Search

Your search keyword '"Standaert, François-Xavier"' showing total 104 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Publisher springer Remove constraint Publisher: springer
104 results on '"Standaert, François-Xavier"'

Search Results

5. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

6. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations

9. Automated News Recommendation in front of Adversarial Examples & the Technical Limits of Transparency in Algorithmic Accountability

10. A Stealthy Hardware Trojan based on a Statistical Fault Attack

11. Towards Tight Random Probing Security - extended version

12. Efficient Leakage-Resilient MACs Without Idealized Assumptions

13. Towards a Better Understanding of Side-Channel Analysis Measurements Setups

14. Scatter: a Missing Case?

15. On the Security of Off-the-Shelf Microcontrollers: Hardware is not Enough

16. Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying

17. Deep Learning Mitigates but Does Not Annihilate the Need of Aligned Traces and a Generalized ResNet Model For Side-channel Attacks

18. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle

19. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices

20. Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions

21. Template Attacks vs. Machine Learning Revisited and the Curse of Dimensionality in Side-Channel Analysis: Extended Version

22. Side-channel attacks against the human brain: the PIN code case study (extended version).

23. Side-Channel Attacks Against the Human Brain: the PIN Code Case Study

24. Ridge-Based Profiled Differential Power Analysis

25. Towards Easy Leakage Certification

26. Score-Based vs. Probability-Based Enumeration - A Cautionary Note

27. Towards Easy Leakage Certification

28. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks

29. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I

30. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers

31. Leakage-Resilient Symmetric Cryptography - Overview of the ERC Project CRASH, Part II

32. Ridge-Based Profiled Differential Power Analysis

33. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

34. Gimli: a cross-platform permutation

35. Side-Channel Attacks Against the Human Brain: the PIN Code Case Study

36. Very High Order Masking: Efficient Implementation and Security Evaluation

37. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

38. Towards Easy Leakage Certification

39. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces

40. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts

41. Towards Easy Leakage Certification

42. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers

43. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I

44. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations

45. Leakage-Resilient Symmetric Cryptography - Overview of the ERC Project CRASH, Part II

46. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks

47. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

48. A Survey of Recent Results in FPGA Security and Intellectual Property protection

49. Unified and optimized linear collision attacks and their application in a non-profiled setting

50. Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box

Catalog

Books, media, physical & digital resources