default search action
Thomas Roche
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Camille Mutschler, Laurent Imbert, Thomas Roche:
Inspector Gadget: A Toolbox for Fair Comparison of Masking Gadgets, Application to Crystals-Kyber Compression. IACR Commun. Cryptol. 1(2): 18 (2024) - [e1]Shivam Bhasin, Thomas Roche:
Smart Card Research and Advanced Applications - 22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, November 14-16, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14530, Springer 2024, ISBN 978-3-031-54408-8 [contents] - [i15]Thomas Roche:
EUCLEAK. IACR Cryptol. ePrint Arch. 2024: 1380 (2024) - 2023
- [i14]Sonia Belaïd, Gaëtan Cassiers, Camille Mutschler, Matthieu Rivain, Thomas Roche, François-Xavier Standaert, Abdul Rahman Taleb:
Towards Achieving Provable Side-Channel Security in Practice. IACR Cryptol. ePrint Arch. 2023: 1198 (2023) - 2021
- [j5]Sameera Tahira Ahmed, Thomas Roche:
Making the connection: Examining the relationship between undergraduate students' digital literacy and academic success in an English medium instruction (EMI) university. Educ. Inf. Technol. 26(4): 4601-4620 (2021) - [c27]Thomas Roche, Victor Lomné, Camille Mutschler, Laurent Imbert:
A Side Journey To Titan. USENIX Security Symposium 2021: 231-248 - [i13]Victor Lomné, Thomas Roche:
A Side Journey to Titan. IACR Cryptol. ePrint Arch. 2021: 28 (2021)
2010 – 2019
- 2019
- [c26]Thomas Roche, Laurent Imbert, Victor Lomné:
Side-Channel Attacks on Blinded Scalar Multiplications Revisited. CARDIS 2019: 95-108 - [i12]Thomas Roche, Laurent Imbert, Victor Lomné:
Side-channel Attacks on Blinded Scalar Multiplications Revisited. IACR Cryptol. ePrint Arch. 2019: 1220 (2019) - 2016
- [i11]Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Algebraic Decomposition for Probing Security. IACR Cryptol. ePrint Arch. 2016: 321 (2016) - 2015
- [j4]Aurora Dimache, Thomas Roche, Simone Kopeinik, Lisa-Christina Winter, Alexander Nussbaumer, Dietrich Albert:
Suitability of Adaptive Self-Regulated e-Learning to Vocational Training: A Pilot Study in Heat Pump System Installation. Int. J. Online Pedagog. Course Des. 5(3): 31-46 (2015) - [c25]Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Algebraic Decomposition for Probing Security. CRYPTO (1) 2015: 742-763 - [i10]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. IACR Cryptol. ePrint Arch. 2015: 359 (2015) - [i9]Adrian Thillard, Emmanuel Prouff, Thomas Roche:
Success through confidence: Evaluating the effectiveness of a side-channel attack. IACR Cryptol. ePrint Arch. 2015: 402 (2015) - 2014
- [j3]Thomas Roche, Riccarda Rossi, Ulisse Stefanelli:
Stability Results for Doubly Nonlinear Differential Inclusions by Variational Convergence. SIAM J. Control. Optim. 52(2): 1071-1107 (2014) - [c24]Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard:
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks. CHES 2014: 35-54 - [c23]Aurélie Bauer, Éliane Jaulmes, Victor Lomné, Emmanuel Prouff, Thomas Roche:
Side-Channel Attack against RSA Key Generation Algorithms. CHES 2014: 223-241 - [c22]Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
On the Practical Security of a Leakage Resilient Masking Scheme. CT-RSA 2014: 169-182 - [c21]Simone Kopeinik, Alexander Nussbaumer, Lisa-Christina Winter, Dietrich Albert, Aurora Dimache, Thomas Roche:
Combining Self-Regulation and Competence-Based Guidance to Personalise the Learning Experience in Moodle. ICALT 2014: 62-64 - [i8]Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard:
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 673 (2014) - 2013
- [c20]Victor Lomné, Emmanuel Prouff, Thomas Roche:
Behind the Scene of Side Channel Attacks. ASIACRYPT (1) 2013: 506-525 - [c19]Matthieu Rivain, Thomas Roche:
SCARE of Secret Ciphers with SPN Structures. ASIACRYPT (1) 2013: 526-544 - [c18]Adrian Thillard, Emmanuel Prouff, Thomas Roche:
Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack. CHES 2013: 21-36 - [c17]Thomas Roche, Victor Lomné:
Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices. COSADE 2013: 114-136 - [c16]Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. FSE 2013: 410-424 - [c15]Lisa-Christina Winter, Simone Kopeinik, Dietrich Albert, Aurora Dimache, Attracta Brennan, Thomas Roche:
Applying Pedagogical Approaches to Enhance Learning: Linking Self-Regulated and Skills-Based Learning with Support from Moodle Extensions. IIAI-AAI 2013: 203-206 - [i7]Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
On the Practical Security of a Leakage Resilient Masking Scheme. IACR Cryptol. ePrint Arch. 2013: 396 (2013) - [i6]Matthieu Rivain, Thomas Roche:
SCARE of Secret Ciphers with SPN Structures. IACR Cryptol. ePrint Arch. 2013: 636 (2013) - [i5]Victor Lomné, Emmanuel Prouff, Thomas Roche:
Behind the Scene of Side Channel Attacks. IACR Cryptol. ePrint Arch. 2013: 794 (2013) - 2012
- [j2]Thomas Roche, Emmanuel Prouff:
Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version. J. Cryptogr. Eng. 2(2): 111-127 (2012) - [c14]Gilles Piret, Thomas Roche, Claude Carlet:
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance. ACNS 2012: 311-328 - [c13]Jean-Sébastien Coron, Emmanuel Prouff, Thomas Roche:
On the Use of Shamir's Secret Sharing against Side-Channel Analysis. CARDIS 2012: 77-90 - [c12]Victor Lomné, Thomas Roche, Adrian Thillard:
On the Need of Randomness in Fault Attack Countermeasures - Application to AES. FDTC 2012: 85-94 - [i4]Gilles Piret, Thomas Roche, Claude Carlet:
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -. IACR Cryptol. ePrint Arch. 2012: 358 (2012) - 2011
- [c11]Thomas Roche, Victor Lomné, Karim Khalfallah:
Combined Fault and Side-Channel Attack on Protected Implementations of AES. CARDIS 2011: 65-83 - [c10]Emmanuel Prouff, Thomas Roche:
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols. CHES 2011: 63-78 - [i3]Emmanuel Prouff, Thomas Roche:
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation. IACR Cryptol. ePrint Arch. 2011: 413 (2011) - 2010
- [b1]Thomas Roche:
Dimensionnement et intégration d'un chiffre symétrique dans le contexte d'un système d'information distribué de grande taille. (Capacity planning and integration of a symmetric cipher within the framework of a large distributed information system). Joseph Fourier University, Grenoble, France, 2010 - [c9]Emmanuel Prouff, Thomas Roche:
Attack on a Higher-Order Masking of the AES Based on Homographic Functions. INDOCRYPT 2010: 262-281 - [c8]Majid Khonji, Clément Pernet, Jean-Louis Roch, Thomas Roche, Thomas Stalinski:
Output-sensitive decoding for redundant residue systems. ISSAC 2010: 265-272
2000 – 2009
- 2009
- [c7]Thomas Roche, Mathieu Cunche, Jean-Louis Roch:
Algorithm-Based Fault Tolerance Applied to P2P Computing Networks. AP2PS 2009: 144-149 - [i2]Thomas Roche, Cédric Tavernier:
Multi-Linear cryptanalysis in Power Analysis Attacks MLPA. CoRR abs/0906.0237 (2009) - [i1]Thomas Roche, Cédric Tavernier:
Side-channel attacks based on linear approximations. IACR Cryptol. ePrint Arch. 2009: 269 (2009) - 2008
- [c6]Thomas Roche, Roland Gillard, Jean-Louis Roch:
Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher. MCO 2008: 597-606 - 2007
- [c5]Vincent Danjean, Roland Gillard, Serge Guelton, Jean-Louis Roch, Thomas Roche:
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography. PASCO 2007: 33-42 - 2006
- [j1]Ovidiu Chira, Camelia Chira, Thomas Roche, David Tormey, Attracta Brennan:
An agent-based approach to knowledge management in distributed design. J. Intell. Manuf. 17(6): 737-750 (2006) - 2005
- [c4]Camelia Chira, Ovidiu Chira, Thomas Roche:
Multi-agent Support for Distributed Engineering Design. IEA/AIE 2005: 155-164 - 2003
- [c3]Ovidiu Chira, Camelia Chira, David Tormey, Attracta Brennan, Thomas Roche:
A Multi-agent Architecture for Distributed Design. HoloMAS 2003: 213-224 - [c2]Ovidiu Chira, Camelia Chira, Thomas Roche, David Tormey, Attracta Brennan:
An agent-based approach to knowledge management in distributed design. CE 2003: 111-119 - 2002
- [c1]Elena Man, Juan Enrique Díez, Camelia Chira, Thomas Roche:
Product Life Cycle Design Using the DFE Workbench. BASYS 2002: 395-402
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint