1,109 results on '"Standaert, François-Xavier"'
Search Results
52. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
53. Improved Filter Permutators for Efficient FHE: Better Instances and Implementations
54. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction : (Extended Abstract)
55. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
56. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
57. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint
58. Reducing the Cost of Authenticity with Leakages: a Scheme with One Call to a Strongly Protected Tweakable Block Cipher
59. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
60. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations
61. An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
62. A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs
63. Scatter: a Missing Case?
64. Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP
65. On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough
66. Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
67. Masking Proofs Are Tight and How to Exploit it in Security Evaluations
68. Connecting and Improving Direct Sum Masking and Inner Product Masking
69. Towards Sound and Optimal Leakage Detection Procedure
70. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version
71. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks
72. A first step towards automatic application of power analysis countermeasures
73. Consolidating Inner Product Masking
74. Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms
75. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
76. Gimli : A Cross-Platform Permutation
77. Very High Order Masking: Efficient Implementation and Security Evaluation
78. Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study
79. Getting the Most Out of Leakage Detection : Statistical Tools and Measurement Setups Hand in Hand
80. Side-Channel Attacks Against the Human Brain: The PIN Code Case Study
81. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
82. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages
83. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks
84. Ridge-Based Profiled Differential Power Analysis
85. Protecting Dilithium against Leakage
86. A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
87. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography
88. Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions
89. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
90. A Systematic Appraisal of Side Channel Evaluation Strategies
91. Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
92. Key Enumeration from the Adversarial Viewpoint
93. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
94. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
95. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach
96. Towards Easy Leakage Certification
97. Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
98. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
99. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
100. Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.