Search

Your search keyword '"Standaert, François-Xavier"' showing total 92 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
92 results on '"Standaert, François-Xavier"'

Search Results

1. Explanation sensitivity to the randomness of large language models: the case of journalistic text classification

2. A Question on the Explainability of Large Language Models and the Word-Level Univariate First-Order Plausibility Assumption

3. Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences

5. Generalized Feistel Ciphers for Efficient Prime Field Masking

6. Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking

7. The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm

9. Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs

11. Learning with Physical Rounding for Linear and Quadratic Leakage Functions

12. POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption

14. Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings

17. A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding

18. Towards Case-Optimized Hybrid Homomorphic Encryption : Featuring the Elisabeth Stream Cipher

19. S-box Pooling: Towards More Efficient Side-Channel Security Evaluations

20. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

21. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations

22. Towards a Better Understanding of Side-Channel Analysis Measurements Setups

36. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

37. Protecting Dilithium against Leakage

41. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

44. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate

45. Optimally Secure Tweakable Block Ciphers with a Large Tweak

46. Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers

49. TIPECS : A corpus cleaning method using machine learning and qualitative analysis

Catalog

Books, media, physical & digital resources