215 results on '"Standaert, François-Xavier"'
Search Results
2. Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
3. Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
4. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
5. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
6. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach
7. Towards Easy Leakage Certification
8. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
9. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
10. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
11. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
12. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
13. Evaluation and Improvement of Generic-Emulating DPA Attacks
14. Blind Source Separation from Single Measurements Using Singular Spectrum Analysis
15. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
16. Making Masking Security Proofs Concrete : Or How to Evaluate the Security of Any Leaking Device
17. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
18. Towards easy leakage certification: extended version
19. Soft Analytical Side-Channel Attacks
20. FPGA Implementations of SPRING : And Their Countermeasures against Side-Channel Attacks
21. How to Certify the Leakage of a Chip?
22. Block Ciphers That Are Easier to Mask: How Far Can We Go?
23. Masking vs. Multiparty Computation: How Large Is the Gap for AES?
24. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
25. On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards
26. Security Evaluations beyond Computing Power : How to Analyze Side-Channel Attacks You Cannot Mount?
27. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers
28. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
29. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models
30. Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
31. An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks
32. Side-Channel Analysis and Its Relevance to Fault Attacks
33. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions
34. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
35. Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
36. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
37. Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
38. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
39. Security Analysis of Image-Based PUFs for Anti-counterfeiting
40. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
41. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations : (Extended Abstract)
42. Masking with Randomized Look Up Tables : Towards Preventing Side-Channel Attacks of All Orders
43. Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation
44. Compact FPGA Implementations of the Five SHA-3 Finalists
45. Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks
46. Extractors against Side-Channel Attacks: Weak or Strong?
47. Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box
48. Generic Side-Channel Distinguishers: Improvements and Limitations
49. Leftover Hash Lemma, Revisited
50. FPGA Implementation of a Statistical Saturation Attack against PRESENT
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.