Proofs of space S Dziembowski, S Faust, V Kolmogorov, K Pietrzak Annual Cryptology Conference, 585-605, 2015 | 224 | 2015 |
Leakage-resilient signatures S Faust, E Kiltz, K Pietrzak, GN Rothblum Theory of Cryptography Conference, 343-360, 2010 | 171 | 2010 |
Protecting circuits from leakage: the computationally-bounded and noisy cases S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan Annual International Conference on the Theory and Applications of …, 2010 | 167* | 2010 |
Unifying Leakage Models: From Probing Attacks to Noisy Leakage. A Duc, S Dziembowski, S Faust Annual International Conference on the Theory and Applications of …, 2014 | 161 | 2014 |
Making masking security proofs concrete A Duc, S Faust, FX Standaert Advances in Cryptology--EUROCRYPT 2015, 401-429, 2015 | 139* | 2015 |
Secure two-party computation with low communication I Damgård, S Faust, C Hazay Theory of Cryptography Conference, 54-74, 2012 | 116 | 2012 |
Perun: Virtual payment hubs over cryptographic currencies S Dziembowski, L Eckey, S Faust, D Malinowski IACR Cryptology ePrint Archive 2017, Tech. Rep., 2017 | 111* | 2017 |
General state channel networks S Dziembowski, S Faust, K Hostáková Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 104* | 2018 |
Efficient non-malleable codes and key derivation for poly-size tampering circuits S Faust, P Mukherjee, D Venturi, D Wichs IEEE Transactions on Information Theory 62 (12), 7179-7194, 2016 | 104 | 2016 |
Continuous non-malleable codes S Faust, P Mukherjee, JB Nielsen, D Venturi Theory of Cryptography Conference, 465-488, 2014 | 104 | 2014 |
On the non-malleability of the Fiat-Shamir transform S Faust, M Kohlweiss, GA Marson, D Venturi International Conference on Cryptology in India, 60-79, 2012 | 86 | 2012 |
Parallel implementations of masking schemes and the bounded moment leakage model G Barthe, F Dupressoir, S Faust, B Grégoire, FX Standaert, PY Strub Annual International Conference on the Theory and Applications of …, 2017 | 80 | 2017 |
Leakage-resilient cryptography from the inner-product extractor S Dziembowski, S Faust International Conference on the Theory and Application of Cryptology and …, 2011 | 77 | 2011 |
Fairswap: How to fairly exchange digital goods S Dziembowski, L Eckey, S Faust Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 73 | 2018 |
Practical leakage-resilient symmetric cryptography S Faust, K Pietrzak, J Schipper International Workshop on Cryptographic Hardware and Embedded Systems, 213-232, 2012 | 72 | 2012 |
Leakage-resilient circuits without computational assumptions S Dziembowski, S Faust Theory of cryptography conference, 230-247, 2012 | 58 | 2012 |
Bounded tamper resilience: How to go beyond the algebraic barrier I Damgård, S Faust, P Mukherjee, D Venturi Journal of Cryptology 30 (1), 152-190, 2017 | 49 | 2017 |
Masking vs. multiparty computation: how large is the gap for AES? V Grosso, FX Standaert, S Faust Journal of Cryptographic Engineering 4 (1), 47-57, 2014 | 46 | 2014 |
Efficient oblivious augmented maps: Location-based services with a payment broker M Kohlweiss, S Faust, L Fritsch, B Gedrojc, B Preneel International Workshop on Privacy Enhancing Technologies, 77-94, 2007 | 43 | 2007 |
Composable masking schemes in the presence of physical defaults & the robust probing model S Faust, V Grosso, SMD Pozo, C Paglialonga, FX Standaert | 42 | 2018 |