Louis Goubin

According to our database1, Louis Goubin authored at least 58 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Uncompressing Dilithium's public key.
IACR Cryptol. ePrint Arch., 2024

New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes.
IACR Cryptol. ePrint Arch., 2024

2023
Rectangular Attack on VOX.
IACR Cryptol. ePrint Arch., 2023

2022
Resisting Key-Extraction and Code-Compression: a Secure Implementation of the HFE Signature Scheme in the White-Box Model.
IACR Cryptol. ePrint Arch., 2022

Useful work: a new protocol to ensure usefulness of PoW-based consensus for blockchain.
Proceedings of the GoodIT 2022: ACM International Conference on Information Technology for Social Good, Limassol, Cyprus, September 7, 2022

2020
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Improving side-channel attacks against pairing-based cryptography.
J. Cryptogr. Eng., 2020

How to reveal the secrets of an obscure white-box implementation.
J. Cryptogr. Eng., 2020

2019
Lightweight instruction-level encryption for embedded processors using stream ciphers.
Microprocess. Microsystems, 2019

2018
Blending FHE-NTRU keys - The Excalibur Property.
IACR Cryptol. ePrint Arch., 2018

Excalibur Key-Generation Protocols For DAG Hierarchic Decryption.
IACR Cryptol. ePrint Arch., 2018

On the Design of a Processor Working Over Encrypted Data.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018

2017
First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

Lightweight Software Encryption for Embedded Processors.
Proceedings of the Euromicro Conference on Digital System Design, 2017

2016
Attacking FHE-based applications by software fault injections.
IACR Cryptol. ePrint Arch., 2016

Defeating MBA-based Obfuscation.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

2015
Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults.
IACR Cryptol. ePrint Arch., 2015

Trap Me If You Can - Million Dollar Curve.
IACR Cryptol. ePrint Arch., 2015

A survey of fault attacks in pairing based cryptography.
Cryptogr. Commun., 2015

2014
Practical Validation of Several Fault Attacks against the Miller Algorithm.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

2013
Formal verification of a CRT-RSA implementation against fault attacks.
J. Cryptogr. Eng., 2013

Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design.
Proceedings of the Progress in Cryptology, 2013

2012
A Survey of Differential Fault Analysis Against Classical RSA Implementations.
Proceedings of the Fault Analysis in Cryptography, 2012

Higher-Order Masking Schemes for S-Boxes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Multivariate Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Protecting AES with Shamir's Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2011

2010
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems.
IACR Cryptol. ePrint Arch., 2010

Public Key Perturbation of Randomized RSA Implementations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Fault Analysis of Rabbit: Toward a Secret Key Leakage.
Proceedings of the Progress in Cryptology, 2009

Fault Analysis of Grain-128.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable.
Proceedings of the Topics in Cryptology, 2009

2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


SOSEMANUK: a fast software-oriented stream cipher
CoRR, 2008

Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

In(security) Against Fault Injection Attacks for CRT-RSA Implementations.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

Perturbating RSA Public Keys: An Improved Attack.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
Cryptanalysis of white box DES implementations.
IACR Cryptol. ePrint Arch., 2007

2005
An Algebraic Masking Method to Protect AES Against Power Attacks.
IACR Cryptol. ePrint Arch., 2005

2004
Two Power Analysis Attacks against One-Mask Methods.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
SFLASHv3, a fast asymmetric signature scheme.
IACR Cryptol. ePrint Arch., 2003

What do DES S-boxes Say to Each Other ?
IACR Cryptol. ePrint Arch., 2003

A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems.
Proceedings of the Public Key Cryptography, 2003

A Fast and Secure Implementation of Sflash.
Proceedings of the Public Key Cryptography, 2003

A Generic Protection against High-Order Differential Power Analysis.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2002
Solving Underdefined Systems of Multivariate Quadratic Equations.
Proceedings of the Public Key Cryptography, 2002

2001
FLASH, a Fast Multivariate Signature Algorithm.
Proceedings of the Topics in Cryptology, 2001

QUARTZ, 128-Bit Long Digital Signatures.
Proceedings of the Topics in Cryptology, 2001

A Sound Method for Switching between Boolean and Arithmetic Masking.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
On Boolean and Arithmetic Masking against Differential Power Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000

Cryptanalysis of the TTM Cryptosystem.
Proceedings of the Advances in Cryptology, 2000

1999
Unbalanced Oil and Vinegar Signature Schemes.
Proceedings of the Advances in Cryptology, 1999

DES and Differential Power Analysis (The "Duplication" Method).
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

1998
Improved Algorithms for Isomorphisms of Polynomials.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

<i>C</i><sup>*</sup><sub>-+</sub> and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai.
Proceedings of the Advances in Cryptology, 1998

1997
Asymmetric cryptography with S-Boxes.
Proceedings of the Information and Communication Security, First International Conference, 1997

Trapdoor one-way permutations and multivariate polynominals.
Proceedings of the Information and Communication Security, First International Conference, 1997


  Loading...