Search

Your search keyword '"Standaert, François-Xavier"' showing total 295 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Language english Remove constraint Language: english
295 results on '"Standaert, François-Xavier"'

Search Results

4. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography : A Practical Guide Through the Leakage-Resistance Jungle

5. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?

12. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction : (Extended Abstract)

13. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder

16. Getting the Most Out of Leakage Detection : Statistical Tools and Measurement Setups Hand in Hand

17. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices : Overview of the ERC Project CRASH, Part I (Invited Talk)

19. Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

20. Making Masking Security Proofs Concrete : Or How to Evaluate the Security of Any Leaking Device

21. Combining Leakage-Resilient PRFs and Shuffling : Towards Bounded Security for Small Embedded Devices

23. FPGA Implementations of SPRING : And Their Countermeasures against Side-Channel Attacks

24. From New Technologies to New Solutions : Exploiting FRAM Memories to Enhance Physical Security

25. Security Evaluations beyond Computing Power : How to Analyze Side-Channel Attacks You Cannot Mount?

26. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations : (Extended Abstract)

27. Masking with Randomized Look Up Tables : Towards Preventing Side-Channel Attacks of All Orders

28. TIPECS : A corpus cleaning method using machine learning and qualitative analysis

29. Secure Message Authentication in the Presence of Leakage and Faults

31. Optimally Secure Tweakable Block Ciphers with a Large Tweak

32. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate

34. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations

37. Power Analysis of an FPGA : Implementation of Rijndael: Is Pipelining a DPA Countermeasure?

39. Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher

41. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists

42. Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?

47. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms

Catalog

Books, media, physical & digital resources