Suivre
Vincent Grosso
Vincent Grosso
CNRS/ Université Jean Monnet, Laboratoire Hubert Curien, France
Adresse e-mail validée de univ-st-etienne.fr
Titre
Citée par
Citée par
Année
LS-designs: Bitslice encryption for efficient masked software implementations
V Grosso, G Leurent, FX Standaert, K Varıcı
International Workshop on fast software encryption, 18-37, 2014
2142014
Block Ciphers that are Easier to Mask: How Far Can we Go?
B Gérard, V Grosso, M Naya-Plasencia, FX Standaert
CHES, 2013
1772013
On the cost of lazy engineering for masked software implementations
J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert
International Conference on Smart Card Research and Advanced Applications, 64-81, 2014
1722014
Composable masking schemes in the presence of physical defaults & the robust probing model
S Faust, V Grosso, SMD Pozo, C Paglialonga, FX Standaert
1002018
Simple key enumeration (and rank estimation) using histograms: An integrated approach
R Poussier, FX Standaert, V Grosso
International Conference on Cryptographic Hardware and Embedded Systems, 61-81, 2016
822016
Simpler and more efficient rank estimation for side-channel security assessment
C Glowacz, V Grosso, R Poussier, J Schüth, FX Standaert
International Workshop on Fast Software Encryption, 117-129, 2015
812015
Masking vs. multiparty computation: how large is the gap for AES?
V Grosso, FX Standaert, S Faust
International Conference on Cryptographic Hardware and Embedded Systems, 400-416, 2013
532013
Low Entropy Masking Schemes, Revisited
V Grosso, FX Standaert, E Prouff
Cardis 2013, 2013
532013
Efficient Masked S-Boxes Processing–A Step Forward–
V Grosso, E Prouff, FX Standaert
Africacrypt 2014, 251-266, 2014
442014
Masking and leakage-resilient primitives: One, the other (s) or both?
S Belaïd, V Grosso, FX Standaert
Cryptography and Communications 7 (1), 163-184, 2015
432015
SCREAM & iSCREAM Side-Channel Resistant Authenticated Encryption with Masking
V Grosso, G Leurent, FX Standaert, K Varici, F Durvaux, L Gaspar, ...
CEASAR competition, 2014
402014
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
V Grosso, FX Standaert
Advances in Cryptology–ASIACRYPT 2015, 291-312, 2015
382015
Mode-level vs. implementation-level physical security in symmetric cryptography
D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ...
Annual International Cryptology Conference, 369-400, 2020
352020
Masking proofs are tight and how to exploit it in security evaluations
V Grosso, FX Standaert
Annual International Conference on the Theory and Applications of …, 2018
352018
Comparing approaches to rank estimation for side-channel security evaluations
R Poussier, V Grosso, FX Standaert
International Conference on Smart Card Research and Advanced Applications …, 2015
302015
Strong 8-bit Sboxes with efficient masking in hardware extended version
E Boss, V Grosso, T Güneysu, G Leander, A Moradi, T Schneider
Journal of Cryptographic Engineering 7 (2), 149-165, 2017
232017
Modeling soft analytical side-channel attacks from a coding theory viewpoint
Q Guo, V Grosso, FX Standaert, O Bronchain
IACR Transactions on Cryptographic Hardware and Embedded Systems, 209-238, 2020
212020
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ...
Annual International Conference on the Theory and Applications of …, 2020
192020
Strong 8-bit sboxes with efficient masking in hardware
E Boss, V Grosso, T Güneysu, G Leander, A Moradi, T Schneider
International Conference on Cryptographic Hardware and Embedded Systems, 171-193, 2016
192016
Scalable key rank estimation (and key enumeration) algorithm for large keys
V Grosso
International Conference on Smart Card Research and Advanced Applications, 80-94, 2018
182018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20