The SCEAS System
Navigation Menu

Search the dblp DataBase


Emmanuel Prouff: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jean-Bernard Fischer, Emmanuel Prouff
    Off-Line Group Signatures with Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:263-277 [Conf]
  2. Emmanuel Prouff, Christophe Giraud, Sébastien Aumônier
    Provably Secure S-Box Implementation Based on Fourier Transform. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:216-230 [Conf]
  3. Claude Carlet, Emmanuel Prouff
    Vectorial Functions and Covering Sequences. [Citation Graph (0, 0)][DBLP]
    International Conference on Finite Fields and Applications, 2003, pp:215-248 [Conf]
  4. Claude Carlet, Emmanuel Prouff
    On Plateaued Functions and Their Constructions. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:54-73 [Conf]
  5. Emmanuel Prouff
    DPA Attacks and S-Boxes. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:424-441 [Conf]
  6. Claude Carlet, Emmanuel Prouff
    On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:291-305 [Conf]
  7. Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain
    Side Channel Cryptanalysis of a Higher Order Masking Scheme. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:28-44 [Conf]
  8. Arnaud Boscher, Robert Naciri, Emmanuel Prouff
    CRT RSA Algorithm Protected Against Fault Attacks. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:229-243 [Conf]

  9. Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. [Citation Graph (, )][DBLP]

  10. Secure Multiplicative Masking of Power Functions. [Citation Graph (, )][DBLP]

  11. Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. [Citation Graph (, )][DBLP]

  12. Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. [Citation Graph (, )][DBLP]

  13. Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. [Citation Graph (, )][DBLP]

  14. First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. [Citation Graph (, )][DBLP]

  15. Provably Secure Higher-Order Masking of AES. [Citation Graph (, )][DBLP]

  16. Securing AES Implementation against Fault Attacks. [Citation Graph (, )][DBLP]

  17. Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. [Citation Graph (, )][DBLP]

  18. A Generic Method for Secure SBox Implementation. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002