Suivre
Olivier Bronchain
Titre
Citée par
Citée par
Année
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
852020
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
IACR Transactions on Symmetric Cryptology 2020 (S1), 295--349, 2020
812020
Leakage certification revisited: Bounding model errors in side-channel security evaluations
O Bronchain, JM Hendrickx, C Massart, A Olshevsky, FX Standaert
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
722019
Side-channel countermeasures’ dissection and the limits of closed source security evaluations
O Bronchain, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-25, 2020
522020
Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs
O Bronchain, G Cassiers
IACR Transactions on Cryptographic Hardware and Embedded Systems, 553-588, 2022
472022
Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter
O Bronchain, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 202-234, 2021
472021
Modeling soft analytical side-channel attacks from a coding theory viewpoint
Q Guo, V Grosso, FX Standaert, O Bronchain
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020
332020
Protecting dilithium against leakage: Revisited sensitivity analysis and improved implementations
M Azouaoui, O Bronchain, G Cassiers, C Hoffmann, Y Kuzovkova, ...
Cryptology ePrint Archive, 2022
312022
Systematic study of decryption and re-encryption leakage: the case of kyber
M Azouaoui, O Bronchain, C Hoffmann, Y Kuzovkova, T Schneider, ...
International Workshop on Constructive Side-Channel Analysis and Secure …, 2022
252022
Multi-tuple leakage detection and the dependent signal issue
O Bronchain, T Schneider, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 318-345, 2019
242019
Improved leakage-resistant authenticated encryption based on hardware AES coprocessors
O Bronchain, C Momin, T Peters, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 641-676, 2021
192021
Give me 5 minutes: Attacking ASCAD with a single side-channel trace
O Bronchain, G Cassiers, FX Standaert
Cryptology ePrint Archive, 2021
182021
Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
M Azouaoui, O Bronchain, G Cassiers, C Hoffmann, Y Kuzovkova, ...
IACR Cryptol. ePrint Arch. 2022, 1406, 2022
162022
Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
B Udvarhelyi, O Bronchain, FX Standaert
Constructive Side-Channel Analysis and Secure Design: 12th International …, 2021
152021
Bitslice masking and improved shuffling: How and when to mix them in software?
M Azouaoui, O Bronchain, V Grosso, K Papagiannopoulos, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022
142022
Efficient profiled side-channel analysis of masked implementations, extended
O Bronchain, F Durvaux, L Masure, FX Standaert
IEEE Transactions on Information Forensics and Security 17, 574-584, 2022
132022
Spook: sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher (2019)
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
9
Scalib: a side-channel analysis library
G Cassiers, O Bronchain
Journal of Open Source Software 8 (86), 5196, 2023
82023
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium
M ElGhamrawy, M Azouaoui, O Bronchain, J Renes, T Schneider, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (4 …, 2023
72023
How to fool a black box machine learning based side-channel security evaluation
CH Bertrand Van Ouytsel, O Bronchain, G Cassiers, FX Standaert
Cryptography and Communications 13 (4), 573-585, 2021
7*2021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20