François-Xavier Standaert
Orcid: 0000-0001-7444-0285Affiliations:
- Université catholique de Louvain, Louvain-la-Neuve, Belgium
According to our database1,
François-Xavier Standaert
authored at least 326 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Trans. Symmetric Cryptol., 2024
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Explanation sensitivity to the randomness of large language models: the case of journalistic text classification.
CoRR, 2024
A Question on the Explainability of Large Language Models and the Word-Level Univariate First-Order Plausibility Assumption.
CoRR, 2024
IACR Commun. Cryptol., 2024
IACR Commun. Cryptol., 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024
2023
Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks.
Proc. ACM Program. Lang., October, 2023
An In-Depth Evaluation of Externally Amplified Coupling (EAC) Attacks - A Concrete Threat for Masked Cryptographic Implementations.
IEEE Trans. Circuits Syst. I Regul. Pap., February, 2023
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers.
IACR Trans. Symmetric Cryptol., 2023
IACR Trans. Symmetric Cryptol., 2023
Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
Prouï¬ & Rivain's Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations.
Proceedings of the IEEE Information Theory Workshop, 2023
Proceedings of the 31st European Symposium on Artificial Neural Networks, 2023
Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Smart Card Research and Advanced Applications, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Donât Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher.
IACR Cryptol. ePrint Arch., 2022
Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
IACR Cryptol. ePrint Arch., 2022
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding.
IACR Cryptol. ePrint Arch., 2022
Automated news recommendation in front of adversarial examples and the technical limits of transparency in algorithmic accountability.
AI Soc., 2022
Fully-Digital Randomization Based Side-Channel Security - Toward Ultra-Low Cost-per-Security.
IEEE Access, 2022
Automatic and Manual Detection of Generated News: Case Study, Limitations and Challenges.
Proceedings of the MAD@ICMR 2022: Proceedings of the 1st International Workshop on Multimedia AI against Disinformation, Newark, NJ, USA, June 27, 2022
Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IACR Trans. Symmetric Cryptol., 2021
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IEEE Trans. Computers, 2021
J. Cryptogr. Eng., 2021
J. Cryptogr. Eng., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Cryptogr. Commun., 2021
Cryptogr. Commun., 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design.
Proceedings of the 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2021
Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021
Proceedings of the Smart Card Research and Advanced Applications, 2021
2020
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020
Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference.
IEEE Trans. Inf. Forensics Secur., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEEE Trans. Circuits Syst., 2020
Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks.
J. Cryptogr. Eng., 2020
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
J. Cryptogr. Eng., 2020
Int. J. Circuit Theory Appl., 2020
IACR Cryptol. ePrint Arch., 2020
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.
IACR Cryptol. ePrint Arch., 2020
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
Proceedings of the Smart Card Research and Advanced Applications, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations.
IEEE Trans. Inf. Forensics Secur., 2019
Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Reducing a Masked Implementation's Effective Security Order with Setup Manipulations And an Explanation Based on Externally-Amplified Couplings.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version.
J. Cryptol., 2019
A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs.
Integr., 2019
Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations.
IACR Cryptol. ePrint Arch., 2019
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version).
IACR Cryptol. ePrint Arch., 2019
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptol. ePrint Arch., 2019
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations.
IACR Cryptol. ePrint Arch., 2019
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
IACR Cryptol. ePrint Arch., 2019
Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2019
Proceedings of the Smart Card Research and Advanced Applications, 2019
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling.
IEEE Trans. Computers, 2018
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version.
J. Cryptogr. Eng., 2018
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptol. ePrint Arch., 2018
Side-channel attacks against the human brain: the PIN code case study (extended version).
Brain Informatics, 2018
Let's make it Noisy: A Simulation Methodology for adding Intrinsic Physical Noise to Cryptographic Designs.
Proceedings of the 14th Conference on Ph.D. Research in Microelectronics and Electronics, 2018
Proceedings of the 2018 New Generation of CAS, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Getting the Most Out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017
Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I (Invited Talk).
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016
Proceedings of the Smart Card Research and Advanced Applications, 2016
Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.
IACR Cryptol. ePrint Arch., 2015
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
IACR Cryptol. ePrint Arch., 2015
Cryptogr. Commun., 2015
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Proceedings of the Information Security Practice and Experience, 2015
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014
A Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to Low Voltage Fault Attacks.
IEEE Trans. Emerg. Top. Comput., 2014
Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations.
J. Cryptogr. Eng., 2014
J. Cryptogr. Eng., 2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptogr. Eng., 2014
Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices).
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version.
J. Cryptogr. Eng., 2013
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards.
IACR Cryptol. ePrint Arch., 2013
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption.
IACR Cryptol. ePrint Arch., 2013
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Workshop on Embedded Systems Security, 2013
From New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical Security.
Proceedings of the Smart Card Research and Advanced Applications, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
IACR Cryptol. ePrint Arch., 2012
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations.
IACR Cryptol. ePrint Arch., 2012
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012
Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models.
Proceedings of the Smart Card Research and Advanced Applications, 2012
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags.
J. Cryptogr. Eng., 2011
IET Inf. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the 48th Design Automation Conference, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2011
Proceedings of the Smart Card Research and Advanced Applications, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Mobile Lightweight Wireless Systems, 2010
Proceedings of the International Conference on Image Processing, 2010
Glitch-induced within-die variations of dynamic energy in voltage-scaled nano-CMOS circuits.
Proceedings of the 36th European Solid-State Circuits Conference, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Secure Integrated Circuits and Systems, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Des. Codes Cryptogr., 2009
Scaling Trends of the AES S-box Low Power Consumption in 130 and 65 nm CMOS Technology Nodes.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
Proceedings of the Cryptographic Engineering, 2009
2008
Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking).
IET Inf. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices.
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Integr., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Proc. IEEE, 2006
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version).
IACR Cryptol. ePrint Arch., 2006
FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks.
Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), 2006
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Integrated Circuit and System Design, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Field Programmable Logic and Application, 2004
Proceedings of the Foundations of Security Analysis and Design III, 2004
Proceedings of the 2004 12th European Signal Processing Conference, 2004
Reconfigurable hardware solutions for the digital rights management of digital cinema.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis.
IEEE Trans. Computers, 2003
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003
A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL.
Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2003
Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES.
Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2003
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Proceedings of the Field-Programmable Logic and Applications, 2002
Proceedings of the Field-Programmable Logic and Applications, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002