Seminars

2017 New Challenges to Counteract Higher-Order Side-Channel Attacks
Journées Nationales 2017 Pré-GDR Sécurité Informatique, CNRS, Paris, May 2017 [slides]

2016 On the use of formal tools to improve the security of masked implementations
EIT Digital International Symposium, Université de Rennes 1, November 2016 [slides]

2016 On the Use of Masking to Defeat Power-Analysis Attacks
Paris Crypto Day, ENS, Paris, February 2016 [slides]

2015 Side-Channel Analysis of Multiplications in GF(2^128): Application to AES-GCM
Seminar Cryptology and Security, Caen, February 2015 [slides]

2014 Side-Channel Analysis of Multiplications in GF(2^128): Application to AES-GCM
Seminar of CRYPTO team, UVSQ, Versailles, November 2014 [slides]

2014 Leakage-Resilient Pseudorandom Functions and Generators using Re-keying
Seminar on Security of Embedded Electronic Systems, University of Rennes 1, March 2014 [slides]

2011 Solving Sparse Systems with the Block Wiedemann Algorithm - Efficient Implementation over GF(2)
Seminar SALSA, LIP6, Jussieu, June 2011 [slides]

International Conferences

2015 Improved Side-Channel Analysis of Finite-Field Multiplication.
Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff.
CHES 2015, Saint-Malo, September 2015 [slides]

2015 Verified Proofs of Higher-Order Masking.
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, and Pierre-Yves Strub.
EUROCRYPT 2015, Sofia, April 2015 [slides]

2014 Side-Channel Analysis of Multiplications in GF(2^128): Application to AES-GCM.
Sonia Belaïd, Pierre-Alain Fouque, and Benoît Gérard.
ASIACRYPT 2014, Kaohsiung, December 2014 [slides]

2013 Leakage-Resilient Symmetric Encryption via Re-keying.
Michel Abdalla, Sonia Belaïd, and Pierre-Alain Fouque CHES 2013, Santa Barbara, August 2013 [slides]

French Conferences

2014 Leakage-Resilient Primitives using Re-keying
Journees Codage et Cryptographie, March 2014 [slides]


Thesis

22-10-2015 Security of Cryptosystems Against Power-Analysis Attacks [slides]