Emmanuel Prouff
Orcid: 0000-0002-3998-0478
According to our database1,
Emmanuel Prouff
authored at least 81 papers
between 2003 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
SIAM J. Discret. Math., 2021
Monomial evaluation of polynomial functions protected by threshold implementations - with an illustration on AES -.
Cryptogr. Commun., 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
J. Cryptogr. Eng., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security Theory and Practice, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Mobile, Secure, and Programmable Networking, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures - Profiling Attacks without Pre-Processing -.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Smart Card Research and Advanced Applications, 2016
Proceedings of the New Codebreakers, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Cryptogr. Commun., 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
2014
J. Cryptogr. Eng., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
IEEE Trans. Computers, 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version.
J. Cryptogr. Eng., 2012
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
2011
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2011
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Int. J. Appl. Cryptogr., 2010
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure - Extended Version -.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IEEE Trans. Computers, 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
2008
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Finite Fields and Applications, 2003