Search

Your search keyword '"Standaert, François-Xavier"' showing total 36 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Publisher springer-verlag Remove constraint Publisher: springer-verlag
36 results on '"Standaert, François-Xavier"'

Search Results

7. Masking vs. Multiparty Computation: How Large Is the Gap for AES?

8. Security Evaluations beyond Computing Power

9. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers

10. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

11. Improved and multiple linear cryptanalysis of reduced round serpent

12. Partition vs. Comparison Side-Channel Distinguishers

13. Implementation of the AES-128 on Virtex-5 FPGAs

14. Masking vs. Multiparty Computation: How Large Is the Gap for AES?

15. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions

16. Block Ciphers That Are Easier to Mask: How far Can We GO?

17. Security Evaluations beyond Computing Power

18. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers

19. On the Need of Physical Security for Small Embedded Systems: A Case Study with COMP128-1 Implementations in SIM Cards

20. Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders

21. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

22. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models

23. Shuffling against Side-Channel Attacks: A comprehensive Study with Cautionary Note

24. An Optimal key Enumeration Algorithm and Its Application to Side-Channel Attacks

25. Univariate side channel attacks and leakage modeling

26. Mutual information analysis: how, when and why?

27. A design flow and evaluation framework for DPA-resistant instruction set extensions

28. A statistical saturation attack against the block cipher PRESENT

29. A unified framework for the analysis of side-channel key recovery attacks

30. Partition vs. comparison side-channel distinguishers: an empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices

31. Improved and multiple linear cryptanalysis of reduced round serpent

32. Using subspace-based template attacks to compare and combine power and electromagnetic information leakages

33. Implementation of the AES-128 on Virtex-5 FPGAs

34. Experiments on the multiple linear cryptanalysis of reduced round serpent

35. The swiss-knife RFID distance bounding protocol

36. Time-Memory Tradeoffs

Catalog

Books, media, physical & digital resources