Consolidating masking schemes O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede CRYPTO 2015, the 35th Annual International Cryptology Conference, 764-783, 2015 | 291 | 2015 |
On the cost of lazy engineering for masked software implementations J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert Smart Card Research and Advanced Applications: 13th International Conference …, 2015 | 218 | 2015 |
Masking AES with shares in hardware T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen International Conference on Cryptographic Hardware and Embedded Systems, 194-212, 2016 | 176 | 2016 |
Dude, is my code constant time? O Reparaz, J Balasch, I Verbauwhede Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017 | 124 | 2017 |
A masked ring-LWE implementation O Reparaz, S Sinha Roy, F Vercauteren, I Verbauwhede International Workshop on Cryptographic Hardware and Embedded Systems, 683-702, 2015 | 118 | 2015 |
DPA, bitslicing and masking at 1 GHz J Balasch, B Gierlichs, O Reparaz, I Verbauwhede Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 101 | 2015 |
Additively homomorphic ring-LWE masking O Reparaz, R de Clercq, SS Roy, F Vercauteren, I Verbauwhede Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 …, 2016 | 79 | 2016 |
Constant-time discrete gaussian sampling A Karmakar, SS Roy, O Reparaz, F Vercauteren, I Verbauwhede IEEE Transactions on Computers 67 (11), 1561-1571, 2018 | 73 | 2018 |
Higher-order threshold implementation of the AES S-box T De Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova Smart Card Research and Advanced Applications: 14th International Conference …, 2016 | 73 | 2016 |
Four on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks Z Liu, P Longa, GCCF Pereira, O Reparaz, H Seo IEEE Transactions on Dependable and Secure Computing 17 (3), 536-549, 2018 | 72 | 2018 |
Compact and side channel secure discrete Gaussian sampling SS Roy, O Reparaz, F Vercauteren, I Verbauwhede Cryptology ePrint Archive, 2014 | 68* | 2014 |
Selecting time samples for multivariate DPA attacks O Reparaz, B Gierlichs, I Verbauwhede Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012 | 62 | 2012 |
CAPA: the spirit of beaver against physical attacks O Reparaz, L De Meyer, B Bilgin, V Arribas, S Nikova, V Nikov, N Smart Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 56 | 2018 |
Masking ring-LWE O Reparaz, SS Roy, R De Clercq, F Vercauteren, I Verbauwhede Journal of Cryptographic Engineering 6 (2), 139-153, 2016 | 51 | 2016 |
Multiplicative masking for AES in hardware L De Meyer, O Reparaz, B Bilgin IACR Transactions on Cryptographic Hardware and Embedded Systems, 431-468, 2018 | 49 | 2018 |
Detecting flawed masking schemes with leakage detection tests O Reparaz Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016 | 49 | 2016 |
A note on the security of higher-order threshold implementations O Reparaz Cryptology ePrint Archive, 2015 | 49 | 2015 |
Fast leakage assessment O Reparaz, B Gierlichs, I Verbauwhede Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 46 | 2017 |
Consolidating security notions in hardware masking L De Meyer, B Bilgin, O Reparaz IACR Transactions on Cryptographic Hardware and Embedded Systems, 119-147, 2019 | 25 | 2019 |
Maximizing the throughput of threshold-protected AES-GCM implementations on FPGA J Vliegen, O Reparaz, N Mentens 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 140-145, 2017 | 21 | 2017 |