Search

Your search keyword '"Standaert, François-Xavier"' showing total 470 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Search Limiters Full Text Remove constraint Search Limiters: Full Text
470 results on '"Standaert, François-Xavier"'

Search Results

1. Explanation sensitivity to the randomness of large language models: the case of journalistic text classification

2. A Question on the Explainability of Large Language Models and the Word-Level Univariate First-Order Plausibility Assumption

5. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

6. A first step towards automatic application of power analysis countermeasures

7. Protecting Dilithium against Leakage

8. A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions

12. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

15. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate

16. Optimally Secure Tweakable Block Ciphers with a Large Tweak

17. Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers

19. TIPECS : A corpus cleaning method using machine learning and qualitative analysis

21. Optimally Secure Tweakable Block Ciphers with a Large Tweak

22. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate

24. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations

29. When Bad News Become Good News

30. Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended

31. Worst-case side-channel security : from evaluation of countermeasures to new designs

32. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

33. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations

34. Automatic and Manual Detection of Generated News: Case Study, Limitations and Challenges

35. Composable and efficient masking schemes for side-channel secure implementations

36. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists

37. Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation

39. Tight-ES-TRNG: Improved Construction and Robustness Analysis

42. Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher

45. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists

48. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms

50. Security Analysis of Deterministic Re-Keying with Masking & Shuffling: Application to ISAP

Catalog

Books, media, physical & digital resources