Sonia Belaïd

According to our database1, Sonia Belaïd authored at least 31 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Masking the GLP Lattice-Based Signature Scheme at Any Order.
J. Cryptol., March, 2024

Formal Definition and Verification for Combined Random Fault and Random Probing Security.
IACR Cryptol. ePrint Arch., 2024

2023
High Order Side-Channel Security for Elliptic-Curve Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Unifying Freedom and Separation for Tight Probing-Secure Composition.
IACR Cryptol. ePrint Arch., 2023

Towards Achieving Provable Side-Channel Security in Practice.
IACR Cryptol. ePrint Arch., 2023

2021
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.
IACR Cryptol. ePrint Arch., 2021

On the Power of Expansion: More Efficient Constructions in the Random Probing Model.
IACR Cryptol. ePrint Arch., 2021

High Order Countermeasures for Elliptic-Curve Implementations with Noisy Leakage Security.
IACR Cryptol. ePrint Arch., 2021

IronMask: Versatile Verification of Masking Security.
IACR Cryptol. ePrint Arch., 2021

2020
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
J. Cryptogr. Eng., 2020

Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations.
IACR Cryptol. ePrint Arch., 2020

Random Probing Security: Verification, Composition, Expansion and New Constructions.
IACR Cryptol. ePrint Arch., 2020

2019
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2019

maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
IACR Cryptol. ePrint Arch., 2018

maskVerif: a formal tool for analyzing software and hardware masked implementations.
IACR Cryptol. ePrint Arch., 2018

Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptol. ePrint Arch., 2018

2017
Private Multiplication over Finite Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Randomness Complexity of Private Circuits for Multiplication.
IACR Cryptol. ePrint Arch., 2016

Strong Non-Interference and Type-Directed Higher-Order Masking.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Security of Cryptosystems Against Power-Analysis Attacks. (Sécurité des cryptosystèmes contre les attaques par analyse de courant).
PhD thesis, 2015

Improved Side-Channel Analysis of Finite-Field Multiplication.
IACR Cryptol. ePrint Arch., 2015

Verified Proofs of Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2015

Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler.
IACR Cryptol. ePrint Arch., 2015

Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2015

Leakage-Resilient Symmetric Encryption via Re-keying.
IACR Cryptol. ePrint Arch., 2015

Masking and leakage-resilient primitives: One, the other(s) or both?
Cryptogr. Commun., 2015

2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptogr. Eng., 2014

Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
Proceedings of the SECRYPT 2013, 2013


  Loading...