110 results on '"Standaert, François-Xavier"'
Search Results
2. Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings
3. A Nearly Tight Proof of Duc et al.’s Conjectured Security Bound for Masked Implementations
4. Prouff and Rivain’s Formal Security Proof of Masking, Revisited
5. Learning with Physical Rounding for Linear and Quadratic Leakage Functions
6. Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers
7. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber
8. Towards Case-Optimized Hybrid Homomorphic Encryption
9. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
10. A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
11. Towards a Better Understanding of Side-Channel Analysis Measurements Setups
12. Scatter: a Missing Case?
13. Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP
14. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough
15. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography
16. Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions
17. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
18. A Systematic Appraisal of Side Channel Evaluation Strategies
19. Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
20. Key Enumeration from the Adversarial Viewpoint
21. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction
22. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
23. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations
24. Fast Side-Channel Security Evaluation of ECC Implementations
25. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
26. Reducing the Cost of Authenticity with Leakages: a $$\mathsf {CIML2}$$-Secure $$\mathsf {AE}$$ Scheme with One Call to a Strongly Protected Tweakable Block Cipher
27. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint
28. Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
29. Masking Proofs Are Tight and How to Exploit it in Security Evaluations
30. Connecting and Improving Direct Sum Masking and Inner Product Masking
31. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks
32. Getting the Most Out of Leakage Detection
33. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages
34. Ridge-Based Profiled Differential Power Analysis
35. Consolidating Inner Product Masking
36. Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study
37. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
38. Score-Based vs. Probability-Based Enumeration – A Cautionary Note
39. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers
40. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices
41. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
42. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
43. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
44. Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations
45. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
46. Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
47. Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
48. Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
49. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)
50. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.