Consolidating masking schemes O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
CRYPTO 2015, the 35th Annual International Cryptology Conference, 764-783, 2015
281 2015 On the cost of lazy engineering for masked software implementations J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
211 2015 Masking AES with shares in hardware T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen
International Conference on Cryptographic Hardware and Embedded Systems, 194-212, 2016
174 2016 Dude, is my code constant time? O Reparaz, J Balasch, I Verbauwhede
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017
124 2017 A masked ring-LWE implementation O Reparaz, S Sinha Roy, F Vercauteren, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 683-702, 2015
116 2015 DPA, bitslicing and masking at 1 GHz J Balasch, B Gierlichs, O Reparaz, I Verbauwhede
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
102 2015 Additively homomorphic ring-LWE masking O Reparaz, R de Clercq, SS Roy, F Vercauteren, I Verbauwhede
Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 …, 2016
79 2016 Constant-time discrete gaussian sampling A Karmakar, SS Roy, O Reparaz, F Vercauteren, I Verbauwhede
IEEE Transactions on Computers 67 (11), 1561-1571, 2018
77 2018 Higher-order threshold implementation of the AES S-box T De Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
71 2016 Compact and side channel secure discrete Gaussian sampling SS Roy, O Reparaz, F Vercauteren, I Verbauwhede
Cryptology ePrint Archive, 2014
69 * 2014 Selecting time samples for multivariate DPA attacks O Reparaz, B Gierlichs, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
62 2012 CAPA: the spirit of beaver against physical attacks O Reparaz, L De Meyer, B Bilgin, V Arribas, S Nikova, V Nikov, N Smart
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
51 2018 A note on the security of higher-order threshold implementations O Reparaz
Cryptology ePrint Archive, 2015
51 2015 Detecting flawed masking schemes with leakage detection tests O Reparaz
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
50 2016 Masking ring-LWE O Reparaz, SS Roy, R De Clercq, F Vercauteren, I Verbauwhede
Journal of Cryptographic Engineering 6 (2), 139-153, 2016
49 2016 Four on embedded devices with strong countermeasures against side-channel attacks Z Liu, P Longa, GCCF Pereira, O Reparaz, H Seo
International Conference on Cryptographic Hardware and Embedded Systems, 665-686, 2017
48 2017 Multiplicative masking for AES in hardware L De Meyer, O Reparaz, B Bilgin
IACR Transactions on Cryptographic Hardware and Embedded Systems, 431-468, 2018
45 2018 Fast leakage assessment O Reparaz, B Gierlichs, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
41 2017 Four on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks Z Liu, P Longa, GCCF Pereira, O Reparaz, H Seo
IEEE Transactions on Dependable and Secure Computing 17 (3), 536-549, 2018
26 2018 Consolidating security notions in hardware masking L De Meyer, B Bilgin, O Reparaz
IACR Transactions on Cryptographic Hardware and Embedded Systems, 119-147, 2019
25 2019