Search

Your search keyword '"Standaert, François-Xavier"' showing total 24 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Topic 020201 artificial intelligence & image processing Remove constraint Topic: 020201 artificial intelligence & image processing
24 results on '"Standaert, François-Xavier"'

Search Results

1. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

2. Glitch-Resistant Masking Revisited

3. Multi-Tuple Leakage Detection and the Dependent Signal Issue

4. Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate

5. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)

6. Reducing the Cost of Authenticity with Leakages: a $$\mathsf {CIML2}$$ -Secure $$\mathsf {AE}$$ Scheme with One Call to a Strongly Protected Tweakable Block Cipher

7. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations

8. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security

9. Connecting and Improving Direct Sum Masking and Inner Product Masking

10. Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives

11. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

12. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

13. Towards Sound and Optimal Leakage Detection Procedure

14. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

15. Getting the Most Out of Leakage Detection

16. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF

17. Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems

18. Score-Based vs. Probability-Based Enumeration - A Cautionary Note

19. Towards Easy Leakage Certification

20. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers

21. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

22. Security Analysis of Image-Based PUFs for Anti-counterfeiting

23. Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

24. Very High Order Masking: Efficient Implementation and Security Evaluation

Catalog

Books, media, physical & digital resources