Search

Your search keyword '"Standaert, François-Xavier"' showing total 1,109 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier"
1,109 results on '"Standaert, François-Xavier"'

Search Results

101. Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations

102. Score-Based vs. Probability-Based Enumeration – A Cautionary Note

103. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices : Overview of the ERC Project CRASH, Part I (Invited Talk)

104. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers

109. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?

110. Evaluation and Improvement of Generic-Emulating DPA Attacks

111. Blind Source Separation from Single Measurements Using Singular Spectrum Analysis

112. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment

113. Making Masking Security Proofs Concrete : Or How to Evaluate the Security of Any Leaking Device

114. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations

115. Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards

116. Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits

117. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)

118. On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes

119. Combining Leakage-Resilient PRFs and Shuffling : Towards Bounded Security for Small Embedded Devices

120. On the Cost of Lazy Engineering for Masked Software Implementations

128. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

131. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate

132. Optimally Secure Tweakable Block Ciphers with a Large Tweak

133. Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers

137. Soft Analytical Side-Channel Attacks

138. FPGA Implementations of SPRING : And Their Countermeasures against Side-Channel Attacks

139. How to Certify the Leakage of a Chip?

140. Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions

141. Low Entropy Masking Schemes, Revisited

142. From New Technologies to New Solutions : Exploiting FRAM Memories to Enhance Physical Security

143. Efficient Masked S-Boxes Processing – A Step Forward –

144. Hardware Implementation and Side-Channel Analysis of Lapin

145. The Myth of Generic DPA…and the Magic of Learning

147. Block Ciphers That Are Easier to Mask: How Far Can We Go?

148. Masking vs. Multiparty Computation: How Large Is the Gap for AES?

149. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions

150. On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

Catalog

Books, media, physical & digital resources