Unpublished Reports:

  1. O. Bronchain, M. Azouaoui, M. ElGhamrawy, J. Renes, T. Schneider, “Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium”, eprint.

To Appear:

  1. K. Miteloudi, J. W. Bos, O. Bronchain, B. Fay and J. Renes, “Post-Quantum RISC-V Custom ALU Extensions on Dilithium and Kyber”, to appear in CARDIS 2023, eprint.

Publications:

  1. M. Azouaoui, O. Bronchain, G. Cassiers, C. Hoffmann, Y. Kuzovkova, J. Renes, M. Schönauer, T. Schneider, F.-X. Standaert, C. van Vredendaal, “Protecting Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2023, eprint, pdf, slides.
  2. G. Cassiers, O. Bronchain, “SCALib: A Side-Channel Analysis Library”, The Journal of Open Source Software, paper, github, doc.
  3. M. ElGhamrawy, M. Azouaoui, O. Bronchain, J. Renes, M. Schönauer, T. Schneider, O. Seker, C. van Vredendaal, “From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2023, eprint, pdf, slides.
  4. J. W. Bos, O. Bronchain, F. Custers, J. Renes, D. Verbakel, C. van Vredendall, “Enabling FrodoKEM on Embedded Devices”, to appear in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2023, eprint pdf.
  5. O. Bronchain, G. Cassiers, ” Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2022, eprint, slides.
  6. M. Azouaoui, O. Bronchain, C. Hoffmann, Y. Kuzovkova, T. Schneider, F.-X. Standaert, “Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber”, COSADE 2022, eprint, slides.
  7. B. Udvarhelyi, O. Bronchain, F.-X. Standaert, “Security Analysis of Deterministic Re-Keying with Masking & Shuffling: Application to ISAP”, COSADE 2021, Lecture Notes in Computer Science, vol xxxx, pp yyy-zzz, Lugano, October 2021, Springer, pdf.
  8. O. Bronchain, “Worst-case side-channel security: from evaluation of countermeasures to new designs”, PhD dissertation, thesis,slides.
  9. M. Azouaoui, O. Bronchain, V. Grosso, K. Papagiannopoulos, F.-X. Standaert, “Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?”,in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2022, num 2, pp 140-165, eprint, pdf, slides.
  10. O. Bronchain, F. Durvaux, L. Masure, F.-X. Standaert, “Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended”,IEEE Transactions on Information Forensics & Security, 2022, vol 17 , pp 574-584, pdf.
  11. O. Bronchain, F.-X. Standaert, “Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2021, num 3, pp 202-234, pdf.
  12. O. Bronchain, C. Momin, T. Peters, F.-X. Standaert, “Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2021, num 3, pp 641-676, pdf.
  13. O. Bronchain, S. Faust, V. Lallemand, G. Leander, L. Perrin, F.-X. Standaert, “MOE: Multiplication Operated Encryption with Trojan Resilience to appear in IACR Transactions on Symmetric Cryptology”, vol 2021, num 1, pp 78-129, pdf.
  14. O. Bronchain, T. Schneider, F.-X. Standaert, “Reducing Risks Through Simplicity (Higher Side-Channel Security for Lazy Engineers)”, to appear in the Journal of Cryptographic Engineering, vol 11, num 1, pp 39-55, Apris 2021, pdf.
  15. D. Kamel, D. Bellizia, O. Bronchain, F.-X. Standaert, “Side-channel Analysis of a Learning Parity with Physical Noise Processor”, to appear in the Journal of Cryptographic Engineering, vol 11, num 22, pp 171-179, June 2021, pdf.
  16. B. Udvarhelyi, A. van Wassenhove, O. Bronchain, F.-X. Standaert, “On the Security of Off-the-shelf Microcontrollers: Hardware is Not Enough”, in the proceedings of CARDIS 2020, Lecture Notes in Computer Science, vol 12609, pp 103-118, Virtual, November 2020, Springer, pdf.
  17. Qian Guo, V. Grosso, F.-X. Standaert, O. Bronchain, “Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2020, num 4, pp 209-238, pdf.
  18. D. Bellizia, O. Bronchain, G. Cassiers, V. Grosso, Chun Guo, C. Momin, O. Pereira, T. Peters, F.-X. Standaert, “Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle”, in the proceedings of Crypto 2020, Lecture Notes in Computer Science, vol 12170, pp 369-400, Virtual, August 2020, Springer, pdf.
  19. D. Bellizia, F. Berti, O. Bronchain, G. Cassiers,S. Duval, C. Guo, G. Leander, G. Leurent, I. Levi, C. Momin, O. Pereira, T. Peters, F.-X. Standaert, B. Udvarhelyi, F. Wiemer, “Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher”, in IACR Transactions on Symmetric Cryptology , vol 2020, num S1, pp 295-349, pdf.
  20. C.-H. Bertrand Van Ouytsel, O. Bronchain, G. Cassiers, F.-X. Standaert, “How to Fool a Black Box Machine Learning Based Side-Channel Security Evaluation”, in the proceedings of YACCRYPTED 2020, pp 10, Virtual, May 2020. Extended version to appear in Cryptography and Communications, vol xxx, num yyy, pp www-zzz, 2021, Springer, pdf.
  21. C. Momin, O. Bronchain, F.-X. Standaert, “A Stealthy Hardware Trojan based on a Statistical Fault Attack”, in the proceedings of YACCRYPTED 2020, pp 12, Virtual, May 2020. Extended version to appear in Cryptography and Communications, vol xxx, num yyy, pp www-zzz, 2021, Springer, pdf.
  22. O. Bronchain, F.-X. Standaert, “Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2020, num 2, pp 1-25, pdf.
  23. O. Bronchain, J.M. Hendrickx, C. Massart, A. Olshevsky, F.-X. Standaert, “Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations”, in the proceedings of Crypto 2019, Lecture Notes in Computer Science, vol 11692, pp 713-737, Santa Barbara, California, USA, August 2019, Springer, pdf.
  24. C. Momin, O. Bronchain, F.-X. Standaert, “Time-Modulated Hardware Trojans: Clock-Based and Interface-Based Examples”, in the proceedings of the 40th WIC Symposium on Information Theory in the Benelux, pp 8, Ghent, Belgim, May 2019, pdf.
  25. O. Bronchain, T. Schneider, F.-X. Standaert, “Multi-Tuple Leakage Detection and the Dependent Signal Issue”, in IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2019, num 2, pp 318-345, pdf.
  26. O. Bronchain, F.-X. Standaert, S. Faust, L. Dassy, “Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers”, in the proceedings of ASHES 2018, pp 1-10, Toronto, Canada, October 2018, pdf.

Technical reports:

  1. O. Bronchain, G. Cassiers, F.-X. Standaert, “Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace”, eprint.