1,109 results on '"Standaert, François-Xavier"'
Search Results
152. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers
153. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
154. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models
155. Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
156. An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks
157. Side-Channel Analysis and Its Relevance to Fault Attacks
158. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions
159. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note
160. Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
161. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
162. Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
163. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
164. Security Analysis of Image-Based PUFs for Anti-counterfeiting
165. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
166. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations : (Extended Abstract)
167. Masking with Randomized Look Up Tables : Towards Preventing Side-Channel Attacks of All Orders
168. Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation
169. TIPECS : A corpus cleaning method using machine learning and qualitative analysis
170. Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher
171. Optimally Secure Tweakable Block Ciphers with a Large Tweak
172. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
173. A Third is All You Need: Extended Partial Key Exposure Attack on (CRT-RSA) with Additive Exponent Blinding
174. Compact FPGA Implementations of the Five SHA-3 Finalists
175. Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks
176. Extractors against Side-Channel Attacks: Weak or Strong?
177. Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box
178. Generic Side-Channel Distinguishers: Improvements and Limitations
179. Leftover Hash Lemma, Revisited
180. FPGA Implementation of a Statistical Saturation Attack against PRESENT
181. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
182. Fine-tuning is not (always) overfitting artifacts
183. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
184. Don’t Learn What You Already Know
185. Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
186. Introduction to Side-Channel Attacks
187. Leakage Resilient Cryptography in Practice
188. The World Is Not Enough: Another Look on Second-Order DPA
189. Algebraic Side-Channel Attacks
190. How Leaky Is an Extractor?
191. Adaptive Chosen-Message Side-Channel Attacks
192. Multi-trail Statistical Saturation Attacks
193. Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
194. Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
195. Mutual Information Analysis: How, When and Why?
196. How to Compare Profiled Side-Channel Attacks?
197. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
198. Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
199. The Swiss-Knife RFID Distance Bounding Protocol
200. Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.