|
Search the dblp DataBase
Emmanuel Prouff:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jean-Bernard Fischer, Emmanuel Prouff
Off-Line Group Signatures with Smart Cards. [Citation Graph (0, 0)][DBLP] CARDIS, 2006, pp:263-277 [Conf]
- Emmanuel Prouff, Christophe Giraud, Sébastien Aumônier
Provably Secure S-Box Implementation Based on Fourier Transform. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:216-230 [Conf]
- Claude Carlet, Emmanuel Prouff
Vectorial Functions and Covering Sequences. [Citation Graph (0, 0)][DBLP] International Conference on Finite Fields and Applications, 2003, pp:215-248 [Conf]
- Claude Carlet, Emmanuel Prouff
On Plateaued Functions and Their Constructions. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:54-73 [Conf]
- Emmanuel Prouff
DPA Attacks and S-Boxes. [Citation Graph (0, 0)][DBLP] FSE, 2005, pp:424-441 [Conf]
- Claude Carlet, Emmanuel Prouff
On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:291-305 [Conf]
- Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain
Side Channel Cryptanalysis of a Higher Order Masking Scheme. [Citation Graph (0, 0)][DBLP] CHES, 2007, pp:28-44 [Conf]
- Arnaud Boscher, Robert Naciri, Emmanuel Prouff
CRT RSA Algorithm Protected Against Fault Attacks. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:229-243 [Conf]
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. [Citation Graph (, )][DBLP]
Secure Multiplicative Masking of Power Functions. [Citation Graph (, )][DBLP]
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. [Citation Graph (, )][DBLP]
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. [Citation Graph (, )][DBLP]
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. [Citation Graph (, )][DBLP]
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. [Citation Graph (, )][DBLP]
Provably Secure Higher-Order Masking of AES. [Citation Graph (, )][DBLP]
Securing AES Implementation against Fault Attacks. [Citation Graph (, )][DBLP]
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. [Citation Graph (, )][DBLP]
A Generic Method for Secure SBox Implementation. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|