Search

Your search keyword '"Standaert, François-Xavier"' showing total 49 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Topic computer science Remove constraint Topic: computer science
49 results on '"Standaert, François-Xavier"'

Search Results

1. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)

2. Reducing the Cost of Authenticity with Leakages: a $$\mathsf {CIML2}$$ -Secure $$\mathsf {AE}$$ Scheme with One Call to a Strongly Protected Tweakable Block Cipher

3. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations

4. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security

5. Towards an Open Approach to Side-Channel Resistant Authenticated Encryption

6. Connecting and Improving Direct Sum Masking and Inner Product Masking

7. Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives

8. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

9. Side-Channel Attacks Against the Human Brain: the PIN Code Case Study

10. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

11. Towards Sound and Optimal Leakage Detection Procedure

12. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

13. Getting the Most Out of Leakage Detection

14. Private Circuits III

15. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts

16. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF

17. Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems

18. Score-Based vs. Probability-Based Enumeration - A Cautionary Note

19. Towards Easy Leakage Certification

20. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks

21. Moments-Correlating DPA

22. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers

23. Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

24. Block Ciphers that are Easier to Mask: How Far Can we Go?

25. Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results

26. An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks

27. Masking vs. Multiparty Computation: How Large Is the Gap for AES?

28. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers

29. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

30. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions

31. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model

32. Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box

33. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

34. Security Analysis of Image-Based PUFs for Anti-counterfeiting

35. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs

36. Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting

37. Compact FPGA Implementations of the Five SHA-3 Finalists

38. Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

39. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices

40. Leakage Resilient Cryptography in Practice

41. Information Theoretic Evaluation of Side-Channel Resistant Logic Styles.

42. SEA: A Scalable Encryption Algorithm for Small Embedded Applications.

43. A Comparative Cost/Security Analysis of Fault Attack Countermeasures.

44. Improved Higher-Order Side-Channel Attacks with FPGA Experiments.

45. A Tutorial on Physical Security and Side-Channel Attacks.

46. A Design Methodology for Secured ICs Using Dynamic Current Mode Logic.

47. Very High Order Masking: Efficient Implementation and Security Evaluation

48. Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers

49. Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits

Catalog

Books, media, physical & digital resources