Search

Your search keyword '"Standaert, François-Xavier"' showing total 975 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier"
975 results on '"Standaert, François-Xavier"'

Search Results

951. Noise analysis for the design of side-channel secure cryptographic circuits

952. Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits

953. Towards bounding the effectiveness of statistical attacks in security and privacy

954. De la théorie à la pratique de la cryptographie en boite blanche

955. Authentication in the presence of side-channel leakage

956. Anonymization in the 21st century : a critical examination of de-identification for modern large-scale data

957. Key enumeration, rank estimation and horizontal side-channel attacks

958. Hardware-Trojan resilient blockcipher implementation based on multi-party computation

959. Reconnaissance de codes de sécurité à partir d'images volées

960. Physical security analysis of AES implementations on 8-bit MCU and countermeasures

961. Quantification de l'anonymat dans les bases de données

962. Implementation trade-offs for access tokens

963. Negotiations using secure multi-party computation

964. Privacy-preserving audit mechanisms for multi-party protocols

965. Network flow problems with secure multiparty computation

966. Towards side-channel secure block ciphers

967. Protection des algorithmes cryptographiques embarqués

968. Towards the design of a pseudo-synchronous multi-processor system-on-chip for processing-intensive ultra-low-power applications

969. Towards fair evaluation and intellectual property protection of cryptographic implementations

970. Privacy enhancing cryptographic mechanisms with public verifiability

971. Advanced extraction and exploitation of side-channel information in cryptographic implementations

972. Side channel analysis and countermeasures

973. Transistor-level design of low-power nanoscale digital circuits for secure applications

974. Physical design of cryptographic applications : constrained environments and power analysis resistance

975. Side-channel attacks against the human brain: the PIN code case study (extended version).

Catalog

Books, media, physical & digital resources