1,109 results on '"Standaert, François-Xavier"'
Search Results
102. Score-Based vs. Probability-Based Enumeration – A Cautionary Note
103. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices : Overview of the ERC Project CRASH, Part I (Invited Talk)
104. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers
105. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
106. Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
107. Information Bounds and Convergence Rates for Side-Channel Security Evaluators
108. Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations
109. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
110. Evaluation and Improvement of Generic-Emulating DPA Attacks
111. Blind Source Separation from Single Measurements Using Singular Spectrum Analysis
112. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
113. Making Masking Security Proofs Concrete : Or How to Evaluate the Security of Any Leaking Device
114. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
115. Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
116. Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
117. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)
118. On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes
119. Combining Leakage-Resilient PRFs and Shuffling : Towards Bounded Security for Small Embedded Devices
120. On the Cost of Lazy Engineering for Masked Software Implementations
121. Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction
122. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
123. How (Not) to Use Welch’s T-Test in Side-Channel Security Evaluations
124. Fast Side-Channel Security Evaluation of ECC Implementations
125. SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
126. Reducing the Cost of Authenticity with Leakages: a $$\mathsf {CIML2}$$-Secure $$\mathsf {AE}$$ Scheme with One Call to a Strongly Protected Tweakable Block Cipher
127. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint
128. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks
129. A Third is All You Need: Extended Partial Key Exposure Attack on (CRT-RSA) with Additive Exponent Blinding
130. Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher
131. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
132. Optimally Secure Tweakable Block Ciphers with a Large Tweak
133. Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers
134. Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations
135. Secure Message Authentication in the Presence of Leakage and Faults
136. Towards easy leakage certification: extended version
137. Soft Analytical Side-Channel Attacks
138. FPGA Implementations of SPRING : And Their Countermeasures against Side-Channel Attacks
139. How to Certify the Leakage of a Chip?
140. Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions
141. Low Entropy Masking Schemes, Revisited
142. From New Technologies to New Solutions : Exploiting FRAM Memories to Enhance Physical Security
143. Efficient Masked S-Boxes Processing – A Step Forward –
144. Hardware Implementation and Side-Channel Analysis of Lapin
145. The Myth of Generic DPA…and the Magic of Learning
146. A Survey of Recent Results in FPGA Security and Intellectual Property Protection
147. Block Ciphers That Are Easier to Mask: How Far Can We Go?
148. Masking vs. Multiparty Computation: How Large Is the Gap for AES?
149. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
150. On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.