BibTeX records: David Vigilant

download as .bib file

@article{DBLP:journals/tches/BerzatiVCMVV23,
  author       = {Alexandre Berzati and
                  Andersson Calle Viera and
                  Maya Chartouny and
                  Steven Madec and
                  Damien Vergnaud and
                  David Vigilant},
  title        = {Exploiting Intermediate Value Leakage in Dilithium: {A} Template-Based
                  Approach},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {188--210},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.188-210},
  doi          = {10.46586/TCHES.V2023.I4.188-210},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BerzatiVCMVV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BerzatiVCMVV23,
  author       = {Alexandre Berzati and
                  Andersson Calle Viera and
                  Maya Chartouni and
                  Steven Madec and
                  Damien Vergnaud and
                  David Vigilant},
  title        = {A Practical Template Attack on CRYSTALS-Dilithium},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/050},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BerzatiVCMVV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AzziBCV17,
  author       = {Sabine Azzi and
                  Bruno Barras and
                  Maria Christofi and
                  David Vigilant},
  title        = {Using linear codes as a fault countermeasure for nonlinear operations:
                  application to {AES} and formal verification},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {75--85},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0138-1},
  doi          = {10.1007/S13389-016-0138-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AzziBCV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChristofiCGV13,
  author       = {Maria Christofi and
                  Boutheina Chetali and
                  Louis Goubin and
                  David Vigilant},
  title        = {Formal verification of a {CRT-RSA} implementation against fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {157--167},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0049-3},
  doi          = {10.1007/S13389-013-0049-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChristofiCGV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BouraLV12,
  author       = {Christina Boura and
                  Sylvain L{\'{e}}v{\^{e}}que and
                  David Vigilant},
  title        = {Side-Channel Analysis of Gr{\o}stl and Skein},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {16--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.13},
  doi          = {10.1109/SPW.2012.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BouraLV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Loubet-MoundiVO11,
  author       = {Philippe Loubet{-}Moundi and
                  David Vigilant and
                  Francis Olivier},
  title        = {Static Fault Attacks on Hardware {DES} Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Loubet-MoundiVO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/CoronGMPV10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Christophe Giraud and
                  Nicolas Morin and
                  Gilles Piret and
                  David Vigilant},
  editor       = {Luca Breveglieri and
                  Marc Joye and
                  Israel Koren and
                  David Naccache and
                  Ingrid Verbauwhede},
  title        = {Fault Attacks and Countermeasures on Vigilant's {RSA-CRT} Algorithm},
  booktitle    = {2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2010, Santa Barbara, California, USA, 21 August 2010},
  pages        = {89--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FDTC.2010.9},
  doi          = {10.1109/FDTC.2010.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/CoronGMPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Vigilant08,
  author       = {David Vigilant},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {{RSA} with {CRT:} {A} New Cost-Effective Solution to Thwart Fault
                  Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_9},
  doi          = {10.1007/978-3-540-85053-3\_9},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Vigilant08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/FumaroliV06,
  author       = {Guillaume Fumaroli and
                  David Vigilant},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {Blinded Fault Resistant Exponentiation},
  booktitle    = {Fault Diagnosis and Tolerance in Cryptography, Third International
                  Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4236},
  pages        = {62--70},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889700\_6},
  doi          = {10.1007/11889700\_6},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/FumaroliV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FumaroliV06,
  author       = {Guillaume Fumaroli and
                  David Vigilant},
  title        = {Blinded Fault Resistant Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FumaroliV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics