default search action
Vincent Grosso
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer syndrome decoding in the presence of noise. Cryptogr. Commun. 16(5): 1103-1134 (2024) - [j9]Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso:
Switching Off your Device Does Not Protect Against Fault Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 425-450 (2024) - [c27]Rim Zahmoul, Vincent Grosso:
Relaxed Threshold Implementations. CF (Companion) 2024 - [i26]Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso:
Switching Off your Device Does Not Protect Against Fault Attacks. IACR Cryptol. ePrint Arch. 2024: 1123 (2024) - [i25]Vlad-Florin Dragoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso:
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation. IACR Cryptol. ePrint Arch. 2024: 1694 (2024) - 2023
- [c26]Boly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso, Brice Colombier:
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial. AFRICACRYPT 2023: 105-125 - [c25]Dorian Llavata, Eleonora Cagli, Rémi Eyraud, Vincent Grosso, Lilian Bossuet:
Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks. CARDIS 2023: 235-255 - [c24]Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem - Efficient Side-Channel Attacks Against Classic McEliece. COSADE 2023: 170-192 - [c23]Lilian Bossuet, Vincent Grosso, Carlos Andres Lara-Nino:
Emulating Side Channel Attacks on gem5: lessons learned. EuroS&P Workshops 2023: 287-295 - [c22]Mateus Simões, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno:
Low-Latency Masking with Arbitrary Protection Order Based on Click Elements. HOST 2023: 36-47 - [c21]Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso:
BALoo: First and Efficient Countermeasure Dedicated to Persistent Fault Attacks. IOLTS 2023: 1-7 - [i24]Vincent Grosso, Pierre-Louis Cayrel, Brice Colombier, Vlad-Florin Dragoi:
Punctured Syndrome Decoding Problem Efficient Side-Channel Attacks Against Classic McEliece. IACR Cryptol. ePrint Arch. 2023: 308 (2023) - [i23]Brice Colombier, Vincent Grosso, Pierre-Louis Cayrel, Vlad-Florin Dragoi:
Horizontal Correlation Attack on Classic McEliece. IACR Cryptol. ePrint Arch. 2023: 546 (2023) - [i22]Pierre-Antoine Tissot, Lilian Bossuet, Vincent Grosso:
BALoo: First and Efficient Countermeasure dedicated to Persistent Fault Attacks. IACR Cryptol. ePrint Arch. 2023: 944 (2023) - 2022
- [j8]Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert:
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 140-165 (2022) - [j7]Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem. IEEE Trans. Inf. Forensics Secur. 17: 3407-3420 (2022) - [c20]Mateus Simoes, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad, Thomas Sarno:
Self-timed Masking: Implementing Masked S-Boxes Without Registers. CARDIS 2022: 146-164 - [c19]Boly Seck, Pierre-Louis Cayrel, Idy Diop, Vlad-Florin Dragoi, Kalen Couzon, Brice Colombier, Vincent Grosso:
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems. ICISC 2022: 219-234 - [c18]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. ITW 2022: 482-487 - [e1]Vincent Grosso, Thomas Pöppelmann:
Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11-12, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13173, Springer 2022, ISBN 978-3-030-97347-6 [contents] - [i21]Brice Colombier, Vlad-Florin Dragoi, Pierre-Louis Cayrel, Vincent Grosso:
Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem. IACR Cryptol. ePrint Arch. 2022: 125 (2022) - [i20]Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer Syndrome Decoding in the Presence of Noise. IACR Cryptol. ePrint Arch. 2022: 636 (2022) - [i19]Mateus Simoes, Lilian Bossuet, Nicolas Bruneau, Vincent Grosso, Patrick Haddad:
Self-Timed Masking: Implementing First-Order Masked S-Boxes Without Registers. IACR Cryptol. ePrint Arch. 2022: 641 (2022) - 2021
- [j6]Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso:
Improving Deep Learning Networks for Profiled Side-channel Analysis Using Performance Improvement Techniques. ACM J. Emerg. Technol. Comput. Syst. 17(3): 41:1-41:30 (2021) - [i18]Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert:
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? IACR Cryptol. ePrint Arch. 2021: 951 (2021) - [i17]Damien Robissout, Lilian Bossuet, Amaury Habrard, Vincent Grosso:
Improving Deep Learning Networks for Profiled Side-Channel Analysis Using Performance Improvement Techniques. IACR Cryptol. ePrint Arch. 2021: 1546 (2021) - 2020
- [j5]Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain:
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 209-238 (2020) - [c17]Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle. CRYPTO (1) 2020: 369-400 - [c16]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. EUROCRYPT (1) 2020: 581-611 - [i16]Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle. IACR Cryptol. ePrint Arch. 2020: 211 (2020) - [i15]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. IACR Cryptol. ePrint Arch. 2020: 425 (2020)
2010 – 2019
- 2019
- [c15]Cezary Glowacz, Vincent Grosso:
Optimal Collision Side-Channel Attacks. CARDIS 2019: 126-140 - [i14]Cezary Glowacz, Vincent Grosso:
Optimal Collision Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2019: 828 (2019) - 2018
- [j4]Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert:
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 89-120 (2018) - [c14]Vincent Grosso:
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys. CARDIS 2018: 80-94 - [c13]Vincent Grosso, François-Xavier Standaert:
Masking Proofs Are Tight and How to Exploit it in Security Evaluations. EUROCRYPT (2) 2018: 385-412 - [i13]Vincent Grosso:
Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys. IACR Cryptol. ePrint Arch. 2018: 175 (2018) - [i12]Qian Guo, Vincent Grosso, François-Xavier Standaert:
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint. IACR Cryptol. ePrint Arch. 2018: 498 (2018) - 2017
- [j3]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptogr. Eng. 7(2): 149-165 (2017) - [i11]Vincent Grosso, François-Xavier Standaert:
Masking Proofs are Tight (and How to Exploit it in Security Evaluations). IACR Cryptol. ePrint Arch. 2017: 116 (2017) - [i10]Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert:
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model. IACR Cryptol. ePrint Arch. 2017: 711 (2017) - 2016
- [c12]Romain Poussier, François-Xavier Standaert, Vincent Grosso:
Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach. CHES 2016: 61-81 - [c11]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016: 171-193 - [i9]Romain Poussier, François-Xavier Standaert, Vincent Grosso:
Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach. IACR Cryptol. ePrint Arch. 2016: 571 (2016) - [i8]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptol. ePrint Arch. 2016: 647 (2016) - 2015
- [b1]Vincent Grosso:
Towards side-channel secure block ciphers. Catholic University of Louvain, Louvain-la-Neuve, Belgium, 2015 - [j2]Sonia Belaïd, Vincent Grosso, François-Xavier Standaert:
Masking and leakage-resilient primitives: One, the other(s) or both? Cryptogr. Commun. 7(1): 163-184 (2015) - [c10]Vincent Grosso, François-Xavier Standaert:
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? ASIACRYPT (2) 2015: 291-312 - [c9]Romain Poussier, Vincent Grosso, François-Xavier Standaert:
Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations. CARDIS 2015: 125-142 - [c8]Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert:
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment. FSE 2015: 117-129 - [i7]Vincent Grosso, François-Xavier Standaert, Sebastian Faust:
Masking vs. Multiparty Computation: How Large is the Gap for AES? IACR Cryptol. ePrint Arch. 2015: 492 (2015) - [i6]Vincent Grosso, François-Xavier Standaert:
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? IACR Cryptol. ePrint Arch. 2015: 535 (2015) - 2014
- [j1]Vincent Grosso, François-Xavier Standaert, Sebastian Faust:
Masking vs. multiparty computation: how large is the gap for AES? J. Cryptogr. Eng. 4(1): 47-57 (2014) - [c7]Vincent Grosso, Emmanuel Prouff, François-Xavier Standaert:
Efficient Masked S-Boxes Processing - A Step Forward -. AFRICACRYPT 2014: 251-266 - [c6]Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert:
On the Cost of Lazy Engineering for Masked Software Implementations. CARDIS 2014: 64-81 - [c5]Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar:
Combining Leakage-Resilient PRFs and Shuffling - Towards Bounded Security for Small Embedded Devices. CARDIS 2014: 122-136 - [c4]Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varici:
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. FSE 2014: 18-37 - [i5]Sonia Belaïd, Vincent Grosso, François-Xavier Standaert:
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both? IACR Cryptol. ePrint Arch. 2014: 53 (2014) - [i4]Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar:
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices). IACR Cryptol. ePrint Arch. 2014: 411 (2014) - [i3]Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert:
On the Cost of Lazy Engineering for Masked Software Implementations. IACR Cryptol. ePrint Arch. 2014: 413 (2014) - [i2]Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schueth, François-Xavier Standaert:
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment. IACR Cryptol. ePrint Arch. 2014: 920 (2014) - 2013
- [c3]Vincent Grosso, François-Xavier Standaert, Emmanuel Prouff:
Low Entropy Masking Schemes, Revisited. CARDIS 2013: 33-43 - [c2]Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert:
Block Ciphers That Are Easier to Mask: How Far Can We Go? CHES 2013: 383-399 - [c1]Vincent Grosso, François-Xavier Standaert, Sebastian Faust:
Masking vs. Multiparty Computation: How Large Is the Gap for AES? CHES 2013: 400-416 - [i1]Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert:
Block Ciphers that are Easier to Mask: How Far Can we Go? IACR Cryptol. ePrint Arch. 2013: 369 (2013)
Coauthor Index
aka: Vlad-Florin Dragoi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint