Filtros de búsqueda

Lista de obras de François-Xavier Standaert

A Comparative Cost/Security Analysis of Fault Attack Countermeasures

A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions

A Design Methodology for Secured ICs Using Dynamic Current Mode Logic

A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices

A Formalization of the Security Features of Physical Functions

article published in 2011

A Survey of Recent Results in FPGA Security and Intellectual Property Protection

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

article

A block cipher based pseudo random number generator secure against side-channel key recovery

artículo científico publicado en 2008

A first step towards automatic application of power analysis countermeasures

scholarly article published 2011

A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL

Adaptive Chosen-Message Side-Channel Attacks

Algebraic Side-Channel Attacks

scholarly article by Mathieu Renauld & François-Xavier Standaert published 2010 in Lecture Notes in Computer Science

Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA

scholarly article by Mathieu Renauld et al published 2009 in Lecture Notes in Computer Science

An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks

Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms

Ciphertext Integrity with Misuse and Leakage

Compact FPGA Implementations of the Five SHA-3 Finalists

Connecting and Improving Direct Sum Masking and Inner Product Masking

article by Romain Poussier et al published 2018 in Lecture Notes in Computer Science

Consolidating Inner Product Masking

Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES

Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)

Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits

Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent

Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation

Extractors against Side-Channel Attacks: Weak or Strong?

Extractors against side-channel attacks: weak or strong?

FPGA Implementations of SPRING

article

Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

artículo científico publicado en 2011

Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices

From New Technologies to New Solutions

Fully-Digital Randomization Based Side-Channel Security—Toward Ultra-Low Cost-per-Security

artículo científico publicado en 2022

Generic Side-Channel Distinguishers: Improvements and Limitations

Gimli : A Cross-Platform Permutation

Hardware Implementation and Side-Channel Analysis of Lapin

Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags

scholarly article by Cédric Hocquet et al published 18 February 2011 in Journal of Cryptographic Engineering

How Leaky Is an Extractor?

How to Certify the Leakage of a Chip?

How to Compare Profiled Side-Channel Attacks?

Implementation of the AES-128 on Virtex-5 FPGAs

Improved Higher-Order Side-Channel Attacks with FPGA Experiments

Improving the security and efficiency of block ciphers based on LS-designs

article published in 2016

Information Theoretic Evaluation of Side-Channel Resistant Logic Styles

Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages

article by Weijia Wang et al published 2017 in Lecture Notes in Computer Science

Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions

Introduction to Side-Channel Attacks

article published in 2009

Leakage Resilient Cryptography in Practice

scholarly article by François-Xavier Standaert et al published 2010 in Information Security and Cryptography

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

Leftover Hash Lemma, Revisited

Low Entropy Masking Schemes, Revisited

article by Vincent Grosso et al published 2014 in Lecture Notes in Computer Science

Making Masking Security Proofs Concrete

article by Alexandre Duc et al published 2015 in Lecture Notes in Computer Science

Masking Proofs Are Tight and How to Exploit it in Security Evaluations

article by Vincent Grosso & François-Xavier Standaert published 2018 in Lecture Notes in Computer Science

Masking and leakage-resilient primitives: One, the other(s) or both?

article by Sonia Belaïd et al published 10 October 2014 in Cryptography and Communications

Masking vs. Multiparty Computation: How Large Is the Gap for AES?

article by Vincent Grosso et al published 2013 in Lecture Notes in Computer Science

Mutual Information Analysis: How, When and Why?

Mutual Information Analysis: a Comprehensive Study

article

On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks

scholarly article published October 2008

On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes

Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices

Physical Security

Power Analysis Attacks Against FPGA Implementations of the DES

Power Analysis of FPGAs: How Practical Is the Attack?

Power Analysis of an FPGA

Power and electromagnetic analysis: Improved model, consequences and comparisons

article

Provable security of block ciphers against linear cryptanalysis: a mission impossible?

Ridge-Based Profiled Differential Power Analysis

SEA: A Scalable Encryption Algorithm for Small Embedded Applications

article published in 2006

Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study

Score-Based vs. Probability-Based Enumeration – A Cautionary Note

Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison

article by Dahmun Goudarzi et al published 2018 in Lecture Notes in Computer Science

Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs

Security Analysis of Image-Based PUFs for Anti-counterfeiting

Side-Channel Analysis and Its Relevance to Fault Attacks

Side-channel attacks against the human brain: the PIN code case study (extended version)

scientific article published on 29 October 2018

Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks

Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)

scholarly article by Liran Lerman et al published 2015 in Lecture Notes in Computer Science

The Swiss-Knife RFID Distance Bounding Protocol

article

The World Is Not Enough: Another Look on Second-Order DPA

scholarly article

Time-Memory Trade-offs

article

Time-memory tradeoffs

Towards Easy Leakage Certification

article by François Durvaux et al published 2016 in Lecture Notes in Computer Science

Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security

article published in 2016

Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers

Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems

Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts

Towards easy leakage certification: extended version

article by François Durvaux et al published 10 February 2017 in Journal of Cryptographic Engineering

Univariate side channel attacks and leakage modeling

Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF

Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages

Very High Order Masking: Efficient Implementation and Security Evaluation

article by Anthony Journault & François-Xavier Standaert published 2017 in Lecture Notes in Computer Science