Skip to Main content Skip to Navigation


...
hal-02953167v1  Conference papers
Sonia BelaïdPierre-Evariste DagandDarius MercadierMatthieu RivainRaphaël Wintersdorff. Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations
Eurocrypt 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.311-341, ⟨10.1007/978-3-030-45727-3_11⟩
hal-02470965v1  Conference papers
Gilles BartheSonia BelaïdGaëtan CassiersPierre-Alain FouqueBenjamin Grégoire et al.  MaskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
ESORICS 2019 The European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. pp.300-318
...
hal-02404662v1  Conference papers
Gilles BartheSonia BelaïdGaëtan CassiersPierre-Alain FouqueBenjamin Grégoire et al.  Automated Verification of Higher-Order Masking in Presence of Physical Defaults
ESORICS 2019 - 24th European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. pp.300-318, ⟨10.1007/978-3-030-29959-0_15⟩
...
hal-01900708v1  Conference papers
Gilles BartheSonia BelaïdThomas EspitauPierre-Alain FouqueBenjamin Grégoire et al.  Masking the GLP Lattice-Based Signature Scheme at Any Order
Eurocrypt 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2018, Tel Aviv, Israel. pp.354-384, ⟨10.1007/978-3-319-78375-8_12⟩
...
tel-01767298v1  Theses
Sonia Belaïd. Security of cryptosystems against power-analysis attacks
Cryptography and Security [cs.CR]. Ecole normale supérieure - ENS PARIS, 2015. English. ⟨NNT : 2015ENSU0032⟩
hal-01613773v1  Conference papers
Sonia BelaïdFabrice BenhamoudaAlain PasselègueEmmanuel ProuffAdrian Thillard et al.  Private Multiplication over Finite Fields
Advances in Cryptology - CRYPTO 2017, Aug 2017, Santa Barbara, United States. pp.397-426, ⟨10.1007/978-3-319-63697-9_14⟩
...
hal-01410216v1  Conference papers
Gilles BartheSonia BelaïdFrançois DupressoirPierre-Alain FouqueBenjamin Grégoire et al.  Strong Non-Interference and Type-Directed Higher-Order Masking
CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩
...
tel-01235207v1  Theses
Sonia Belaïd. Security of Cryptosystems Against Power-Analysis Attacks
Cryptography and Security [cs.CR]. ENS, 2015. English
hal-01132195v1  Reports
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015
...
hal-01093987v1  Conference papers
Sonia BelaïdPierre-Alain FouqueBenoit Gérard. Side-Channel Analysis of Multiplications in GF(2 128 ) Application to AES-GCM
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Palash Sarkar, Tetsu Iwata, Dec 2014, Kaoshiung, Taiwan. pp.20
hal-01093883v1  Journal articles
Sonia BelaïdVincent GrossoFrançois-Xavier Standaert. Masking and leakage-resilient primitives: One, the other(s) or both?
Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , Springer, 2014, pp.25. ⟨10.1007/s12095-014-0113-6⟩
...
hal-00872410v1  Conference papers
Sonia BelaïdLuk BettaleEmmanuelle DottaxLaurie GenelleFranck Rondepierre. Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
SECRYPT 2013 - 10th International Conference on Security and Cryptography, Jul 2013, Reykjavik, Iceland
hal-00870955v1  Conference papers
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
Cryptographic Hardware and Embedded Systems - CHES 2013, Aug 2013, Santa Barbara, United States. pp.471-488, ⟨10.1007/978-3-642-40349-1_27⟩