23 results on '"Standaert, François-Xavier"'
Search Results
2. How to fool a black box machine learning based side-channel security evaluation
3. A stealthy Hardware Trojan based on a Statistical Fault Attack
4. Side-channel analysis of a learning parity with physical noise processor
5. Tight-ES-TRNG: Improved Construction and Robustness Analysis
6. Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
7. Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
8. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version
9. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
10. Towards easy leakage certification: extended version
11. Improving the security and efficiency of block ciphers based on LS-designs
12. Side-channel attacks against the human brain: the PIN code case study (extended version)
13. Masking and leakage-resilient primitives: One, the other(s) or both?
14. Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations
15. Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
16. Masking vs. multiparty computation: how large is the gap for AES?
17. Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version
18. Analysis and experimental evaluation of image-based PUFs
19. Extractors against side-channel attacks: weak or strong?
20. Univariate side channel attacks and leakage modeling
21. Mutual Information Analysis: a Comprehensive Study
22. Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags
23. Provable security of block ciphers against linear cryptanalysis: a mission impossible?: An experimental review of the practical security approachand the key equivalence hypothesis in linear cryptanalysis
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.