Side-channel attacks on BLISS lattice-based signatures: Exploiting branch tracing against strongswan and electromagnetic emanations in microcontrollers T Espitau, PA Fouque, B Gérard, M Tibouchi Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 124 | 2017 |
Synthesizing probabilistic invariants via Doob’s decomposition G Barthe, T Espitau, LM Ferrer Fioriti, J Hsu International Conference on Computer Aided Verification, 43-61, 2016 | 46 | 2016 |
Masking the GLP lattice-based signature scheme at any order G Barthe, S Belaïd, T Espitau, PA Fouque, B Grégoire, M Rossi, ... Annual International Conference on the Theory and Applications of …, 2018 | 42 | 2018 |
Loop-abort faults on lattice-based fiat-shamir and hash-and-sign signatures T Espitau, PA Fouque, B Gérard, M Tibouchi International Conference on Selected Areas in Cryptography, 140-158, 2016 | 36 | 2016 |
Computing generator in cyclotomic integer rings JF Biasse, T Espitau, PA Fouque, A Gélin, P Kirchner Annual International Conference on the Theory and Applications of …, 2017 | 35 | 2017 |
Proving expected sensitivity of probabilistic programs G Barthe, T Espitau, B Grégoire, J Hsu, PY Strub Proceedings of the ACM on Programming Languages 2 (POPL), 1-29, 2017 | 31 | 2017 |
LWE without modular reduction and improved side-channel attacks against BLISS J Bootle, C Delaplace, T Espitau, PA Fouque, M Tibouchi International Conference on the Theory and Application of Cryptology and …, 2018 | 30 | 2018 |
GALACTICS: Gaussian sampling for lattice-based constant-time implementation of cryptographic signatures, revisited G Barthe, S Belaïd, T Espitau, PA Fouque, M Rossi, M Tibouchi Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 29 | 2019 |
Relational reasoning via probabilistic coupling G Barthe, T Espitau, B Grégoire, J Hsu, L Stefanesco, PY Strub Logic for programming, artificial intelligence, and reasoning, 387-401, 2015 | 25 | 2015 |
Loop-abort faults on lattice-based signature schemes and key exchange protocols T Espitau, PA Fouque, B Gerard, M Tibouchi IEEE Transactions on Computers 67 (11), 1535-1549, 2018 | 23 | 2018 |
An assertion-based program logic for probabilistic programs G Barthe, T Espitau, M Gaboardi, B Grégoire, J Hsu, PY Strub European Symposium on Programming, 117-144, 2018 | 19 | 2018 |
Proving uniformity and independence by self-composition and coupling G Barthe, T Espitau, B Grégoire, J Hsu, PY Strub arXiv preprint arXiv:1701.06477, 2017 | 17 | 2017 |
Liftings for differential privacy G Barthe, T Espitau, J Hsu, T Sato, PY Strub ICALP 2017, 2017 | 16* | 2017 |
Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE T Espitau, PA Fouque, P Karpman Annual Cryptology Conference, 683-701, 2015 | 14 | 2015 |
Fast Reduction of Algebraic Lattices over Cyclotomic Fields T Espitau, P Kirchner, PA Fouque Annual International Cryptology Conference, 155-185, 2020 | 8* | 2020 |
A program logic for probabilistic programs G Barthe, T Espitau, M Gaboardi, B Grégoire, J Hsu, PY Strub Available at justinh. su/files/papers/ellora. pdf, 2016 | 7 | 2016 |
On a dual/hybrid approach to small secret LWE T Espitau, A Joux, N Kharchenko International Conference on Cryptology in India, 440-462, 2020 | 6 | 2020 |
Computing generator in cyclotomic integer rings T Espitau, PA Fouque, A Gélin, P Kirchner Cryptology ePrint Archive, 2016 | 6 | 2016 |
The nearest-colattice algorithm: Time-approximation tradeoff for approx-CVP T Espitau, P Kirchner Open Book Series 4 (1), 251-266, 2020 | 5 | 2020 |
On a hybrid approach to solve small secret LWE T Espitau, A Joux, N Kharchenko Cryptology ePrint Archive, 2020 | 5 | 2020 |