Search

Your search keyword '"Standaert, François-Xavier"' showing total 163 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Database OpenAIRE Remove constraint Database: OpenAIRE
163 results on '"Standaert, François-Xavier"'

Search Results

1. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

2. Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

3. TIPECS : A corpus cleaning method using machine learning and qualitative analysis

4. Secure Message Authentication in the Presence of Leakage and Faults

6. Optimally Secure Tweakable Block Ciphers with a Large Tweak

7. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate

9. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations

10. Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher

12. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists

13. Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?

15. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms

16. Advances in Cryptology – EUROCRYPT 2021 - Part I

17. Security Analysis of Deterministic Re-Keying with Masking & Shuffling: Application to ISAP

18. Advances in Cryptology – EUROCRYPT 2021 - Part III

19. Transparents mais corruptibles : les algorithmes au défi des comportements « adversariaux » dans le domaine journalistique

20. Advances in Cryptology – EUROCRYPT 2021 - Part II

21. Unprotected and masked hardware implementations of spook v2

22. Leakage Detection with the x2-Test

23. Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware (with Application to the Spook AEAD)

24. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

25. Automated Verification of Higher-Order Masking in Presence of Physical Defaults

26. Glitch-Resistant Masking Revisited

27. Multi-Tuple Leakage Detection and the Dependent Signal Issue

28. Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate

29. TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications

30. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)

31. Reducing the Cost of Authenticity with Leakages: a $$\mathsf {CIML2}$$ -Secure $$\mathsf {AE}$$ Scheme with One Call to a Strongly Protected Tweakable Block Cipher

32. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations

33. Simplified Single-Trace Side-Channel Attacks on Elliptic Curve Scalar Multiplication using Fully Convolutional Networks

34. Towards Long-Term Privacy Bounds in Open Data Publishing

35. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security

36. Towards an Open Approach to Side-Channel Resistant Authenticated Encryption

37. A Transient Noise Analysis of Secured Dual-rail based Logic Style

38. Demonstrating an LPPN Processor (Short Paper)

39. Connecting and Improving Direct Sum Masking and Inner Product Masking

40. Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives

41. Let’s make it Noisy: A Simulation Methodology for adding Intrinsic Physical Noise to Cryptographic Designs

42. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

43. Side-Channel Attacks Against the Human Brain: the PIN Code Case Study

44. Ridge-Based Profiled Differential Power Analysis

45. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

46. Towards Sound and Optimal Leakage Detection Procedure

47. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

48. Towards Easy Leakage Certification

49. Getting the Most Out of Leakage Detection

50. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations

Catalog

Books, media, physical & digital resources