Skip to main content

previous disabled Page of 2
and
  1. No Access

    Book and Conference Proceedings

    Smart Card Research and Advanced Applications

    22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, November 14–16, 2023, Revised Selected Papers

    Shivam Bhasin, Thomas Roche in Lecture Notes in Computer Science (2024)

  2. No Access

    Article

    A Methodology for Experimental Quantification of Firebrand Generation from WUI Fuels

    Over the past few years, numerous large-scale disasters have occurred due to wildfires at the wildland-urban interface (WUI). In these fires, spread via the transport of firebrands (burning embers) plays a sig...

    Mohammadhadi Hajilou, Steven Hu, Thomas Roche, Priya Garg in Fire Technology (2021)

  3. No Access

    Article

    Making the connection: Examining the relationship between undergraduate students’ digital literacy and academic success in an English medium instruction (EMI) university

    The transition through the first year of university study is challenging for the majority of students. For students from Culturally and Linguistically Diverse (CALD) backgrounds, commencing studies in an Engli...

    Sameera Tahira Ahmed, Thomas Roche in Education and Information Technologies (2021)

  4. No Access

    Chapter and Conference Paper

    Side-Channel Attacks on Blinded Scalar Multiplications Revisited

    In a series of recent articles (from 2011 to 2017), Schindler et al. show that exponent/scalar blinding is not as effective a countermeasure as expected against side-channel attacks targeting RSA modular exponent...

    Thomas Roche, Laurent Imbert, Victor Lomné in Smart Card Research and Advanced Applications (2020)

  5. No Access

    Chapter

    Understanding Higher Education Attrition in English-Medium Programs in the Arab Gulf States: Identifying Push, Pull and Fallout Factors at an Omani University

    Attrition rates are typically higher in English-medium university programs in the Arab Gulf States than in programs offered in Arabic. This paper reports on the results of a study of academic engagement at a p...

    Yogesh Sinha, Thomas Roche, Manisha Sinha in English Education in Oman (2018)

  6. No Access

    Chapter

    Vocabulary Recognition Skill as a Screening Tool in English-as-a-Lingua-Franca University Settings

    Research has shown that vocabulary recognition skill is a readily measured and relatively robust predictor of second language performance in university settings in English-speaking countries. This study builds...

    Thomas Roche, Michael Harrington in Post-admission Language Assessment of Univ… (2016)

  7. Chapter and Conference Paper

    Algebraic Decomposition for Probing Security

    The probing security model is very popular to prove the side-channel security of cryptographic implementations protected by masking. A common approach to secure nonlinear functions in this model is to represen...

    Claude Carlet, Emmanuel Prouff, Matthieu Rivain in Advances in Cryptology -- CRYPTO 2015 (2015)

  8. No Access

    Chapter and Conference Paper

    On the Practical Security of a Leakage Resilient Masking Scheme

    Implementations of cryptographic algorithms are vulnerable to Side-Channel Analyses extracting information from the device behaviour. When such an attack targets the manipulation of several, say d, intermediate v...

    Emmanuel Prouff, Matthieu Rivain, Thomas Roche in Topics in Cryptology – CT-RSA 2014 (2014)

  9. Chapter and Conference Paper

    Side-Channel Attack against RSA Key Generation Algorithms

    Many applications of embedded devices require the generation of cryptographic secret parameters during the life cycle of the product. In such an unsafe context, several papers have shown that key generation al...

    Aurélie Bauer, Eliane Jaulmes, Victor Lomné in Cryptographic Hardware and Embedded System… (2014)

  10. Chapter and Conference Paper

    How to Estimate the Success Rate of Higher-Order Side-Channel Attacks

    The resistance of a cryptographic implementation with regards to side-channel analysis is often quantified by measuring the success rate of a given attack. This approach cannot always be followed in practice, ...

    Victor Lomné, Emmanuel Prouff in Cryptographic Hardware and Embedded System… (2014)

  11. Chapter and Conference Paper

    Higher-Order Side Channel Security and Mask Refreshing

    Masking is a widely used countermeasure to protect block cipher implementations against side-channel attacks. The principle is to split every sensitive intermediate variable occurring in the computation into ...

    Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain in Fast Software Encryption (2014)

  12. Article

    Open Access

    Recognition vocabulary knowledge as a predictor of academic performance in an English as a foreign language setting

    This paper presents findings of a study of recognition vocabulary knowledge as a predictor of written Academic English Proficiency (AEP) and overall Academic Achievement in an English medium higher education p...

    Thomas Roche, Michael Harrington in Language Testing in Asia (2013)

  13. Chapter and Conference Paper

    SCARE of Secret Ciphers with SPN Structures

    Side-Channel Analysis (SCA) is commonly used to recover secret keys involved in the implementation of publicly known cryptographic algorithms. On the other hand, Side-Channel Analysis for Reverse Engineering (...

    Matthieu Rivain, Thomas Roche in Advances in Cryptology - ASIACRYPT 2013 (2013)

  14. Chapter and Conference Paper

    Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack

    Side-channel attacks usually apply a divide-and-conquer strategy, separately recovering different parts of the secret. Their efficiency in practice relies on the adversary ability to precisely assess the succe...

    Adrian Thillard, Emmanuel Prouff in Cryptographic Hardware and Embedded System… (2013)

  15. Chapter and Conference Paper

    Behind the Scene of Side Channel Attacks

    Since the introduction of side channel attacks in the nineties, a large amount of work has been devoted to their effectiveness and efficiency improvements. On the one side, general results and conclusions are ...

    Victor Lomné, Emmanuel Prouff, Thomas Roche in Advances in Cryptology - ASIACRYPT 2013 (2013)

  16. No Access

    Chapter and Conference Paper

    On the Use of Shamir’s Secret Sharing against Side-Channel Analysis

    At CHES 2011 Goubin and Martinelli described a new countermeasure against side-channel analysis for AES based on Shamir’s secret-sharing scheme. In the present paper, we exhibit a flaw in this scheme and we sh...

    Jean-Sébastien Coron, Emmanuel Prouff in Smart Card Research and Advanced Applicati… (2013)

  17. No Access

    Chapter and Conference Paper

    Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices

    In this paper we study the collision-correlation attack published by Clavier et al. at CHES 2011 on a 1st-order Boolean masking scheme and show its lack of robustness against unknown and high level ...

    Thomas Roche, Victor Lomné in Constructive Side-Channel Analysis and Secure Design (2013)

  18. No Access

    Article

    Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols

    Higher-order side channel analysis (HO-SCA) is a powerful technique against cryptographic implementations and the design of appropriate countermeasures is nowadays an important topic. In parallel, another clas...

    Thomas Roche, Emmanuel Prouff in Journal of Cryptographic Engineering (2012)

  19. Article

    Rigorous derivation of a plate theory in linear elastoplasticity via Γ-convergence

    This paper deals with dimension reduction in linearized elastoplasticity in the rate-independent case. The reference configuration of the elastoplastic body is given by a two-dimensional middle surface and a s...

    Matthias Liero, Thomas Roche in Nonlinear Differential Equations and Applications NoDEA (2012)

  20. Chapter and Conference Paper

    PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance

    Many papers deal with the problem of constructing an efficient masking scheme for existing block ciphers. We take the reverse approach: that is, given a proven masking scheme (Rivain and Prouff, CHES 2010) we ...

    Gilles Piret, Thomas Roche, Claude Carlet in Applied Cryptography and Network Security (2012)

previous disabled Page of 2