How fast can higher-order masking be in software? D Goudarzi, M Rivain Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 144 | 2017 |
Tight private circuits: Achieving probing security with the least refreshing S Belaïd, D Goudarzi, M Rivain International Conference on the Theory and Application of Cryptology and …, 2018 | 74 | 2018 |
Unifying leakage models on a Rényi day T Prest, D Goudarzi, A Martinelli, A Passelègue Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 39 | 2019 |
Pyjamask: Block cipher and authenticated encryption with highly efficient masked implementation D Goudarzi, J Jean, S Kölbl, T Peyrin, M Rivain, Y Sasaki, SM Sim IACR Transactions on Symmetric Cryptology, 31-59, 2020 | 33 | 2020 |
Secure multiplication for bitslice higher-order masking: Optimisation and comparison D Goudarzi, A Journault, M Rivain, FX Standaert Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018 | 28 | 2018 |
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking D Goudarzi, M Rivain Cryptographic Hardware and Embedded Systems – CHES 2016, 2016 | 23 | 2016 |
How to securely compute with noisy leakage in quasilinear complexity D Goudarzi, A Joux, M Rivain International Conference on the Theory and Application of Cryptology and …, 2018 | 21 | 2018 |
Probing security through input-output separation and revisited quasilinear masking D Goudarzi, T Prest, M Rivain, D Vergnaud IACR Transactions on Cryptographic Hardware and Embedded Systems, 599-640, 2021 | 20 | 2021 |
Sharp: Short relaxed range proofs G Couteau, D Goudarzi, M Klooß, M Reichle Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 17 | 2022 |
Pyjamask v1. 0 D Goudarzi, J Jean, S Kölbl, T Peyrin, M Rivain, Y Sasaki, SM Sim Submission to the NIST Lightweight Cryptography Standardization Effort, 2019 | 15* | 2019 |
Lattice attacks against elliptic-curve signatures with blinded scalar multiplication D Goudarzi, M Rivain, D Vergnaud Selected Areas in Cryptography–SAC 2016: 23rd International Conference, St …, 2017 | 15 | 2017 |
Generalized polynomial decomposition for s-boxes with application to side-channel countermeasures D Goudarzi, M Rivain, D Vergnaud, S Vivek International Conference on Cryptographic Hardware and Embedded Systems, 154-171, 2017 | 9 | 2017 |
Unifying Leakage Models on a Rényi Day. D Goudarzi, A Martinelli, A Passelègue, T Prest IACR Cryptol. ePrint Arch. 2019, 138, 2019 | 5 | 2019 |
Short Signatures from Regular Syndrome Decoding, Revisited D Bui, E Carozza, G Couteau, D Goudarzi, A Joux Cryptology ePrint Archive, 2024 | 1 | 2024 |
Secure implementation of block ciphers against physical attacks D Goudarzi Université Paris sciences et lettres, 2018 | | 2018 |