What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sonia Belaïd
Google Scholar
25
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Further Improvements in AES Execution over TFHE.
Sonia Belaïd
Nicolas Bon
Aymen Boudguiga
Renaud Sirdey
Daphné Trama
Nicolas Ye
2025
journals/cic
SoK: A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations.
Sonia Belaïd
Gaëtan Cassiers
Camille Mutschler
Matthieu Rivain
Thomas Roche
François-Xavier Standaert
Abdul Rahman Taleb
2025
conf/eurocrypt
New Techniques for Random Probing Security and Application to Raccoon Signature Scheme.
Sonia Belaïd
Matthieu Rivain
Mélissa Rossi
2025
conf/crypto
Transistor: a TFHE-Friendly Stream Cipher.
Jules Baudrin
Sonia Belaïd
Nicolas Bon
Christina Boura
Anne Canteaut
Gaëtan Leurent
Pascal Paillier
Léo Perrin
Matthieu Rivain
Yann Rotella
Samuel Tap
2024
journals/joc
Masking the GLP Lattice-Based Signature Scheme at Any Order.
Gilles Barthe
Sonia Belaïd
Thomas Espitau
Pierre-Alain Fouque
Benjamin Grégoire
Mélissa Rossi
Mehdi Tibouchi
2024
conf/asiacrypt
Formal Definition and Verification for Combined Random Fault and Random Probing Security.
Sonia Belaïd
Jakob Feldtkeller
Tim Güneysu
Anna Guinet
Jan Richter-Brockmann
Matthieu Rivain
Pascal Sasdrich
Abdul Rahman Taleb
2023
journals/tches
High Order Side-Channel Security for Elliptic-Curve Implementations.
Sonia Belaïd
Matthieu Rivain
2023
conf/crypto
Unifying Freedom and Separation for Tight Probing-Secure Composition.
Sonia Belaïd
Gaëtan Cassiers
Matthieu Rivain
Abdul Rahman Taleb
2022
conf/sp
IronMask: Versatile Verification of Masking Security.
Sonia Belaïd
Darius Mercadier
Matthieu Rivain
Abdul Rahman Taleb
2021
conf/eurocrypt
On the Power of Expansion: More Efficient Constructions in the Random Probing Model.
Sonia Belaïd
Matthieu Rivain
Abdul Rahman Taleb
2021
conf/asiacrypt
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.
Sonia Belaïd
Matthieu Rivain
Abdul Rahman Taleb
Damien Vergnaud
2020
conf/crypto
Random Probing Security: Verification, Composition, Expansion and New Constructions.
Sonia Belaïd
Jean-Sébastien Coron
Emmanuel Prouff
Matthieu Rivain
Abdul Rahman Taleb
2020
conf/eurocrypt
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations.
Sonia Belaïd
Pierre-Évariste Dagand
Darius Mercadier
Matthieu Rivain
Raphaël Wintersdorff
2019
conf/ccs
GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
Gilles Barthe
Sonia Belaïd
Thomas Espitau
Pierre-Alain Fouque
Mélissa Rossi
Mehdi Tibouchi
2019
conf/esorics
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Gilles Barthe
Sonia Belaïd
Gaëtan Cassiers
Pierre-Alain Fouque
Benjamin Grégoire
François-Xavier Standaert
2018
conf/eurocrypt
Masking the GLP Lattice-Based Signature Scheme at Any Order.
Gilles Barthe
Sonia Belaïd
Thomas Espitau
Pierre-Alain Fouque
Benjamin Grégoire
Mélissa Rossi
Mehdi Tibouchi
2018
conf/asiacrypt
Tight Private Circuits: Achieving Probing Security with the Least Refreshing.
Sonia Belaïd
Dahmun Goudarzi
Matthieu Rivain
2017
conf/crypto
Private Multiplication over Finite Fields.
Sonia Belaïd
Fabrice Benhamouda
Alain Passelègue
Emmanuel Prouff
Adrian Thillard
Damien Vergnaud
2016
conf/ccs
Strong Non-Interference and Type-Directed Higher-Order Masking.
Gilles Barthe
Sonia Belaïd
François Dupressoir
Pierre-Alain Fouque
Benjamin Grégoire
Pierre-Yves Strub
Rébecca Zucchini
2016
conf/eurocrypt
Randomness Complexity of Private Circuits for Multiplication.
Sonia Belaïd
Fabrice Benhamouda
Alain Passelègue
Emmanuel Prouff
Adrian Thillard
Damien Vergnaud
2015
conf/acns
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
Michel Abdalla
Sonia Belaïd
David Pointcheval
Sylvain Ruhault
Damien Vergnaud
2015
conf/ches
Improved Side-Channel Analysis of Finite-Field Multiplication.
Sonia Belaïd
Jean-Sébastien Coron
Pierre-Alain Fouque
Benoît Gérard
Jean-Gabriel Kammerer
Emmanuel Prouff
2015
conf/eurocrypt
Verified Proofs of Higher-Order Masking.
Gilles Barthe
Sonia Belaïd
François Dupressoir
Pierre-Alain Fouque
Benjamin Grégoire
Pierre-Yves Strub
2014
conf/asiacrypt
Side-Channel Analysis of Multiplications in GF(2128) - Application to AES-GCM.
Sonia Belaïd
Pierre-Alain Fouque
Benoît Gérard
2013
conf/ches
Leakage-Resilient Symmetric Encryption via Re-keying.
Michel Abdalla
Sonia Belaïd
Pierre-Alain Fouque
Coauthors
Abdul Rahman Taleb
(7)
Adrian Thillard
(2)
Alain Passelègue
(2)
Anna Guinet
(1)
Anne Canteaut
(1)
Aymen Boudguiga
(1)
Benjamin Grégoire
(5)
Benoît Gérard
(2)
Camille Mutschler
(1)
Christina Boura
(1)
Dahmun Goudarzi
(1)
Damien Vergnaud
(4)
Daphné Trama
(1)
Darius Mercadier
(2)
David Pointcheval
(1)
Emmanuel Prouff
(4)
Fabrice Benhamouda
(2)
François Dupressoir
(2)
François-Xavier Standaert
(2)
Gaëtan Cassiers
(3)
Gaëtan Leurent
(1)
Gilles Barthe
(6)
Jakob Feldtkeller
(1)
Jan Richter-Brockmann
(1)
Jean-Gabriel Kammerer
(1)
Jean-Sébastien Coron
(2)
Jules Baudrin
(1)
Léo Perrin
(1)
Matthieu Rivain
(12)
Mehdi Tibouchi
(3)
Mélissa Rossi
(4)
Michel Abdalla
(2)
Nicolas Bon
(2)
Nicolas Ye
(1)
Pascal Paillier
(1)
Pascal Sasdrich
(1)
Pierre-Alain Fouque
(9)
Pierre-Évariste Dagand
(1)
Pierre-Yves Strub
(2)
Raphaël Wintersdorff
(1)
Rébecca Zucchini
(1)
Renaud Sirdey
(1)
Samuel Tap
(1)
Sonia Belaïd
(25)
Sylvain Ruhault
(1)
Thomas Espitau
(3)
Thomas Roche
(1)
Tim Güneysu
(1)
Yann Rotella
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to