François-Xavier Standaert

From MaRDI portal
(Redirected from Person:510501)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
IP masking with generic security guarantees under minimum assumptions, and applications2026-03-31Paper
Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences2024-12-13Paper
Generalized Feistel ciphers for efficient prime field masking2024-11-13Paper
Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking2024-11-13Paper
The patching landscape of Elisabeth-4 and the mixed filter permutator paradigm2024-10-23Paper
Forgery attacks on several beyond-birthday-bound secure MACs2024-08-30Paper
SpookChain: chaining a sponge-based AEAD with beyond-birthday security2024-03-12Paper
Prouff and Rivain's formal security proof of masking, revisited. Tight bounds in the noisy leakage model
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Learning with physical rounding for linear and quadratic leakage functions
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Systematic study of decryption and re-encryption leakage: the case of Kyber
Constructive Side-Channel Analysis and Secure Design
2023-12-12Paper
Handcrafting: improving automated masking in hardware with manual optimizations
Constructive Side-Channel Analysis and Secure Design
2023-12-12Paper
Effective and efficient masking with low noise using small-Mersenne-prime ciphers
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Fast side-channel security evaluation of ECC implementations. Shortcut formulas for horizontal side-channel attacks against ECSM with the Montgomery ladder
Constructive Side-Channel Analysis and Secure Design
2023-10-20Paper
Towards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipher
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Packed multiplication: how to amortize the cost of side-channel masking?2023-03-21Paper
\textsf{Scatter}: a missing case?2022-12-16Paper
On the worst-case side-channel security of ECC point randomization in embedded devices2022-07-06Paper
Security analysis of deterministic re-keying with masking and shuffling: application to ISAP2022-06-17Paper
Towards tight random probing security2022-04-22Paper
How to fool a black box machine learning based side-channel security evaluation
Cryptography and Communications
2022-04-01Paper
A stealthy hardware Trojan based on a statistical fault attack
Cryptography and Communications
2022-04-01Paper
Hardware Private Circuits: From Trivial Composition to Full Verification
IEEE Transactions on Computers
2022-03-23Paper
A systematic appraisal of side channel evaluation strategies2021-07-06Paper
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison
Constructive Side-Channel Analysis and Secure Design
2020-07-20Paper
Very high order masking: efficient implementation and security evaluation
Lecture Notes in Computer Science
2020-06-24Paper
A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
Lecture Notes in Computer Science
2020-06-24Paper
Leakage certification revisited: bounding model errors in side-channel security evaluations2020-05-20Paper
Improved filter permutators for efficient FHE: better instances and implementations2020-05-12Paper
Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher2020-05-06Paper
Revisiting location privacy from a side-channel analysis viewpoint2020-05-06Paper
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
Journal of Cryptology
2019-11-27Paper
Masking proofs are tight and how to exploit it in security evaluations2018-07-09Paper
Consolidating inner product masking2018-04-06Paper
Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms2018-02-16Paper
Blind source separation from single measurements using singular spectrum analysis2018-02-14Paper
Evaluation and improvement of generic-emulating DPA attacks2018-02-14Paper
Towards easy leakage certification2018-02-14Paper
Simple key enumeration (and rank estimation) using histograms: an integrated approach2018-02-14Paper
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
Lecture Notes in Computer Science
2017-06-13Paper
Ridge-based profiled differential power analysis
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Improving the security and efficiency of block ciphers based on LS-designs
Designs, Codes and Cryptography
2017-02-10Paper
Unknown-input attacks in the parallel setting: improving the security of the CHES 2012 leakage-resilient PRF
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Score-Based vs. Probability-Based Enumeration – A Cautionary Note
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Towards sound fresh re-keying with hard (physical) learning problems
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Towards stream ciphers for efficient FHE with low-noise ciphertexts
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
From improved leakage detection to the detection of points of interests in leakage traces
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Support vector machines for improved IP detection with soft physical hash functions
Constructive Side-Channel Analysis and Secure Design
2016-03-10Paper
An optimal key enumeration algorithm and its application to side-channel attacks
Selected Areas in Cryptography
2015-12-04Paper
Masking and leakage-resilient primitives: one, the other(s) or both?
Cryptography and Communications
2015-11-18Paper
SEA: A Scalable Encryption Algorithm for Small Embedded Applications
Smart Card Research and Advanced Applications
2015-11-11Paper
Making Masking Security Proofs Concrete
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
LS-designs: bitslice encryption for efficient masked software implementations
Fast Software Encryption
2015-09-18Paper
Simpler and more efficient rank estimation for side-channel security assessment
Fast Software Encryption
2015-09-18Paper
FPGA implementations of SPRING and their countermeasures against side-channel attacks
Advanced Information Systems Engineering
2015-07-21Paper
Soft analytical side-channel attacks
Lecture Notes in Computer Science
2015-01-16Paper
On a particular case of the bisymmetric equation for quasigroups
Acta Mathematica Hungarica
2014-08-14Paper
Experimenting linear cryptanalysis2014-08-07Paper
Efficient masked S-boxes processing -- a step forward
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
How to certify the leakage of a chip?
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
The Myth of Generic DPA…and the Magic of Learning
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Hardware implementation and side-channel analysis of Lapin
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Block ciphers that are easier to mask: how far can we go?
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
Leakage-resilient symmetric cryptography under empirically verifiable assumptions
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount?
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Shuffling against side-channel attacks: a comprehensive study with cautionary note
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Practical leakage-resilient pseudorandom objects with minimum public randomness
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Towards super-exponential side-channel security with efficient leakage-resilient PRFs
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Towards Green cryptography: a comparison of lightweight ciphers from the energy viewpoint
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Unified and optimized linear collision attacks and their application in a non-profiled setting
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation
RFID. Security and Privacy
2012-08-20Paper
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Masking with randomized look up tables. Towards preventing side-channel attacks of all orders
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Mutual information analysis: a comprehensive study
Journal of Cryptology
2012-01-18Paper
Generic side-channel distinguishers: improvements and limitations
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Leftover Hash Lemma, Revisited
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
FPGA implementation of a statistical saturation attack against PRESENT
Lecture Notes in Computer Science
2011-06-29Paper
A formal study of power variability issues and side-channel attacks for nanoscale devices
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
The world is not enough: another look on second-order DPA
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Algebraic side-channel attacks
Information Security and Cryptology
2010-11-23Paper
How leaky is an extractor?
Lecture Notes in Computer Science
2010-08-31Paper
Adaptive chosen-message side-channel attacks
Applied Cryptography and Network Security
2010-07-06Paper
Multi-trail statistical saturation attacks
Applied Cryptography and Network Security
2010-07-06Paper
Fresh re-keying: security against side-channel and fault attacks for low-cost devices
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Lecture Notes in Computer Science
2009-11-10Paper
Mutual Information Analysis: How, When and Why?
Lecture Notes in Computer Science
2009-11-10Paper
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Lecture Notes in Computer Science
2009-11-10Paper
How to Compare Profiled Side-Channel Attacks?
Applied Cryptography and Network Security
2009-06-03Paper
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Designs, Codes and Cryptography
2009-03-31Paper
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
Fast Software Encryption
2008-09-18Paper
Implementation of the AES-128 on Virtex-5 FPGAs
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Improving the Time Complexity of Matsui’s Linear Cryptanalysis
Lecture Notes in Computer Science
2008-05-06Paper
Foundations of Security Analysis and Design III
Lecture Notes in Computer Science
2006-11-01Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 1979312 (Why is no real title available?)2003-09-11Paper
scientific article; zbMATH DE number 1941130 (Why is no real title available?)2003-06-29Paper
scientific article; zbMATH DE number 1941137 (Why is no real title available?)2003-06-29Paper
Optimization of processes by equipartition
Journal of Non-Equilibrium Thermodynamics
2000-01-30Paper


Research outcomes over time


This page was built for person: François-Xavier Standaert