International Conferences

2017 Private Multiplication over Finite Fields.
Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud.
in the proceedings of CRYPTO 2017, pp 397-426 [Springer link]

2016 Strong Non-Interference and Type-Directed Higher-Order Masking.
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub and Rebecca Zucchini.
in the proceedings of ACM Conference on Computer and Communications Security, CCS 2016, pp 116-129 [preliminary and long version]

2016 Randomness Complexity of Private Circuits for Multiplication.
Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud.
in the proceedings of EUROCRYPT 2016 Lecture Notes in Computer Science, volume 9666, pp 616-648 [ePrint]

2015 Improved Side-Channel Analysis of Finite-Field Multiplication.
Sonia Belaïd, Jean-Sébastien Coron, Benoît Gérard, Pierre-Alain Fouque, Jean-Gabriel Kammerer, and Emmanuel Prouff.
in the proceedings of CHES 2015 Lecture Notes in Computer Science, volume 9293, pp 395-415 [ePrint]

2015 Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, and Damien Vergnaud.
in the proceedings of ACNS 2015 Lecture Notes in Computer Science, volume 9092, pp 635-654

2015 Verified Proofs of Higher-Order Masking.
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, and Pierre-Yves Strub.
in the proceedings of EUROCRYPT 2015 Lecture Notes in Computer Science, volume 9056, pp 457-485 [ePrint]

2014 Side-Channel Analysis of Multiplications in GF(2^{128}): Application to AES-GCM.
Sonia Belaïd, Pierre-Alain Fouque, and Benoît Gérard.
in the proceedings of ASIACRYPT 2014, Lecture Notes in Computer Science, volume 8874, pp 306-325

2013 Leakage-Resilient Symmetric Encryption via Re-keying.
Michel Abdalla, Sonia Belaïd, and Pierre-Alain Fouque.
in the proceedings of CHES 2013, Lecture Notes in Computer Science, volume 8086, pp 471-488 [Full version] [ePrint]

2013 Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle and Franck Rondepierre.
in the proceedings of SECRYPT 2013, pp 230-241 [PDF]

Journals

2015 Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre.
E-Business and Telecommunications, Volume 554 of the series Communications in Computer and Information Science, pp 363-379, December 2015, Springer [Springer link]

2015 Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
Sonia Belaïd, Vincent Grosso, François-Xavier Standaert.
Cryptography and Communications, volume 7, number 1, pp 163-184, March 2015, Springer [Springer link] [ePrint]

2014 Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis.
Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jorn-Marc Schmidt, François-Xavier Standaert, and Stefan Tillich.
Journal of Cryptographic Engineering, volume 4, number 3, pp 157-171, September 2014, Springer [Springer link] [ePrint]

Thesis

22-10-2015 Security of Cryptosystems Against Power-Analysis Attacks
Sonia Belaïd. [PDF]