108 results on '"Standaert, François-Xavier"'
Search Results
2. Transparents mais corruptibles: les algorithmes au défi des comportements « adversariaux » dans le domaine journalistique.
3. Automated news recommendation in front of adversarial examples and the technical limits of transparency in algorithmic accountability.
4. A stealthy Hardware Trojan based on a Statistical Fault Attack.
5. How to fool a black box machine learning based side-channel security evaluation.
6. Side-channel analysis of a learning parity with physical noise processor.
7. Reducing risks through simplicity: high side-channel security for lazy engineers.
8. Beyond algorithmic noise or how to shuffle parallel implementations?
9. Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks.
10. Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
11. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version.
12. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version.
13. Towards easy leakage certification: extended version.
14. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers.
15. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices.
16. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
17. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
18. Score-Based vs. Probability-Based Enumeration – A Cautionary Note.
19. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach.
20. Towards Easy Leakage Certification.
21. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
22. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.
23. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.
24. Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security.
25. Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations.
26. Improving the security and efficiency of block ciphers based on LS-designs.
27. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment.
28. On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
29. Combining Leakage-Resilient PRFs and Shuffling.
30. On the Cost of Lazy Engineering for Masked Software Implementations.
31. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
32. Evaluation and Improvement of Generic-Emulating DPA Attacks.
33. Blind Source Separation from Single Measurements Using Singular Spectrum Analysis.
34. Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
35. Making Masking Security Proofs Concrete.
36. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations.
37. Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits.
38. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).
39. Masking and leakage-resilient primitives: One, the other(s) or both?
40. Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions.
41. FPGA Implementations of SPRING.
42. A Survey of Recent Results in FPGA Security and Intellectual Property Protection.
43. Soft Analytical Side-Channel Attacks.
44. Low Entropy Masking Schemes, Revisited.
45. From New Technologies to New Solutions.
46. How to Certify the Leakage of a Chip?
47. Hardware Implementation and Side-Channel Analysis of Lapin.
48. The Myth of Generic DPA…and the Magic of Learning.
49. Efficient Masked S-Boxes Processing – A Step Forward –.
50. Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.