[go: up one dir, main page]

Follow
Dahmun Goudarzi
Dahmun Goudarzi
Quarkslab
Verified email at quarkslab.com - Homepage
Title
Cited by
Cited by
Year
How fast can higher-order masking be in software?
D Goudarzi, M Rivain
Annual International Conference on the Theory and Applications of …, 2017
1582017
Tight private circuits: Achieving probing security with the least refreshing
S Belaïd, D Goudarzi, M Rivain
International Conference on the Theory and Application of Cryptology and …, 2018
892018
Unifying leakage models on a Rényi day
T Prest, D Goudarzi, A Martinelli, A Passelègue
Annual International Cryptology Conference, 683-712, 2019
57*2019
Pyjamask: Block cipher and authenticated encryption with highly efficient masked implementation
D Goudarzi, J Jean, S Kölbl, T Peyrin, M Rivain, Y Sasaki, SM Sim
IACR transactions on symmetric cryptology, 31-59, 2020
382020
Sharp: Short relaxed range proofs
G Couteau, D Goudarzi, M Klooß, M Reichle
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
352022
Secure multiplication for bitslice higher-order masking: Optimisation and comparison
D Goudarzi, A Journault, M Rivain, FX Standaert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2018
302018
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking
D Goudarzi, M Rivain
Cryptographic Hardware and Embedded Systems – CHES 2016, 2016
282016
Probing security through input-output separation and revisited quasilinear masking
D Goudarzi, T Prest, M Rivain, D Vergnaud
IACR Transactions on Cryptographic Hardware and Embedded Systems, 599-640, 2021
272021
Short signatures from regular syndrome decoding
D Bui, E Carozza, G Couteau, D Goudarzi, A Joux
Revisited. Cryptology ePrint Archive, Paper 2024/252, 2024
26*2024
How to securely compute with noisy leakage in quasilinear complexity
D Goudarzi, A Joux, M Rivain
International Conference on the Theory and Application of Cryptology and …, 2018
262018
Lattice attacks against elliptic-curve signatures with blinded scalar multiplication
D Goudarzi, M Rivain, D Vergnaud
International Conference on Selected Areas in Cryptography, 120-139, 2016
182016
Pyjamask v1. 0
D Goudarzi, J Jean, S Kölbl, T Peyrin, M Rivain, Y Sasaki, SM Sim
Submission to the NIST Lightweight Cryptography Standardization Effort, 2019
14*2019
Generalized polynomial decomposition for s-boxes with application to side-channel countermeasures
D Goudarzi, M Rivain, D Vergnaud, S Vivek
International Conference on Cryptographic Hardware and Embedded Systems, 154-171, 2017
112017
Secure implementation of block ciphers against physical attacks
D Goudarzi
Université Paris sciences et lettres, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–14