295 results on '"Standaert, François-Xavier"'
Search Results
2. Towards Case-Optimized Hybrid Homomorphic Encryption : Featuring the Elisabeth Stream Cipher
3. Automated news recommendation in front of adversarial examples and the technical limits of transparency in algorithmic accountability
4. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography : A Practical Guide Through the Leakage-Resistance Jungle
5. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?
6. How to fool a black box machine learning based side-channel security evaluation
7. A stealthy Hardware Trojan based on a Statistical Fault Attack
8. Side-channel analysis of a learning parity with physical noise processor
9. Tight-ES-TRNG: Improved Construction and Robustness Analysis
10. Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
11. Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
12. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction : (Extended Abstract)
13. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
14. A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs
15. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version
16. Getting the Most Out of Leakage Detection : Statistical Tools and Measurement Setups Hand in Hand
17. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices : Overview of the ERC Project CRASH, Part I (Invited Talk)
18. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
19. Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
20. Making Masking Security Proofs Concrete : Or How to Evaluate the Security of Any Leaking Device
21. Combining Leakage-Resilient PRFs and Shuffling : Towards Bounded Security for Small Embedded Devices
22. Towards easy leakage certification: extended version
23. FPGA Implementations of SPRING : And Their Countermeasures against Side-Channel Attacks
24. From New Technologies to New Solutions : Exploiting FRAM Memories to Enhance Physical Security
25. Security Evaluations beyond Computing Power : How to Analyze Side-Channel Attacks You Cannot Mount?
26. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations : (Extended Abstract)
27. Masking with Randomized Look Up Tables : Towards Preventing Side-Channel Attacks of All Orders
28. TIPECS : A corpus cleaning method using machine learning and qualitative analysis
29. Secure Message Authentication in the Presence of Leakage and Faults
30. Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher
31. Optimally Secure Tweakable Block Ciphers with a Large Tweak
32. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
33. A Third is All You Need: Extended Partial Key Exposure Attack on (CRT-RSA) with Additive Exponent Blinding
34. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
35. Improving the security and efficiency of block ciphers based on LS-designs
36. Side-channel attacks against the human brain: the PIN code case study (extended version)
37. Power Analysis of an FPGA : Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
38. Masking and leakage-resilient primitives: One, the other(s) or both?
39. Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher
40. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
41. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists
42. Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
43. Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations
44. Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
45. Masking vs. multiparty computation: how large is the gap for AES?
46. Understanding screaming channels: From a detailed analysis to improved attacks
47. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms
48. Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version
49. Analysis and experimental evaluation of image-based PUFs
50. Extractors against side-channel attacks: weak or strong?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.