default search action
Matthieu Rivain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2009
- [b1]Matthieu Rivain:
On the physical security of cryptographic implementations. University of Luxembourg, Luxembourg City, Luxembourg, 2009
Journal Articles
- 2024
- [j15]Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko:
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 588-629 (2024) - [j14]Nicolas Bon, David Pointcheval, Matthieu Rivain:
Optimized Homomorphic Evaluation of Boolean Functions. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 302-341 (2024) - 2023
- [j13]Thibauld Feneuil, Antoine Joux, Matthieu Rivain:
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature. Des. Codes Cryptogr. 91(2): 563-608 (2023) - [j12]Sonia Belaïd, Matthieu Rivain:
High Order Side-Channel Security for Elliptic-Curve Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 238-276 (2023) - 2021
- [j11]Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud:
Probing Security through Input-Output Separation and Revisited Quasilinear Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 599-640 (2021) - 2020
- [j10]Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang:
How to reveal the secrets of an obscure white-box implementation. J. Cryptogr. Eng. 10(1): 49-66 (2020) - [j9]Louis Goubin, Matthieu Rivain, Junwei Wang:
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 454-482 (2020) - [j8]Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, Matthieu Rivain, Yu Sasaki, Siang Meng Sim:
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation. IACR Trans. Symmetric Cryptol. 2020(S1): 31-59 (2020) - 2019
- [j7]Matthieu Rivain, Junwei Wang:
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 225-255 (2019) - 2018
- [j6]Daniel Page, Matthieu Rivain:
Preface to TCHES 2018. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): I-IV (2018) - 2011
- [j5]Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert:
Univariate side channel attacks and leakage modeling. J. Cryptogr. Eng. 1(2): 123-144 (2011) - [j4]Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, Alexandre Venelli:
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic. J. Cryptogr. Eng. 1(2): 161-176 (2011) - [j3]Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert, Nicolas Veyrat-Charvillon:
Mutual Information Analysis: a Comprehensive Study. J. Cryptol. 24(2): 269-291 (2011) - 2010
- [j2]Emmanuel Prouff, Matthieu Rivain:
Theoretical and practical aspects of mutual information-based side channel analysis. Int. J. Appl. Cryptogr. 2(2): 121-138 (2010) - 2009
- [j1]Emmanuel Prouff, Matthieu Rivain, Régis Bevan:
Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans. Computers 58(6): 799-811 (2009)
Conference and Workshop Papers
- 2024
- [c43]Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain:
Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank. ASIACRYPT (2) 2024: 38-69 - [c42]Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. ASIACRYPT (7) 2024: 167-200 - [c41]Ryad Benadjila, Thibauld Feneuil, Matthieu Rivain:
MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem. EuroS&P 2024: 468-485 - 2023
- [c40]Thibauld Feneuil, Matthieu Rivain:
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head. ASIACRYPT (1) 2023: 441-473 - [c39]Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb:
Unifying Freedom and Separation for Tight Probing-Secure Composition. CRYPTO (3) 2023: 440-472 - 2022
- [c38]Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud:
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection. ASIACRYPT (2) 2022: 371-402 - [c37]Thibauld Feneuil, Antoine Joux, Matthieu Rivain:
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs. CRYPTO (2) 2022: 541-572 - [c36]Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb:
IronMask: Versatile Verification of Masking Security. SP 2022: 142-160 - 2021
- [c35]Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud:
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity. ASIACRYPT (2) 2021: 157-188 - [c34]Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb:
On the Power of Expansion: More Efficient Constructions in the Random Probing Model. EUROCRYPT (2) 2021: 313-343 - 2020
- [c33]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. CRYPTO (1) 2020: 339-368 - [c32]Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff:
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. EUROCRYPT (3) 2020: 311-341 - 2019
- [c31]Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang:
Higher-Order DCA against Standard Side-Channel Countermeasures. COSADE 2019: 118-141 - 2018
- [c30]Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain:
Tight Private Circuits: Achieving Probing Security with the Least Refreshing. ASIACRYPT (2) 2018: 343-372 - [c29]Dahmun Goudarzi, Antoine Joux, Matthieu Rivain:
How to Securely Compute with Noisy Leakage in Quasilinear Complexity. ASIACRYPT (2) 2018: 547-574 - [c28]Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, François-Xavier Standaert:
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison. COSADE 2018: 3-22 - 2017
- [c27]Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek:
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures. CHES 2017: 154-171 - [c26]Dahmun Goudarzi, Matthieu Rivain:
How Fast Can Higher-Order Masking Be in Software? EUROCRYPT (1) 2017: 567-597 - 2016
- [c25]Dahmun Goudarzi, Matthieu Rivain:
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking. CHES 2016: 457-478 - [c24]Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud:
Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication. SAC 2016: 120-139 - 2015
- [c23]Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Algebraic Decomposition for Probing Security. CRYPTO (1) 2015: 742-763 - 2014
- [c22]Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard:
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks. CHES 2014: 35-54 - [c21]Duc-Phong Le, Matthieu Rivain, Chik How Tan:
On Double Exponentiation for Securing RSA against Fault Analysis. CT-RSA 2014: 152-168 - [c20]Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
On the Practical Security of a Leakage Resilient Masking Scheme. CT-RSA 2014: 169-182 - 2013
- [c19]Matthieu Rivain, Thomas Roche:
SCARE of Secret Ciphers with SPN Structures. ASIACRYPT (1) 2013: 526-544 - [c18]Emmanuel Prouff, Matthieu Rivain:
Masking against Side-Channel Attacks: A Formal Security Proof. EUROCRYPT 2013: 142-159 - [c17]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. FSE 2013: 410-424 - [c16]Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain:
White-Box Security Notions for Symmetric Encryption Schemes. Selected Areas in Cryptography 2013: 247-264 - [c15]Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel:
Two Attacks on a White-Box AES Implementation. Selected Areas in Cryptography 2013: 265-285 - 2012
- [c14]Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala:
Conversion of Security Proofs from One Leakage Model to Another: A New Issue. COSADE 2012: 69-81 - [c13]Claude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater, Matthieu Rivain:
Higher-Order Masking Schemes for S-Boxes. FSE 2012: 366-384 - 2010
- [c12]Matthieu Rivain, Emmanuel Prouff:
Provably Secure Higher-Order Masking of AES. CHES 2010: 413-427 - [c11]Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain:
Affine Masking against Higher-Order Side Channel Analysis. Selected Areas in Cryptography 2010: 262-280 - 2009
- [c10]Emmanuel Prouff, Matthieu Rivain:
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. ACNS 2009: 499-518 - [c9]Matthieu Rivain, Emmanuel Prouff, Julien Doget:
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. CHES 2009: 171-188 - [c8]Matthieu Rivain:
Differential Fault Analysis on DES Middle Rounds. CHES 2009: 457-469 - [c7]Matthieu Rivain:
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. CT-RSA 2009: 459-480 - [c6]Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra:
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. WISTP 2009: 68-83 - 2008
- [c5]Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain:
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. CHES 2008: 1-14 - [c4]Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff:
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. FSE 2008: 127-143 - [c3]Matthieu Rivain:
On the Exact Success Rate of Side Channel Analysis in the Gaussian Model. Selected Areas in Cryptography 2008: 165-183 - 2007
- [c2]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain:
Side Channel Cryptanalysis of a Higher Order Masking Scheme. CHES 2007: 28-44 - [c1]Emmanuel Prouff, Matthieu Rivain:
A Generic Method for Secure SBox Implementation. WISA 2007: 227-244
Parts in Books or Collections
- 2012
- [p1]Matthieu Rivain:
Differential Fault Analysis of DES. Fault Analysis in Cryptography 2012: 37-54
Informal and Other Publications
- 2024
- [i48]Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko:
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. IACR Cryptol. ePrint Arch. 2024: 77 (2024) - [i47]Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain:
Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank. IACR Cryptol. ePrint Arch. 2024: 541 (2024) - [i46]Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. IACR Cryptol. ePrint Arch. 2024: 757 (2024) - 2023
- [i45]Nicolas Aragon, Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain:
MIRA: a Digital Signature Scheme based on the MinRank problem and the MPC-in-the-Head paradigm. CoRR abs/2307.08575 (2023) - [i44]Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Antoine Joux, Matthieu Rivain, Adrien Vinçotte:
RYDE: A Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm. CoRR abs/2307.08726 (2023) - [i43]Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb:
Unifying Freedom and Separation for Tight Probing-Secure Composition. IACR Cryptol. ePrint Arch. 2023: 835 (2023) - [i42]Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, Abdul Rahman Taleb:
Towards Achieving Provable Side-Channel Security in Practice. IACR Cryptol. ePrint Arch. 2023: 1198 (2023) - [i41]Thibauld Feneuil, Matthieu Rivain:
Threshold Computation in the Head: Improved Framework for Post-Quantum Signatures and Zero-Knowledge Arguments. IACR Cryptol. ePrint Arch. 2023: 1573 (2023) - [i40]Nicolas Bon, David Pointcheval, Matthieu Rivain:
Optimized Homomorphic Evaluation of Boolean Functions. IACR Cryptol. ePrint Arch. 2023: 1589 (2023) - [i39]Ryad Benadjila, Thibauld Feneuil, Matthieu Rivain:
MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem. IACR Cryptol. ePrint Arch. 2023: 1719 (2023) - 2022
- [i38]Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud:
Probing Security through Input-Output Separation and Revisited Quasilinear Masking. IACR Cryptol. ePrint Arch. 2022: 45 (2022) - [i37]Thibauld Feneuil, Antoine Joux, Matthieu Rivain:
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2022: 188 (2022) - [i36]Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud:
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection. IACR Cryptol. ePrint Arch. 2022: 223 (2022) - [i35]Thibauld Feneuil, Matthieu Rivain:
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head. IACR Cryptol. ePrint Arch. 2022: 1407 (2022) - 2021
- [i34]Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb:
On the Power of Expansion: More Efficient Constructions in the Random Probing Model. IACR Cryptol. ePrint Arch. 2021: 434 (2021) - [i33]Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud:
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity. IACR Cryptol. ePrint Arch. 2021: 1455 (2021) - [i32]Thibauld Feneuil, Antoine Joux, Matthieu Rivain:
Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature. IACR Cryptol. ePrint Arch. 2021: 1576 (2021) - [i31]Sonia Belaïd, Matthieu Rivain:
High Order Countermeasures for Elliptic-Curve Implementations with Noisy Leakage Security. IACR Cryptol. ePrint Arch. 2021: 1580 (2021) - [i30]Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb:
IronMask: Versatile Verification of Masking Security. IACR Cryptol. ePrint Arch. 2021: 1671 (2021) - 2020
- [i29]Louis Goubin, Matthieu Rivain, Junwei Wang:
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks. IACR Cryptol. ePrint Arch. 2020: 413 (2020) - [i28]Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff:
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. IACR Cryptol. ePrint Arch. 2020: 506 (2020) - [i27]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. IACR Cryptol. ePrint Arch. 2020: 786 (2020) - 2019
- [i26]Matthieu Rivain, Junwei Wang:
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations. IACR Cryptol. ePrint Arch. 2019: 76 (2019) - 2018
- [i25]Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang:
How to Reveal the Secrets of an Obscure White-Box Implementation. IACR Cryptol. ePrint Arch. 2018: 98 (2018) - [i24]Dahmun Goudarzi, Anthony Journault, Matthieu Rivain, François-Xavier Standaert:
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison. IACR Cryptol. ePrint Arch. 2018: 315 (2018) - [i23]Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain:
Tight Private Circuits: Achieving Probing Security with the Least Refreshing. IACR Cryptol. ePrint Arch. 2018: 439 (2018) - [i22]Andrey Bogdanov, Matthieu Rivain, Philip S. Vejre, Junwei Wang:
Higher-Order DCA against Standard Side-Channel Countermeasures. IACR Cryptol. ePrint Arch. 2018: 869 (2018) - 2017
- [i21]Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek:
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures. IACR Cryptol. ePrint Arch. 2017: 632 (2017) - [i20]Dahmun Goudarzi, Antoine Joux, Matthieu Rivain:
How to Securely Compute with Noisy Leakage in Quasilinear Complexity. IACR Cryptol. ePrint Arch. 2017: 929 (2017) - 2016
- [i19]Dahmun Goudarzi, Matthieu Rivain:
How Fast Can Higher-Order Masking Be in Software? IACR Cryptol. ePrint Arch. 2016: 264 (2016) - [i18]Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Algebraic Decomposition for Probing Security. IACR Cryptol. ePrint Arch. 2016: 321 (2016) - [i17]Dahmun Goudarzi, Matthieu Rivain:
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking. IACR Cryptol. ePrint Arch. 2016: 557 (2016) - 2015
- [i16]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. IACR Cryptol. ePrint Arch. 2015: 359 (2015) - [i15]Thomas Baignères, Cécile Delerablée, Matthieu Finiasz, Louis Goubin, Tancrède Lepoint, Matthieu Rivain:
Trap Me If You Can - Million Dollar Curve. IACR Cryptol. ePrint Arch. 2015: 1249 (2015) - 2014
- [i14]Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard:
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 673 (2014) - 2013
- [i13]Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
On the Practical Security of a Leakage Resilient Masking Scheme. IACR Cryptol. ePrint Arch. 2013: 396 (2013) - [i12]Tancrède Lepoint, Matthieu Rivain:
Another Nail in the Coffin of White-Box AES Implementations. IACR Cryptol. ePrint Arch. 2013: 455 (2013) - [i11]Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain:
White-Box Security Notions for Symmetric Encryption Schemes. IACR Cryptol. ePrint Arch. 2013: 523 (2013) - [i10]Matthieu Rivain, Thomas Roche:
SCARE of Secret Ciphers with SPN Structures. IACR Cryptol. ePrint Arch. 2013: 636 (2013) - 2011
- [i9]Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert:
Univariate Side Channel Attacks and Leakage Modeling. IACR Cryptol. ePrint Arch. 2011: 302 (2011) - [i8]Matthieu Rivain:
Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves. IACR Cryptol. ePrint Arch. 2011: 338 (2011) - 2010
- [i7]Matthieu Rivain, Emmanuel Prouff:
Provably Secure Higher-Order Masking of AES. IACR Cryptol. ePrint Arch. 2010: 441 (2010) - [i6]Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain:
Affine Masking against Higher-Order Side Channel Analysis. IACR Cryptol. ePrint Arch. 2010: 523 (2010) - [i5]Emmanuel Prouff, Matthieu Rivain, Régis Bevan:
Statistical Analysis of Second Order Differential Power Analysis. IACR Cryptol. ePrint Arch. 2010: 646 (2010) - 2009
- [i4]Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra:
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. IACR Cryptol. ePrint Arch. 2009: 24 (2009) - [i3]Matthieu Rivain:
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. IACR Cryptol. ePrint Arch. 2009: 165 (2009) - [i2]Matthieu Rivain, Emmanuel Prouff, Julien Doget:
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers. IACR Cryptol. ePrint Arch. 2009: 420 (2009) - 2008
- [i1]Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff:
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. IACR Cryptol. ePrint Arch. 2008: 21 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint