Search

Your search keyword '"Standaert, François-Xavier"' showing total 218 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Publisher springer international publishing Remove constraint Publisher: springer international publishing
218 results on '"Standaert, François-Xavier"'

Search Results

3. S-box Pooling: Towards More Efficient Side-Channel Security Evaluations

4. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

5. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations

6. Towards a Better Understanding of Side-Channel Analysis Measurements Setups

9. Efficient Leakage-Resilient MACs Without Idealized Assumptions

10. Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP

11. Towards Tight Random Probing Security

12. Scatter: a Missing Case?

13. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough

17. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices

18. Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?

19. A Systematic Appraisal of Side Channel Evaluation Strategies

20. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography : A Practical Guide Through the Leakage-Resistance Jungle

21. Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions

22. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?

23. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security

24. Improved Filter Permutators for Efficient FHE: Better Instances and Implementations

25. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction : (Extended Abstract)

26. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults

27. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations

28. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint

29. Reducing the Cost of Authenticity with Leakages: a Scheme with One Call to a Strongly Protected Tweakable Block Cipher

30. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder

31. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations

36. Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison

37. Masking Proofs Are Tight and How to Exploit it in Security Evaluations

38. Connecting and Improving Direct Sum Masking and Inner Product Masking

39. Towards Sound and Optimal Leakage Detection Procedure

40. Consolidating Inner Product Masking

41. Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms

42. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

43. Gimli : A Cross-Platform Permutation

44. Very High Order Masking: Efficient Implementation and Security Evaluation

45. Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study

46. Getting the Most Out of Leakage Detection : Statistical Tools and Measurement Setups Hand in Hand

47. Side-Channel Attacks Against the Human Brain: The PIN Code Case Study

48. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

49. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

50. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks

Catalog

Books, media, physical & digital resources