Search

Your search keyword '"Standaert, François-Xavier"' showing total 215 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
215 results on '"Standaert, François-Xavier"'

Search Results

4. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations

5. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF

6. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach

7. Towards Easy Leakage Certification

8. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems

9. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts

10. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces

12. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?

13. Evaluation and Improvement of Generic-Emulating DPA Attacks

14. Blind Source Separation from Single Measurements Using Singular Spectrum Analysis

15. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment

16. Making Masking Security Proofs Concrete : Or How to Evaluate the Security of Any Leaking Device

17. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations

19. Soft Analytical Side-Channel Attacks

20. FPGA Implementations of SPRING : And Their Countermeasures against Side-Channel Attacks

21. How to Certify the Leakage of a Chip?

22. Block Ciphers That Are Easier to Mask: How Far Can We Go?

23. Masking vs. Multiparty Computation: How Large Is the Gap for AES?

24. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions

25. On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

26. Security Evaluations beyond Computing Power : How to Analyze Side-Channel Attacks You Cannot Mount?

27. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers

28. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

29. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models

30. Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness

31. An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks

33. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions

34. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note

35. Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint

36. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs

37. Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting

38. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model

39. Security Analysis of Image-Based PUFs for Anti-counterfeiting

40. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

41. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations : (Extended Abstract)

42. Masking with Randomized Look Up Tables : Towards Preventing Side-Channel Attacks of All Orders

43. Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation

44. Compact FPGA Implementations of the Five SHA-3 Finalists

45. Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

46. Extractors against Side-Channel Attacks: Weak or Strong?

47. Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box

48. Generic Side-Channel Distinguishers: Improvements and Limitations

49. Leftover Hash Lemma, Revisited

50. FPGA Implementation of a Statistical Saturation Attack against PRESENT

Catalog

Books, media, physical & digital resources