Antoine Wurcker

According to our database1, Antoine Wurcker authored at least 14 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys.
IACR Cryptol. ePrint Arch., 2019

Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input.
IACR Cryptol. ePrint Arch., 2019

Second-order Scatter Attack.
IACR Cryptol. ePrint Arch., 2019

Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm.
IACR Cryptol. ePrint Arch., 2019

2018
Quadrivariate Improved Blind Side-Channel Analysis on Boolean Masked AES.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2017
SCATTER : A New Dimension in Side-Channel.
IACR Cryptol. ePrint Arch., 2017

2015
Etude de la sécurité d'algorithmes de cryptographie embarquée vis-à-vis des attaques par analyse de la consommation de courant. (Study of the security of embedded cryptography algorithms facing power consumption analysis attacks).
PhD thesis, 2015

Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule.
IACR Cryptol. ePrint Arch., 2015

Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks.
Cryptogr. Commun., 2015

2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014

Simple Power Analysis on AES Key Expansion Revisited.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Software Camouflage.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault Analysis.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013


  Loading...