Emmanuelle Dottax

Orcid: 0000-0001-8717-3462

According to our database1, Emmanuelle Dottax authored at least 19 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest.
IACR Cryptol. ePrint Arch., 2022

Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Post-Quantum Protocols for Banking Applications.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
White-Box ECDSA: Challenges and Existing Solutions.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021

2020
Augmented Voting Reality.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
Smart-card Deployment of an Electronic Voting Protocol.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Algebraic Side-Channel Attacks on Masked Implementations of AES.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2014
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the SECRYPT 2013, 2013

2009
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.
IACR Cryptol. ePrint Arch., 2009

2008
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2008

2006
White Box Cryptography: Another Attempt.
IACR Cryptol. ePrint Arch., 2006

Perturbing and Protecting a Traceable Block Cipher.
IACR Cryptol. ePrint Arch., 2006

HB<sup>++</sup>: a Lightweight Authentication Protocol Secure against Some Attacks.
Proceedings of the Second International Workshop on Security, 2006

2005
Generalizing Square Attack using Side-Channels of an AES Implementation on an FPGA.
Proceedings of the 2005 International Conference on Field Programmable Logic and Applications (FPL), 2005

2004
Electromagnetic Side Channels of an FPGA Implementation of AES.
IACR Cryptol. ePrint Arch., 2004

Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design.
IACR Cryptol. ePrint Arch., 2004


  Loading...