Search

Your search keyword '"Standaert, François-Xavier"' showing total 26 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier" Topic side-channel attacks Remove constraint Topic: side-channel attacks
26 results on '"Standaert, François-Xavier"'

Search Results

1. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

2. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations

3. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?

5. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults

6. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder

7. Masking Proofs Are Tight and How to Exploit it in Security Evaluations

9. Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards

10. From New Technologies to New Solutions : Exploiting FRAM Memories to Enhance Physical Security

11. Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

14. Automated Verification of Higher-Order Masking in Presence of Physical Defaults

15. Side-Channel Attacks Against the Human Brain: the PIN Code Case Study

16. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

17. Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems

18. Score-Based vs. Probability-Based Enumeration - A Cautionary Note

19. Towards Easy Leakage Certification

20. Information Theoretic Evaluation of Logic Styles to Counteract Side-Channel Attacks

21. An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays.

22. Fault Sensitivity Analysis

23. Algebraic Side-Channel Analysis in the Presence of Errors

24. Key enumeration, rank estimation and horizontal side-channel attacks

25. Protection des algorithmes cryptographiques embarqués

26. Physical design of cryptographic applications : constrained environments and power analysis resistance

Catalog

Books, media, physical & digital resources