When Clocks Fail: On Critical Paths and Clock Faults, CARDIS, pp.182-193, 2010. ,
DOI : 10.1007/978-3-642-12510-2_13
URL : https://hal.archives-ouvertes.fr/emse-00505344
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow, 2009 International Conference on Reconfigurable Computing and FPGAs, pp.213-218, 2009. ,
DOI : 10.1109/ReConFig.2009.50
URL : https://hal.archives-ouvertes.fr/hal-00411843
A low-entropy first-degree secure provable masking scheme for resource-constrained devices, Proceedings of the Workshop on Embedded Systems Security, WESS '13, pp.1-7, 2013. ,
DOI : 10.1145/2527317.2527324
A fast new DES implementation in software, Lecture Notes in Computer Science, vol.1267, pp.260-272, 1997. ,
DOI : 10.1007/BFb0052352
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3325
Provably Secure Masking of AES, Selected Areas in Cryptography, pp.69-83, 2004. ,
DOI : 10.1007/978-3-540-30564-4_5
Masking Does Not Protect Against Differential Fault Attacks. In FDTC, 5th Workshop on Fault Detection and Tolerance in Cryptography, IEEE-CS, vol.12, pp.35-40, 2008. ,
DOI : 10.1109/fdtc.2008.12
Protecting AES against side-channel analysis using wire-tap codes, Journal of Cryptographic Engineering, vol.54, issue.8, pp.129-141, 2012. ,
DOI : 10.1007/s13389-012-0034-2
Boolean Functions for Cryptography and Error-Correcting Codes, pp.257-397, 2010. ,
DOI : 10.1017/CBO9780511780448.011
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.2986
Achieving side-channel high-order correlation immunity with leakage squeezing, Journal of Cryptographic Engineering, vol.58, issue.6, pp.1-15, 2014. ,
DOI : 10.1007/s13389-013-0067-1
A New Representation of Boolean Functions, Lecture Notes in Computer Science, vol.1719, pp.94-103, 1999. ,
DOI : 10.1007/3-540-46796-3_10
Higher Order Masking of Look-Up Tables, Cryptology ePrint Archive, vol.700, 2013. ,
DOI : 10.1007/978-3-642-55220-5_25
On Boolean and Arithmetic Masking against Differential Power Analysis, CHES, pp.231-237, 1965. ,
Efficient and provable Secure Methods for Switching from Arithmetic to Boolean Masking, CHES, 2012. ,
DES and Differential Power Analysis, Cryptographic Hardware and Embedded Systems, pp.158-172, 1999. ,
Fault Analysis in Cryptography, 2011. ,
DOI : 10.1007/978-3-642-29656-7
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Securing the AES Finalists Against Power Analysis Attacks, Fast Software Encryption'00, pp.150-164, 2000. ,
Statistical Tools Flavor Side-Channel Collision Attacks, Lecture Notes in Computer Science, vol.7237, pp.428-445, 2012. ,
DOI : 10.1007/978-3-642-29011-4_26
Advanced Encryption Standard (AES) FIPS PUB 197, 2001. ,
A Generic Method for Secure SBox Implementation, Lecture Notes in Computer Science, vol.4867, pp.227-244, 2007. ,
DOI : 10.1007/978-3-540-77535-5_17
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Fast Software Encryption FSE, pp.127-143, 2008. ,
DOI : 10.1007/978-3-540-71039-4_8
Provably Secure Higher-Order Masking of AES, CHES, pp.413-427, 2010. ,
DOI : 10.1007/978-3-642-15031-9_28
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault, Lecture Notes in Computer Science, vol.6633, pp.224-233, 2011. ,
DOI : 10.1007/978-3-642-21040-2_15
Masking Tables???An Underestimated Security Risk, IACR Cryptology ePrint Archive, p.735, 2013. ,
DOI : 10.1007/978-3-662-43933-3_22
Algorithms for Switching between Boolean and Arithmetic Masking of Second Order, Lecture Notes in Computer Science, vol.8204, pp.95-110, 2013. ,
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note, Lecture Notes in Computer Science, vol.7658, pp.740-757, 2012. ,
DOI : 10.1007/978-3-642-34961-4_44
URL : http://hdl.handle.net/2078.1/130004
Towards Efficient Second-Order Power Analysis, CHES, pp.1-15, 2004. ,
DOI : 10.1007/978-3-540-28632-5_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.460.2991
On the Vulnerability of Low Entropy Masking Schemes, CARDIS, Lecture Notes in Computer Science, 2013. ,