International Conferences

9. 2017 - Private Multiplication over Finite Fields.
Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud.
in the proceedings of CRYPTO 2017, pp 397-426 [Springer link]

8. 2016 - Strong Non-Interference and Type-Directed Higher-Order Masking.
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub and Rebecca Zucchini.
in the proceedings of ACM Conference on Computer and Communications Security, CCS 2016, pp 116-129 [preliminary and long version]

7. 2016 - Randomness Complexity of Private Circuits for Multiplication.
Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud.
in the proceedings of EUROCRYPT 2016 Lecture Notes in Computer Science, volume 9666, pp 616-648 [ePrint]

6. 2015 - Improved Side-Channel Analysis of Finite-Field Multiplication.
Sonia Belaïd, Jean-Sébastien Coron, Benoît Gérard, Pierre-Alain Fouque, Jean-Gabriel Kammerer, and Emmanuel Prouff.
in the proceedings of CHES 2015 Lecture Notes in Computer Science, volume 9293, pp 395-415 [ePrint]

5. 2015 - Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, and Damien Vergnaud.
in the proceedings of ACNS 2015 Lecture Notes in Computer Science, volume 9092, pp 635-654

4. 2015 - Verified Proofs of Higher-Order Masking.
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, and Pierre-Yves Strub.
in the proceedings of EUROCRYPT 2015 Lecture Notes in Computer Science, volume 9056, pp 457-485 [ePrint]

3. 2014 - Side-Channel Analysis of Multiplications in GF(2^{128}): Application to AES-GCM.
Sonia Belaïd, Pierre-Alain Fouque, and Benoît Gérard.
in the proceedings of ASIACRYPT 2014, Lecture Notes in Computer Science, volume 8874, pp 306-325

2. 2013 - Leakage-Resilient Symmetric Encryption via Re-keying.
Michel Abdalla, Sonia Belaïd, and Pierre-Alain Fouque.
in the proceedings of CHES 2013, Lecture Notes in Computer Science, volume 8086, pp 471-488 [Almost full version] [ePrint]

1. 2013 - Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle and Franck Rondepierre.
in the proceedings of SECRYPT 2013, pp 230-241 [PDF]

Journals

3. 2015 - Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model.
Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre.
E-Business and Telecommunications, Volume 554 of the series Communications in Computer and Information Science, pp 363-379, December 2015, Springer [Springer link]

2. 2015 - Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
Sonia Belaïd, Vincent Grosso, François-Xavier Standaert.
Cryptography and Communications, volume 7, number 1, pp 163-184, March 2015, Springer [Springer link] [ePrint]

1. 2014 - Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis.
Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jorn-Marc Schmidt, François-Xavier Standaert, and Stefan Tillich.
Journal of Cryptographic Engineering, volume 4, number 3, pp 157-171, September 2014, Springer [Springer link] [ePrint]

Thesis

22-10-2015 - Security of Cryptosystems Against Power-Analysis Attacks
Sonia Belaïd. [PDF]