32 results on '"Standaert, François-Xavier"'
Search Results
2. How to fool a black box machine learning based side-channel security evaluation
3. A stealthy Hardware Trojan based on a Statistical Fault Attack
4. Side-channel analysis of a learning parity with physical noise processor
5. Tight-ES-TRNG: Improved Construction and Robustness Analysis
6. Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
7. Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
8. A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs
9. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version
10. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
11. Towards easy leakage certification: extended version
12. Sensibilité des explications à l'aléa des grands modèles de langage : le cas de la classification de textes journalistiques.
13. Improving the security and efficiency of block ciphers based on LS-designs
14. Side-channel attacks against the human brain: the PIN code case study (extended version)
15. Transparents mais corruptibles: les algorithmes au défi des comportements « adversariaux » dans le domaine journalistique.
16. Masking and leakage-resilient primitives: One, the other(s) or both?
17. Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations
18. Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
19. Masking vs. multiparty computation: how large is the gap for AES?
20. Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version
21. Analysis and experimental evaluation of image-based PUFs
22. Extractors against side-channel attacks: weak or strong?
23. Univariate side channel attacks and leakage modeling
24. Mutual Information Analysis: a Comprehensive Study
25. Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags
26. Provable security of block ciphers against linear cryptanalysis: a mission impossible?: An experimental review of the practical security approachand the key equivalence hypothesis in linear cryptanalysis
27. Power and electromagnetic analysis: Improved model, consequences and comparisons
28. Reducing risks through simplicity: high side-channel security for lazy engineers.
29. Beyond algorithmic noise or how to shuffle parallel implementations?
30. A first step towards automatic application of power analysis countermeasures.
31. Analysis of Dynamic Differential Swing Limited Logic for Low-Power Secure Applications.
32. An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.