LS-designs: Bitslice encryption for efficient masked software implementations V Grosso, G Leurent, FX Standaert, K Varıcı Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015 | 243 | 2015 |
On the cost of lazy engineering for masked software implementations J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert Smart Card Research and Advanced Applications: 13th International Conference …, 2015 | 214 | 2015 |
Block Ciphers that are Easier to Mask: How Far Can we Go? B Gérard, V Grosso, M Naya-Plasencia, FX Standaert CHES, 2013 | 197 | 2013 |
Composable masking schemes in the presence of physical defaults & the robust probing model S Faust, V Grosso, SMD Pozo, C Paglialonga, FX Standaert | 164 | 2018 |
Simple key enumeration (and rank estimation) using histograms: An integrated approach R Poussier, FX Standaert, V Grosso Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016 | 104 | 2016 |
Simpler and more efficient rank estimation for side-channel security assessment C Glowacz, V Grosso, R Poussier, J Schüth, FX Standaert Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015 | 91 | 2015 |
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 74 | 2020 |
Low Entropy Masking Schemes, Revisited V Grosso, FX Standaert, E Prouff Cardis 2013, 2013 | 56 | 2013 |
Masking and leakage-resilient primitives: One, the other (s) or both? S Belaïd, V Grosso, FX Standaert Cryptography and Communications 7, 163-184, 2015 | 49 | 2015 |
SCREAM & iSCREAM Side-Channel Resistant Authenticated Encryption with Masking V Grosso, G Leurent, FX Standaert, K Varici, F Durvaux, L Gaspar, ... CEASAR competition, 2014 | 46 | 2014 |
Masking proofs are tight and how to exploit it in security evaluations V Grosso, FX Standaert Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 45 | 2018 |
Efficient Masked S-Boxes Processing–A Step Forward– V Grosso, E Prouff, FX Standaert Africacrypt 2014, 251-266, 2014 | 45 | 2014 |
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? V Grosso, FX Standaert Advances in Cryptology–ASIACRYPT 2015, 291-312, 2015 | 41 | 2015 |
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ... Annual International Conference on the Theory and Applications of …, 2020 | 36 | 2020 |
Comparing approaches to rank estimation for side-channel security evaluations R Poussier, V Grosso, FX Standaert Smart Card Research and Advanced Applications: 14th International Conference …, 2016 | 32 | 2016 |
Modeling soft analytical side-channel attacks from a coding theory viewpoint Q Guo, V Grosso, FX Standaert, O Bronchain IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020 | 31 | 2020 |
Strong 8-bit Sboxes with efficient masking in hardware extended version E Boss, V Grosso, T Güneysu, G Leander, A Moradi, T Schneider Journal of Cryptographic Engineering 7, 149-165, 2017 | 29 | 2017 |
Masking vs. multiparty computation: how large is the gap for AES? V Grosso, FX Standaert, S Faust Journal of Cryptographic Engineering 4, 47-57, 2014 | 29 | 2014 |
Masking vs. multiparty computation: how large is the gap for AES? V Grosso, FX Standaert, S Faust Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013 | 28 | 2013 |
Scalable key rank estimation (and key enumeration) algorithm for large keys V Grosso Smart Card Research and Advanced Applications: 17th International Conference …, 2019 | 23 | 2019 |