The following pages link to François-Xavier Standaert (Q510501):
Displaying 50 items.
- (Q397037) (redirect page) (← links)
- (Q1961638) (redirect page) (← links)
- On a particular case of the bisymmetric equation for quasigroups (Q397038) (← links)
- Improving the security and efficiency of block ciphers based on LS-designs (Q510503) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- Provable security of block ciphers against linear cryptanalysis: a mission impossible? (Q1009123) (← links)
- Masking proofs are tight and how to exploit it in security evaluations (Q1648843) (← links)
- Blind source separation from single measurements using singular spectrum analysis (Q1695846) (← links)
- Evaluation and improvement of generic-emulating DPA attacks (Q1695893) (← links)
- Towards easy leakage certification (Q1695966) (← links)
- Simple key enumeration (and rank estimation) using histograms: an integrated approach (Q1695968) (← links)
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- Optimization of processes by equipartition (Q1961640) (← links)
- Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version (Q2010587) (← links)
- A systematic appraisal of side channel evaluation strategies (Q2039987) (← links)
- \textsf{Scatter}: a missing case? (Q2106687) (← links)
- How to fool a black box machine learning based side-channel security evaluation (Q2120993) (← links)
- A stealthy hardware Trojan based on a statistical fault attack (Q2120995) (← links)
- Towards tight random probing security (Q2128995) (← links)
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP (Q2145296) (← links)
- On the worst-case side-channel security of ECC point randomization in embedded devices (Q2152029) (← links)
- Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher (Q2177631) (← links)
- Revisiting location privacy from a side-channel analysis viewpoint (Q2177641) (← links)
- Improved filter permutators for efficient FHE: better instances and implementations (Q2179380) (← links)
- Leakage certification revisited: bounding model errors in side-channel security evaluations (Q2181870) (← links)
- Consolidating inner product masking (Q2412891) (← links)
- Packed multiplication: how to amortize the cost of side-channel masking? (Q2692370) (← links)
- Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions (Q2794577) (← links)
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? (Q2795975) (← links)
- From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces (Q2820485) (← links)
- Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts (Q2820488) (← links)
- Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems (Q2829218) (← links)
- Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions (Q2845681) (← links)
- Block Ciphers That Are Easier to Mask: How Far Can We Go? (Q2851426) (← links)
- Masking with Randomized Look Up Tables (Q2889770) (← links)
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Q2894400) (← links)
- Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices (Q2900618) (← links)
- Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation (Q2902472) (← links)
- Soft Analytical Side-Channel Attacks (Q2938850) (← links)
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations (Q2946901) (← links)
- Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment (Q2946939) (← links)
- Making Masking Security Proofs Concrete (Q2948337) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF (Q2958140) (← links)
- Ridge-Based Profiled Differential Power Analysis (Q2975816) (← links)
- A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices (Q3003379) (← links)
- FPGA Implementation of a Statistical Saturation Attack against PRESENT (Q3011907) (← links)
- Algebraic Side-Channel Attacks (Q3056913) (← links)
- The World Is Not Enough: Another Look on Second-Order DPA (Q3058652) (← links)
- Score-Based vs. Probability-Based Enumeration – A Cautionary Note (Q3179482) (← links)