Search

Your search keyword '"Standaert, François-Xavier"' showing total 579 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
579 results on '"Standaert, François-Xavier"'

Search Results

1. Explanation sensitivity to the randomness of large language models: the case of journalistic text classification

2. A Question on the Explainability of Large Language Models and the Word-Level Univariate First-Order Plausibility Assumption

3. Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences

5. Generalized Feistel Ciphers for Efficient Prime Field Masking

6. Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking

7. The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm

9. Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs

11. Learning with Physical Rounding for Linear and Quadratic Leakage Functions

12. POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption

14. Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings

17. A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding

18. Towards Case-Optimized Hybrid Homomorphic Encryption : Featuring the Elisabeth Stream Cipher

19. S-box Pooling: Towards More Efficient Side-Channel Security Evaluations

20. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

21. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations

22. Towards a Better Understanding of Side-Channel Analysis Measurements Setups

30. Efficient Leakage-Resilient MACs Without Idealized Assumptions

31. Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP

32. Towards Tight Random Probing Security

33. Scatter: a Missing Case?

34. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough

40. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices

41. Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?

42. A Systematic Appraisal of Side Channel Evaluation Strategies

43. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography : A Practical Guide Through the Leakage-Resistance Jungle

44. Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions

45. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?

Catalog

Books, media, physical & digital resources