Follow
Rina Zeitoun
Rina Zeitoun
Unknown affiliation
Verified email at idemia.com
Title
Cited by
Cited by
Year
Horizontal side-channel attacks and countermeasures on the ISW masking scheme
A Battistello, JS Coron, E Prouff, R Zeitoun
International Conference on Cryptographic Hardware and Embedded Systems, 23-39, 2016
1212016
Faster evaluation of sboxes via common shares
JS Coron, A Greuet, E Prouff, R Zeitoun
International Conference on Cryptographic Hardware and Embedded Systems, 498-514, 2016
362016
High order masking of look-up tables with common shares
JS Coron, F Rondepierre, R Zeitoun
Cryptology ePrint Archive, 2017
332017
Rounding and chaining LLL: finding faster small roots of univariate polynomial congruences
J Bi, JS Coron, JC Faugère, PQ Nguyen, G Renault, R Zeitoun
International Workshop on Public Key Cryptography, 185-202, 2014
322014
Improved high-order conversion from Boolean to arithmetic masking
L Bettale, JS Coron, R Zeitoun
IACR Transactions on Cryptographic Hardware and Embedded Systems, 22-45, 2018
312018
Factoring for Large r and s
JS Coron, JC Faugère, G Renault, R Zeitoun
Cryptographers’ Track at the RSA Conference, 448-464, 2016
26*2016
Side-channel masking with pseudo-random generator
JS Coron, A Greuet, R Zeitoun
Annual International Conference on the Theory and Applications of …, 2020
232020
High-order polynomial comparison and masking lattice-based encryption
JS Coron, F Gérard, S Montoya, R Zeitoun
Cryptology ePrint Archive, 2021
202021
Improved factorization of
JS Coron, R Zeitoun
Cryptographers’ Track at the RSA Conference, 65-79, 2018
14*2018
High-order table-based conversion algorithms and masking lattice-based encryption
JS Coron, F Gérard, S Montoya, R Zeitoun
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 (2), 2022
122022
Combined attack on CRT-RSA: why public verification must not be public?
G Barbu, A Battistello, G Dabosville, C Giraud, G Renault, S Renner, ...
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
102013
High-order masking of NTRU
JS Coron, F Gérard, M Trannoy, R Zeitoun
IACR Transactions on Cryptographic Hardware and Embedded Systems, 180-211, 2023
82023
Improved Gadgets for the High-Order Masking of Dilithium
JS Coron, F Gérard, M Trannoy, R Zeitoun
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (4 …, 2023
32023
Method of verifying integrity of a pair of cryptographic keys and cryptographic device
L Bettale, R Zeitoun, F Rondepierre, C Giraud, C Vermeersch
US Patent 11,606,195, 2023
2023
Factoring N= prqs for Large r and s
G Renault, R Zeitoun
Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016
2016
Méthodes algébriques pour l'analyse de sécurité des implantations d'algorithmes cryptographiques
R Zeitoun
Paris 6, 2015
2015
Algebraic methods for security analysis of cryptographic algorithms implementations
R Zeitoun
Université Pierre et Marie Curie-Paris VI, 2015
2015
Combined Attack on CRT-RSA
C Giraud, G Renault, S Renner, R Zeitoun
Public-Key Cryptography--PKC 2013: 16th International Conference on Practice …, 2013
2013
A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search
JS Coron, JC Faugère, G Renault, R Zeitoun
Cryptology ePrint Archive, 2013
2013
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial
J Bi, JS Coron, JC Faugere, P Nguyen, G Renault, R Zeitoun
The system can't perform the operation now. Try again later.
Articles 1–20