| 1 | 2010 | CHES | pc |
| 2 | 2009 | CHES | pc chair |
| 3 | 2008 | CHES | pc |
| 4 | 2007 | CHES | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2012 | Generating Provable Primes Efficiently on Embedded Devices | pkc | 372-389 |
| 2 | 2011 | Improved Collision-Correlation Power Analysis on First Order Protected AES | ches | 49-62 |
| 3 | 2010 | Horizontal Correlation Analysis on Exponentiation | eprint | online |
| 4 | 2007 | On the Implementation of a Fast Prime Generation Algorithm | ches | 443-449 |
| 5 | 2007 | Secret External Encodings Do Not Prevent Transient Fault Analysis | ches | 181-194 |
| 6 | 2006 | Why One Should Also Secure RSA Public Key Elements | ches | online |
| 7 | 2004 | Correlation Power Analysis with a Leakage Model | ches | 16-29 |
| 8 | 2004 | Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm | eprint | online |
| 9 | 2003 | Optimal Statistical Power Analysis | eprint | online |
| 10 | 2001 | Cryptanalysis of RSA Signatures with Fixed-Pattern Padding | crypto | 433-439 |
| 11 | 2001 | Universal Exponentiation Algorithm | ches | 300-308 |
| 12 | 2000 | Differential Power Analysis in the Presence of Hardware Countermeasures | ches | 252-263 |
Coauthors of Christophe Clavier |