Search

Your search keyword '"Standaert, François-Xavier"' showing total 1,109 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier"
1,109 results on '"Standaert, François-Xavier"'

Search Results

52. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security

53. Improved Filter Permutators for Efficient FHE: Better Instances and Implementations

54. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction : (Extended Abstract)

55. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults

56. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations

57. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint

58. Reducing the Cost of Authenticity with Leakages: a Scheme with One Call to a Strongly Protected Tweakable Block Cipher

59. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder

60. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations

66. Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison

67. Masking Proofs Are Tight and How to Exploit it in Security Evaluations

68. Connecting and Improving Direct Sum Masking and Inner Product Masking

69. Towards Sound and Optimal Leakage Detection Procedure

71. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

72. A first step towards automatic application of power analysis countermeasures

73. Consolidating Inner Product Masking

74. Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms

75. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

76. Gimli : A Cross-Platform Permutation

77. Very High Order Masking: Efficient Implementation and Security Evaluation

78. Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study

79. Getting the Most Out of Leakage Detection : Statistical Tools and Measurement Setups Hand in Hand

80. Side-Channel Attacks Against the Human Brain: The PIN Code Case Study

81. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

82. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

83. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks

84. Ridge-Based Profiled Differential Power Analysis

85. Protecting Dilithium against Leakage

86. A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions

90. A Systematic Appraisal of Side Channel Evaluation Strategies

93. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations

94. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF

95. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach

96. Towards Easy Leakage Certification

97. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems

98. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts

99. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces

100. Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security

Catalog

Books, media, physical & digital resources