Publications
Unpublished Reports:
- O. Bronchain, M. Azouaoui, M. ElGhamrawy, J. Renes, T. Schneider, “Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium”, eprint.
To Appear:
- K. Miteloudi, J. W. Bos, O. Bronchain, B. Fay and J. Renes, “Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber”, to appear in CARDIS 2023, eprint.
Publications:
- M. Azouaoui, O. Bronchain, G. Cassiers, C. Hoffmann, Y. Kuzovkova, J. Renes, M. Schönauer, T. Schneider, F.-X. Standaert, C. van Vredendaal, “Protecting Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2023, eprint, pdf, slides.
- G. Cassiers, O. Bronchain, “SCALib: A Side-Channel Analysis Library”, The Journal of Open Source Software, paper, github, doc.
- M. ElGhamrawy, M. Azouaoui, O. Bronchain, J. Renes, M. Schönauer, T. Schneider, O. Seker, C. van Vredendaal, “From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2023, eprint, pdf, slides.
- J. W. Bos, O. Bronchain, F. Custers, J. Renes, D. Verbakel, C. van Vredendall, “Enabling FrodoKEM on Embedded Devices”, to appear in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2023, eprint pdf.
- O. Bronchain, G. Cassiers, ” Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2022, eprint, slides.
- M. Azouaoui, O. Bronchain, C. Hoffmann, Y. Kuzovkova, T. Schneider, F.-X. Standaert, “Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber”, COSADE 2022, eprint, slides.
- B. Udvarhelyi, O. Bronchain, F.-X. Standaert, “Security Analysis of Deterministic Re-Keying with Masking & Shuffling: Application to ISAP”, COSADE 2021, Lecture Notes in Computer Science, vol xxxx, pp yyy-zzz, Lugano, October 2021, Springer, pdf.
- O. Bronchain, “Worst-case side-channel security: from evaluation of countermeasures to new designs”, PhD dissertation, thesis,slides.
- M. Azouaoui, O. Bronchain, V. Grosso, K. Papagiannopoulos, F.-X. Standaert, “Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?”,in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2022, num 2, pp 140-165, eprint, pdf, slides.
- O. Bronchain, F. Durvaux, L. Masure, F.-X. Standaert, “Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended”,IEEE Transactions on Information Forensics & Security, 2022, vol 17 , pp 574-584, pdf.
- O. Bronchain, F.-X. Standaert, “Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2021, num 3, pp 202-234, pdf.
- O. Bronchain, C. Momin, T. Peters, F.-X. Standaert, “Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2021, num 3, pp 641-676, pdf.
- O. Bronchain, S. Faust, V. Lallemand, G. Leander, L. Perrin, F.-X. Standaert, “MOE: Multiplication Operated Encryption with Trojan Resilience to appear in IACR Transactions on Symmetric Cryptology”, vol 2021, num 1, pp 78-129, pdf.
- O. Bronchain, T. Schneider, F.-X. Standaert, “Reducing Risks Through Simplicity (Higher Side-Channel Security for Lazy Engineers)”, to appear in the Journal of Cryptographic Engineering, vol 11, num 1, pp 39-55, Apris 2021, pdf.
- D. Kamel, D. Bellizia, O. Bronchain, F.-X. Standaert, “Side-channel Analysis of a Learning Parity with Physical Noise Processor”, to appear in the Journal of Cryptographic Engineering, vol 11, num 22, pp 171-179, June 2021, pdf.
- B. Udvarhelyi, A. van Wassenhove, O. Bronchain, F.-X. Standaert, “On the Security of Off-the-shelf Microcontrollers: Hardware is Not Enough”, in the proceedings of CARDIS 2020, Lecture Notes in Computer Science, vol 12609, pp 103-118, Virtual, November 2020, Springer, pdf.
- Qian Guo, V. Grosso, F.-X. Standaert, O. Bronchain, “Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2020, num 4, pp 209-238, pdf.
- D. Bellizia, O. Bronchain, G. Cassiers, V. Grosso, Chun Guo, C. Momin, O. Pereira, T. Peters, F.-X. Standaert, “Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle”, in the proceedings of Crypto 2020, Lecture Notes in Computer Science, vol 12170, pp 369-400, Virtual, August 2020, Springer, pdf.
- D. Bellizia, F. Berti, O. Bronchain, G. Cassiers,S. Duval, C. Guo, G. Leander, G. Leurent, I. Levi, C. Momin, O. Pereira, T. Peters, F.-X. Standaert, B. Udvarhelyi, F. Wiemer, “Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher”, in IACR Transactions on Symmetric Cryptology , vol 2020, num S1, pp 295-349, pdf.
- C.-H. Bertrand Van Ouytsel, O. Bronchain, G. Cassiers, F.-X. Standaert, “How to Fool a Black Box Machine Learning Based Side-Channel Security Evaluation”, in the proceedings of YACCRYPTED 2020, pp 10, Virtual, May 2020. Extended version to appear in Cryptography and Communications, vol xxx, num yyy, pp www-zzz, 2021, Springer, pdf.
- C. Momin, O. Bronchain, F.-X. Standaert, “A Stealthy Hardware Trojan based on a Statistical Fault Attack”, in the proceedings of YACCRYPTED 2020, pp 12, Virtual, May 2020. Extended version to appear in Cryptography and Communications, vol xxx, num yyy, pp www-zzz, 2021, Springer, pdf.
- O. Bronchain, F.-X. Standaert, “Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2020, num 2, pp 1-25, pdf.
- O. Bronchain, J.M. Hendrickx, C. Massart, A. Olshevsky, F.-X. Standaert, “Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations”, in the proceedings of Crypto 2019, Lecture Notes in Computer Science, vol 11692, pp 713-737, Santa Barbara, California, USA, August 2019, Springer, pdf.
- C. Momin, O. Bronchain, F.-X. Standaert, “Time-Modulated Hardware Trojans: Clock-Based and Interface-Based Examples”, in the proceedings of the 40th WIC Symposium on Information Theory in the Benelux, pp 8, Ghent, Belgim, May 2019, pdf.
- O. Bronchain, T. Schneider, F.-X. Standaert, “Multi-Tuple Leakage Detection and the Dependent Signal Issue”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2019, num 2, pp 318-345, pdf.
- O. Bronchain, F.-X. Standaert, S. Faust, L. Dassy, “Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers”, in the proceedings of ASHES 2018, pp 1-10, Toronto, Canada, October 2018, pdf.
Technical reports:
- O. Bronchain, G. Cassiers, F.-X. Standaert, “Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace”, eprint.