013


  Loading...