221 results on '"Standaert, François-Xavier"'
Search Results
2. The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm
3. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists
4. Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings
5. POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption
6. A Nearly Tight Proof of Duc et al.’s Conjectured Security Bound for Masked Implementations
7. Prouff and Rivain’s Formal Security Proof of Masking, Revisited
8. Learning with Physical Rounding for Linear and Quadratic Leakage Functions
9. Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers
10. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber
11. Towards Case-Optimized Hybrid Homomorphic Encryption
12. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
13. A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
14. S-box Pooling: Towards More Efficient Side-Channel Security Evaluations
15. Towards a Better Understanding of Side-Channel Analysis Measurements Setups
16. Efficient Leakage-Resilient MACs Without Idealized Assumptions
17. Scatter: a Missing Case?
18. Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP
19. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough
20. Protecting Dilithium against Leakage
21. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography
22. Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions
23. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
24. A Systematic Appraisal of Side Channel Evaluation Strategies
25. Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
26. Key Enumeration from the Adversarial Viewpoint
27. Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
28. Information Bounds and Convergence Rates for Side-Channel Security Evaluators
29. Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations
30. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction
31. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
32. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations
33. Fast Side-Channel Security Evaluation of ECC Implementations
34. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
35. Reducing the Cost of Authenticity with Leakages: a $$\mathsf {CIML2}$$-Secure $$\mathsf {AE}$$ Scheme with One Call to a Strongly Protected Tweakable Block Cipher
36. Improved Filter Permutators for Efficient FHE: Better Instances and Implementations
37. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint
38. Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations
39. Secure Message Authentication in the Presence of Leakage and Faults
40. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks
41. Fine-tuning is not (always) overfitting artifacts
42. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
43. Don’t Learn What You Already Know
44. Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
45. Masking Proofs Are Tight and How to Exploit it in Security Evaluations
46. Connecting and Improving Direct Sum Masking and Inner Product Masking
47. Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation
48. When Bad News Become Good News
49. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks
50. Very High Order Masking: Efficient Implementation and Security Evaluation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.