Search

Your search keyword '"Standaert, François-Xavier"' showing total 34 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Topic 02 engineering and technology Remove constraint Topic: 02 engineering and technology
34 results on '"Standaert, François-Xavier"'

Search Results

1. Leakage Detection with the x2-Test

2. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

3. Glitch-Resistant Masking Revisited

4. Multi-Tuple Leakage Detection and the Dependent Signal Issue

5. Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate

6. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)

7. Reducing the Cost of Authenticity with Leakages: a $$\mathsf {CIML2}$$ -Secure $$\mathsf {AE}$$ Scheme with One Call to a Strongly Protected Tweakable Block Cipher

8. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations

9. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security

10. Connecting and Improving Direct Sum Masking and Inner Product Masking

11. Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives

12. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

13. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

14. Towards Sound and Optimal Leakage Detection Procedure

15. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

16. Getting the Most Out of Leakage Detection

17. Private Circuits III

18. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts

19. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF

20. Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems

21. Score-Based vs. Probability-Based Enumeration - A Cautionary Note

22. Towards Easy Leakage Certification

23. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks

24. Moments-Correlating DPA

25. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers

26. Block Ciphers that are Easier to Mask: How Far Can we Go?

27. Masking vs. Multiparty Computation: How Large Is the Gap for AES?

28. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

29. Security Analysis of Image-Based PUFs for Anti-counterfeiting

30. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs

31. Compact FPGA Implementations of the Five SHA-3 Finalists

32. Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

33. Very High Order Masking: Efficient Implementation and Security Evaluation

34. Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers

Catalog

Books, media, physical & digital resources