27 results on '"Standaert, François-Xavier"'
Search Results
2. Reducing risks through simplicity: high side-channel security for lazy engineers
3. How to fool a black box machine learning based side-channel security evaluation
4. How to fool a black box machine learning based side-channel security evaluation
5. A stealthy Hardware Trojan based on a Statistical Fault Attack
6. Automated news recommendation in front of adversarial examples and the technical limits of transparency in algorithmic accountability
7. Reducing risks through simplicity: high side-channel security for lazy engineers
8. Side-channel analysis of a learning parity with physical noise processor
9. Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
10. Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
11. Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
12. Side-channel attacks against the human brain: the PIN code case study (extended version)
13. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version
14. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
15. Towards easy leakage certification: extended version
16. Improving the security and efficiency of block ciphers based on LS-designs
17. Masking and leakage-resilient primitives: One, the other(s) or both?
18. Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations
19. Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
20. Masking vs. multiparty computation: how large is the gap for AES?
21. Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version
22. Analysis and experimental evaluation of image-based PUFs
23. Extractors against side-channel attacks: weak or strong?
24. Univariate side channel attacks and leakage modeling
25. Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags
26. Mutual Information Analysis: a Comprehensive Study
27. Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.