Search

Your search keyword '"Standaert, François-Xavier"' showing total 300 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
300 results on '"Standaert, François-Xavier"'

Search Results

1. Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences

3. Generalized Feistel Ciphers for Efficient Prime Field Masking

4. Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking

5. The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm

7. Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs

9. Learning with Physical Rounding for Linear and Quadratic Leakage Functions

10. POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption

12. Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings

15. A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding

16. Towards Case-Optimized Hybrid Homomorphic Encryption : Featuring the Elisabeth Stream Cipher

17. S-box Pooling: Towards More Efficient Side-Channel Security Evaluations

18. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

19. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations

20. Towards a Better Understanding of Side-Channel Analysis Measurements Setups

21. Efficient Leakage-Resilient MACs Without Idealized Assumptions

22. Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP

23. Towards Tight Random Probing Security

24. Scatter: a Missing Case?

25. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough

26. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices

27. Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?

28. A Systematic Appraisal of Side Channel Evaluation Strategies

29. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography : A Practical Guide Through the Leakage-Resistance Jungle

30. Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions

31. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?

32. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security

33. Improved Filter Permutators for Efficient FHE: Better Instances and Implementations

34. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction : (Extended Abstract)

35. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults

36. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations

37. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint

38. Reducing the Cost of Authenticity with Leakages: a Scheme with One Call to a Strongly Protected Tweakable Block Cipher

39. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder

40. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations

42. Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison

43. Masking Proofs Are Tight and How to Exploit it in Security Evaluations

44. Connecting and Improving Direct Sum Masking and Inner Product Masking

45. Towards Sound and Optimal Leakage Detection Procedure

46. Consolidating Inner Product Masking

47. Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms

48. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

49. Gimli : A Cross-Platform Permutation

50. Very High Order Masking: Efficient Implementation and Security Evaluation

Catalog

Books, media, physical & digital resources