default search action
BibTeX records: Louis Goubin
@article{DBLP:journals/iacr/CogliatiFGM24, author = {Beno{\^{\i}}t Cogliati and Pierre{-}Alain Fouque and Louis Goubin and Brice Minaud}, title = {New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2024}, url = {https://eprint.iacr.org/2024/609}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiFGM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MacarioRatPCFFGLM23, author = {Gilles Macario{-}Rat and Jacques Patarin and Benoit Cogliati and Jean{-}Charles Faug{\`{e}}re and Pierre{-}Alain Fouque and Louis Goubin and Robin Larrieu and Brice Minaud}, title = {Rectangular Attack on {VOX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1822}, year = {2023}, url = {https://eprint.iacr.org/2023/1822}, timestamp = {Mon, 11 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MacarioRatPCFFGLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/goodit/ToulemondeBGP22, author = {Ambre Toulemonde and Lo{\"{\i}}c Besson and Louis Goubin and Jacques Patarin}, title = {Useful work: a new protocol to ensure usefulness of PoW-based consensus for blockchain}, booktitle = {GoodIT 2022: {ACM} International Conference on Information Technology for Social Good, Limassol, Cyprus, September 7 - 9, 2022}, pages = {308--314}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524458.3547248}, doi = {10.1145/3524458.3547248}, timestamp = {Thu, 25 Aug 2022 14:29:30 +0200}, biburl = {https://dblp.org/rec/conf/goodit/ToulemondeBGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalissantG22, author = {Pierre Galissant and Louis Goubin}, title = {Resisting Key-Extraction and Code-Compression: a Secure Implementation of the {HFE} Signature Scheme in the White-Box Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2022}, url = {https://eprint.iacr.org/2022/138}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalissantG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JauvartMFG20, author = {Damien Jauvart and Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin}, title = {Improving side-channel attacks against pairing-based cryptography}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.1007/s13389-018-00201-3}, doi = {10.1007/S13389-018-00201-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JauvartMFG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GoubinPRW20, author = {Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang}, title = {How to reveal the secrets of an obscure white-box implementation}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {49--66}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00207-5}, doi = {10.1007/S13389-019-00207-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GoubinPRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GoubinRW20, author = {Louis Goubin and Matthieu Rivain and Junwei Wang}, title = {Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {454--482}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.454-482}, doi = {10.13154/TCHES.V2020.I3.454-482}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GoubinRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinRW20, author = {Louis Goubin and Matthieu Rivain and Junwei Wang}, title = {Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2020}, url = {https://eprint.iacr.org/2020/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/HiscockSG19, author = {Thomas Hiscock and Olivier Savry and Louis Goubin}, title = {Lightweight instruction-level encryption for embedded processors using stream ciphers}, journal = {Microprocess. Microsystems}, volume = {64}, pages = {43--52}, year = {2019}, url = {https://doi.org/10.1016/j.micpro.2018.10.001}, doi = {10.1016/J.MICPRO.2018.10.001}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/HiscockSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/HiscockSG18, author = {Thomas Hiscock and Olivier Savry and Louis Goubin}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {On the Design of a Processor Working Over Encrypted Data}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {577--580}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00101}, doi = {10.1109/DSD.2018.00101}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/HiscockSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GoubinMRP18, author = {Louis Goubin and Geraldine Monsalve and Juan L. Reutter and Francisco Jos{\'{e}} Vial Prado}, editor = {Kwangsu Lee}, title = {Excalibur Key-Generation Protocols for {DAG} Hierarchic Decryption}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {103--120}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_7}, doi = {10.1007/978-3-030-12146-4\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GoubinMRP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinPRW18, author = {Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang}, title = {How to Reveal the Secrets of an Obscure White-Box Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2018}, url = {http://eprint.iacr.org/2018/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinPRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinP18, author = {Louis Goubin and Francisco Jos{\'{e}} Vial Prado}, title = {Blending {FHE-NTRU} keys - The Excalibur Property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2018}, url = {https://eprint.iacr.org/2018/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinMRP18, author = {Louis Goubin and Geraldine Monsalve and Juan L. Reutter and Francisco Jos{\'{e}} Vial Prado}, title = {Excalibur Key-Generation Protocols For {DAG} Hierarchic Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2018}, url = {https://eprint.iacr.org/2018/1177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinMRP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/HiscockSG17, author = {Thomas Hiscock and Olivier Savry and Louis Goubin}, editor = {Hana Kub{\'{a}}tov{\'{a}} and Martin Novotn{\'{y}} and Amund Skavhaug}, title = {Lightweight Software Encryption for Embedded Processors}, booktitle = {Euromicro Conference on Digital System Design, {DSD} 2017, Vienna, Austria, August 30 - Sept. 1, 2017}, pages = {213--220}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSD.2017.25}, doi = {10.1109/DSD.2017.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/HiscockSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/JauvartMFG17, author = {Damien Jauvart and Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin}, editor = {Mohammad S. Obaidat and Enrique Cabello}, title = {Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel Attack}, booktitle = {E-Business and Telecommunications - 14th International Joint Conference, {ICETE} 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper}, series = {Communications in Computer and Information Science}, volume = {990}, pages = {150--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-11039-0\_8}, doi = {10.1007/978-3-030-11039-0\_8}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/JauvartMFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JauvartFG17, author = {Damien Jauvart and Jacques J. A. Fournier and Louis Goubin}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {104--115}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006425501040115}, doi = {10.5220/0006425501040115}, timestamp = {Thu, 17 Aug 2017 18:31:18 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JauvartFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EyrollesGV16, author = {Ninon Eyrolles and Louis Goubin and Marion Videau}, editor = {Brecht Wyseur and Bjorn De Sutter}, title = {Defeating MBA-based Obfuscation}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS 2016, Vienna, Austria, October 24-28, 2016}, pages = {27--38}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995306.2995308}, doi = {10.1145/2995306.2995308}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EyrollesGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/JauvartFMG16, author = {Damien Jauvart and Jacques J. A. Fournier and Nadia El Mrabet and Louis Goubin}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Jean{-}Louis Lanet and Axel Legay}, title = {Improving Side-Channel Attacks Against Pairing-Based Cryptography}, booktitle = {Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10158}, pages = {199--213}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54876-0\_16}, doi = {10.1007/978-3-319-54876-0\_16}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/crisis/JauvartFMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GoubinP16, author = {Louis Goubin and Francisco Jos{\'{e}} Vial Prado}, editor = {Orr Dunkelman and Somitra Kumar Sanadhya}, title = {Blending {FHE-NTRU} Keys - The Excalibur Property}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10095}, pages = {3--24}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49890-4\_1}, doi = {10.1007/978-3-319-49890-4\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GoubinP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiGG16, author = {Ilaria Chillotti and Nicolas Gama and Louis Goubin}, title = {Attacking FHE-based applications by software fault injections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1164}, year = {2016}, url = {http://eprint.iacr.org/2016/1164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MrabetFGL15, author = {Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin and Ronan Lashermes}, title = {A survey of fault attacks in pairing based cryptography}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {185--205}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0114-5}, doi = {10.1007/S12095-014-0114-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MrabetFGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LashermesFG15, author = {Ronan Lashermes and Jacques J. A. Fournier and Louis Goubin}, title = {Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2015}, url = {http://eprint.iacr.org/2015/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LashermesFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaigneresDFGLR15, author = {Thomas Baign{\`{e}}res and C{\'{e}}cile Delerabl{\'{e}}e and Matthieu Finiasz and Louis Goubin and Tancr{\`{e}}de Lepoint and Matthieu Rivain}, title = {Trap Me If You Can - Million Dollar Curve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1249}, year = {2015}, url = {http://eprint.iacr.org/2015/1249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaigneresDFGLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/LashermesPMFG14, author = {Ronan Lashermes and Marie Paindavoine and Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin}, editor = {Assia Tria and Dooho Choi}, title = {Practical Validation of Several Fault Attacks against the Miller Algorithm}, booktitle = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2014, Busan, South Korea, September 23, 2014}, pages = {115--122}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FDTC.2014.21}, doi = {10.1109/FDTC.2014.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/LashermesPMFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MrabetFGL14, author = {Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin and Ronan Lashermes}, title = {A survey of Fault Attacks in Pairing Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {742}, year = {2014}, url = {http://eprint.iacr.org/2014/742}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MrabetFGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChristofiCGV13, author = {Maria Christofi and Boutheina Chetali and Louis Goubin and David Vigilant}, title = {Formal verification of a {CRT-RSA} implementation against fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {3}, pages = {157--167}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0049-3}, doi = {10.1007/S13389-013-0049-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChristofiCGV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GoubinMW13, author = {Louis Goubin and Ange Martinelli and Matthieu Walle}, editor = {Amr M. Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien}, title = {Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7918}, pages = {240--259}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38553-7\_14}, doi = {10.1007/978-3-642-38553-7\_14}, timestamp = {Fri, 31 Jan 2020 16:14:16 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/GoubinMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LashermesFG13, author = {Ronan Lashermes and Jacques J. A. Fournier and Louis Goubin}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {365--382}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_21}, doi = {10.1007/978-3-642-40349-1\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/LashermesFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BerzatiCG12, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {David Naccache}, title = {Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {233--247}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_16}, doi = {10.1007/978-3-642-28368-0\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BerzatiCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CarletGPQR12, author = {Claude Carlet and Louis Goubin and Emmanuel Prouff and Micha{\"{e}}l Quisquater and Matthieu Rivain}, editor = {Anne Canteaut}, title = {Higher-Order Masking Schemes for S-Boxes}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {366--384}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_21}, doi = {10.1007/978-3-642-34047-5\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CarletGPQR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BerzatiCG12, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {Marc Joye and Michael Tunstall}, title = {A Survey of Differential Fault Analysis Against Classical {RSA} Implementations}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {111--124}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_7}, doi = {10.1007/978-3-642-29656-7\_7}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/BerzatiCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoubinM11, author = {Louis Goubin and Ange Martinelli}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Protecting {AES} with Shamir's Secret Sharing Scheme}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {79--94}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_6}, doi = {10.1007/978-3-642-23951-9\_6}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/GoubinM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/GoubinPY11, author = {Louis Goubin and Jacques Patarin and Bo{-}Yin Yang}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Multivariate Cryptography}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {824--828}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_421}, doi = {10.1007/978-1-4419-5906-5\_421}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/GoubinPY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinM11, author = {Louis Goubin and Ange Martinelli}, title = {Protecting {AES} with Shamir's Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {516}, year = {2011}, url = {http://eprint.iacr.org/2011/516}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BerzatiCG10, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Public Key Perturbation of Randomized {RSA} Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {306--319}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_21}, doi = {10.1007/978-3-642-15031-9\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BerzatiCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BerzatiCG10, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, title = {Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2010}, url = {http://eprint.iacr.org/2010/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BerzatiCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BerzatiCDG09, author = {Alexandre Berzati and C{\'{e}}cile Canovas and Jean{-}Guillaume Dumas and Louis Goubin}, editor = {Marc Fischlin}, title = {Fault Attacks on {RSA} Public Keys: Left-To-Right Implementations Are Also Vulnerable}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {414--428}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_28}, doi = {10.1007/978-3-642-00862-7\_28}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BerzatiCDG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CastagnosBCDGGPS09, author = {Guilhem Castagnos and Alexandre Berzati and C{\'{e}}cile Canovas and Blandine Debraize and Louis Goubin and Aline Gouget and Pascal Paillier and Stephanie Salgado}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Fault Analysis of Grain-128}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings}, pages = {7--14}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HST.2009.5225030}, doi = {10.1109/HST.2009.5225030}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CastagnosBCDGGPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BerzatiCG09, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Fault Analysis of Rabbit: Toward a Secret Key Leakage}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {72--87}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_5}, doi = {10.1007/978-3-642-10628-6\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BerzatiCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0901-0911, author = {Alexandre Berzati and C{\'{e}}cile Canovas and Jean{-}Guillaume Dumas and Louis Goubin}, title = {Fault Attacks on {RSA} Public Keys: Left-To-Right Implementations are also Vulnerable}, journal = {CoRR}, volume = {abs/0901.0911}, year = {2009}, url = {http://arxiv.org/abs/0901.0911}, eprinttype = {arXiv}, eprint = {0901.0911}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0901-0911.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BerzatiCG08, author = {Alexandre Berzati and C{\'{e}}cile Canovas and Louis Goubin}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Perturbating {RSA} Public Keys: An Improved Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {380--395}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_24}, doi = {10.1007/978-3-540-85053-3\_24}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/BerzatiCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/BerzatiCG08, author = {Alexandre Berzati and C{\'{e}}cile Canovas and Louis Goubin}, editor = {Luca Breveglieri and Shay Gueron and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {In(security) Against Fault Injection Attacks for {CRT-RSA} Implementations}, booktitle = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008}, pages = {101--107}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FDTC.2008.9}, doi = {10.1109/FDTC.2008.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BerzatiCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DebraizeG08, author = {Blandine Debraize and Louis Goubin}, editor = {Kaisa Nyberg}, title = {Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {235--252}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_15}, doi = {10.1007/978-3-540-71039-4\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DebraizeG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BerbainBCCGGGGLMPS08, author = {C{\^{o}}me Berbain and Olivier Billet and Anne Canteaut and Nicolas T. Courtois and Henri Gilbert and Louis Goubin and Aline Gouget and Louis Granboulan and C{\'{e}}dric Lauradoux and Marine Minier and Thomas Pornin and Herv{\'{e}} Sibert}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {Sosemanuk, a Fast Software-Oriented Stream Cipher}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {98--118}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_9}, doi = {10.1007/978-3-540-68351-3\_9}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/BerbainBCCGGGGLMPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BerbainBCCDGGGGLMPS08, author = {C{\^{o}}me Berbain and Olivier Billet and Anne Canteaut and Nicolas T. Courtois and Blandine Debraize and Henri Gilbert and Louis Goubin and Aline Gouget and Louis Granboulan and C{\'{e}}dric Lauradoux and Marine Minier and Thomas Pornin and Herv{\'{e}} Sibert}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {Decimv2}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {140--151}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_11}, doi = {10.1007/978-3-540-68351-3\_11}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/BerbainBCCDGGGGLMPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0810-1858, author = {C{\^{o}}me Berbain and Olivier Billet and Anne Canteaut and Nicolas T. Courtois and Henri Gilbert and Louis Goubin and Aline Gouget and Louis Granboulan and C{\'{e}}dric Lauradoux and Marine Minier and Thomas Pornin and Herv{\'{e}} Sibert}, title = {{SOSEMANUK:} a fast software-oriented stream cipher}, journal = {CoRR}, volume = {abs/0810.1858}, year = {2008}, url = {http://arxiv.org/abs/0810.1858}, eprinttype = {arXiv}, eprint = {0810.1858}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0810-1858.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GoubinMQ07, author = {Louis Goubin and Jean{-}Michel Masereel and Micha{\"{e}}l Quisquater}, editor = {Carlisle M. Adams and Ali Miri and Michael J. Wiener}, title = {Cryptanalysis of White Box {DES} Implementations}, booktitle = {Selected Areas in Cryptography, 14th International Workshop, {SAC} 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4876}, pages = {278--295}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77360-3\_18}, doi = {10.1007/978-3-540-77360-3\_18}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GoubinMQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinMQ07, author = {Louis Goubin and Jean{-}Michel Masereel and Micha{\"{e}}l Quisquater}, title = {Cryptanalysis of white box {DES} implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2007}, url = {http://eprint.iacr.org/2007/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinMQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2006, editor = {Louis Goubin and Mitsuru Matsui}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063}, doi = {10.1007/11894063}, isbn = {3-540-46559-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CourtoisG05, author = {Nicolas T. Courtois and Louis Goubin}, editor = {Dongho Won and Seungjoo Kim}, title = {An Algebraic Masking Method to Protect {AES} Against Power Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {199--209}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_18}, doi = {10.1007/11734727\_18}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/CourtoisG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisG05, author = {Nicolas T. Courtois and Louis Goubin}, title = {An Algebraic Masking Method to Protect {AES} Against Power Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2005}, url = {http://eprint.iacr.org/2005/204}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AkkarBG04, author = {Mehdi{-}Laurent Akkar and R{\'{e}}gis Bevan and Louis Goubin}, editor = {Bimal K. Roy and Willi Meier}, title = {Two Power Analysis Attacks against One-Mask Methods}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {332--347}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_21}, doi = {10.1007/978-3-540-25937-4\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AkkarBG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AkkarG03, author = {Mehdi{-}Laurent Akkar and Louis Goubin}, editor = {Thomas Johansson}, title = {A Generic Protection against High-Order Differential Power Analysis}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {192--205}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_15}, doi = {10.1007/978-3-540-39887-5\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AkkarG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Goubin03, author = {Louis Goubin}, editor = {Yvo Desmedt}, title = {A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {199--210}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_15}, doi = {10.1007/3-540-36288-6\_15}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Goubin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AkkarCDG03, author = {Mehdi{-}Laurent Akkar and Nicolas T. Courtois and Romain Duteuil and Louis Goubin}, editor = {Yvo Desmedt}, title = {A Fast and Secure Implementation of Sflash}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {267--278}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_20}, doi = {10.1007/3-540-36288-6\_20}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AkkarCDG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisCG03, author = {Nicolas T. Courtois and Guilhem Castagnos and Louis Goubin}, title = {What do {DES} S-boxes Say to Each Other ?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2003}, url = {http://eprint.iacr.org/2003/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisCG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisGP03, author = {Nicolas T. Courtois and Louis Goubin and Jacques Patarin}, title = {SFLASHv3, a fast asymmetric signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2003}, url = {http://eprint.iacr.org/2003/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisGP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CourtoisGMT02, author = {Nicolas T. Courtois and Louis Goubin and Willi Meier and Jean{-}Daniel Tacier}, editor = {David Naccache and Pascal Paillier}, title = {Solving Underdefined Systems of Multivariate Quadratic Equations}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {211--227}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_15}, doi = {10.1007/3-540-45664-3\_15}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CourtoisGMT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Goubin01, author = {Louis Goubin}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {A Sound Method for Switching between Boolean and Arithmetic Masking}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {3--15}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_2}, doi = {10.1007/3-540-44709-1\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Goubin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PatarinCG01, author = {Jacques Patarin and Nicolas T. Courtois and Louis Goubin}, editor = {David Naccache}, title = {QUARTZ, 128-Bit Long Digital Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {282--297}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_21}, doi = {10.1007/3-540-45353-9\_21}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PatarinCG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PatarinCG01a, author = {Jacques Patarin and Nicolas T. Courtois and Louis Goubin}, editor = {David Naccache}, title = {FLASH, a Fast Multivariate Signature Algorithm}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {298--307}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_22}, doi = {10.1007/3-540-45353-9\_22}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PatarinCG01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoubinC00, author = {Louis Goubin and Nicolas T. Courtois}, editor = {Tatsuaki Okamoto}, title = {Cryptanalysis of the {TTM} Cryptosystem}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {44--57}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_4}, doi = {10.1007/3-540-44448-3\_4}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoubinC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronG00, author = {Jean{-}S{\'{e}}bastien Coron and Louis Goubin}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {On Boolean and Arithmetic Masking against Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {231--237}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_18}, doi = {10.1007/3-540-44499-8\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoubinP99, author = {Louis Goubin and Jacques Patarin}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {{DES} and Differential Power Analysis (The "Duplication" Method)}, booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1717}, pages = {158--172}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48059-5\_15}, doi = {10.1007/3-540-48059-5\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GoubinP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KipnisPG99, author = {Aviad Kipnis and Jacques Patarin and Louis Goubin}, editor = {Jacques Stern}, title = {Unbalanced Oil and Vinegar Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {206--222}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_15}, doi = {10.1007/3-540-48910-X\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KipnisPG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatarinGC98, author = {Jacques Patarin and Louis Goubin and Nicolas T. Courtois}, editor = {Kazuo Ohta and Dingyi Pei}, title = {\emph{C}\({}^{\mbox{*}}\)\({}_{\mbox{-+}}\) and {HM:} Variations Around Two Schemes of T. Matsumoto and H. Imai}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {35--49}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_4}, doi = {10.1007/3-540-49649-1\_4}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatarinGC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PatarinGC98, author = {Jacques Patarin and Louis Goubin and Nicolas T. Courtois}, editor = {Kaisa Nyberg}, title = {Improved Algorithms for Isomorphisms of Polynomials}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {184--200}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054126}, doi = {10.1007/BFB0054126}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PatarinGC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PatarinG97, author = {Jacques Patarin and Louis Goubin}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Trapdoor one-way permutations and multivariate polynominals}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {356--368}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028491}, doi = {10.1007/BFB0028491}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/PatarinG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PatarinG97a, author = {Jacques Patarin and Louis Goubin}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Asymmetric cryptography with S-Boxes}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {369--380}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028492}, doi = {10.1007/BFB0028492}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/PatarinG97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.