Provably secure higher-order masking of AES M Rivain, E Prouff International Workshop on Cryptographic Hardware and Embedded Systems, 413-427, 2010 | 635 | 2010 |
Breaking cryptographic implementations using deep learning techniques H Maghrebi, T Portigliatti, E Prouff Security, Privacy, and Applied Cryptography Engineering: 6th International …, 2016 | 564 | 2016 |
Deep learning for side-channel analysis and introduction to ASCAD database R Benadjila, E Prouff, R Strullu, E Cagli, C Dumas Journal of Cryptographic Engineering 10 (2), 163-188, 2020 | 481 | 2020 |
Convolutional neural networks with data augmentation against jitter-based countermeasures: Profiling attacks without pre-processing E Cagli, C Dumas, E Prouff Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 456 | 2017 |
Masking against side-channel attacks: A formal security proof E Prouff, M Rivain Annual International Conference on the Theory and Applications of …, 2013 | 421 | 2013 |
Statistical analysis of second order differential power analysis E Prouff, M Rivain, R Bevan IEEE Transactions on computers 58 (6), 799-811, 2009 | 391 | 2009 |
Privacy-preserving classification on deep neural network H Chabanne, A De Wargny, J Milgram, C Morel, E Prouff Cryptology ePrint Archive, 2017 | 387 | 2017 |
Mutual information analysis: a comprehensive study L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ... Journal of Cryptology 24 (2), 269-291, 2011 | 358 | 2011 |
Univariate side channel attacks and leakage modeling J Doget, E Prouff, M Rivain, FX Standaert Journal of Cryptographic Engineering 1, 123-144, 2011 | 237 | 2011 |
DPA attacks and S-boxes E Prouff International Workshop on Fast Software Encryption, 424-441, 2005 | 226 | 2005 |
Higher-order side channel security and mask refreshing JS Coron, E Prouff, M Rivain, T Roche International Workshop on Fast Software Encryption, 410-424, 2013 | 201 | 2013 |
Higher-order masking and shuffling for software implementations of block ciphers M Rivain, E Prouff, J Doget International Workshop on Cryptographic Hardware and Embedded Systems, 171-188, 2009 | 176 | 2009 |
Higher-order masking schemes for s-boxes C Carlet, L Goubin, E Prouff, M Quisquater, M Rivain International Workshop on Fast Software Encryption, 366-384, 2012 | 159 | 2012 |
A comprehensive study of deep learning for side-channel analysis L Masure, C Dumas, E Prouff IACR Transactions on Cryptographic Hardware and Embedded Systems, 348-375, 2020 | 146 | 2020 |
Affine masking against higher-order side channel analysis G Fumaroli, A Martinelli, E Prouff, M Rivain International Workshop on Selected Areas in Cryptography, 262-280, 2010 | 143 | 2010 |
Higher-order glitches free implementation of the AES using secure multi-party computation protocols E Prouff, T Roche International Workshop on Cryptographic Hardware and Embedded Systems, 63-78, 2011 | 140 | 2011 |
Horizontal collision correlation attack on elliptic curves: –Extended Version– A Bauer, É Jaulmes, E Prouff, JR Reinhard, J Wild Cryptography and Communications 7 (1), 91-119, 2015 | 134 | 2015 |
Side channel cryptanalysis of a higher order masking scheme JS Coron, E Prouff, M Rivain Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International …, 2007 | 133 | 2007 |
Horizontal side-channel attacks and countermeasures on the ISW masking scheme A Battistello, JS Coron, E Prouff, R Zeitoun International Conference on Cryptographic Hardware and Embedded Systems, 23-39, 2016 | 129 | 2016 |
Horizontal and vertical side-channel attacks against secure RSA implementations A Bauer, É Jaulmes, E Prouff, J Wild Cryptographers’ Track at the RSA Conference, 1-17, 2013 | 118 | 2013 |