Sonia Belaïd
Sonia Belaïd
CryptoExperts
Verifierad e-postadress på cryptoexperts.com - Startsida
Titel
Citeras av
Citeras av
År
Strong non-interference and type-directed higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
122*2016
Verified proofs of higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub
Annual International Conference on the Theory and Applications of …, 2015
1122015
Randomness complexity of private circuits for multiplication
S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud
Annual International Conference on the Theory and Applications of …, 2016
592016
Improved Side-Channel Analysis of Finite-Field Multiplication
S Belaïd, JS Coron, PA Fouque, B Gérard, JG Kammerer, E Prouff
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
402015
Masking and leakage-resilient primitives: One, the other (s) or both?
S Belaïd, V Grosso, FX Standaert
Cryptography and Communications 7 (1), 163-184, 2015
402015
Leakage-resilient symmetric encryption via re-keying
M Abdalla, S Belaïd, PA Fouque
International Workshop on Cryptographic Hardware and Embedded Systems, 471-488, 2013
392013
Side-Channel Analysis of Multiplications in GF(2128)
S Belaïd, PA Fouque, B Gérard
International Conference on the Theory and Application of Cryptology and …, 2014
382014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
S Belaïd, F De Santis, J Heyszl, S Mangard, M Medwed, JM Schmidt, ...
Journal of Cryptographic Engineering 4 (3), 157-171, 2014
372014
Tight private circuits: Achieving probing security with the least refreshing
S Belaïd, D Goudarzi, M Rivain
International Conference on the Theory and Application of Cryptology and …, 2018
242018
maskverif: Automated verification of higher-order masking in presence of physical defaults
G Barthe, S Belaïd, G Cassiers, PA Fouque, B Grégoire, FX Standaert
European Symposium on Research in Computer Security, 300-318, 2019
23*2019
Differential power analysis of HMAC SHA-2 in the Hamming weight model
S Belaid, L Bettale, E Dottax, L Genelle, F Rondepierre
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
232013
Private multiplication over finite fields
S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud
Annual International Cryptology Conference, 397-426, 2017
202017
Masking the GLP lattice-based signature scheme at any order
G Barthe, S Belaïd, T Espitau, PA Fouque, B Grégoire, M Rossi, ...
Annual International Conference on the Theory and Applications of …, 2018
182018
GALACTICS: Gaussian sampling for lattice-based constant-time implementation of cryptographic signatures, revisited
G Barthe, S Belaïd, T Espitau, PA Fouque, M Rossi, M Tibouchi
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
132019
Tornado: Automatic generation of probing-secure masked bitsliced implementations
S Belaïd, PÉ Dagand, D Mercadier, M Rivain, R Wintersdorff
Annual International Conference on the Theory and Applications of …, 2020
112020
Robust pseudo-random number generators with input secure against side-channel attacks
M Abdalla, S Belaïd, D Pointcheval, S Ruhault, D Vergnaud
International Conference on Applied Cryptography and Network Security, 635-654, 2015
112015
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, FX Standaert, ...
Journal of Cryptographic Engineering 10 (1), 17-26, 2020
62020
Differential power analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming weight model
S Belaïd, L Bettale, E Dottax, L Genelle, F Rondepierre
International Conference on E-Business and Telecommunications, 363-379, 2014
32014
Security of Cryptosystems Against Power-Analysis Attacks
S Belaïd
Ecole Normale Supérieure, 2015
22015
Random Probing Security: Verification, Composition, Expansion and New Constructions
S Belaïd, JS Coron, E Prouff, M Rivain, AR Taleb
Annual International Cryptology Conference, 339-368, 2020
2020
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20