default search action
Sonia Belaïd
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. J. Cryptol. 37(1): 5 (2024) - [c21]Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. ASIACRYPT (7) 2024: 167-200 - [i22]Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. IACR Cryptol. ePrint Arch. 2024: 757 (2024) - 2023
- [j4]Sonia Belaïd, Matthieu Rivain:
High Order Side-Channel Security for Elliptic-Curve Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 238-276 (2023) - [c20]Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb:
Unifying Freedom and Separation for Tight Probing-Secure Composition. CRYPTO (3) 2023: 440-472 - [i21]Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb:
Unifying Freedom and Separation for Tight Probing-Secure Composition. IACR Cryptol. ePrint Arch. 2023: 835 (2023) - [i20]Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, Abdul Rahman Taleb:
Towards Achieving Provable Side-Channel Security in Practice. IACR Cryptol. ePrint Arch. 2023: 1198 (2023) - 2022
- [c19]Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb:
IronMask: Versatile Verification of Masking Security. SP 2022: 142-160 - 2021
- [c18]Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud:
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity. ASIACRYPT (2) 2021: 157-188 - [c17]Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb:
On the Power of Expansion: More Efficient Constructions in the Random Probing Model. EUROCRYPT (2) 2021: 313-343 - [i19]Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb:
On the Power of Expansion: More Efficient Constructions in the Random Probing Model. IACR Cryptol. ePrint Arch. 2021: 434 (2021) - [i18]Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud:
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity. IACR Cryptol. ePrint Arch. 2021: 1455 (2021) - [i17]Sonia Belaïd, Matthieu Rivain:
High Order Countermeasures for Elliptic-Curve Implementations with Noisy Leakage Security. IACR Cryptol. ePrint Arch. 2021: 1580 (2021) - [i16]Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb:
IronMask: Versatile Verification of Masking Security. IACR Cryptol. ePrint Arch. 2021: 1671 (2021) - 2020
- [j3]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub:
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations. J. Cryptogr. Eng. 10(1): 17-26 (2020) - [c16]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. CRYPTO (1) 2020: 339-368 - [c15]Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff:
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. EUROCRYPT (3) 2020: 311-341 - [e1]Sonia Belaïd, Tim Güneysu:
Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11833, Springer 2020, ISBN 978-3-030-42067-3 [contents] - [i15]Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff:
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. IACR Cryptol. ePrint Arch. 2020: 506 (2020) - [i14]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. IACR Cryptol. ePrint Arch. 2020: 786 (2020)
2010 – 2019
- 2019
- [c14]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited. CCS 2019: 2147-2164 - [c13]Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert:
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults. ESORICS (1) 2019: 300-318 - [i13]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi:
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited. IACR Cryptol. ePrint Arch. 2019: 511 (2019) - 2018
- [c12]Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain:
Tight Private Circuits: Achieving Probing Security with the Least Refreshing. ASIACRYPT (2) 2018: 343-372 - [c11]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. EUROCRYPT (2) 2018: 354-384 - [i12]Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. IACR Cryptol. ePrint Arch. 2018: 381 (2018) - [i11]Sonia Belaïd, Dahmun Goudarzi, Matthieu Rivain:
Tight Private Circuits: Achieving Probing Security with the Least Refreshing. IACR Cryptol. ePrint Arch. 2018: 439 (2018) - [i10]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub:
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations. IACR Cryptol. ePrint Arch. 2018: 505 (2018) - [i9]Gilles Barthe, Sonia Belaïd, Pierre-Alain Fouque, Benjamin Grégoire:
maskVerif: a formal tool for analyzing software and hardware masked implementations. IACR Cryptol. ePrint Arch. 2018: 562 (2018) - 2017
- [c10]Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud:
Private Multiplication over Finite Fields. CRYPTO (3) 2017: 397-426 - 2016
- [c9]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini:
Strong Non-Interference and Type-Directed Higher-Order Masking. CCS 2016: 116-129 - [c8]Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud:
Randomness Complexity of Private Circuits for Multiplication. EUROCRYPT (2) 2016: 616-648 - [i8]Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud:
Randomness Complexity of Private Circuits for Multiplication. IACR Cryptol. ePrint Arch. 2016: 211 (2016) - 2015
- [b1]Sonia Belaïd:
Security of Cryptosystems Against Power-Analysis Attacks. (Sécurité des cryptosystèmes contre les attaques par analyse de courant). École Normale Supérieure, Paris, France, 2015 - [j2]Sonia Belaïd, Vincent Grosso, François-Xavier Standaert:
Masking and leakage-resilient primitives: One, the other(s) or both? Cryptogr. Commun. 7(1): 163-184 (2015) - [c7]Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. ACNS 2015: 635-654 - [c6]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. CHES 2015: 395-415 - [c5]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:
Verified Proofs of Higher-Order Masking. EUROCRYPT (1) 2015: 457-485 - [i7]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:
Verified Proofs of Higher-Order Masking. IACR Cryptol. ePrint Arch. 2015: 60 (2015) - [i6]Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. IACR Cryptol. ePrint Arch. 2015: 204 (2015) - [i5]Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire:
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler. IACR Cryptol. ePrint Arch. 2015: 506 (2015) - [i4]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. IACR Cryptol. ePrint Arch. 2015: 542 (2015) - [i3]Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 1219 (2015) - 2014
- [j1]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J. Cryptogr. Eng. 4(3): 157-171 (2014) - [c4]Sonia Belaïd, Pierre-Alain Fouque, Benoît Gérard:
Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM. ASIACRYPT (2) 2014: 306-325 - [c3]Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre:
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model. ICETE (Selected Papers) 2014: 363-379 - [i2]Sonia Belaïd, Vincent Grosso, François-Xavier Standaert:
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both? IACR Cryptol. ePrint Arch. 2014: 53 (2014) - 2013
- [c2]Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. CHES 2013: 471-488 - [c1]Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre:
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. SECRYPT 2013: 230-241 - [i1]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. IACR Cryptol. ePrint Arch. 2013: 305 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint