Search

Your search keyword '"Standaert, François-Xavier"' showing total 21 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Language undetermined Remove constraint Language: undetermined
21 results on '"Standaert, François-Xavier"'

Search Results

1. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

2. Leakage Detection with the x2-Test

3. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)

4. Reducing the Cost of Authenticity with Leakages: a $$\mathsf {CIML2}$$ -Secure $$\mathsf {AE}$$ Scheme with One Call to a Strongly Protected Tweakable Block Cipher

5. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations

6. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security

7. Connecting and Improving Direct Sum Masking and Inner Product Masking

8. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

9. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

10. Getting the Most Out of Leakage Detection

11. Private Circuits III

12. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF

13. Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

15. Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results

16. An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks

17. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

18. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions

19. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model

20. Randomly driven fuzzy key extraction of unclonable images

21. Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits

Catalog

Books, media, physical & digital resources