300 results on '"Standaert, François-Xavier"'
Search Results
2. Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber
3. Generalized Feistel Ciphers for Efficient Prime Field Masking
4. Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking
5. The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm
6. Leveraging Coprocessors as Noise Engines in Off-the-Shelf Microcontrollers
7. Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs
8. Prouff and Rivain’s Formal Security Proof of Masking, Revisited : Tight Bounds in the Noisy Leakage Model
9. Learning with Physical Rounding for Linear and Quadratic Leakage Functions
10. POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption
11. Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers
12. Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings
13. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists
14. A Nearly Tight Proof of Duc et al.’s Conjectured Security Bound for Masked Implementations
15. A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
16. Towards Case-Optimized Hybrid Homomorphic Encryption : Featuring the Elisabeth Stream Cipher
17. S-box Pooling: Towards More Efficient Side-Channel Security Evaluations
18. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber
19. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
20. Towards a Better Understanding of Side-Channel Analysis Measurements Setups
21. Efficient Leakage-Resilient MACs Without Idealized Assumptions
22. Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP
23. Towards Tight Random Probing Security
24. Scatter: a Missing Case?
25. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough
26. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
27. Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
28. A Systematic Appraisal of Side Channel Evaluation Strategies
29. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography : A Practical Guide Through the Leakage-Resistance Jungle
30. Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions
31. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?
32. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
33. Improved Filter Permutators for Efficient FHE: Better Instances and Implementations
34. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction : (Extended Abstract)
35. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
36. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
37. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint
38. Reducing the Cost of Authenticity with Leakages: a Scheme with One Call to a Strongly Protected Tweakable Block Cipher
39. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
40. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations
41. An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
42. Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
43. Masking Proofs Are Tight and How to Exploit it in Security Evaluations
44. Connecting and Improving Direct Sum Masking and Inner Product Masking
45. Towards Sound and Optimal Leakage Detection Procedure
46. Consolidating Inner Product Masking
47. Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms
48. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
49. Gimli : A Cross-Platform Permutation
50. Very High Order Masking: Efficient Implementation and Security Evaluation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.