Follow
Vincent Grosso
Vincent Grosso
CNRS/ Université Jean Monnet, Laboratoire Hubert Curien, France
Verified email at univ-st-etienne.fr
Title
Cited by
Cited by
Year
LS-designs: Bitslice encryption for efficient masked software implementations
V Grosso, G Leurent, FX Standaert, K Varıcı
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
2462015
On the cost of lazy engineering for masked software implementations
J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
2192015
Block Ciphers that are Easier to Mask: How Far Can we Go?
B Gérard, V Grosso, M Naya-Plasencia, FX Standaert
CHES, 2013
2012013
Composable masking schemes in the presence of physical defaults & the robust probing model
S Faust, V Grosso, SMD Pozo, C Paglialonga, FX Standaert
1742018
Simple key enumeration (and rank estimation) using histograms: An integrated approach
R Poussier, FX Standaert, V Grosso
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
1062016
Simpler and more efficient rank estimation for side-channel security assessment
C Glowacz, V Grosso, R Poussier, J Schüth, FX Standaert
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
932015
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
852020
Low Entropy Masking Schemes, Revisited
V Grosso, FX Standaert, E Prouff
Cardis 2013, 2013
562013
Masking and leakage-resilient primitives: One, the other (s) or both?
S Belaïd, V Grosso, FX Standaert
Cryptography and Communications 7, 163-184, 2015
492015
Masking proofs are tight and how to exploit it in security evaluations
V Grosso, FX Standaert
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
472018
SCREAM & iSCREAM Side-Channel Resistant Authenticated Encryption with Masking
V Grosso, G Leurent, FX Standaert, K Varici, F Durvaux, L Gaspar, ...
CEASAR competition, 2014
472014
Efficient Masked S-Boxes Processing–A Step Forward–
V Grosso, E Prouff, FX Standaert
Africacrypt 2014, 251-266, 2014
462014
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
V Grosso, FX Standaert
Advances in Cryptology–ASIACRYPT 2015, 291-312, 2015
452015
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ...
Annual International Conference on the Theory and Applications of …, 2020
372020
Modeling soft analytical side-channel attacks from a coding theory viewpoint
Q Guo, V Grosso, FX Standaert, O Bronchain
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020
332020
Comparing approaches to rank estimation for side-channel security evaluations
R Poussier, V Grosso, FX Standaert
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
332016
Strong 8-bit Sboxes with efficient masking in hardware extended version
E Boss, V Grosso, T Güneysu, G Leander, A Moradi, T Schneider
Journal of Cryptographic Engineering 7, 149-165, 2017
292017
Masking vs. multiparty computation: how large is the gap for AES?
V Grosso, FX Standaert, S Faust
Journal of Cryptographic Engineering 4, 47-57, 2014
292014
Masking vs. multiparty computation: how large is the gap for AES?
V Grosso, FX Standaert, S Faust
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
292013
Scalable key rank estimation (and key enumeration) algorithm for large keys
V Grosso
Smart Card Research and Advanced Applications: 17th International Conference …, 2019
252019
The system can't perform the operation now. Try again later.
Articles 1–20