218 results on '"Standaert, François-Xavier"'
Search Results
2. A Nearly Tight Proof of Duc et al.’s Conjectured Security Bound for Masked Implementations
3. S-box Pooling: Towards More Efficient Side-Channel Security Evaluations
4. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber
5. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
6. Towards a Better Understanding of Side-Channel Analysis Measurements Setups
7. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists
8. A Nearly Tight Proof of Duc et al.’s Conjectured Security Bound for Masked Implementations
9. Efficient Leakage-Resilient MACs Without Idealized Assumptions
10. Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP
11. Towards Tight Random Probing Security
12. Scatter: a Missing Case?
13. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough
14. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber
15. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
16. Towards a Better Understanding of Side-Channel Analysis Measurements Setups
17. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
18. Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
19. A Systematic Appraisal of Side Channel Evaluation Strategies
20. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography : A Practical Guide Through the Leakage-Resistance Jungle
21. Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions
22. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?
23. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
24. Improved Filter Permutators for Efficient FHE: Better Instances and Implementations
25. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction : (Extended Abstract)
26. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
27. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
28. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint
29. Reducing the Cost of Authenticity with Leakages: a Scheme with One Call to a Strongly Protected Tweakable Block Cipher
30. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
31. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations
32. An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
33. Scatter: a Missing Case?
34. Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP
35. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough
36. Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
37. Masking Proofs Are Tight and How to Exploit it in Security Evaluations
38. Connecting and Improving Direct Sum Masking and Inner Product Masking
39. Towards Sound and Optimal Leakage Detection Procedure
40. Consolidating Inner Product Masking
41. Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms
42. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
43. Gimli : A Cross-Platform Permutation
44. Very High Order Masking: Efficient Implementation and Security Evaluation
45. Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study
46. Getting the Most Out of Leakage Detection : Statistical Tools and Measurement Setups Hand in Hand
47. Side-Channel Attacks Against the Human Brain: The PIN Code Case Study
48. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
49. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages
50. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.