Private multiplication over finite fields, Proceedings, Part III, volume 10403 of LNCS, pp.397-426, 2017. ,
Formal Verification of Masked Hardware Implementations in the Presence of Glitches, Advances in Cryptology -EURO-CRYPT 2018, vol.10821, pp.321-353, 2018. ,
PRESENT: An Ultra-Lightweight Block Cipher, CHES, vol.4727, pp.450-466, 2007. ,
Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems -CHES 2004: 6th International Workshop, vol.3156, pp.16-29, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-02487026
An APN permutation in dimension six, The 9th Conference on Finite Fields and Applications -Fq9, vol.518, pp.33-42, 2010. ,
On correlation-immune functions, Proceedings of CRYPTO'91, vol.576, pp.86-100, 1991. ,
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks, Progress in Cryptology -IN-DOCRYPT 2005, 6th International Conference on Cryptology in India, vol.3797, pp.49-62, 2005. ,
Boolean functions for cryptography and error correcting codes, Boolean Models and Methods in Mathematics, vol.2, pp.257-397, 2010. ,
Vectorial Boolean Functions for Cryptography, Chapter of the monography Boolean Models and Methods in Mathematics, pp.398-469, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-02060699
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience, Applied Cryptography and Network Security -15th International Conference, vol.10355, pp.393-414, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01629879
On Semi-bent Boolean Functions, IEEE Transactions on Information Theory, vol.58, issue.5, pp.3287-3292, 2012. ,
Redefining the transparency order, Des. Codes Cryptography, vol.82, issue.1-2, pp.95-115, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01399584
On Propagation Characteristics of Resilient Functions. Selected Areas in Cryptography, Lecture Notes in Computer Science, vol.2595, pp.175-195, 2002. ,
URL : https://hal.archives-ouvertes.fr/inria-00072051
Confused yet successful: -theoretical comparison of distinguishers for monobit leakages in terms of confusion coefficient and SNR, Information Security and Cryptology -14th International Conference, vol.11449, pp.533-553, 2018. ,
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis, IACR Trans. Cryptogr. Hardw. Embed. Syst, vol.2019, issue.2, pp.49-79, 2019. ,
Elementary Hadamard difference sets, 1974. ,
, Construction of bent functions and balanced Boolean functions with high nonlinearity. FSE 1994, vol.1008, pp.61-74, 1995.
Portability of templates, Journal of Cryptographic Engineering, vol.2, issue.1, pp.63-74 ,
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis, LNCS, vol.7428, pp.233-250, 2012. ,
Masking at Gate Level in the Presence of Glitches, CHES, vol.3659, pp.187-200, 2005. ,
A Key to Success -Success Exponents for Side-Channel Distinguishers, Progress in Cryptology -INDOCRYPT 2015, vol.9462, pp.270-290, 2015. ,
Differential Power Analysis Model and Some Results, Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), vol.153, pp.127-142, 2004. ,
A Theoretical Study of Kolmogorov-Smirnov Distinguishers -Side-Channel Analysis vs. Differential Cryptanalysis, Constructive Side-Channel Analysis and Secure Design -5th International Workshop, vol.8622, pp.9-28, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02286939
Good Is Not Good Enough -Deriving Optimal Distinguishers from Communication Theory, Cryptographic Hardware and Embedded Systems -CHES 2014 -16th International Workshop, vol.8731, pp.55-74, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02286943
Results on rotation-symmetric S-boxes, Information Sciences, vol.201, pp.93-113, 2012. ,
A new algorithm for the design of strong Boolean functions (in Turkish), Proceedings of the First National Cryptology Symposium, pp.95-105, 2005. ,
Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions -9 Variable Boolean Functions with Nonlinearity 242, 17th International Applied Algebra, Algebraic Algorithms, and Error Correcting Codes Symposium, vol.4851, pp.321-329, 2007. ,
Differential power analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999. ,
Constructing differentially 4-uniform permutations over GF (2 2m ) from quadratic APN permutations over GF (2 2m+1 ), Des. Codes Cryptogr, vol.72, issue.2, pp.249-264, 2014. ,
Finite fields, 1983. ,
Correlation Power Analysis Based on Switching Glitch Model, Lecture Notes in Computer Science, vol.6513, pp.191-205, 2010. ,
A family of difference sets in non-cyclic groups, Journal of Combinatorial Theory, Series A, vol.15, issue.1, pp.1-10, 1973. ,
Comparison between Side-Channel Analysis Distinguishers, LNCS, vol.7618, pp.331-340, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-02299929
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Pinpointing the side-channel leakage of masked AES hardware implementations, Cryptographic Hardware and Embedded Systems -CHES 2006, 8th International Workshop, vol.4249, pp.76-90, 2006. ,
Cellular automata based S-boxes, Cryptography and Communications, vol.11, issue.1, pp.41-62, 2019. ,
SAFER K-64: A byte-oriented block-ciphering algorithm, Fast Software Encryption, Cambridge Security Workshop, vol.809, pp.1-17, 1993. ,
Bent functions: fundamentals and results, pp.1-544, 2016. ,
Detecting Hidden Leakages, Applied Cryptography and Network Security -12th International Conference, ACNS 2014, vol.8479, pp.324-342, 2014. ,
Improving cross-device attacks using zero-mean unit-variance normalization, J. Cryptographic Engineering, vol.3, issue.2, pp.99-110, 2013. ,
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs, 2012 Design, Automation & Test in Europe Conference & Exhibition, DATE 2012, pp.1173-1178, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00666337
Threshold Implementations Against Side-Channel Attacks and Glitches, ICICS, vol.4307, pp.529-545, 2006. ,
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches, ICISC, vol.5461, pp.218-234, 2008. ,
, NIST. AES Proposal: Rijndael (now FIPS PUB 197), 2003.
, Differentially uniform mappings for cryptography. EUROCRYPT'93, vol.765, pp.55-64, 1994.
Modified Transparency Order Property: Solution or Just Another Attempt, Security, Privacy, and Applied Cryptography Engineering -5th International Conference, vol.9354, pp.210-227, 2015. ,
, Lecture Notes in Computer Science, vol.3557, pp.424-441, 2005.
, Constructive Side-Channel Analysis and Secure Design -5th International Workshop, Lecture Notes in Computer Science, vol.8622, 2014.
A note on the use of margins to compare distinguishers, Prouff [48], pp.1-8 ,
Rotation symmetry in algebraically generated cryptographic substitution tables, Inf. Process. Lett, vol.106, issue.6, pp.246-250, 2008. ,
Communication theory of secrecy systems, Bell system technical journal, vol.28, pp.656-715, 1949. ,
A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005. ,
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, vol.5479, pp.443-461, 2009. ,
Mutual Information Analysis: How, When and Why?, Cryptographic Hardware and Embedded Systems -CHES 2009, 11th International Workshop, vol.5747, pp.429-443, 2009. ,
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework, Lecture Notes in Computer Science, vol.6841, pp.316-334, 2011. ,
A Fair Evaluation Framework for Comparing Side-Channel Distinguishers, J. Cryptographic Engineering, vol.1, issue.2, pp.145-160, 2011. ,
GAC ? the criterion for global avalanche characteristics of cryptographic functions, Journal of Universal Computer Science, vol.1, issue.5, pp.320-337, 1995. ,
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers, Lecture Notes in Computer Science, vol.7863, p.63, 2013. ,
, , vol.58, p.63
, , vol.33, p.63, 2003.
, , vol.33, p.63, 2003.