Sonia Belaïd
Sonia Belaïd
CryptoExperts
Verified email at cryptoexperts.com - Homepage
Title
Cited by
Cited by
Year
Strong non-interference and type-directed higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
131*2016
Verified proofs of higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub
Annual International Conference on the Theory and Applications of …, 2015
1182015
Randomness complexity of private circuits for multiplication
S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud
Annual International Conference on the Theory and Applications of …, 2016
622016
Leakage-resilient symmetric encryption via re-keying
M Abdalla, S Belaïd, PA Fouque
International Workshop on Cryptographic Hardware and Embedded Systems, 471-488, 2013
412013
Improved Side-Channel Analysis of Finite-Field Multiplication
S Belaïd, JS Coron, PA Fouque, B Gérard, JG Kammerer, E Prouff
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
402015
Masking and leakage-resilient primitives: One, the other (s) or both?
S Belaïd, V Grosso, FX Standaert
Cryptography and Communications 7 (1), 163-184, 2015
402015
Side-Channel Analysis of Multiplications in GF(2128)
S Belaïd, PA Fouque, B Gérard
International Conference on the Theory and Application of Cryptology and …, 2014
382014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
S Belaïd, F De Santis, J Heyszl, S Mangard, M Medwed, JM Schmidt, ...
Journal of Cryptographic Engineering 4 (3), 157-171, 2014
382014
maskverif: Automated verification of higher-order masking in presence of physical defaults
G Barthe, S Belaïd, G Cassiers, PA Fouque, B Grégoire, FX Standaert
European Symposium on Research in Computer Security, 300-318, 2019
27*2019
Tight private circuits: Achieving probing security with the least refreshing
S Belaïd, D Goudarzi, M Rivain
International Conference on the Theory and Application of Cryptology and …, 2018
272018
Differential power analysis of HMAC SHA-2 in the Hamming weight model
S Belaid, L Bettale, E Dottax, L Genelle, F Rondepierre
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
242013
Private multiplication over finite fields
S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud
Annual International Cryptology Conference, 397-426, 2017
212017
Masking the GLP lattice-based signature scheme at any order
G Barthe, S Belaïd, T Espitau, PA Fouque, B Grégoire, M Rossi, ...
Annual International Conference on the Theory and Applications of …, 2018
202018
GALACTICS: Gaussian sampling for lattice-based constant-time implementation of cryptographic signatures, revisited
G Barthe, S Belaïd, T Espitau, PA Fouque, M Rossi, M Tibouchi
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
142019
Tornado: Automatic generation of probing-secure masked bitsliced implementations
S Belaïd, PÉ Dagand, D Mercadier, M Rivain, R Wintersdorff
Annual International Conference on the Theory and Applications of …, 2020
122020
Robust pseudo-random number generators with input secure against side-channel attacks
M Abdalla, S Belaïd, D Pointcheval, S Ruhault, D Vergnaud
International Conference on Applied Cryptography and Network Security, 635-654, 2015
112015
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, FX Standaert, ...
Journal of Cryptographic Engineering 10 (1), 17-26, 2020
72020
Differential power analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming weight model
S Belaïd, L Bettale, E Dottax, L Genelle, F Rondepierre
International Conference on E-Business and Telecommunications, 363-379, 2014
32014
Security of Cryptosystems Against Power-Analysis Attacks
S Belaïd
Ecole Normale Supérieure, 2015
22015
Random Probing Security: Verification, Composition, Expansion and New Constructions
S Belaïd, JS Coron, E Prouff, M Rivain, AR Taleb
Annual International Cryptology Conference, 339-368, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20