Search

Your search keyword '"Standaert, François-Xavier"' showing total 1,109 results

Search Constraints

Start Over You searched for: Author "Standaert, François-Xavier" Remove constraint Author: "Standaert, François-Xavier"
1,109 results on '"Standaert, François-Xavier"'

Search Results

151. Security Evaluations beyond Computing Power : How to Analyze Side-Channel Attacks You Cannot Mount?

152. Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers

153. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

154. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models

155. Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness

156. An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks

158. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions

159. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note

160. Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint

161. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs

162. Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting

163. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model

164. Security Analysis of Image-Based PUFs for Anti-counterfeiting

165. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

166. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations : (Extended Abstract)

167. Masking with Randomized Look Up Tables : Towards Preventing Side-Channel Attacks of All Orders

168. Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation

169. TIPECS : A corpus cleaning method using machine learning and qualitative analysis

171. Optimally Secure Tweakable Block Ciphers with a Large Tweak

172. Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate

174. Compact FPGA Implementations of the Five SHA-3 Finalists

175. Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

176. Extractors against Side-Channel Attacks: Weak or Strong?

177. Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box

178. Generic Side-Channel Distinguishers: Improvements and Limitations

179. Leftover Hash Lemma, Revisited

180. FPGA Implementation of a Statistical Saturation Attack against PRESENT

181. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices

183. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations

185. Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks

188. The World Is Not Enough: Another Look on Second-Order DPA

189. Algebraic Side-Channel Attacks

190. How Leaky Is an Extractor?

191. Adaptive Chosen-Message Side-Channel Attacks

192. Multi-trail Statistical Saturation Attacks

193. Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices

194. Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA

195. Mutual Information Analysis: How, When and Why?

196. How to Compare Profiled Side-Channel Attacks?

197. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

198. Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices

199. The Swiss-Knife RFID Distance Bounding Protocol

Catalog

Books, media, physical & digital resources