Circuit compilers with O(1/ log(n)) leakage rate, EUROCRYPT 2016, pp.586-615, 2016. ,
DOI : 10.1007/978-3-662-49896-5_21
On the Cost of Lazy Engineering for Masked Software Implementations, Proceedings of the Smart Card Research and Advanced Application Conference (CARDIS), pp.64-81, 2014. ,
DOI : 10.1007/978-3-319-16763-3_5
A New Decision Procedure for Finite Sets and Cardinality Constraints in SMT, Proceedings of the 8th International Joint Conference on Automated Reasoning (IJCAR), pp.82-98, 2016. ,
DOI : 10.1007/978-3-319-40229-1_7
Verified Proofs of Higher-Order Masking, EUROCRYPT 2015, pp.457-485, 2015. ,
DOI : 10.1007/978-3-662-46800-5_18
URL : https://hal.archives-ouvertes.fr/hal-01216699
EasyCrypt: A Tutorial, Foundations of Security Analysis and Design VII -FOSAD 2012/2013 Tutorial Lectures, pp.146-166, 2013. ,
DOI : 10.1007/978-3-642-22792-9_5
URL : https://hal.archives-ouvertes.fr/hal-01114366
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme, CHES 2016, pp.23-29, 2016. ,
DOI : 10.1007/978-3-662-53140-2_2
URL : https://hal.archives-ouvertes.fr/hal-01399577
Sleuth: Automated verification of software power analysis countermeasures, CHES 2013, pp.293-310, 2013. ,
Randomness complexity of private circuits for multiplication, EUROCRYPT 2016, pp.616-648, 2016. ,
Higher-Order Threshold Implementations, ASI- ACRYPT 2014, pp.326-343, 2014. ,
DOI : 10.1007/978-3-662-45608-8_18
Algebraic Decomposition for Probing Security, CRYPTO 2015, pp.742-763, 2015. ,
DOI : 10.1007/978-3-662-47989-6_36
Towards Sound Approaches to Counteract Power-Analysis Attacks, LNCS, vol.1666, issue.99, pp.398-412, 1999. ,
DOI : 10.1007/3-540-48405-1_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.8951
Higher Order Masking of Look-Up Tables, EUROCRYPT 2014, pp.441-458, 2014. ,
DOI : 10.1007/978-3-642-55220-5_25
Conversion from arithmetic to boolean masking with logarithmic complexity, LNCS, vol.2015, issue.9054, pp.130-149, 2015. ,
Secure conversion between boolean and arithmetic masking of any order, CHES 2014, pp.188-205, 2014. ,
Higher-order side channel security and mask refreshing, LNCS, vol.2013, issue.8424, pp.410-424, 2014. ,
Faster evaluation of sboxes via common shares, CHES 2016, pp.498-514, 2016. ,
Unifying Leakage Models: From Probing Attacks to Noisy Leakage., EUROCRYPT 2014, pp.423-440, 2014. ,
DOI : 10.1007/978-3-642-55220-5_24
Making masking security proofs concrete -or how to evaluate the security of any leaking device, EUROCRYPT 2015, Part I, pp.401-429, 2015. ,
Synthesis of Masking Countermeasures against Side Channel Attacks, Proceedings of the 26th International Conference on Computer Aided Verification, pp.114-130, 2014. ,
DOI : 10.1007/978-3-319-08867-9_8
SMT-Based Verification of Software Countermeasures against Side-Channel Attacks, Proceedings of the 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.62-77, 2014. ,
DOI : 10.1007/978-3-642-54862-8_5
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases, LNCS, vol.6110, pp.135-156, 2010. ,
DOI : 10.1007/978-3-642-13190-5_7
DES and Differential Power Analysis The ???Duplication??? Method, CHES'99, pp.158-172, 1999. ,
DOI : 10.1007/3-540-48059-5_15
How fast can higher-order masking be in software? Cryptology ePrint Archive, 2016. ,
DOI : 10.1007/978-3-319-56620-7_20
Private Circuits: Securing Hardware against Probing Attacks, LNCS, vol.2729, pp.463-481, 2003. ,
DOI : 10.1007/978-3-540-45146-4_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9436
Differential power analysis, CRYPTO'99, pp.388-397, 1999. ,
Binary adders, 1996. ,
Compiler Assisted Masking, CHES 2012, pp.58-75, 2012. ,
DOI : 10.1007/978-3-642-33027-8_4
URL : http://urn.kb.se/resolve?urn=urn:nbn:se:bth-7057
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, Journal of Cryptology, vol.22, issue.11, pp.292-321, 2011. ,
DOI : 10.1007/s00145-010-9085-7
Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries, 2015 IEEE 28th Computer Security Foundations Symposium, pp.75-89, 2015. ,
DOI : 10.1109/CSF.2015.13
Masking against Side-Channel Attacks: A Formal Security Proof, EUROCRYPT 2013, pp.142-159, 2013. ,
DOI : 10.1007/978-3-642-38348-9_9
Provably Secure Higher-Order Masking of AES, CHES 2010, pp.413-427, 2010. ,
DOI : 10.1007/978-3-642-15031-9_28
Combining sets with cardinals, Journal of Automated Reasoning, vol.34, issue.1, pp.1-29, 2005. ,
Untrusted hosts and confidentiality: Secure program partitioning, Proceedings of the 18th ACM Symposium on Operating System Principles, pp.1-14, 2001. ,
DOI : 10.1109/fits.2003.1264931