


default search action
Emmanuel Prouff
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j18]Simon Landry
, Yanis Linge, Emmanuel Prouff:
Monomial evaluation of polynomial functions protected by threshold implementations - with an illustration on AES -. Cryptogr. Commun. 13(4): 543-572 (2021) - [j17]Eyal Kushilevitz, Rafail Ostrovsky
, Emmanuel Prouff, Adi Rosén, Adrian Thillard, Damien Vergnaud
:
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND. SIAM J. Discret. Math. 35(1): 465-484 (2021) - 2020
- [j16]Ryad Benadjila, Emmanuel Prouff
, Rémi Strullu, Eleonora Cagli, Cécile Dumas
:
Deep learning for side-channel analysis and introduction to ASCAD database. J. Cryptogr. Eng. 10(2): 163-188 (2020) - [j15]Zhipeng Guo
, Ming Tang
, Emmanuel Prouff, Maixing Luo, Fei Yan
:
Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(1): 34-44 (2020) - [j14]Loïc Masure
, Cécile Dumas, Emmanuel Prouff:
A Comprehensive Study of Deep Learning for Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 348-375 (2020) - [c59]Maamar Ouladj
, Sylvain Guilley, Emmanuel Prouff:
On the Implementation Efficiency of Linear Regression-Based Side-Channel Attacks. COSADE 2020: 147-172 - [c58]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. CRYPTO (1) 2020: 339-368 - [i32]Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:
Random Probing Security: Verification, Composition, Expansion and New Constructions. IACR Cryptol. ePrint Arch. 2020: 786 (2020)
2010 – 2019
- 2019
- [j13]Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli:
Deep Learning to Evaluate Secure RSA Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 132-161 (2019) - [c57]Loïc Masure
, Cécile Dumas
, Emmanuel Prouff:
Gradient Visualization for General Characterization in Profiling Attacks. COSADE 2019: 145-167 - [c56]Eyal Kushilevitz, Rafail Ostrovsky, Emmanuel Prouff, Adi Rosén, Adrian Thillard, Damien Vergnaud
:
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND. TCC (2) 2019: 386-406 - [c55]Simon Landry
, Yanis Linge
, Emmanuel Prouff
:
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations. WISTP 2019: 66-84 - [i31]Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli:
Deep Learning to Evaluate Secure RSA Implementations. IACR Cryptol. ePrint Arch. 2019: 54 (2019) - [i30]Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild:
Horizontal Collision Correlation Attack on Elliptic Curves. IACR Cryptol. ePrint Arch. 2019: 321 (2019) - [i29]Loïc Masure, Cécile Dumas, Emmanuel Prouff:
A Comprehensive Study of Deep Learning for Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2019: 439 (2019) - 2018
- [j12]Hervé Chabanne
, Houssem Maghrebi, Emmanuel Prouff:
Linear Repairing Codes and Side-Channel Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 118-141 (2018) - [c54]Houssem Maghrebi, Emmanuel Prouff:
On the Use of Independent Component Analysis to Denoise Side-Channel Measurements. COSADE 2018: 61-81 - [c53]Hervé Chabanne, Julien Keuffer, Emmanuel Prouff:
Outsourcing Signatures of Confidential Documents. CRiSIS 2018: 41-47 - [c52]Hervé Chabanne, Roch Lescuyer, Jonathan Milgram, Constance Morel, Emmanuel Prouff:
Recognition Over Encrypted Faces. MSPN 2018: 174-191 - [i28]Emmanuel Prouff, Rémi Strullu, Ryad Benadjila, Eleonora Cagli, Cécile Dumas:
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database. IACR Cryptol. ePrint Arch. 2018: 53 (2018) - [i27]Houssem Maghrebi, Emmanuel Prouff:
On the Use of Independent Component Analysis to Denoise Side-Channel Measurements. IACR Cryptol. ePrint Arch. 2018: 177 (2018) - [i26]Loïc Masure, Cécile Dumas, Emmanuel Prouff:
Gradient Visualization for General Characterization in Profiling Attacks. IACR Cryptol. ePrint Arch. 2018: 1196 (2018) - 2017
- [j11]Kaushik Chakraborty
, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff:
Redefining the transparency order. Des. Codes Cryptogr. 82(1-2): 95-115 (2017) - [j10]Nicolas Bruneau, Claude Carlet, Sylvain Guilley
, Annelie Heuser, Emmanuel Prouff, Olivier Rioul
:
Stochastic Collision Attack. IEEE Trans. Inf. Forensics Secur. 12(9): 2090-2104 (2017) - [c51]Eleonora Cagli, Cécile Dumas
, Emmanuel Prouff:
Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing. CHES 2017: 45-68 - [c50]Sonia Belaïd, Fabrice Benhamouda
, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
:
Private Multiplication over Finite Fields. CRYPTO (3) 2017: 397-426 - [i25]Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff:
Privacy-Preserving Classification on Deep Neural Network. IACR Cryptol. ePrint Arch. 2017: 35 (2017) - [i24]Eleonora Cagli, Cécile Dumas, Emmanuel Prouff:
Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures - Profiling Attacks without Pre-Processing -. IACR Cryptol. ePrint Arch. 2017: 740 (2017) - [i23]Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff:
Linear Repairing Codes and Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2017: 918 (2017) - 2016
- [c49]Claude Carlet, Emmanuel Prouff:
Polynomial Evaluation and Side Channel Analysis. The New Codebreakers 2016: 315-341 - [c48]Eleonora Cagli, Cécile Dumas
, Emmanuel Prouff:
Kernel Discriminant Analysis for Information Extraction in the Presence of Masking. CARDIS 2016: 1-22 - [c47]Alberto Battistello
, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. CHES 2016: 23-39 - [c46]Jean-Sébastien Coron, Aurélien Greuet
, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. CHES 2016: 498-514 - [c45]Sonia Belaïd, Fabrice Benhamouda
, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
:
Randomness Complexity of Private Circuits for Multiplication. EUROCRYPT (2) 2016: 616-648 - [c44]Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff:
Breaking Cryptographic Implementations Using Deep Learning Techniques. SPACE 2016: 3-26 - [i22]Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud:
Randomness Complexity of Private Circuits for Multiplication. IACR Cryptol. ePrint Arch. 2016: 211 (2016) - [i21]Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Algebraic Decomposition for Probing Security. IACR Cryptol. ePrint Arch. 2016: 321 (2016) - [i20]Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. IACR Cryptol. ePrint Arch. 2016: 540 (2016) - [i19]Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:
Faster Evaluation of SBoxes via Common Shares. IACR Cryptol. ePrint Arch. 2016: 572 (2016) - [i18]Houssem Maghrebi, Thibault Portigliatti, Emmanuel Prouff:
Breaking Cryptographic Implementations Using Deep Learning Techniques. IACR Cryptol. ePrint Arch. 2016: 921 (2016) - 2015
- [j9]Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild:
Horizontal collision correlation attack on elliptic curves - - Extended Version -. Cryptogr. Commun. 7(1): 91-119 (2015) - [c43]Eleonora Cagli, Cécile Dumas
, Emmanuel Prouff:
Enhancing Dimensionality Reduction Methods for Side-Channel Attacks. CARDIS 2015: 15-33 - [c42]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. CHES 2015: 395-415 - [c41]Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Algebraic Decomposition for Probing Security. CRYPTO (1) 2015: 742-763 - [i17]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. IACR Cryptol. ePrint Arch. 2015: 359 (2015) - [i16]Adrian Thillard, Emmanuel Prouff, Thomas Roche:
Success through confidence: Evaluating the effectiveness of a side-channel attack. IACR Cryptol. ePrint Arch. 2015: 402 (2015) - [i15]Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:
Improved Side-Channel Analysis of Finite-Field Multiplication. IACR Cryptol. ePrint Arch. 2015: 542 (2015) - 2014
- [j8]Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi, Emmanuel Prouff:
Achieving side-channel high-order correlation immunity with leakage squeezing. J. Cryptogr. Eng. 4(2): 107-121 (2014) - [c40]Vincent Grosso, Emmanuel Prouff, François-Xavier Standaert
:
Efficient Masked S-Boxes Processing - A Step Forward -. AFRICACRYPT 2014: 251-266 - [c39]Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard:
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks. CHES 2014: 35-54 - [c38]Aurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche:
Side-Channel Attack against RSA Key Generation Algorithms. CHES 2014: 223-241 - [c37]Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
On the Practical Security of a Leakage Resilient Masking Scheme. CT-RSA 2014: 169-182 - [c36]Éliane Jaulmes, Emmanuel Prouff, Justine Wild:
Side-Channel Analysis of Montgomery's Representation Randomization. Selected Areas in Cryptography 2014: 212-227 - [e4]Emmanuel Prouff:
Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8622, Springer 2014, ISBN 978-3-319-10174-3 [contents] - [i14]Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard:
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 673 (2014) - 2013
- [j7]Emmanuel Prouff, Patrick Schaumont
:
Introduction to the CHES 2012 special issue. J. Cryptogr. Eng. 3(1): 1 (2013) - [j6]Guillaume Dabosville, Julien Doget, Emmanuel Prouff:
A New Second-Order Side Channel Attack Based on Linear Regression. IEEE Trans. Computers 62(8): 1629-1640 (2013) - [c35]Victor Lomné, Emmanuel Prouff, Thomas Roche:
Behind the Scene of Side Channel Attacks. ASIACRYPT (1) 2013: 506-525 - [c34]Vincent Grosso, François-Xavier Standaert
, Emmanuel Prouff:
Low Entropy Masking Schemes, Revisited. CARDIS 2013: 33-43 - [c33]Adrian Thillard, Emmanuel Prouff, Thomas Roche:
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack. CHES 2013: 21-36 - [c32]Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild:
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations. CT-RSA 2013: 1-17 - [c31]Emmanuel Prouff, Matthieu Rivain:
Masking against Side-Channel Attacks: A Formal Security Proof. EUROCRYPT 2013: 142-159 - [c30]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. FSE 2013: 410-424 - [c29]Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild:
Horizontal Collision Correlation Attack on Elliptic Curves. Selected Areas in Cryptography 2013: 553-570 - [e3]Emmanuel Prouff:
Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7864, Springer 2013, ISBN 978-3-642-40025-4 [contents] - [i13]Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
On the Practical Security of a Leakage Resilient Masking Scheme. IACR Cryptol. ePrint Arch. 2013: 396 (2013) - [i12]Victor Lomné, Emmanuel Prouff, Thomas Roche:
Behind the Scene of Side Channel Attacks. IACR Cryptol. ePrint Arch. 2013: 794 (2013) - 2012
- [j5]Thomas Roche, Emmanuel Prouff:
Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version. J. Cryptogr. Eng. 2(2): 111-127 (2012) - [c28]Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche:
On the Use of Shamir's Secret Sharing against Side-Channel Analysis. CARDIS 2012: 77-90 - [c27]Jean-Sébastien Coron, Christophe Giraud
, Emmanuel Prouff, Soline Renner, Matthieu Rivain, Praveen Kumar Vadnala:
Conversion of Security Proofs from One Leakage Model to Another: A New Issue. COSADE 2012: 69-81 - [c26]Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger:
A First-Order Leak-Free Masking Countermeasure. CT-RSA 2012: 156-170 - [c25]Claude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater, Matthieu Rivain:
Higher-Order Masking Schemes for S-Boxes. FSE 2012: 366-384 - [c24]Houssem Maghrebi, Sylvain Guilley, Emmanuel Prouff, Jean-Luc Danger:
Register leakage masking using Gray code. HOST 2012: 37-42 - [e2]Emmanuel Prouff, Patrick Schaumont
:
Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7428, Springer 2012, ISBN 978-3-642-33026-1 [contents] - [i11]Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger:
A First-Order Leak-Free Masking Countermeasure. IACR Cryptol. ePrint Arch. 2012: 28 (2012) - 2011
- [j4]Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert
:
Univariate side channel attacks and leakage modeling. J. Cryptogr. Eng. 1(2): 123-144 (2011) - [j3]Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert
, Nicolas Veyrat-Charvillon:
Mutual Information Analysis: a Comprehensive Study. J. Cryptol. 24(2): 269-291 (2011) - [c23]Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:
Montgomery's Trick and Fast Implementation of Masked AES. AFRICACRYPT 2011: 153-169 - [c22]Emmanuel Prouff, Thomas Roche:
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols. CHES 2011: 63-78 - [c21]Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. CHES 2011: 240-255 - [e1]Emmanuel Prouff:
Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7079, Springer 2011, ISBN 978-3-642-27256-1 [contents] - [i10]Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert:
Univariate Side Channel Attacks and Leakage Modeling. IACR Cryptol. ePrint Arch. 2011: 302 (2011) - [i9]Emmanuel Prouff, Thomas Roche:
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation. IACR Cryptol. ePrint Arch. 2011: 413 (2011) - [i8]Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. IACR Cryptol. ePrint Arch. 2011: 425 (2011) - [i7]Julien Doget, Guillaume Dabosville, Emmanuel Prouff:
Defeat Masking With a (Very) Few Knowledge About the Leakage. IACR Cryptol. ePrint Arch. 2011: 505 (2011) - 2010
- [j2]Emmanuel Prouff, Matthieu Rivain:
Theoretical and practical aspects of mutual information-based side channel analysis. Int. J. Appl. Cryptogr. 2(2): 121-138 (2010) - [c20]Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:
Secure Multiplicative Masking of Power Functions. ACNS 2010: 200-217 - [c19]Matthieu Rivain, Emmanuel Prouff:
Provably Secure Higher-Order Masking of AES. CHES 2010: 413-427 - [c18]Emmanuel Prouff, Thomas Roche:
Attack on a Higher-Order Masking of the AES Based on Homographic Functions. INDOCRYPT 2010: 262-281 - [c17]Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain:
Affine Masking against Higher-Order Side Channel Analysis. Selected Areas in Cryptography 2010: 262-280 - [i6]Emmanuel Prouff, Robert P. McEvoy:
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure - Extended Version -. IACR Cryptol. ePrint Arch. 2010: 385 (2010) - [i5]Matthieu Rivain, Emmanuel Prouff:
Provably Secure Higher-Order Masking of AES. IACR Cryptol. ePrint Arch. 2010: 441 (2010) - [i4]Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain:
Affine Masking against Higher-Order Side Channel Analysis. IACR Cryptol. ePrint Arch. 2010: 523 (2010) - [i3]Emmanuel Prouff, Matthieu Rivain, Régis Bevan:
Statistical Analysis of Second Order Differential Power Analysis. IACR Cryptol. ePrint Arch. 2010: 646 (2010)
2000 – 2009
- 2009
- [j1]Emmanuel Prouff, Matthieu Rivain, Régis Bevan:
Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans. Computers 58(6): 799-811 (2009) - [c16]Emmanuel Prouff, Matthieu Rivain:
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. ACNS 2009: 499-518 - [c15]Emmanuel Prouff, Robert P. McEvoy:
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. CHES 2009: 81-96 - [c14]Matthieu Rivain, Emmanuel Prouff, Julien Doget:
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. CHES 2009: 171-188 - [c13]Laurie Genelle, Christophe Giraud
, Emmanuel Prouff:
Securing AES Implementation against Fault Attacks. FDTC 2009: 51-62 - [i2]Matthieu Rivain, Emmanuel Prouff, Julien Doget:
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers. IACR Cryptol. ePrint Arch. 2009: 420 (2009) - 2008
- [c12]Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Prouff:
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices. CARDIS 2008: 191-205 - [c11]Jean-Sébastien Coron, Christophe Giraud
, Emmanuel Prouff, Matthieu Rivain:
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. CHES 2008: 1-14 - [c10]Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff:
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. FSE 2008: 127-143 - [i1]Matthieu Rivain, Emmanuelle Dottax
, Emmanuel Prouff:
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. IACR Cryptol. ePrint Arch. 2008: 21 (2008) - 2007
- [c9]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain:
Side Channel Cryptanalysis of a Higher Order Masking Scheme. CHES 2007: 28-44 - [c8]Emmanuel Prouff, Matthieu Rivain:
A Generic Method for Secure SBox Implementation. WISA 2007: 227-244 - [c7]Arnaud Boscher, Robert Naciri, Emmanuel Prouff:
CRT RSA Algorithm Protected Against Fault Attacks. WISTP 2007: 229-243 - 2006
- [c6]Jean-Bernard Fischer, Emmanuel Prouff:
Off-Line Group Signatures with Smart Cards. CARDIS 2006: 263-277 - [c5]Emmanuel Prouff, Christophe Giraud
, Sébastien Aumônier:
Provably Secure S-Box Implementation Based on Fourier Transform. CHES 2006: 216-230 - 2005
- [c4]Emmanuel Prouff:
DPA Attacks and S-Boxes. FSE 2005: 424-441 - 2003
- [c3]Claude Carlet, Emmanuel Prouff:
Vectorial Functions and Covering Sequences. International Conference on Finite Fields and Applications 2003: 215-248 - [c2]Claude Carlet, Emmanuel Prouff:
On Plateaued Functions and Their Constructions. FSE 2003: 54-73 - [c1]Claude Carlet, Emmanuel Prouff:
On a New Notion of Nonlinearity Relevant to Multi-output Pseudo-random Generators. Selected Areas in Cryptography 2003: 291-305
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint