Search

Your search keyword '"François-Xavier Standaert"' showing total 686 results

Search Constraints

Start Over You searched for: Author "François-Xavier Standaert" Remove constraint Author: "François-Xavier Standaert"
686 results on '"François-Xavier Standaert"'

Search Results

1. Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks

2. Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon

3. Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate

4. Protecting Dilithium against Leakage

5. Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations

6. Information Bounds and Convergence Rates for Side-Channel Security Evaluators

7. Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

8. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

9. Secure Message Authentication in the Presence of Leakage and Faults

10. Don’t Learn What You Already Know

11. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations

12. Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation

13. When Bad News Become Good News

14. A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB

15. Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype

16. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms

17. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

18. Provable Security of SP Networks with Partial Non-Linear Layers

19. MOE: Multiplication Operated Encryption with Trojan Resilience

20. Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry

21. Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding

22. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

23. Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher

24. Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks

25. Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction

26. Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking

27. Side-channel attacks against the human brain: the PIN code case study (extended version)

28. On Leakage-Resilient Authenticated Encryption with Decryption Leakages

29. Efficient and Private Computations with Code-Based Masking

30. Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations

31. Efficient Side-Channel Secure Message Authentication with Better Bounds

32. TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

33. Multi-Tuple Leakage Detection and the Dependent Signal Issue

34. Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations

35. Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate

36. Glitch-Resistant Masking Revisited

37. Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model

38. Leakage Detection with the x2-Test

39. Analysis of Dynamic Differential Swing Limited Logic for Low-Power Secure Applications

Catalog

Books, media, physical & digital resources