On Boolean and Arithmetic Masking against Differential Power Analysis, Cryptographic Hardware and Embedded Systems ? CHES, pp.231-237, 1965. ,
DOI : 10.1007/3-540-44499-8_18
URL : http://www.gemplus.com/smart/r_d/publications/ps/CG00mask.ps
Protecting AES against side-channel analysis using wire-tap codes, Journal of Cryptographic Engineering, vol.54, issue.8, pp.129-141, 2012. ,
DOI : 10.1002/j.1538-7305.1975.tb02040.x
Orthogonal Direct Sum Masking, Information Security Theory and Practice International Workshop ? WISTP 2014, pp.40-56, 2014. ,
DOI : 10.1007/978-3-662-43826-8_4
URL : https://hal.archives-ouvertes.fr/hal-01400919
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems Advances in Cryptology ? CRYPTO '96, LNCS, vol.1109, pp.104-113, 1996. ,
Introduction to Differential Power Analysis and Related Attacks, Cryptography Research Inc, 1998. ,
DOI : 10.1007/s13389-011-0006-y
Power Analysis Attacks and Countermeasures for Cryptographic Algorithms, 2000. ,
Power Analysis Attacks of Modular Exponentiation in Smartcards, Cryptographic Hardware and Embedded Systems ? CHES '99, pp.144-157, 1999. ,
DOI : 10.1007/3-540-48059-5_14
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems ? CHES '99, pp.292-302, 1999. ,
DOI : 10.1007/3-540-48059-5_25
Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems ? CHES 2010, 2010. ,
DOI : 10.1007/978-3-642-15031-9_28
URL : https://eprint.iacr.org/2010/441.pdf
Wire-Tap Codes as Side-Channel Countermeasure -an FPGA-based experiment, Progress in Cryptology ? INDOCRYPT 2014, pp.341-359, 2014. ,
DOI : 10.1007/978-3-319-13039-2_20
Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verification, PROOFS: Security Proofs for Embedded Systems, 2015. ,
DOI : 10.1007/s13389-013-0065-3
Side-channel analysis of multiplications in GF (2 128 ) -application to AES-GCM, LNCS, vol.8874, pp.306-325, 2014. ,
Improved Side-Channel Analysis of Finite-Field Multiplication, Cryptology ePrint Archive Report, vol.2015542, 2015. ,
DOI : 10.1007/978-3-662-48324-4_20