“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks J Jancar, M Fourné, D De Almeida Braga, M Sabt, P Schwabe, G Barthe, ... 2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022 | 68 | 2022 |
Dragonblood is still leaking: Practical cache-based side-channel in the wild D de Almeida Braga, PA Fouque, M Sabt Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 19 | 2020 |
PARASITE: Password recovery attack against SRP implementations in the wild D de Almeida Braga, PA Fouque, M Sabt Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 16 | 2021 |
Generic and Automated Drive-by GPU Cache Attacks from the Browser L Giner, R Czerny, C Gruber, F Rauscher, A Kogler, D De Almeida Braga, ... | 2 | 2024 |
From Dragondoom to Dragonstar: Side-Channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake D De Almeida Braga, N Kulatova, M Sabt, PA Fouque, K Bhargavan 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 707-723, 2023 | 2 | 2023 |
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10 D De Almeida Braga, PA Fouque, M Sabt IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3 …, 2020 | 2* | 2020 |
“These results must be false”: A usability evaluation of constant-time analysis tools M Fourné, D De Almeida Braga, J Jancar, M Sabt, P Schwabe, G Barthe, ... | 2* | |
Internship: Systematic Analysis of Side Channels in Novel ARM Microarchitectures DDA Braga, T Rokicki | | 2024 |
Cryptographie dans la nature: la sécurité des implémentations cryptographiques D De Almeida Braga Université Rennes 1, 2022 | | 2022 |