BibTeX records: Louis Goubin

download as .bib file

@article{DBLP:journals/iacr/CogliatiFGM24,
  author       = {Beno{\^{\i}}t Cogliati and
                  Pierre{-}Alain Fouque and
                  Louis Goubin and
                  Brice Minaud},
  title        = {New Security Proofs and Techniques for Hash-and-Sign with Retry Signature
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/609},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiFGM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MacarioRatPCFFGLM23,
  author       = {Gilles Macario{-}Rat and
                  Jacques Patarin and
                  Benoit Cogliati and
                  Jean{-}Charles Faug{\`{e}}re and
                  Pierre{-}Alain Fouque and
                  Louis Goubin and
                  Robin Larrieu and
                  Brice Minaud},
  title        = {Rectangular Attack on {VOX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1822},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1822},
  timestamp    = {Mon, 11 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MacarioRatPCFFGLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/goodit/ToulemondeBGP22,
  author       = {Ambre Toulemonde and
                  Lo{\"{\i}}c Besson and
                  Louis Goubin and
                  Jacques Patarin},
  title        = {Useful work: a new protocol to ensure usefulness of PoW-based consensus
                  for blockchain},
  booktitle    = {GoodIT 2022: {ACM} International Conference on Information Technology
                  for Social Good, Limassol, Cyprus, September 7 - 9, 2022},
  pages        = {308--314},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524458.3547248},
  doi          = {10.1145/3524458.3547248},
  timestamp    = {Thu, 25 Aug 2022 14:29:30 +0200},
  biburl       = {https://dblp.org/rec/conf/goodit/ToulemondeBGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalissantG22,
  author       = {Pierre Galissant and
                  Louis Goubin},
  title        = {Resisting Key-Extraction and Code-Compression: a Secure Implementation
                  of the {HFE} Signature Scheme in the White-Box Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/138},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalissantG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/JauvartMFG20,
  author       = {Damien Jauvart and
                  Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  title        = {Improving side-channel attacks against pairing-based cryptography},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {1--16},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-018-00201-3},
  doi          = {10.1007/S13389-018-00201-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/JauvartMFG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GoubinPRW20,
  author       = {Louis Goubin and
                  Pascal Paillier and
                  Matthieu Rivain and
                  Junwei Wang},
  title        = {How to reveal the secrets of an obscure white-box implementation},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {49--66},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00207-5},
  doi          = {10.1007/S13389-019-00207-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GoubinPRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GoubinRW20,
  author       = {Louis Goubin and
                  Matthieu Rivain and
                  Junwei Wang},
  title        = {Defeating State-of-the-Art White-Box Countermeasures with Advanced
                  Gray-Box Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {454--482},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.454-482},
  doi          = {10.13154/TCHES.V2020.I3.454-482},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GoubinRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinRW20,
  author       = {Louis Goubin and
                  Matthieu Rivain and
                  Junwei Wang},
  title        = {Defeating State-of-the-Art White-Box Countermeasures with Advanced
                  Gray-Box Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/HiscockSG19,
  author       = {Thomas Hiscock and
                  Olivier Savry and
                  Louis Goubin},
  title        = {Lightweight instruction-level encryption for embedded processors using
                  stream ciphers},
  journal      = {Microprocess. Microsystems},
  volume       = {64},
  pages        = {43--52},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.micpro.2018.10.001},
  doi          = {10.1016/J.MICPRO.2018.10.001},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/HiscockSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/HiscockSG18,
  author       = {Thomas Hiscock and
                  Olivier Savry and
                  Louis Goubin},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {On the Design of a Processor Working Over Encrypted Data},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {577--580},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00101},
  doi          = {10.1109/DSD.2018.00101},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/HiscockSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GoubinMRP18,
  author       = {Louis Goubin and
                  Geraldine Monsalve and
                  Juan L. Reutter and
                  Francisco Jos{\'{e}} Vial Prado},
  editor       = {Kwangsu Lee},
  title        = {Excalibur Key-Generation Protocols for {DAG} Hierarchic Decryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {103--120},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_7},
  doi          = {10.1007/978-3-030-12146-4\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GoubinMRP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinPRW18,
  author       = {Louis Goubin and
                  Pascal Paillier and
                  Matthieu Rivain and
                  Junwei Wang},
  title        = {How to Reveal the Secrets of an Obscure White-Box Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinPRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinP18,
  author       = {Louis Goubin and
                  Francisco Jos{\'{e}} Vial Prado},
  title        = {Blending {FHE-NTRU} keys - The Excalibur Property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinMRP18,
  author       = {Louis Goubin and
                  Geraldine Monsalve and
                  Juan L. Reutter and
                  Francisco Jos{\'{e}} Vial Prado},
  title        = {Excalibur Key-Generation Protocols For {DAG} Hierarchic Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinMRP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/HiscockSG17,
  author       = {Thomas Hiscock and
                  Olivier Savry and
                  Louis Goubin},
  editor       = {Hana Kub{\'{a}}tov{\'{a}} and
                  Martin Novotn{\'{y}} and
                  Amund Skavhaug},
  title        = {Lightweight Software Encryption for Embedded Processors},
  booktitle    = {Euromicro Conference on Digital System Design, {DSD} 2017, Vienna,
                  Austria, August 30 - Sept. 1, 2017},
  pages        = {213--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSD.2017.25},
  doi          = {10.1109/DSD.2017.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/HiscockSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/JauvartMFG17,
  author       = {Damien Jauvart and
                  Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Resistance of the Point Randomisation Countermeasure for Pairings
                  Against Side-Channel Attack},
  booktitle    = {E-Business and Telecommunications - 14th International Joint Conference,
                  {ICETE} 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper},
  series       = {Communications in Computer and Information Science},
  volume       = {990},
  pages        = {150--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-11039-0\_8},
  doi          = {10.1007/978-3-030-11039-0\_8},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/JauvartMFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JauvartFG17,
  author       = {Damien Jauvart and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {First Practical Side-channel Attack to Defeat Point Randomization
                  in Secure Implementations of Pairing-based Cryptography},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {104--115},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006425501040115},
  doi          = {10.5220/0006425501040115},
  timestamp    = {Thu, 17 Aug 2017 18:31:18 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JauvartFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EyrollesGV16,
  author       = {Ninon Eyrolles and
                  Louis Goubin and
                  Marion Videau},
  editor       = {Brecht Wyseur and
                  Bjorn De Sutter},
  title        = {Defeating MBA-based Obfuscation},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Software PROtection, SPRO@CCS
                  2016, Vienna, Austria, October 24-28, 2016},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995306.2995308},
  doi          = {10.1145/2995306.2995308},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EyrollesGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/JauvartFMG16,
  author       = {Damien Jauvart and
                  Jacques J. A. Fournier and
                  Nadia El Mrabet and
                  Louis Goubin},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  title        = {Improving Side-Channel Attacks Against Pairing-Based Cryptography},
  booktitle    = {Risks and Security of Internet and Systems - 11th International Conference,
                  CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10158},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54876-0\_16},
  doi          = {10.1007/978-3-319-54876-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/JauvartFMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GoubinP16,
  author       = {Louis Goubin and
                  Francisco Jos{\'{e}} Vial Prado},
  editor       = {Orr Dunkelman and
                  Somitra Kumar Sanadhya},
  title        = {Blending {FHE-NTRU} Keys - The Excalibur Property},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10095},
  pages        = {3--24},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49890-4\_1},
  doi          = {10.1007/978-3-319-49890-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GoubinP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiGG16,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Louis Goubin},
  title        = {Attacking FHE-based applications by software fault injections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1164},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/MrabetFGL15,
  author       = {Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin and
                  Ronan Lashermes},
  title        = {A survey of fault attacks in pairing based cryptography},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {185--205},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0114-5},
  doi          = {10.1007/S12095-014-0114-5},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/MrabetFGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LashermesFG15,
  author       = {Ronan Lashermes and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  title        = {Inverting the Final exponentiation of Tate pairings on ordinary elliptic
                  curves using faults},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LashermesFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaigneresDFGLR15,
  author       = {Thomas Baign{\`{e}}res and
                  C{\'{e}}cile Delerabl{\'{e}}e and
                  Matthieu Finiasz and
                  Louis Goubin and
                  Tancr{\`{e}}de Lepoint and
                  Matthieu Rivain},
  title        = {Trap Me If You Can - Million Dollar Curve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1249},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaigneresDFGLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/LashermesPMFG14,
  author       = {Ronan Lashermes and
                  Marie Paindavoine and
                  Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Assia Tria and
                  Dooho Choi},
  title        = {Practical Validation of Several Fault Attacks against the Miller Algorithm},
  booktitle    = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2014, Busan, South Korea, September 23, 2014},
  pages        = {115--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FDTC.2014.21},
  doi          = {10.1109/FDTC.2014.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/LashermesPMFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MrabetFGL14,
  author       = {Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin and
                  Ronan Lashermes},
  title        = {A survey of Fault Attacks in Pairing Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {742},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/742},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MrabetFGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChristofiCGV13,
  author       = {Maria Christofi and
                  Boutheina Chetali and
                  Louis Goubin and
                  David Vigilant},
  title        = {Formal verification of a {CRT-RSA} implementation against fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {157--167},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0049-3},
  doi          = {10.1007/S13389-013-0049-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChristofiCGV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GoubinMW13,
  author       = {Louis Goubin and
                  Ange Martinelli and
                  Matthieu Walle},
  editor       = {Amr M. Youssef and
                  Abderrahmane Nitaj and
                  Aboul Ella Hassanien},
  title        = {Impact of Sboxes Size upon Side Channel Resistance and Block Cipher
                  Design},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
                  on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7918},
  pages        = {240--259},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38553-7\_14},
  doi          = {10.1007/978-3-642-38553-7\_14},
  timestamp    = {Fri, 31 Jan 2020 16:14:16 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GoubinMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LashermesFG13,
  author       = {Ronan Lashermes and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic
                  Curves Using Faults},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {365--382},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_21},
  doi          = {10.1007/978-3-642-40349-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LashermesFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BerzatiCG12,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas{-}Dumas and
                  Louis Goubin},
  editor       = {David Naccache},
  title        = {Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_16},
  doi          = {10.1007/978-3-642-28368-0\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BerzatiCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CarletGPQR12,
  author       = {Claude Carlet and
                  Louis Goubin and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater and
                  Matthieu Rivain},
  editor       = {Anne Canteaut},
  title        = {Higher-Order Masking Schemes for S-Boxes},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {366--384},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_21},
  doi          = {10.1007/978-3-642-34047-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CarletGPQR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BerzatiCG12,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas{-}Dumas and
                  Louis Goubin},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {A Survey of Differential Fault Analysis Against Classical {RSA} Implementations},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {111--124},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_7},
  doi          = {10.1007/978-3-642-29656-7\_7},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/BerzatiCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoubinM11,
  author       = {Louis Goubin and
                  Ange Martinelli},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Protecting {AES} with Shamir's Secret Sharing Scheme},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {79--94},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_6},
  doi          = {10.1007/978-3-642-23951-9\_6},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GoubinM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/GoubinPY11,
  author       = {Louis Goubin and
                  Jacques Patarin and
                  Bo{-}Yin Yang},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Multivariate Cryptography},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {824--828},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_421},
  doi          = {10.1007/978-1-4419-5906-5\_421},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/GoubinPY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinM11,
  author       = {Louis Goubin and
                  Ange Martinelli},
  title        = {Protecting {AES} with Shamir's Secret Sharing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {516},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/516},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BerzatiCG10,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas{-}Dumas and
                  Louis Goubin},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Public Key Perturbation of Randomized {RSA} Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {306--319},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_21},
  doi          = {10.1007/978-3-642-15031-9\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BerzatiCG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BerzatiCG10,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas{-}Dumas and
                  Louis Goubin},
  title        = {Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BerzatiCG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BerzatiCDG09,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas and
                  Jean{-}Guillaume Dumas and
                  Louis Goubin},
  editor       = {Marc Fischlin},
  title        = {Fault Attacks on {RSA} Public Keys: Left-To-Right Implementations
                  Are Also Vulnerable},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {414--428},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_28},
  doi          = {10.1007/978-3-642-00862-7\_28},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BerzatiCDG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CastagnosBCDGGPS09,
  author       = {Guilhem Castagnos and
                  Alexandre Berzati and
                  C{\'{e}}cile Canovas and
                  Blandine Debraize and
                  Louis Goubin and
                  Aline Gouget and
                  Pascal Paillier and
                  Stephanie Salgado},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Fault Analysis of Grain-128},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings},
  pages        = {7--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HST.2009.5225030},
  doi          = {10.1109/HST.2009.5225030},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CastagnosBCDGGPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BerzatiCG09,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas{-}Dumas and
                  Louis Goubin},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Fault Analysis of Rabbit: Toward a Secret Key Leakage},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_5},
  doi          = {10.1007/978-3-642-10628-6\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BerzatiCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0901-0911,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas and
                  Jean{-}Guillaume Dumas and
                  Louis Goubin},
  title        = {Fault Attacks on {RSA} Public Keys: Left-To-Right Implementations
                  are also Vulnerable},
  journal      = {CoRR},
  volume       = {abs/0901.0911},
  year         = {2009},
  url          = {http://arxiv.org/abs/0901.0911},
  eprinttype    = {arXiv},
  eprint       = {0901.0911},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0901-0911.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BerzatiCG08,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas and
                  Louis Goubin},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Perturbating {RSA} Public Keys: An Improved Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {380--395},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_24},
  doi          = {10.1007/978-3-540-85053-3\_24},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BerzatiCG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BerzatiCG08,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas and
                  Louis Goubin},
  editor       = {Luca Breveglieri and
                  Shay Gueron and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {In(security) Against Fault Injection Attacks for {CRT-RSA} Implementations},
  booktitle    = {Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  2008, {FDTC} 2008, Washington, DC, USA, 10 August 2008},
  pages        = {101--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FDTC.2008.9},
  doi          = {10.1109/FDTC.2008.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/BerzatiCG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DebraizeG08,
  author       = {Blandine Debraize and
                  Louis Goubin},
  editor       = {Kaisa Nyberg},
  title        = {Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_15},
  doi          = {10.1007/978-3-540-71039-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DebraizeG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BerbainBCCGGGGLMPS08,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Anne Canteaut and
                  Nicolas T. Courtois and
                  Henri Gilbert and
                  Louis Goubin and
                  Aline Gouget and
                  Louis Granboulan and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Thomas Pornin and
                  Herv{\'{e}} Sibert},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {Sosemanuk, a Fast Software-Oriented Stream Cipher},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {98--118},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_9},
  doi          = {10.1007/978-3-540-68351-3\_9},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BerbainBCCGGGGLMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BerbainBCCDGGGGLMPS08,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Anne Canteaut and
                  Nicolas T. Courtois and
                  Blandine Debraize and
                  Henri Gilbert and
                  Louis Goubin and
                  Aline Gouget and
                  Louis Granboulan and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Thomas Pornin and
                  Herv{\'{e}} Sibert},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {Decimv2},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {140--151},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_11},
  doi          = {10.1007/978-3-540-68351-3\_11},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BerbainBCCDGGGGLMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0810-1858,
  author       = {C{\^{o}}me Berbain and
                  Olivier Billet and
                  Anne Canteaut and
                  Nicolas T. Courtois and
                  Henri Gilbert and
                  Louis Goubin and
                  Aline Gouget and
                  Louis Granboulan and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier and
                  Thomas Pornin and
                  Herv{\'{e}} Sibert},
  title        = {{SOSEMANUK:} a fast software-oriented stream cipher},
  journal      = {CoRR},
  volume       = {abs/0810.1858},
  year         = {2008},
  url          = {http://arxiv.org/abs/0810.1858},
  eprinttype    = {arXiv},
  eprint       = {0810.1858},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0810-1858.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GoubinMQ07,
  author       = {Louis Goubin and
                  Jean{-}Michel Masereel and
                  Micha{\"{e}}l Quisquater},
  editor       = {Carlisle M. Adams and
                  Ali Miri and
                  Michael J. Wiener},
  title        = {Cryptanalysis of White Box {DES} Implementations},
  booktitle    = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
                  2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4876},
  pages        = {278--295},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77360-3\_18},
  doi          = {10.1007/978-3-540-77360-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GoubinMQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinMQ07,
  author       = {Louis Goubin and
                  Jean{-}Michel Masereel and
                  Micha{\"{e}}l Quisquater},
  title        = {Cryptanalysis of white box {DES} implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinMQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2006,
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063},
  doi          = {10.1007/11894063},
  isbn         = {3-540-46559-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CourtoisG05,
  author       = {Nicolas T. Courtois and
                  Louis Goubin},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {An Algebraic Masking Method to Protect {AES} Against Power Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {199--209},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_18},
  doi          = {10.1007/11734727\_18},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/CourtoisG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisG05,
  author       = {Nicolas T. Courtois and
                  Louis Goubin},
  title        = {An Algebraic Masking Method to Protect {AES} Against Power Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/204},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AkkarBG04,
  author       = {Mehdi{-}Laurent Akkar and
                  R{\'{e}}gis Bevan and
                  Louis Goubin},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Two Power Analysis Attacks against One-Mask Methods},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {332--347},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_21},
  doi          = {10.1007/978-3-540-25937-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AkkarBG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AkkarG03,
  author       = {Mehdi{-}Laurent Akkar and
                  Louis Goubin},
  editor       = {Thomas Johansson},
  title        = {A Generic Protection against High-Order Differential Power Analysis},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {192--205},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_15},
  doi          = {10.1007/978-3-540-39887-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AkkarG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Goubin03,
  author       = {Louis Goubin},
  editor       = {Yvo Desmedt},
  title        = {A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {199--210},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_15},
  doi          = {10.1007/3-540-36288-6\_15},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Goubin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AkkarCDG03,
  author       = {Mehdi{-}Laurent Akkar and
                  Nicolas T. Courtois and
                  Romain Duteuil and
                  Louis Goubin},
  editor       = {Yvo Desmedt},
  title        = {A Fast and Secure Implementation of Sflash},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {267--278},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_20},
  doi          = {10.1007/3-540-36288-6\_20},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AkkarCDG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisCG03,
  author       = {Nicolas T. Courtois and
                  Guilhem Castagnos and
                  Louis Goubin},
  title        = {What do {DES} S-boxes Say to Each Other ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisCG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisGP03,
  author       = {Nicolas T. Courtois and
                  Louis Goubin and
                  Jacques Patarin},
  title        = {SFLASHv3, a fast asymmetric signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisGP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CourtoisGMT02,
  author       = {Nicolas T. Courtois and
                  Louis Goubin and
                  Willi Meier and
                  Jean{-}Daniel Tacier},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Solving Underdefined Systems of Multivariate Quadratic Equations},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {211--227},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_15},
  doi          = {10.1007/3-540-45664-3\_15},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CourtoisGMT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Goubin01,
  author       = {Louis Goubin},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {A Sound Method for Switching between Boolean and Arithmetic Masking},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_2},
  doi          = {10.1007/3-540-44709-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Goubin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PatarinCG01,
  author       = {Jacques Patarin and
                  Nicolas T. Courtois and
                  Louis Goubin},
  editor       = {David Naccache},
  title        = {QUARTZ, 128-Bit Long Digital Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {282--297},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_21},
  doi          = {10.1007/3-540-45353-9\_21},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PatarinCG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PatarinCG01a,
  author       = {Jacques Patarin and
                  Nicolas T. Courtois and
                  Louis Goubin},
  editor       = {David Naccache},
  title        = {FLASH, a Fast Multivariate Signature Algorithm},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {298--307},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_22},
  doi          = {10.1007/3-540-45353-9\_22},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PatarinCG01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GoubinC00,
  author       = {Louis Goubin and
                  Nicolas T. Courtois},
  editor       = {Tatsuaki Okamoto},
  title        = {Cryptanalysis of the {TTM} Cryptosystem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {44--57},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_4},
  doi          = {10.1007/3-540-44448-3\_4},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GoubinC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronG00,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Louis Goubin},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {On Boolean and Arithmetic Masking against Differential Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {231--237},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_18},
  doi          = {10.1007/3-540-44499-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoubinP99,
  author       = {Louis Goubin and
                  Jacques Patarin},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {{DES} and Differential Power Analysis (The "Duplication"
                  Method)},
  booktitle    = {Cryptographic Hardware and Embedded Systems, First International Workshop,
                  CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1717},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48059-5\_15},
  doi          = {10.1007/3-540-48059-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GoubinP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KipnisPG99,
  author       = {Aviad Kipnis and
                  Jacques Patarin and
                  Louis Goubin},
  editor       = {Jacques Stern},
  title        = {Unbalanced Oil and Vinegar Signature Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {206--222},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_15},
  doi          = {10.1007/3-540-48910-X\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KipnisPG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PatarinGC98,
  author       = {Jacques Patarin and
                  Louis Goubin and
                  Nicolas T. Courtois},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {\emph{C}\({}^{\mbox{*}}\)\({}_{\mbox{-+}}\) and {HM:} Variations Around
                  Two Schemes of T. Matsumoto and H. Imai},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {35--49},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_4},
  doi          = {10.1007/3-540-49649-1\_4},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PatarinGC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PatarinGC98,
  author       = {Jacques Patarin and
                  Louis Goubin and
                  Nicolas T. Courtois},
  editor       = {Kaisa Nyberg},
  title        = {Improved Algorithms for Isomorphisms of Polynomials},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {184--200},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054126},
  doi          = {10.1007/BFB0054126},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PatarinGC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PatarinG97,
  author       = {Jacques Patarin and
                  Louis Goubin},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Trapdoor one-way permutations and multivariate polynominals},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {356--368},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028491},
  doi          = {10.1007/BFB0028491},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/PatarinG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PatarinG97a,
  author       = {Jacques Patarin and
                  Louis Goubin},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Asymmetric cryptography with S-Boxes},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {369--380},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028492},
  doi          = {10.1007/BFB0028492},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/PatarinG97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics