|
|
(4 intermediate revisions by 4 users not shown) |
| Property / author |
| | |
| Property / author: François-Xavier Standaert / rank |
| | Normal rank |
| Property / MaRDI profile type |
| | |
| Property / MaRDI profile type: MaRDI publication profile / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W2612816951 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems -- CHES 2015. 17th international workshop, Saint-Malo, France, September 13--16, 2015. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems -- CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17--19, 2016. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part I / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8--12, 2016. Proceedings. Part I / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Verified Proofs of Higher-Order Masking / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Mutual information analysis: a comprehensive study / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Horizontal side-channel attacks and countermeasures on the ISW masking scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Randomness Complexity of Private Circuits for Multiplication / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Higher-Order Threshold Implementations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A More Efficient AES Threshold Implementation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Selected Areas in Cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Masking AES with \(d+1\) shares in hardware / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Conversion of Security Proofs from One Leakage Model to Another: A New Issue / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Side Channel Cryptanalysis of a Higher Order Masking Scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Making Masking Security Proofs Concrete / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards easy leakage certification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Cryptography from the Inner-Product Extractor / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Synthesis of Masking Countermeasures against Side Channel Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941869 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Statistical Tools Flavor Side-Channel Collision Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pushing the Limits: A Very Compact and a Threshold Implementation of AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure hardware implementation of nonlinear functions in the presence of glitches / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Side-channel resistant crypto for less than 2,300 GE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Statistical Analysis of Second Order Differential Power Analysis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Consolidating Masking Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Provably Secure Higher-Order Masking of AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage assessment methodology. A clear roadmap for side-channel evaluations / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank |
| | Normal rank |
links / mardi / name | links / mardi / name |
| | |