BibTeX records: François-Xavier Standaert

download as .bib file

@article{DBLP:journals/corr/abs-2403-10275,
  author       = {J{\'{e}}r{\'{e}}mie Bogaert and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {A Question on the Explainability of Large Language Models and the
                  Word-Level Univariate First-Order Plausibility Assumption},
  journal      = {CoRR},
  volume       = {abs/2403.10275},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.10275},
  doi          = {10.48550/ARXIV.2403.10275},
  eprinttype    = {arXiv},
  eprint       = {2403.10275},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-10275.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoosSS24,
  author       = {Thorben Moos and
                  Sayandeep Saha and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Prime Masking vs. Faults - Exponential Security Amplification against
                  Selected Classes of Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/147},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MoosSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetersSS24,
  author       = {Thomas Peters and
                  Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/294},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetersSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMMOS24,
  author       = {Sebastian Faust and
                  Lo{\"{\i}}c Masure and
                  Elena Micheli and
                  Maximilian Orlt and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends
                  and Physical Dependencies of Prime Field Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/377},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMMOS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrassiMMMS24,
  author       = {Lorenzo Grassi and
                  Lo{\"{\i}}c Masure and
                  Pierrick M{\'{e}}aux and
                  Thorben Moos and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Generalized Feistel Ciphers for Efficient Prime Field Masking - Full
                  Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/431},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrassiMMMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/GaoZSCS23,
  author       = {Pengfei Gao and
                  Yedi Zhang and
                  Fu Song and
                  Taolue Chen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Compositional Verification of Efficient Masking Countermeasures against
                  Side-Channel Attacks},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {7},
  number       = {{OOPSLA2}},
  pages        = {1817--1847},
  year         = {2023},
  url          = {https://doi.org/10.1145/3622862},
  doi          = {10.1145/3622862},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/GaoZSCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasI/GurGBSL23,
  author       = {Ofek Gur and
                  Tomer Gross and
                  Davide Bellizia and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Itamar Levi},
  title        = {An In-Depth Evaluation of Externally Amplified Coupling {(EAC)} Attacks
                  - {A} Concrete Threat for Masked Cryptographic Implementations},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {70},
  number       = {2},
  pages        = {783--796},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCSI.2022.3222176},
  doi          = {10.1109/TCSI.2022.3222176},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcasI/GurGBSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MasureCLS23,
  author       = {Lo{\"{\i}}c Masure and
                  Valence Cristiani and
                  Maxime Lecomte and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Don't Learn What You Already Know Scheme-Aware Modeling for Profiling
                  Side-Channel Analysis against Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {32--59},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.32-59},
  doi          = {10.46586/TCHES.V2023.I1.32-59},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/MasureCLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CamuratiDS23,
  author       = {Giovanni Camurati and
                  Matteo Dell'Amico and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security
                  Evaluations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {277--300},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.277-300},
  doi          = {10.46586/TCHES.V2023.I1.277-300},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CamuratiDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersMMMS23,
  author       = {Ga{\"{e}}tan Cassiers and
                  Lo{\"{\i}}c Masure and
                  Charles Momin and
                  Thorben Moos and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Prime-Field Masking in Hardware and its Soundness against Low-Noise
                  {SCA} Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {482--518},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.482-518},
  doi          = {10.46586/TCHES.V2023.I2.482-518},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersMMMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersDSU23,
  author       = {Ga{\"{e}}tan Cassiers and
                  Henri Devillez and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi},
  title        = {Efficient Regression-Based Linear Discriminant Analysis for Side-Channel
                  Security Evaluations Towards Analytical Attacks against 32-bit Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {270--293},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.270-293},
  doi          = {10.46586/TCHES.V2023.I3.270-293},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersDSU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MasureCHS23,
  author       = {Lo{\"{\i}}c Masure and
                  Ga{\"{e}}tan Cassiers and
                  Julien M. Hendrickx and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Information Bounds and Convergence Rates for Side-Channel Security
                  Evaluators},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {522--569},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.522-569},
  doi          = {10.46586/TCHES.V2023.I3.522-569},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MasureCHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AzouaouiBCHKRSSSV23,
  author       = {Melissa Azouaoui and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Cl{\'{e}}ment Hoffmann and
                  Yulia Kuzovkova and
                  Joost Renes and
                  Tobias Schneider and
                  Markus Sch{\"{o}}nauer and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Christine van Vredendaal},
  title        = {Protecting Dilithium against Leakage Revisited Sensitivity Analysis
                  and Improved Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {58--79},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.58-79},
  doi          = {10.46586/TCHES.V2023.I4.58-79},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AzouaouiBCHKRSSSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BertiGPSS23,
  author       = {Francesco Berti and
                  Chun Guo and
                  Thomas Peters and
                  Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Secure Message Authentication in the Presence of Leakage and Faults},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {288--315},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.288-315},
  doi          = {10.46586/TOSC.V2023.I1.288-315},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BertiGPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ShenS23,
  author       = {Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit
                  Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {47--68},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.47-68},
  doi          = {10.46586/TOSC.V2023.I2.47-68},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ShenS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ShenSW23,
  author       = {Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lei Wang},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14440},
  pages        = {169--189},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8727-6\_6},
  doi          = {10.1007/978-981-99-8727-6\_6},
  timestamp    = {Sun, 07 Jan 2024 14:24:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ShenSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/UdvarhelyiS23,
  author       = {Balazs Udvarhelyi and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Shivam Bhasin and
                  Thomas Roche},
  title        = {Leveraging Coprocessors as Noise Engines in Off-the-Shelf Microcontrollers},
  booktitle    = {Smart Card Research and Advanced Applications - 22nd International
                  Conference, {CARDIS} 2023, Amsterdam, The Netherlands, November 14-16,
                  2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14530},
  pages        = {148--165},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54409-5\_8},
  doi          = {10.1007/978-3-031-54409-5\_8},
  timestamp    = {Tue, 05 Mar 2024 11:32:26 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/UdvarhelyiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeldtkellerGMRS23,
  author       = {Jakob Feldtkeller and
                  Tim G{\"{u}}neysu and
                  Thorben Moos and
                  Jan Richter{-}Brockmann and
                  Sayandeep Saha and
                  Pascal Sasdrich and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Combined Private Circuits - Combined Security Refurbished},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {990--1004},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623129},
  doi          = {10.1145/3576915.3623129},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FeldtkellerGMRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BeguinotCGLMRS23,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Yi Liu and
                  Lo{\"{\i}}c Masure and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Elif Bilge Kavun and
                  Michael Pehl},
  title        = {Removing the Field Size Loss from Duc et al.'s Conjectured Bound for
                  Masked Encodings},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 14th International
                  Workshop, {COSADE} 2023, Munich, Germany, April 3-4, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13979},
  pages        = {86--104},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-29497-6\_5},
  doi          = {10.1007/978-3-031-29497-6\_5},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BeguinotCGLMRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MasureS23,
  author       = {Lo{\"{\i}}c Masure and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Prouff and Rivain's Formal Security Proof of Masking, Revisited -
                  Tight Bounds in the Noisy Leakage Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {343--376},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_12},
  doi          = {10.1007/978-3-031-38548-3\_12},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MasureS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoffmannMMRSU23,
  author       = {Cl{\'{e}}ment Hoffmann and
                  Pierrick M{\'{e}}aux and
                  Charles Momin and
                  Yann Rotella and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Learning with Physical Rounding for Linear and Quadratic Leakage Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {410--439},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_14},
  doi          = {10.1007/978-3-031-38548-3\_14},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoffmannMMRSU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MasureMMS23,
  author       = {Lo{\"{\i}}c Masure and
                  Pierrick M{\'{e}}aux and
                  Thorben Moos and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime
                  Ciphers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {596--627},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_20},
  doi          = {10.1007/978-3-031-30634-1\_20},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MasureMMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/HoffmannMS23,
  author       = {Cl{\'{e}}ment Hoffmann and
                  Pierrick M{\'{e}}aux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Anupam Chattopadhyay and
                  Shivam Bhasin and
                  Stjepan Picek and
                  Chester Rebeiro},
  title        = {The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator
                  Paradigm},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference
                  on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14459},
  pages        = {134--156},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56232-7\_7},
  doi          = {10.1007/978-3-031-56232-7\_7},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/HoffmannMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/LiuBCGMRS23,
  author       = {Yi Liu and
                  Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Lo{\"{\i}}c Masure and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic
                  Implementations},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2023, Saint-Malo, France,
                  April 23-28, 2023},
  pages        = {81--86},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ITW55543.2023.10161608},
  doi          = {10.1109/ITW55543.2023.10161608},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/LiuBCGMRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HoffmannLMPS23,
  author       = {Cl{\'{e}}ment Hoffmann and
                  Beno{\^{\i}}t Libert and
                  Charles Momin and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {{POLKA:} Towards Leakage-Resistant Post-quantum CCA-Secure Public
                  Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {114--144},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_5},
  doi          = {10.1007/978-3-031-31368-4\_5},
  timestamp    = {Fri, 05 May 2023 22:44:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HoffmannLMPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShenS23,
  author       = {Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit
                  Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {790},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/790},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShenS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MasureS23,
  author       = {Lo{\"{\i}}c Masure and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Prou{\"{\i}}{\(\lnot\)}{\mbox{\texteuro}} {\&} Rivain's Formal
                  Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {883},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/883},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MasureS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CassiersMMM0S23,
  author       = {Ga{\"{e}}tan Cassiers and
                  Lo{\"{\i}}c Masure and
                  Charles Momin and
                  Thorben Moos and
                  Amir Moradi and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Randomness Generation for Secure Hardware Masking - Unrolled Trivium
                  to the Rescue},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1134},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1134},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CassiersMMM0S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidCMRRST23,
  author       = {Sonia Bela{\"{\i}}d and
                  Ga{\"{e}}tan Cassiers and
                  Camille Mutschler and
                  Matthieu Rivain and
                  Thomas Roche and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Abdul Rahman Taleb},
  title        = {Towards Achieving Provable Side-Channel Security in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1198},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1198},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidCMRRST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeldtkellerGMRSSS23,
  author       = {Jakob Feldtkeller and
                  Tim G{\"{u}}neysu and
                  Thorben Moos and
                  Jan Richter{-}Brockmann and
                  Sayandeep Saha and
                  Pascal Sasdrich and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Combined Private Circuits - Combined Security Refurbished},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1341},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1341},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeldtkellerGMRSSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShenSW23,
  author       = {Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lei Wang},
  title        = {Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1431},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1431},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShenSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannMS23,
  author       = {Cl{\'{e}}ment Hoffmann and
                  Pierrick M{\'{e}}aux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator
                  Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1895},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1895},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BreuerSL22,
  author       = {Rinat Breuer and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Itamar Levi},
  title        = {Fully-Digital Randomization Based Side-Channel Security - Toward Ultra-Low
                  Cost-per-Security},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {68440--68449},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3185995},
  doi          = {10.1109/ACCESS.2022.3185995},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BreuerSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ais/DescampeMPSS22,
  author       = {Antonin Descampe and
                  Cl{\'{e}}ment Massart and
                  Simon Poelman and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Standaert},
  title        = {Automated news recommendation in front of adversarial examples and
                  the technical limits of transparency in algorithmic accountability},
  journal      = {{AI} Soc.},
  volume       = {37},
  number       = {1},
  pages        = {67--80},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00146-021-01159-3},
  doi          = {10.1007/S00146-021-01159-3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ais/DescampeMPSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/LeviBS22,
  author       = {Itamar Levi and
                  Davide Bellizia and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Tight-ES-TRNG: Improved Construction and Robustness Analysis},
  journal      = {{SN} Comput. Sci.},
  volume       = {3},
  number       = {4},
  pages        = {321},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42979-022-01219-5},
  doi          = {10.1007/S42979-022-01219-5},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/LeviBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BertiBBHPSU22,
  author       = {Francesco Berti and
                  Shivam Bhasin and
                  Jakub Breier and
                  Xiaolu Hou and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi},
  title        = {A Finer-Grain Analysis of the Leakage (Non) Resilience of {OCB}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {461--481},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.461-481},
  doi          = {10.46586/TCHES.V2022.I1.461-481},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BertiBBHPSU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AzouaouiBGP22,
  author       = {Melissa Azouaoui and
                  Olivier Bronchain and
                  Vincent Grosso and
                  Kostas Papagiannopoulos and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Bitslice Masking and Improved Shuffling: How and When to Mix Them
                  in Software?},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {140--165},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.140-165},
  doi          = {10.46586/TCHES.V2022.I2.140-165},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AzouaouiBGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelliziaHKMS22,
  author       = {Davide Bellizia and
                  Cl{\'{e}}ment Hoffmann and
                  Dina Kamel and
                  Pierrick M{\'{e}}aux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {When Bad News Become Good News Towards Usable Instances of Learning
                  with Physical Errors},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {1--24},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.1-24},
  doi          = {10.46586/TCHES.V2022.I4.1-24},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelliziaHKMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShenPSCV22,
  author       = {Yaobin Shen and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}tan Cassiers and
                  Corentin Verhamme},
  title        = {Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {135--162},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.135-162},
  doi          = {10.46586/TCHES.V2022.I4.135-162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShenPSCV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BronchainDMS22,
  author       = {Olivier Bronchain and
                  Fran{\c{c}}ois Durvaux and
                  Lo{\"{\i}}c Masure and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Efficient Profiled Side-Channel Analysis of Masked Implementations,
                  Extended},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {574--584},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3144871},
  doi          = {10.1109/TIFS.2022.3144871},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/BronchainDMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhouS22,
  author       = {Yuanyuan Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {S-box Pooling: Towards More Efficient Side-Channel Security Evaluations},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  pages        = {146--164},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_9},
  doi          = {10.1007/978-3-031-16815-4\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ZhouS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CosseronHMS22,
  author       = {Orel Cosseron and
                  Cl{\'{e}}ment Hoffmann and
                  Pierrick M{\'{e}}aux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the
                  Elisabeth Stream Cipher},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {32--67},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_2},
  doi          = {10.1007/978-3-031-22969-5\_2},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CosseronHMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhouPYS22,
  author       = {Yuanyuan Zhou and
                  Joop van de Pol and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {A Third is All You Need: Extended Partial Key Exposure Attack on {CRT-RSA}
                  with Additive Exponent Blinding},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  pages        = {508--536},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5\_18},
  doi          = {10.1007/978-3-031-22972-5\_18},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZhouPYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/MasureRS22,
  author       = {Lo{\"{\i}}c Masure and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Ileana Buhan and
                  Tobias Schneider},
  title        = {A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for
                  Masked Implementations},
  booktitle    = {Smart Card Research and Advanced Applications - 21st International
                  Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13820},
  pages        = {69--81},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25319-5\_4},
  doi          = {10.1007/978-3-031-25319-5\_4},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/MasureRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/VerhammeCS22,
  author       = {Corentin Verhamme and
                  Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Ileana Buhan and
                  Tobias Schneider},
  title        = {Analyzing the Leakage Resistance of the NIST's Lightweight Crypto
                  Competition's Finalists},
  booktitle    = {Smart Card Research and Advanced Applications - 21st International
                  Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13820},
  pages        = {290--308},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25319-5\_15},
  doi          = {10.1007/978-3-031-25319-5\_15},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/VerhammeCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/AzouaouiBHKSS22,
  author       = {Melissa Azouaoui and
                  Olivier Bronchain and
                  Cl{\'{e}}ment Hoffmann and
                  Yulia Kuzovkova and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Josep Balasch and
                  Colin O'Flynn},
  title        = {Systematic Study of Decryption and Re-encryption Leakage: The Case
                  of Kyber},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 13th International
                  Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13211},
  pages        = {236--256},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99766-3\_11},
  doi          = {10.1007/978-3-030-99766-3\_11},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/AzouaouiBHKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MominCS22,
  author       = {Charles Momin and
                  Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Josep Balasch and
                  Colin O'Flynn},
  title        = {Handcrafting: Improving Automated Masking in Hardware with Manual
                  Optimizations},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 13th International
                  Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13211},
  pages        = {257--275},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99766-3\_12},
  doi          = {10.1007/978-3-030-99766-3\_12},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MominCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mir/BogaertMDS22,
  author       = {J{\'{e}}r{\'{e}}mie Bogaert and
                  Marie{-}Catherine de Marneffe and
                  Antonin Descampe and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Bogdan Ionescu and
                  Giorgos Kordopatis{-}Zilos and
                  Symeon Papadopoulos and
                  Adrian Popescu and
                  Luca Cuccovillo},
  title        = {Automatic and Manual Detection of Generated News: Case Study, Limitations
                  and Challenges},
  booktitle    = {MAD@ICMR 2022: Proceedings of the 1st International Workshop on Multimedia
                  {AI} against Disinformation, Newark, NJ, USA, June 27 - 30, 2022},
  pages        = {18--26},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3512732.3533589},
  doi          = {10.1145/3512732.3533589},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mir/BogaertMDS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzouaouiBHKSS22,
  author       = {Melissa Azouaoui and
                  Olivier Bronchain and
                  Cl{\'{e}}ment Hoffmann and
                  Yulia Kuzovkova and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Systematic Study of Decryption and Re-Encryption Leakage: the Case
                  of Kyber},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/036},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AzouaouiBHKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CosseronHMS22,
  author       = {Orel Cosseron and
                  Cl{\'{e}}ment Hoffmann and
                  Pierrick M{\'{e}}aux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring
                  the Elisabeth Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/180},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CosseronHMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MominCS22,
  author       = {Charles Momin and
                  Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Handcrafting: Improving Automated Masking in Hardware with Manual
                  Optimizations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/252},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MominCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MominCS22a,
  author       = {Charles Momin and
                  Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Unprotected and Masked Hardware Implementations of Spook v2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/254},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MominCS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MasureCHS22,
  author       = {Lo{\"{\i}}c Masure and
                  Ga{\"{e}}tan Cassiers and
                  Julien M. Hendrickx and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Information Bounds and Convergence Rates for Side-Channel Security
                  Evaluators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/490},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MasureCHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MasureCLS22,
  author       = {Lo{\"{\i}}c Masure and
                  Valence Cristiani and
                  Maxime Lecomte and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Don{\^{a}}{\mbox{\texteuro}}{\texttrademark}t Learn What You Already
                  Know: Grey-Box Modeling for Profiling Side-Channel Analysis against
                  Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {493},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/493},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MasureCLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MasureRS22,
  author       = {Lo{\"{\i}}c Masure and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for
                  Masked Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/600},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MasureRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MasureMMS22,
  author       = {Lo{\"{\i}}c Masure and
                  Pierrick M{\'{e}}aux and
                  Thorben Moos and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/863},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MasureMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannLMPS22,
  author       = {Cl{\'{e}}ment Hoffmann and
                  Beno{\^{\i}}t Libert and
                  Charles Momin and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/873},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannLMPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Berti0PSS22,
  author       = {Francesco Berti and
                  Chun Guo and
                  Thomas Peters and
                  Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Secure Message Authentication in the Presence of Leakage and Faults},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1142},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1142},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Berti0PSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0006P0S22,
  author       = {Yuanyuan Zhou and
                  Joop van de Pol and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {A Third is All You Need: Extended Partial Key Exposure Attack on {CRT-RSA}
                  with Additive Exponent Blinding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1163},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1163},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0006P0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzouaouiBCHKRSS22,
  author       = {Melissa Azouaoui and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Cl{\'{e}}ment Hoffmann and
                  Yulia Kuzovkova and
                  Joost Renes and
                  Markus Sch{\"{o}}nauer and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Christine van Vredendaal},
  title        = {Leveling Dilithium against Leakage: Revisited Sensitivity Analysis
                  and Improved Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1406},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1406},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AzouaouiBCHKRSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VerhammeCS22,
  author       = {Corentin Verhamme and
                  Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Analyzing the Leakage Resistance of the NIST's Lightweight Crypto
                  Competition's Finalists},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1628},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1628},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VerhammeCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeguinotCGLMRS22,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Yi Liu and
                  Lo{\"{\i}}c Masure and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Removing the Field Size Loss from Duc et al.'s Conjectured Bound for
                  Masked Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1738},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1738},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeguinotCGLMRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/OuytselBCS21,
  author       = {Charles{-}Henry Bertrand Van Ouytsel and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {How to fool a black box machine learning based side-channel security
                  evaluation},
  journal      = {Cryptogr. Commun.},
  volume       = {13},
  number       = {4},
  pages        = {573--585},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12095-021-00479-x},
  doi          = {10.1007/S12095-021-00479-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/OuytselBCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/MominBS21,
  author       = {Charles Momin and
                  Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {A stealthy Hardware Trojan based on a Statistical Fault Attack},
  journal      = {Cryptogr. Commun.},
  volume       = {13},
  number       = {4},
  pages        = {587--600},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12095-021-00480-4},
  doi          = {10.1007/S12095-021-00480-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/MominBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BronchainSS21,
  author       = {Olivier Bronchain and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Reducing risks through simplicity: high side-channel security for
                  lazy engineers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {1},
  pages        = {39--55},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00241-8},
  doi          = {10.1007/S13389-020-00241-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BronchainSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KamelBBS21,
  author       = {Dina Kamel and
                  Davide Bellizia and
                  Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Side-channel analysis of a learning parity with physical noise processor},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {171--179},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00238-3},
  doi          = {10.1007/S13389-020-00238-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KamelBBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/CassiersGLS21,
  author       = {Ga{\"{e}}tan Cassiers and
                  Benjamin Gr{\'{e}}goire and
                  Itamar Levi and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Hardware Private Circuits: From Trivial Composition to Full Verification},
  journal      = {{IEEE} Trans. Computers},
  volume       = {70},
  number       = {10},
  pages        = {1677--1690},
  year         = {2021},
  url          = {https://doi.org/10.1109/TC.2020.3022979},
  doi          = {10.1109/TC.2020.3022979},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/CassiersGLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DuvalMMS21,
  author       = {S{\'{e}}bastien Duval and
                  Pierrick M{\'{e}}aux and
                  Charles Momin and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding
                  Towards Secure and Efficient Fresh Re-Keying},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {373--401},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.373-401},
  doi          = {10.46586/TCHES.V2021.I1.373-401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DuvalMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersS21,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Provably Secure Hardware Masking in the Transition- and Glitch-Robust
                  Probing Model: Better Safe than Sorry},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {136--158},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.136-158},
  doi          = {10.46586/TCHES.V2021.I2.136-158},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainS21,
  author       = {Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Breaking Masked Implementations with Many Shares on 32-bit Software
                  Platforms or When the Security Order Does Not Matter},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {202--234},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.202-234},
  doi          = {10.46586/TCHES.V2021.I3.202-234},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelliziaHKLMSY21,
  author       = {Davide Bellizia and
                  Cl{\'{e}}ment Hoffmann and
                  Dina Kamel and
                  Hanlin Liu and
                  Pierrick M{\'{e}}aux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  title        = {Learning Parity with Physical Noise: Imperfections, Reductions and
                  {FPGA} Prototype},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {390--417},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.390-417},
  doi          = {10.46586/TCHES.V2021.I3.390-417},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelliziaHKLMSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainMPS21,
  author       = {Olivier Bronchain and
                  Charles Momin and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Improved Leakage-Resistant Authenticated Encryption based on Hardware
                  {AES} Coprocessors},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {641--676},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.641-676},
  doi          = {10.46586/TCHES.V2021.I3.641-676},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainMPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BronchainFLLPS21,
  author       = {Olivier Bronchain and
                  Sebastian Faust and
                  Virginie Lallemand and
                  Gregor Leander and
                  L{\'{e}}o Perrin and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {{MOE:} Multiplication Operated Encryption with Trojan Resilience},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {78--129},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.78-129},
  doi          = {10.46586/TOSC.V2021.I1.78-129},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BronchainFLLPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoSWWY21,
  author       = {Chun Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Weijia Wang and
                  Xiao Wang and
                  Yu Yu},
  title        = {Provable Security of {SP} Networks with Partial Non-Linear Layers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {353--388},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.353-388},
  doi          = {10.46586/TOSC.V2021.I2.353-388},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoSWWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BertiGPS21,
  author       = {Francesco Berti and
                  Chun Guo and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Efficient Leakage-Resilient MACs Without Idealized Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {95--123},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_4},
  doi          = {10.1007/978-3-030-92075-3\_4},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BertiGPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BelliziaUS21,
  author       = {Davide Bellizia and
                  Balazs Udvarhelyi and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Vincent Grosso and
                  Thomas P{\"{o}}ppelmann},
  title        = {Towards a Better Understanding of Side-Channel Analysis Measurements
                  Setups},
  booktitle    = {Smart Card Research and Advanced Applications - 20th International
                  Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12,
                  2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13173},
  pages        = {64--79},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97348-3\_4},
  doi          = {10.1007/978-3-030-97348-3\_4},
  timestamp    = {Thu, 10 Mar 2022 15:30:57 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/BelliziaUS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/UdvarhelyiBS21,
  author       = {Balazs Udvarhelyi and
                  Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Shivam Bhasin and
                  Fabrizio De Santis},
  title        = {Security Analysis of Deterministic Re-keying with Masking and Shuffling:
                  Application to {ISAP}},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 12th International
                  Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12910},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89915-8\_8},
  doi          = {10.1007/978-3-030-89915-8\_8},
  timestamp    = {Fri, 29 Oct 2021 16:42:34 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/UdvarhelyiBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CassiersFOS21,
  author       = {Ga{\"{e}}tan Cassiers and
                  Sebastian Faust and
                  Maximilian Orlt and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Towards Tight Random Probing Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {185--214},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_7},
  doi          = {10.1007/978-3-030-84252-9\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CassiersFOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/BelliziaMFPRSTV21,
  author       = {Davide Bellizia and
                  Nadia El Mrabet and
                  Apostolos P. Fournaris and
                  Simon Ponti{\'{e}} and
                  Francesco Regazzoni and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  {\'{E}}lise Tasso and
                  Emanuele Valea},
  editor       = {Luigi Dilillo and
                  Luca Cassano and
                  Athanasios Papadimitriou},
  title        = {Post-Quantum Cryptography: Challenges and Opportunities for Robust
                  and Secure {HW} Design},
  booktitle    = {36th {IEEE} International Symposium on Defect and Fault Tolerance
                  in {VLSI} and Nanotechnology Systems, {DFT} 2021, Athens, Greece,
                  October 6-8, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DFT52944.2021.9568301},
  doi          = {10.1109/DFT52944.2021.9568301},
  timestamp    = {Fri, 22 Oct 2021 15:23:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dft/BelliziaMFPRSTV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Standaert21,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Evaluating and Designing against Side-Channel Leakage: White Box or
                  Black Box?},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3458441},
  doi          = {10.1145/3437880.3458441},
  timestamp    = {Wed, 07 Jul 2021 17:13:20 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Standaert21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2021-1,
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5},
  doi          = {10.1007/978-3-030-77870-5},
  isbn         = {978-3-030-77869-9},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2021-2,
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6},
  doi          = {10.1007/978-3-030-77886-6},
  isbn         = {978-3-030-77885-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2021-3,
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5},
  doi          = {10.1007/978-3-030-77883-5},
  isbn         = {978-3-030-77882-8},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2021-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BronchainCS21,
  author       = {Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Give Me 5 Minutes: Attacking {ASCAD} with a Single Side-Channel Trace},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {817},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/817},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BronchainCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CassiersFOS21,
  author       = {Ga{\"{e}}tan Cassiers and
                  Sebastian Faust and
                  Maximilian Orlt and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Tight Random Probing Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {880},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/880},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CassiersFOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuvalMMS21,
  author       = {S{\'{e}}bastien Duval and
                  Pierrick M{\'{e}}aux and
                  Charles Momin and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding
                  Towards Secure and Efficient Fresh Re-Keying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {950},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/950},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuvalMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzouaouiBGPS21,
  author       = {Melissa Azouaoui and
                  Olivier Bronchain and
                  Vincent Grosso and
                  Kostas Papagiannopoulos and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Bitslice Masking and Improved Shuffling: How and When to Mix Them
                  in Software?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {951},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/951},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AzouaouiBGPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiGPS21,
  author       = {Francesco Berti and
                  Chun Guo and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Efficient Leakage-Resilient MACs without Idealized Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1250},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiGPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/LeviBS20,
  author       = {Itamar Levi and
                  Davide Bellizia and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Beyond algorithmic noise or how to shuffle parallel implementations?},
  journal      = {Int. J. Circuit Theory Appl.},
  volume       = {48},
  number       = {5},
  pages        = {674--695},
  year         = {2020},
  url          = {https://doi.org/10.1002/cta.2756},
  doi          = {10.1002/CTA.2756},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcta/LeviBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BartheBDFGSS20,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Fran{\c{c}}ois Dupressoir and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Pierre{-}Yves Strub},
  title        = {Improved parallel mask refreshing algorithms: generic solutions with
                  parametrized non-interference and automated optimizations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {17--26},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-018-00202-2},
  doi          = {10.1007/S13389-018-00202-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BartheBDFGSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ZhouS20,
  author       = {Yuanyuan Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Deep learning mitigates but does not annihilate the need of aligned
                  traces and a generalized ResNet model for side-channel attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {85--95},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00209-3},
  doi          = {10.1007/S13389-019-00209-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ZhouS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/LeviBBS20,
  author       = {Itamar Levi and
                  Davide Bellizia and
                  David Bol and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Ask Less, Get More: Side-Channel Signal Hiding, Revisited},
  journal      = {{IEEE} Trans. Circuits Syst.},
  volume       = {67-I},
  number       = {12},
  pages        = {4904--4917},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSI.2020.3005338},
  doi          = {10.1109/TCSI.2020.3005338},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcas/LeviBBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BertiGPPS20,
  author       = {Francesco Berti and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {TEDT, a Leakage-Resist {AEAD} Mode for High Physical Security Applications},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {256--320},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.256-320},
  doi          = {10.13154/TCHES.V2020.I1.256-320},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BertiGPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainS20,
  author       = {Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Side-Channel Countermeasures' Dissection and the Limits of Closed
                  Source Security Evaluations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {1--25},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.1-25},
  doi          = {10.13154/TCHES.V2020.I2.1-25},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WangMCS20,
  author       = {Weijia Wang and
                  Pierrick M{\'{e}}aux and
                  Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Efficient and Private Computations with Code-Based Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {128--171},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.128-171},
  doi          = {10.13154/TCHES.V2020.I2.128-171},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WangMCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CamuratiFS20,
  author       = {Giovanni Camurati and
                  Aur{\'{e}}lien Francillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Understanding Screaming Channels: From a Detailed Analysis to Improved
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {358--401},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.358-401},
  doi          = {10.13154/TCHES.V2020.I3.358-401},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CamuratiFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuoGSB20,
  author       = {Qian Guo and
                  Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Bronchain},
  title        = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory
                  Viewpoint},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {209--238},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.209-238},
  doi          = {10.13154/TCHES.V2020.I4.209-238},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GuoGSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KamelSDFB20,
  author       = {Dina Kamel and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Alexandre Duc and
                  Denis Flandre and
                  Francesco Berti},
  title        = {Learning with Physical Noise or Errors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {957--971},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2830763},
  doi          = {10.1109/TDSC.2018.2830763},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KamelSDFB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CassiersS20,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Trivially and Efficiently Composing Masked Gadgets With Probe Isolating
                  Non-Interference},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2542--2555},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2971153},
  doi          = {10.1109/TIFS.2020.2971153},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CassiersS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoPPS20,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Low-Energy Leakage-Resistant Authenticated Encryption from
                  the Duplex Sponge Construction},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {6--42},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.6-42},
  doi          = {10.13154/TOSC.V2020.I1.6-42},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BilginMDLS20,
  author       = {Beg{\"{u}}l Bilgin and
                  Lauren De Meyer and
                  S{\'{e}}bastien Duval and
                  Itamar Levi and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Low {AND} Depth and Efficient Inverses: a Guide on S-boxes for Low-latency
                  Masking},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {144--184},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.144-184},
  doi          = {10.13154/TOSC.V2020.I1.144-184},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BilginMDLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BelliziaBBCDGLL20,
  author       = {Davide Bellizia and
                  Francesco Berti and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  S{\'{e}}bastien Duval and
                  Chun Guo and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Itamar Levi and
                  Charles Momin and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi and
                  Friedrich Wiemer},
  title        = {Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with
                  a Masked Tweakable Block Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {295--349},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.295-349},
  doi          = {10.13154/TOSC.V2020.IS1.295-349},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BelliziaBBCDGLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Wang0S0C20,
  author       = {Weijia Wang and
                  Chun Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu and
                  Ga{\"{e}}tan Cassiers},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {851--880},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_28},
  doi          = {10.1007/978-3-030-64837-4\_28},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Wang0S0C20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/UdvarhelyiWBS20,
  author       = {Balazs Udvarhelyi and
                  Antoine van Wassenhove and
                  Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Pierre{-}Yvan Liardet and
                  Nele Mentens},
  title        = {On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not
                  Enough},
  booktitle    = {Smart Card Research and Advanced Applications - 19th International
                  Conference, {CARDIS} 2020, Virtual Event, November 18-19, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12609},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68487-7\_7},
  doi          = {10.1007/978-3-030-68487-7\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/UdvarhelyiWBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/0006DS20,
  author       = {Yuanyuan Zhou and
                  S{\'{e}}bastien Duval and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Scatter: a Missing Case?},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {90--103},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_5},
  doi          = {10.1007/978-3-030-68773-1\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/0006DS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelliziaBCGGMPP20,
  author       = {Davide Bellizia and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Vincent Grosso and
                  Chun Guo and
                  Charles Momin and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Mode-Level vs. Implementation-Level Physical Security in Symmetric
                  Cryptography - {A} Practical Guide Through the Leakage-Resistance
                  Jungle},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {369--400},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_13},
  doi          = {10.1007/978-3-030-56784-2\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BelliziaBCGGMPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AzouaouiDPSPV20,
  author       = {Melissa Azouaoui and
                  Fran{\c{c}}ois Durvaux and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Kostas Papagiannopoulos and
                  Vincent Verneuil},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {On the Worst-Case Side-Channel Security of {ECC} Point Randomization
                  in Embedded Devices},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {205--227},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_9},
  doi          = {10.1007/978-3-030-65277-7\_9},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AzouaouiDPSPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DanhierMS20,
  author       = {Pierre Danhier and
                  Cl{\'{e}}ment Massart and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fidelity Leakages: Applying Membership Inference Attacks to Preference
                  Data},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops
                  2020, Toronto, ON, Canada, July 6-9, 2020},
  pages        = {728--733},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9163032},
  doi          = {10.1109/INFOCOMWKSHPS50562.2020.9163032},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/DanhierMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/AzouaouiBBDD0JK20,
  author       = {Melissa Azouaoui and
                  Davide Bellizia and
                  Ileana Buhan and
                  Nicolas Debande and
                  S{\'{e}}bastien Duval and
                  Christophe Giraud and
                  {\'{E}}liane Jaulmes and
                  Fran{\c{c}}ois Koeune and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Carolyn Whitnall},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {A Systematic Appraisal of Side Channel Evaluation Strategies},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {46--66},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_3},
  doi          = {10.1007/978-3-030-64357-7\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/AzouaouiBBDD0JK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CassiersGLS20,
  author       = {Ga{\"{e}}tan Cassiers and
                  Benjamin Gr{\'{e}}goire and
                  Itamar Levi and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Hardware Private Circuits: From Trivial Composition to Full Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CassiersGLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelliziaBCGGMPP20,
  author       = {Davide Bellizia and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Vincent Grosso and
                  Chun Guo and
                  Charles Momin and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Mode-Level vs. Implementation-Level Physical Security in Symmetric
                  Cryptography: {A} Practical Guide Through the Leakage-Resistance Jungle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/211},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BelliziaBCGGMPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangGSYC20,
  author       = {Weijia Wang and
                  Chun Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu and
                  Ga{\"{e}}tan Cassiers},
  title        = {Packed Multiplication: How to Amortize the Cost of Side-channel Masking
                  ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1103},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1103},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangGSYC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzouaouiBBDDGJK20,
  author       = {Melissa Azouaoui and
                  Davide Bellizia and
                  Ileana Buhan and
                  Nicolas Debande and
                  S{\'{e}}bastien Duval and
                  Christophe Giraud and
                  {\'{E}}liane Jaulmes and
                  Fran{\c{c}}ois Koeune and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Carolyn Whitnall},
  title        = {A Systematic Appraisal of Side Channel Evaluation Strategies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1347},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1347},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AzouaouiBBDDGJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzouaouiDPSPV20,
  author       = {Melissa Azouaoui and
                  Fran{\c{c}}ois Durvaux and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Kostas Papagiannopoulos and
                  Vincent Verneuil},
  title        = {On the Worst-Case Side-Channel Security of {ECC} Point Randomization
                  in Embedded Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1368},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1368},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AzouaouiDPSPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/NawazBLSF19,
  author       = {Kashif Nawaz and
                  L{\'{e}}opold Van Brandt and
                  Itamar Levi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre},
  title        = {A security oriented transient-noise simulation methodology: Evaluation
                  of intrinsic physical noise of cryptographic designs},
  journal      = {Integr.},
  volume       = {68},
  pages        = {71--79},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.vlsi.2019.06.006},
  doi          = {10.1016/J.VLSI.2019.06.006},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/NawazBLSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DucFS19,
  author       = {Alexandre Duc and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Making Masking Security Proofs Concrete (Or How to Evaluate the Security
                  of Any Leaking Device), Extended Version},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1263--1297},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9277-0},
  doi          = {10.1007/S00145-018-9277-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DucFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersS19,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Globally Optimized Masking: From Low Randomness to Low Noise
                  Rate or Probe Isolating Multiplications with Reduced Randomness and
                  Security against Horizontal Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {162--198},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.162-198},
  doi          = {10.13154/TCHES.V2019.I2.162-198},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MoosMSS19,
  author       = {Thorben Moos and
                  Amir Moradi and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing
                  Model are Needed},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {256--292},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.256-292},
  doi          = {10.13154/TCHES.V2019.I2.256-292},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MoosMSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LeviBS19,
  author       = {Itamar Levi and
                  Davide Bellizia and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Reducing a Masked Implementation's Effective Security Order with Setup
                  Manipulations And an Explanation Based on Externally-Amplified Couplings},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {293--317},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.293-317},
  doi          = {10.13154/TCHES.V2019.I2.293-317},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/LeviBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainSS19,
  author       = {Olivier Bronchain and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Multi-Tuple Leakage Detection and the Dependent Signal Issue},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {318--345},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.318-345},
  doi          = {10.13154/TCHES.V2019.I2.318-345},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYS19,
  author       = {Weijia Wang and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Provable Order Amplification for Code-Based Masking: How to Avoid
                  Non-Linear Leakages Due to Masked Operations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {11},
  pages        = {3069--3082},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2912549},
  doi          = {10.1109/TIFS.2019.2912549},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoSWY19,
  author       = {Chun Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Weijia Wang and
                  Yu Yu},
  title        = {Efficient Side-Channel Secure Message Authentication with Better Bounds},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {23--53},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.23-53},
  doi          = {10.13154/TOSC.V2019.I4.23-53},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoSWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BertiPS19,
  author       = {Francesco Berti and
                  Olivier Pereira and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Johannes Buchmann and
                  Abderrahmane Nitaj and
                  Tajje{-}eddine Rachidi},
  title        = {Reducing the Cost of Authenticity with Leakages: a {\textbackslash}mathsf
                  {CIML2} -Secure {\textbackslash}mathsf {AE} Scheme with One Call to
                  a Strongly Protected Tweakable Block Cipher},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
                  on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11627},
  pages        = {229--249},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23696-0\_12},
  doi          = {10.1007/978-3-030-23696-0\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BertiPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MassartS19,
  author       = {Cl{\'{e}}ment Massart and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Johannes Buchmann and
                  Abderrahmane Nitaj and
                  Tajje{-}eddine Rachidi},
  title        = {Revisiting Location Privacy from a Side-Channel Analysis Viewpoint},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
                  on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11627},
  pages        = {333--351},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23696-0\_17},
  doi          = {10.1007/978-3-030-23696-0\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/MassartS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AzouaouiPSV19,
  author       = {Melissa Azouaoui and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Vincent Verneuil},
  editor       = {Sonia Bela{\"{\i}}d and
                  Tim G{\"{u}}neysu},
  title        = {Key Enumeration from the Adversarial Viewpoint},
  booktitle    = {Smart Card Research and Advanced Applications - 18th International
                  Conference, {CARDIS} 2019, Prague, Czech Republic, November 11-13,
                  2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11833},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42068-0\_15},
  doi          = {10.1007/978-3-030-42068-0\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AzouaouiPSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Standaert19,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Daniel E. Holcomb and
                  Patrick Schaumont},
  title        = {Towards an Open Approach to Side-Channel Resistant Authenticated Encryption},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Attacks and Solutions in
                  Hardware Security Workshop, ASHES@CCS 2019, London, UK, November 15,
                  2019},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338508.3359579},
  doi          = {10.1145/3338508.3359579},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Standaert19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/BertiGPPS19,
  author       = {Francesco Berti and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Strong Authenticity with Leakage Under Weak and Falsifiable Physical
                  Assumptions},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {517--532},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_31},
  doi          = {10.1007/978-3-030-42921-8\_31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/BertiGPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/AzouaouiPS19,
  author       = {Melissa Azouaoui and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Ilia Polian and
                  Marc St{\"{o}}ttinger},
  title        = {Fast Side-Channel Security Evaluation of {ECC} Implementations - Shortcut
                  Formulas for Horizontal Side-Channel Attacks Against {ECSM} with the
                  Montgomery Ladder},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 10th International
                  Workshop, {COSADE} 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11421},
  pages        = {25--42},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16350-1\_3},
  doi          = {10.1007/978-3-030-16350-1\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/AzouaouiPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BronchainHMOS19,
  author       = {Olivier Bronchain and
                  Julien M. Hendrickx and
                  Cl{\'{e}}ment Massart and
                  Alex Olshevsky and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Leakage Certification Revisited: Bounding Model Errors in Side-Channel
                  Security Evaluations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {713--737},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_25},
  doi          = {10.1007/978-3-030-26948-7\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BronchainHMOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BartheBCFGS19,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Ga{\"{e}}tan Cassiers and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {maskVerif: Automated Verification of Higher-Order Masking in Presence
                  of Physical Defaults},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {300--318},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_15},
  doi          = {10.1007/978-3-030-29959-0\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BartheBCFGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MeauxCJS19,
  author       = {Pierrick M{\'{e}}aux and
                  Claude Carlet and
                  Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Feng Hao and
                  Sushmita Ruj and
                  Sourav Sen Gupta},
  title        = {Improved Filter Permutators for Efficient {FHE:} Better Instances
                  and Implementations},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
                  on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11898},
  pages        = {68--91},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35423-7\_4},
  doi          = {10.1007/978-3-030-35423-7\_4},
  timestamp    = {Wed, 20 Mar 2024 15:23:22 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MeauxCJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/GuoPPS19,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Peter Schwabe and
                  Nicolas Th{\'{e}}riault},
  title        = {Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions,
                  Separation Results and First Construction - (Extended Abstract)},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2019 - 6th International Conference
                  on Cryptology and Information Security in Latin America, Santiago
                  de Chile, Chile, October 2-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11774},
  pages        = {150--172},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30530-7\_8},
  doi          = {10.1007/978-3-030-30530-7\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/GuoPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/CassiersGPPS19,
  author       = {Ga{\"{e}}tan Cassiers and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Shivam Bhasin and
                  Avi Mendelson and
                  Mridul Nandi},
  title        = {SpookChain: Chaining a Sponge-Based {AEAD} with Beyond-Birthday Security},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 9th International
                  Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11947},
  pages        = {67--85},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35869-3\_7},
  doi          = {10.1007/978-3-030-35869-3\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/CassiersGPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BronchainHMOS19,
  author       = {Olivier Bronchain and
                  Julien M. Hendrickx and
                  Cl{\'{e}}ment Massart and
                  Alex Olshevsky and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Leakage Certification Revisited: Bounding Model Errors in Side-Channel
                  Security Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BronchainHMOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiGPPS19,
  author       = {Francesco Berti and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {TEDT, a Leakage-Resilient {AEAD} mode for High (Physical) Security
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/137},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiGPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzouaouiPS19,
  author       = {Melissa Azouaoui and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fast Side-Channel Security Evaluation of {ECC} Implementations: Shortcut
                  Formulas for Horizontal Side-channel Attacks against {ECSM} with the
                  Montgomery ladder},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/163},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AzouaouiPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoPPS19,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Lightweight Side-Channel Security and the Leakage-Resilience
                  of the Duplex Sponge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/193},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoPPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiPS19,
  author       = {Francesco Berti and
                  Olivier Pereira and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Reducing the Cost of Authenticity with Leakages: a CIML2-Secure {AE}
                  Scheme with One Call to a Strongly Protected Tweakable Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MassartS19,
  author       = {Cl{\'{e}}ment Massart and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Revisiting Location Privacy from a Side-Channel Analysis Viewpoint
                  (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MassartS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeauxCJS19,
  author       = {Pierrick M{\'{e}}aux and
                  Claude Carlet and
                  Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Improved Filter Permutators: Combining Symmetric Encryption Design,
                  Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption,
                  for Private Delegation of Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeauxCJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BronchainS19,
  author       = {Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Side-Channel Countermeasures' Dissection and the Limits of Closed
                  Source Security Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1008},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BronchainS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzouaouiPSV19,
  author       = {Melissa Azouaoui and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Vincent Verneuil},
  title        = {Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring
                  and Start Enumerating?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1331},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1331},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AzouaouiPSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiGPPS19a,
  author       = {Francesco Berti and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Strong Authenticity with Leakage under Weak and Falsifiable Physical
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1413},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1413},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiGPPS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoSW019,
  author       = {Chun Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Weijia Wang and
                  Yu Yu},
  title        = {Efficient Side-Channel Secure Message Authentication with Better Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1424},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1424},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoSW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/braininf/LangeMMS18,
  author       = {Joseph Lange and
                  Cl{\'{e}}ment Massart and
                  Andr{\'{e}} Mouraux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Side-channel attacks against the human brain: the {PIN} code case
                  study (extended version)},
  journal      = {Brain Informatics},
  volume       = {5},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1186/s40708-018-0090-1},
  doi          = {10.1186/S40708-018-0090-1},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/braininf/LangeMMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LermanPMS18,
  author       = {Liran Lerman and
                  Romain Poussier and
                  Olivier Markowitch and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Template attacks versus machine learning revisited and the curse of
                  dimensionality in side-channel analysis: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {4},
  pages        = {301--313},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0162-9},
  doi          = {10.1007/S13389-017-0162-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LermanPMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LermanVMS18,
  author       = {Liran Lerman and
                  Nikita Veshchikov and
                  Olivier Markowitch and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis
                  Tool for Leakage Profiling},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {2},
  pages        = {268--283},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2017.2731342},
  doi          = {10.1109/TC.2017.2731342},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/LermanVMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MoradiRSS18,
  author       = {Amir Moradi and
                  Bastian Richter and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Leakage Detection with the x2-Test},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {209--237},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.209-237},
  doi          = {10.13154/TCHES.V2018.I1.209-237},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/MoradiRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FaustGPPS18,
  author       = {Sebastian Faust and
                  Vincent Grosso and
                  Santos Merino Del Pozo and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Composable Masking Schemes in the Presence of Physical Defaults {\&}
                  the Robust Probing Model},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {89--120},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.89-120},
  doi          = {10.13154/TCHES.V2018.I3.89-120},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/FaustGPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYSLGG18,
  author       = {Weijia Wang and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Junrong Liu and
                  Zheng Guo and
                  Dawu Gu},
  title        = {Ridge-Based {DPA:} Improvement of Differential Power Analysis For
                  Nanoscale Chips},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1301--1316},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2787985},
  doi          = {10.1109/TIFS.2017.2787985},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangYSLGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Standaert18,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Beg{\"{u}}l Bilgin and
                  Jean{-}Bernard Fischer},
  title        = {How (Not) to Use Welch's T-Test in Side-Channel Security Evaluations},
  booktitle    = {Smart Card Research and Advanced Applications, 17th International
                  Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11389},
  pages        = {65--79},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15462-2\_5},
  doi          = {10.1007/978-3-030-15462-2\_5},
  timestamp    = {Sat, 30 Sep 2023 09:35:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Standaert18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BronchainDFS18,
  author       = {Olivier Bronchain and
                  Louis Dassy and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Daniel E. Holcomb and
                  Jorge Guajardo},
  title        = {Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components
                  Designed by Colluding Manufacturers},
  booktitle    = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware
                  Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3266444.3266447},
  doi          = {10.1145/3266444.3266447},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BronchainDFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KamelBSFB18,
  author       = {Dina Kamel and
                  Davide Bellizia and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre and
                  David Bol},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Daniel E. Holcomb and
                  Jorge Guajardo},
  title        = {Demonstrating an {LPPN} Processor},
  booktitle    = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware
                  Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {18--23},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3266444.3266445},
  doi          = {10.1145/3266444.3266445},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KamelBSFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BertiKPPS18,
  author       = {Francesco Berti and
                  Fran{\c{c}}ois Koeune and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Ciphertext Integrity with Misuse and Leakage: Definition and Efficient
                  Constructions with Symmetric Primitives},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {37--50},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196525},
  doi          = {10.1145/3196494.3196525},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BertiKPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/GoudarziJRS18,
  author       = {Dahmun Goudarzi and
                  Anthony Journault and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Junfeng Fan and
                  Benedikt Gierlichs},
  title        = {Secure Multiplication for Bitslice Higher-Order Masking: Optimisation
                  and Comparison},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 9th International
                  Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10815},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89641-0\_1},
  doi          = {10.1007/978-3-319-89641-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/GoudarziJRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GrossoS18,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Masking Proofs Are Tight and How to Exploit it in Security Evaluations},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {385--412},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_13},
  doi          = {10.1007/978-3-319-78375-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GrossoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ngcas/NawazLSF18,
  author       = {Kashif Nawaz and
                  Itamar Levi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre},
  title        = {A Transient Noise Analysis of Secured Dual-Rail Based Logic Style},
  booktitle    = {2018 New Generation of CAS, {NGCAS} 2018, Valletta, Malta, November
                  20-23, 2018},
  pages        = {146--149},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NGCAS.2018.8572199},
  doi          = {10.1109/NGCAS.2018.8572199},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ngcas/NawazLSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prime/NawazBSF18,
  author       = {Kashif Nawaz and
                  L{\'{e}}opold Van Brandt and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre},
  title        = {Let's make it Noisy: {A} Simulation Methodology for adding Intrinsic
                  Physical Noise to Cryptographic Designs},
  booktitle    = {14th Conference on Ph.D. Research in Microelectronics and Electronics,
                  {PRIME} 2018, Prague, Czech Republic, July 2-5, 2018},
  pages        = {61--64},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/PRIME.2018.8430315},
  doi          = {10.1109/PRIME.2018.8430315},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prime/NawazBSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoudarziJRS18,
  author       = {Dahmun Goudarzi and
                  Anthony Journault and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Secure Multiplication for Bitslice Higher-Order Masking: Optimisation
                  and Comparison},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoudarziJRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CassiersS18,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Improved Bitslice Masking: from Optimized Non-Interference to Probe
                  Isolation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/438},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CassiersS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoPPS18,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Leakage-Resilient Authenticated Encryption with Misuse in the Leveled
                  Leakage Setting: Definitions, Separation Results, and Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/484},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoosMSS18,
  author       = {Thorben Moos and
                  Amir Moradi and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing
                  Model are Needed},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/490},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoosMSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoGS18,
  author       = {Qian Guo and
                  Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory
                  Viewpoint},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheBDFGSS18,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Fran{\c{c}}ois Dupressoir and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Pierre{-}Yves Strub},
  title        = {Improved Parallel Mask Refreshing Algorithms: Generic Solutions with
                  Parametrized Non-Interference {\&} Automated Optimizations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/505},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheBDFGSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JournaultSV17,
  author       = {Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Kerem Varici},
  title        = {Improving the security and efficiency of block ciphers based on LS-designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {495--509},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0193-8},
  doi          = {10.1007/S10623-016-0193-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JournaultSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DurvauxSP17,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Santos Merino Del Pozo},
  title        = {Towards easy leakage certification: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {129--147},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0150-0},
  doi          = {10.1007/S13389-017-0150-0},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/DurvauxSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BertiPPS17,
  author       = {Francesco Berti and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {On Leakage-Resilient Authenticated Encryption with Decryption Leakages},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {271--293},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.271-293},
  doi          = {10.13154/TOSC.V2017.I3.271-293},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BertiPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BalaschFGPS17,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Consolidating Inner Product Masking},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {724--754},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_25},
  doi          = {10.1007/978-3-319-70694-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BalaschFGPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DingZDSF17,
  author       = {A. Adam Ding and
                  Liwei Zhang and
                  Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yunsi Fei},
  editor       = {Thomas Eisenbarth and
                  Yannick Teglia},
  title        = {Towards Sound and Optimal Leakage Detection Procedure},
  booktitle    = {Smart Card Research and Advanced Applications - 16th International
                  Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10728},
  pages        = {105--122},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75208-2\_7},
  doi          = {10.1007/978-3-319-75208-2\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DingZDSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PoussierGSCG17,
  author       = {Romain Poussier and
                  Qian Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Claude Carlet and
                  Sylvain Guilley},
  editor       = {Thomas Eisenbarth and
                  Yannick Teglia},
  title        = {Connecting and Improving Direct Sum Masking and Inner Product Masking},
  booktitle    = {Smart Card Research and Advanced Applications - 16th International
                  Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10728},
  pages        = {123--141},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75208-2\_8},
  doi          = {10.1007/978-3-319-75208-2\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/PoussierGSCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinKLMMN017,
  author       = {Daniel J. Bernstein and
                  Stefan K{\"{o}}lbl and
                  Stefan Lucks and
                  Pedro Maat Costa Massolino and
                  Florian Mendel and
                  Kashif Nawaz and
                  Tobias Schneider and
                  Peter Schwabe and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yosuke Todo and
                  Beno{\^{\i}}t Viguier},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Gimli : {A} Cross-Platform Permutation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {299--320},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_15},
  doi          = {10.1007/978-3-319-66787-4\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinKLMMN017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoussierZS17,
  author       = {Romain Poussier and
                  Yuanyuan Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {A Systematic Approach to the Side-Channel Analysis of {ECC} Implementations
                  with Worst-Case Horizontal Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {534--554},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_26},
  doi          = {10.1007/978-3-319-66787-4\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoussierZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JournaultS17,
  author       = {Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Very High Order Masking: Efficient Implementation and Security Evaluation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {623--643},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_30},
  doi          = {10.1007/978-3-319-66787-4\_30},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/JournaultS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/NawazKSF17,
  author       = {Kashif Nawaz and
                  Dina Kamel and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre},
  editor       = {Sylvain Guilley},
  title        = {Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks:
                  {A} Case-Study},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_2},
  doi          = {10.1007/978-3-319-64647-3\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/NawazKSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/LangeMMS17,
  author       = {Joseph Lange and
                  Cl{\'{e}}ment Massart and
                  Andr{\'{e}} Mouraux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Sylvain Guilley},
  title        = {Side-Channel Attacks Against the Human Brain: The {PIN} Code Case
                  Study},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {171--189},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_11},
  doi          = {10.1007/978-3-319-64647-3\_11},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/LangeMMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/PozoS17,
  author       = {Santos Merino Del Pozo and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Sylvain Guilley},
  title        = {Getting the Most Out of Leakage Detection - Statistical Tools and
                  Measurement Setups Hand in Hand},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {264--281},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_16},
  doi          = {10.1007/978-3-319-64647-3\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/PozoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangYSGSZ17,
  author       = {Weijia Wang and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dawu Gu and
                  Sen Xu and
                  Chi Zhang},
  editor       = {Helena Handschuh},
  title        = {Ridge-Based Profiled Differential Power Analysis},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {347--362},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_20},
  doi          = {10.1007/978-3-319-52153-4\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WangYSGSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BartheDFGSS17,
  author       = {Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir and
                  Sebastian Faust and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Pierre{-}Yves Strub},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Parallel Implementations of Masking Schemes and the Bounded Moment
                  Leakage Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {535--566},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_19},
  doi          = {10.1007/978-3-319-56620-7\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BartheDFGSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossoS17,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Masking Proofs are Tight (and How to Exploit it in Security Evaluations)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Standaert17,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {How (not) to Use Welch's T-test in Side-Channel Security Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Standaert17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangDDSF17,
  author       = {Liwei Zhang and
                  A. Adam Ding and
                  Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yunsi Fei},
  title        = {Towards Sound and Optimal Leakage Detection Procedure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangDDSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoussierZS17,
  author       = {Romain Poussier and
                  Yuanyuan Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {A Systematic Approach to the Side-Channel Analysis of {ECC} Implementations
                  with Worst-Case Horizontal Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/629},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoussierZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinKLMMNS17,
  author       = {Daniel J. Bernstein and
                  Stefan K{\"{o}}lbl and
                  Stefan Lucks and
                  Pedro Maat Costa Massolino and
                  Florian Mendel and
                  Kashif Nawaz and
                  Tobias Schneider and
                  Peter Schwabe and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yosuke Todo and
                  Beno{\^{\i}}t Viguier},
  title        = {Gimli: a cross-platform permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinKLMMNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JournaultS17,
  author       = {Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Very High Order Masking: Efficient Implementation and Security Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/637},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JournaultS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustGPPS17,
  author       = {Sebastian Faust and
                  Vincent Grosso and
                  Santos Merino Del Pozo and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Composable Masking Schemes in the Presence of Physical Defaults and
                  the Robust Probing Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustGPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschFGPS17,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Consolidating Inner Product Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1047},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschFGPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangGZWYSG16,
  author       = {Fan Zhang and
                  Shize Guo and
                  Xinjie Zhao and
                  Tao Wang and
                  Jian Yang and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dawu Gu},
  title        = {A Framework for the Analysis and Evaluation of Algebraic Fault Attacks
                  on Lightweight Block Ciphers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1039--1054},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516905},
  doi          = {10.1109/TIFS.2016.2516905},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangGZWYSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BruneauGHRST16,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yannick Teglia},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled
                  Implementations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {573--601},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_21},
  doi          = {10.1007/978-3-662-53887-6\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BruneauGHRST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MedwedSNF16,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Ventzislav Nikov and
                  Martin Feldhofer},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Unknown-Input Attacks in the Parallel Setting: Improving the Security
                  of the {CHES} 2012 Leakage-Resilient {PRF}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {602--623},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_22},
  doi          = {10.1007/978-3-662-53887-6\_22},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MedwedSNF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/WangSYPLGG16,
  author       = {Weijia Wang and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu and
                  Sihang Pu and
                  Junrong Liu and
                  Zheng Guo and
                  Dawu Gu},
  editor       = {Kerstin Lemke{-}Rust and
                  Michael Tunstall},
  title        = {Inner Product Masking for Bitslice Ciphers and Security Order Amplification
                  for Linear Leakages},
  booktitle    = {Smart Card Research and Advanced Applications - 15th International
                  Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10146},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54669-8\_11},
  doi          = {10.1007/978-3-319-54669-8\_11},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/WangSYPLGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BertiS16,
  author       = {Francesco Berti and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Kerstin Lemke{-}Rust and
                  Michael Tunstall},
  title        = {An Analysis of the Learning Parity with Noise Assumption Against Fault
                  Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 15th International
                  Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10146},
  pages        = {245--264},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54669-8\_15},
  doi          = {10.1007/978-3-319-54669-8\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BertiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoradiS16,
  author       = {Amir Moradi and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Moments-Correlating {DPA}},
  booktitle    = {Proceedings of the {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2016 Vienna, Austria, October, 2016},
  pages        = {5--15},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996366.2996369},
  doi          = {10.1145/2996366.2996369},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MoradiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DziembowskiFS16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {142--153},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978419},
  doi          = {10.1145/2976749.2978419},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DziembowskiFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DurvauxSP16,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Santos Merino Del Pozo},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Towards Easy Leakage Certification},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {40--60},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_3},
  doi          = {10.1007/978-3-662-53140-2\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DurvauxSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoussierSG16,
  author       = {Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Vincent Grosso},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Simple Key Enumeration (and Rank Estimation) Using Histograms: An
                  Integrated Approach},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {61--81},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_4},
  doi          = {10.1007/978-3-662-53140-2\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoussierSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFHJM16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Gottfried Herold and
                  Anthony Journault and
                  Daniel Masny and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {272--301},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_10},
  doi          = {10.1007/978-3-662-53008-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DziembowskiFHJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BiSYSJ16,
  author       = {Yu Bi and
                  Kaveh Shamsi and
                  Jiann{-}Shiun Yuan and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yier Jin},
  editor       = {Luca Fanucci and
                  J{\"{u}}rgen Teich},
  title        = {Leverage Emerging Technologies For DPA-Resilient Block Cipher Design},
  booktitle    = {2016 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016},
  pages        = {1538--1543},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7459558/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/BiSYSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DurvauxS16,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {From Improved Leakage Detection to the Detection of Points of Interests
                  in Leakage Traces},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {240--262},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_10},
  doi          = {10.1007/978-3-662-49890-3\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DurvauxS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MeauxJSC16,
  author       = {Pierrick M{\'{e}}aux and
                  Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Claude Carlet},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {311--343},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_13},
  doi          = {10.1007/978-3-662-49890-3\_13},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MeauxJSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChoudaryPS16,
  author       = {Marios O. Choudary and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Orr Dunkelman and
                  Somitra Kumar Sanadhya},
  title        = {Score-Based vs. Probability-Based Enumeration - {A} Cautionary Note},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10095},
  pages        = {137--152},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49890-4\_8},
  doi          = {10.1007/978-3-319-49890-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ChoudaryPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/00020SG16,
  author       = {Tobias Schneider and
                  Amir Moradi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Tim G{\"{u}}neysu},
  editor       = {Roberto Avanzi and
                  Howard M. Heys},
  title        = {Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation
                  Beyond Gaussian Templates and Histograms},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
                  St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10532},
  pages        = {58--78},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-69453-5\_4},
  doi          = {10.1007/978-3-319-69453-5\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/00020SG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/KamelSPNSFB16,
  author       = {Dina Kamel and
                  Guerric de Streel and
                  Santos Merino Del Pozo and
                  Kashif Nawaz and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre and
                  David Bol},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage
                  Vdd Randomizers},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {233--248},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_13},
  doi          = {10.1007/978-3-319-49445-6\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/space/KamelSPNSFB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/Standaert16,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices
                  - Overview of the {ERC} Project CRASH, Part {I} (Invited Talk)},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {353--362},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_20},
  doi          = {10.1007/978-3-319-49445-6\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/Standaert16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2016,
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0},
  doi          = {10.1007/978-3-319-43283-0},
  isbn         = {978-3-319-43282-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeauxJSC16,
  author       = {Pierrick M{\'{e}}aux and
                  Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Claude Carlet},
  title        = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeauxJSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYLGSGXF16,
  author       = {Weijia Wang and
                  Yu Yu and
                  Junrong Liu and
                  Zheng Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dawu Gu and
                  Sen Xu and
                  Rong Fu},
  title        = {Evaluation and Improvement of Generic-Emulating {DPA} Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/294},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYLGSGXF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PozoS16,
  author       = {Santos Merino Del Pozo and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Blind Source Separation from Single Measurements using Singular Spectrum
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PozoS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PozoS16a,
  author       = {Santos Merino Del Pozo and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {A note on the security of threshold implementations with d+1 input
                  shares},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PozoS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoussierSG16,
  author       = {Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Vincent Grosso},
  title        = {Simple Key Enumeration (and Rank Estimation) using Histograms: an
                  Integrated Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoussierSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFHJM16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Gottfried Herold and
                  Anthony Journault and
                  Daniel Masny and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/573},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFHJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchneiderMSG16,
  author       = {Tobias Schneider and
                  Amir Moradi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Tim G{\"{u}}neysu},
  title        = {Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation
                  beyond Gaussian Templates and Histograms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/719},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchneiderMSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheDFGSS16,
  author       = {Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir and
                  Sebastian Faust and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Pierre{-}Yves Strub},
  title        = {Parallel Implementations of Masking Schemes and the Bounded Moment
                  Leakage Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {912},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/912},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheDFGSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiKPPS16,
  author       = {Francesco Berti and
                  Fran{\c{c}}ois Koeune and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Leakage-Resilient and Misuse-Resistant Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/996},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiKPPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFS16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1004},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BelaidGS15,
  author       = {Sonia Bela{\"{\i}}d and
                  Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Masking and leakage-resilient primitives: One, the other(s) or both?},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {163--184},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0113-6},
  doi          = {10.1007/S12095-014-0113-6},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BelaidGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BayrakRNBSI15,
  author       = {Ali Galip Bayrak and
                  Francesco Regazzoni and
                  David Novo and
                  Philip Brisk and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Paolo Ienne},
  title        = {Automatic Application of Power Analysis Countermeasures},
  journal      = {{IEEE} Trans. Computers},
  volume       = {64},
  number       = {2},
  pages        = {329--341},
  year         = {2015},
  url          = {https://doi.org/10.1109/TC.2013.219},
  doi          = {10.1109/TC.2013.219},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/BayrakRNBSI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GrossoS15,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {ASCA, {SASCA} and {DPA} with Enumeration: Which One Beats the Other
                  and When?},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {291--312},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_12},
  doi          = {10.1007/978-3-662-48800-3\_12},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GrossoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PoussierGS15,
  author       = {Romain Poussier and
                  Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Naofumi Homma and
                  Marcel Medwed},
  title        = {Comparing Approaches to Rank Estimation for Side-Channel Security
                  Evaluations},
  booktitle    = {Smart Card Research and Advanced Applications - 14th International
                  Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9514},
  pages        = {125--142},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31271-2\_8},
  doi          = {10.1007/978-3-319-31271-2\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/PoussierGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DobraunigKMMS15,
  author       = {Christoph Dobraunig and
                  Fran{\c{c}}ois Koeune and
                  Stefan Mangard and
                  Florian Mendel and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Naofumi Homma and
                  Marcel Medwed},
  title        = {Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security},
  booktitle    = {Smart Card Research and Advanced Applications - 14th International
                  Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9514},
  pages        = {225--241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31271-2\_14},
  doi          = {10.1007/978-3-319-31271-2\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/DobraunigKMMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PereiraSV15,
  author       = {Olivier Pereira and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Srinivas Vivek},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic
                  Primitives},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {96--108},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813626},
  doi          = {10.1145/2810103.2813626},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PereiraSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PozoS15,
  author       = {Santos Merino Del Pozo and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Blind Source Separation from Single Measurements Using Singular Spectrum
                  Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {42--59},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_3},
  doi          = {10.1007/978-3-662-48324-4\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PozoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WangYLGSGXF15,
  author       = {Weijia Wang and
                  Yu Yu and
                  Junrong Liu and
                  Zheng Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dawu Gu and
                  Sen Xu and
                  Rong Fu},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Evaluation and Improvement of Generic-Emulating {DPA} Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {416--432},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_21},
  doi          = {10.1007/978-3-662-48324-4\_21},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/WangYLGSGXF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/LermanPBMS15,
  author       = {Liran Lerman and
                  Romain Poussier and
                  Gianluca Bontempi and
                  Olivier Markowitch and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Stefan Mangard and
                  Axel Y. Poschmann},
  title        = {Template Attacks vs. Machine Learning Revisited (and the Curse of
                  Dimensionality in Side-Channel Analysis)},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 6th International
                  Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9064},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21476-4\_2},
  doi          = {10.1007/978-3-319-21476-4\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/LermanPBMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DurvauxSVMD15,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Jean{-}Baptiste Mairy and
                  Yves Deville},
  editor       = {Stefan Mangard and
                  Axel Y. Poschmann},
  title        = {Efficient Selection of Time Samples for Higher-Order {DPA} with Projection
                  Pursuits},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 6th International
                  Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9064},
  pages        = {34--50},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21476-4\_3},
  doi          = {10.1007/978-3-319-21476-4\_3},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/DurvauxSVMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/PozoSKM15,
  author       = {Santos Merino Del Pozo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dina Kamel and
                  Amir Moradi},
  editor       = {Wolfgang Nebel and
                  David Atienza},
  title        = {Side-channel attacks from static power: when should we care?},
  booktitle    = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
                  Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
                  9-13, 2015},
  pages        = {145--150},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2755785},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/PozoSKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuYSGGSGX15,
  author       = {Junrong Liu and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Zheng Guo and
                  Dawu Gu and
                  Wei Sun and
                  Yijie Ge and
                  Xinjun Xie},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Small Tweaks Do Not Help: Differential Power Analysis of {MILENAGE}
                  Implementations in 3G/4G {USIM} Cards},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {468--480},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_24},
  doi          = {10.1007/978-3-319-24174-6\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuYSGGSGX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DucFS15,
  author       = {Alexandre Duc and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Making Masking Security Proofs Concrete - Or How to Evaluate the Security
                  of Any Leaking Device},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {401--429},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_16},
  doi          = {10.1007/978-3-662-46800-5\_16},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DucFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GlowaczGPSS15,
  author       = {Cezary Glowacz and
                  Vincent Grosso and
                  Romain Poussier and
                  Joachim Sch{\"{u}}th and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Gregor Leander},
  title        = {Simpler and More Efficient Rank Estimation for Side-Channel Security
                  Assessment},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {117--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_6},
  doi          = {10.1007/978-3-662-48116-5\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GlowaczGPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/FanZSF15,
  author       = {Guangjun Fan and
                  Yongbin Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dengguo Feng},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {On the Impacts of Mathematical Realization over Practical Security
                  of Leakage Resilient Cryptographic Schemes},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {469--484},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_32},
  doi          = {10.1007/978-3-319-17533-1\_32},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/FanZSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucFS15,
  author       = {Alexandre Duc and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Making Masking Security Proofs Concrete Or How to Evaluate the Security
                  of any Leaking Device},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossoSF15,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Sebastian Faust},
  title        = {Masking vs. Multiparty Computation: How Large is the Gap for AES?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossoSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossoS15,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {ASCA, {SASCA} and {DPA} with Enumeration: Which One Beats the Other
                  and When?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxS15,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {From Improved Leakage Detection to the Detection of Points of Interests
                  in Leakage Traces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxS15a,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Easy Leakage Certification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GrossoSF14,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Sebastian Faust},
  title        = {Masking vs. multiparty computation: how large is the gap for AES?},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {47--57},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0073-y},
  doi          = {10.1007/S13389-014-0073-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GrossoSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BelaidSHMMSST14,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrizio De Santis and
                  Johann Heyszl and
                  Stefan Mangard and
                  Marcel Medwed and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Stefan Tillich},
  title        = {Towards fresh re-keying with leakage-resilient PRFs: cipher design
                  principles and analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {157--171},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0079-5},
  doi          = {10.1007/S13389-014-0079-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BelaidSHMMSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KamelRFS14,
  author       = {Dina Kamel and
                  Mathieu Renauld and
                  Denis Flandre and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Understanding the limitations and improving the relevance of {SPICE}
                  simulations in side-channel security evaluations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {187--195},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0080-z},
  doi          = {10.1007/S13389-014-0080-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KamelRFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/BarenghiHBSRK14,
  author       = {Alessandro Barenghi and
                  C{\'{e}}dric Hocquet and
                  David Bol and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Francesco Regazzoni and
                  Israel Koren},
  title        = {A Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold
                  Devices to Low Voltage Fault Attacks},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {2},
  number       = {2},
  pages        = {107--118},
  year         = {2014},
  url          = {https://doi.org/10.1109/TETC.2014.2316509},
  doi          = {10.1109/TETC.2014.2316509},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/BarenghiHBSRK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoZZWSSM14,
  author       = {Shize Guo and
                  Xinjie Zhao and
                  Fan Zhang and
                  Tao Wang and
                  Zhijie Jerry Shi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Chujiao Ma},
  title        = {Exploiting the Incomplete Diffusion Feature: {A} Specialized Analytical
                  Side-Channel Attack Against the {AES} and Its Application to Microcontroller
                  Implementations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {6},
  pages        = {999--1014},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2315534},
  doi          = {10.1109/TIFS.2014.2315534},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GuoZZWSSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GrossoPS14,
  author       = {Vincent Grosso and
                  Emmanuel Prouff and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Efficient Masked S-Boxes Processing - {A} Step Forward -},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {251--266},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_16},
  doi          = {10.1007/978-3-319-06734-6\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GrossoPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Veyrat-CharvillonGS14,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Soft Analytical Side-Channel Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_15},
  doi          = {10.1007/978-3-662-45611-8\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Veyrat-CharvillonGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BalaschGGRS14,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Vincent Grosso and
                  Oscar Reparaz and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Marc Joye and
                  Amir Moradi},
  title        = {On the Cost of Lazy Engineering for Masked Software Implementations},
  booktitle    = {Smart Card Research and Advanced Applications - 13th International
                  Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8968},
  pages        = {64--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16763-3\_5},
  doi          = {10.1007/978-3-319-16763-3\_5},
  timestamp    = {Thu, 14 Oct 2021 10:29:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BalaschGGRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GrossoPSG14,
  author       = {Vincent Grosso and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lubos Gaspar},
  editor       = {Marc Joye and
                  Amir Moradi},
  title        = {Combining Leakage-Resilient PRFs and Shuffling - Towards Bounded Security
                  for Small Embedded Devices},
  booktitle    = {Smart Card Research and Advanced Applications - 13th International
                  Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8968},
  pages        = {122--136},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16763-3\_8},
  doi          = {10.1007/978-3-319-16763-3\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/GrossoPSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BrennerGLRS14,
  author       = {Hai Brenner and
                  Lubos Gaspar and
                  Ga{\"{e}}tan Leurent and
                  Alon Rosen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {{FPGA} Implementations of {SPRING} - And Their Countermeasures against
                  Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {414--432},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_23},
  doi          = {10.1007/978-3-662-44709-3\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BrennerGLRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/GustinDKSV14,
  author       = {Ludovic{-}Henri Gustin and
                  Fran{\c{c}}ois Durvaux and
                  St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Michel Verleysen},
  editor       = {Emmanuel Prouff},
  title        = {Support Vector Machines for Improved {IP} Detection with Soft Physical
                  Hash Functions},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {112--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_9},
  doi          = {10.1007/978-3-319-10175-0\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/GustinDKSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WhitnallOS14,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Josh Benaloh},
  title        = {The Myth of Generic DPA...and the Magic of Learning},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {183--205},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_10},
  doi          = {10.1007/978-3-319-04852-9\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WhitnallOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GasparLS14,
  author       = {Lubos Gaspar and
                  Ga{\"{e}}tan Leurent and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Josh Benaloh},
  title        = {Hardware Implementation and Side-Channel Analysis of Lapin},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {206--226},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_11},
  doi          = {10.1007/978-3-319-04852-9\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GasparLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DurvauxSV14,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {How to Certify the Leakage of a Chip?},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {459--476},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_26},
  doi          = {10.1007/978-3-642-55220-5\_26},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DurvauxSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GrossoLSV14,
  author       = {Vincent Grosso and
                  Ga{\"{e}}tan Leurent and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Kerem Varici},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {18--37},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_2},
  doi          = {10.1007/978-3-662-46706-0\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GrossoLSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/DurvauxKRS14,
  author       = {Fran{\c{c}}ois Durvaux and
                  St{\'{e}}phanie Kerckhof and
                  Francesco Regazzoni and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {A Survey of Recent Results in {FPGA} Security and Intellectual Property
                  Protection},
  booktitle    = {Secure Smart Embedded Devices, Platforms and Applications},
  pages        = {201--224},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7915-4\_9},
  doi          = {10.1007/978-1-4614-7915-4\_9},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/DurvauxKRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidGS14,
  author       = {Sonia Bela{\"{\i}}d and
                  Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiS14,
  author       = {Amir Moradi and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Moments-Correlating {DPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonGS14,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Soft Analytical Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossoPSG14,
  author       = {Vincent Grosso and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lubos Gaspar},
  title        = {Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security
                  for Small Embedded Devices)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossoPSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxSVMD14,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Jean{-}Baptiste Mairy and
                  Yves Deville},
  title        = {Efficient Selection of Time Samples for Higher-Order {DPA} with Projection
                  Pursuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxSVMD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschGGRS14,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Vincent Grosso and
                  Oscar Reparaz and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {On the Cost of Lazy Engineering for Masked Software Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschGGRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GlowaczGPSS14,
  author       = {Cezary Glowacz and
                  Vincent Grosso and
                  Romain Poussier and
                  Joachim Schueth and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Simpler and More Efficient Rank Estimation for Side-Channel Security
                  Assessment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {920},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/920},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GlowaczGPSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GerardS13,
  author       = {Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Unified and optimized linear collision attacks and their application
                  in a non-profiled setting: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {1},
  pages        = {45--58},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0051-9},
  doi          = {10.1007/S13389-013-0051-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GerardS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/KerckhofSP13,
  author       = {St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {From New Technologies to New Solutions - Exploiting {FRAM} Memories
                  to Enhance Physical Security},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_2},
  doi          = {10.1007/978-3-319-08302-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/KerckhofSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GrossoSP13,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Emmanuel Prouff},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Low Entropy Masking Schemes, Revisited},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {33--43},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_3},
  doi          = {10.1007/978-3-319-08302-5\_3},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/GrossoSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/ParusinskiSKS13,
  author       = {Michal Parusinski and
                  Saloomeh Shariati and
                  Dina Kamel and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Strong PUFs and their (physical) unpredictability: a case study with
                  power PUFs},
  booktitle    = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013,
                  Montreal, Quebec, Canada, September 29 - October 4, 2013},
  pages        = {5:1--5:10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2527317.2527322},
  doi          = {10.1145/2527317.2527322},
  timestamp    = {Tue, 06 Nov 2018 11:07:42 +0100},
  biburl       = {https://dblp.org/rec/conf/cases/ParusinskiSKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GerardGNS13,
  author       = {Beno{\^{\i}}t G{\'{e}}rard and
                  Vincent Grosso and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Block Ciphers That Are Easier to Mask: How Far Can We Go?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {383--399},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_22},
  doi          = {10.1007/978-3-642-40349-1\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GerardGNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossoSF13,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Sebastian Faust},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Masking vs. Multiparty Computation: How Large Is the Gap for AES?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {400--416},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_23},
  doi          = {10.1007/978-3-642-40349-1\_23},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GrossoSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StandaertPY13,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Leakage-Resilient Symmetric Cryptography under Empirically Verifiable
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {335--352},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_19},
  doi          = {10.1007/978-3-642-40041-4\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/StandaertPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/YuS13,
  author       = {Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Ed Dawson},
  title        = {Practical Leakage-Resilient Pseudorandom Objects with Minimum Public
                  Randomness},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_15},
  doi          = {10.1007/978-3-642-36095-4\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/YuS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Veyrat-CharvillonGS13,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Security Evaluations beyond Computing Power},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_8},
  doi          = {10.1007/978-3-642-38348-9\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Veyrat-CharvillonGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZhouYSQ13,
  author       = {Yuanyuan Zhou and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {On the Need of Physical Security for Small Embedded Devices: {A} Case
                  Study with {COMP128-1} Implementations in {SIM} Cards},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {230--238},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_20},
  doi          = {10.1007/978-3-642-39884-1\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ZhouYSQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KerckhofDSG13,
  author       = {St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Beno{\^{\i}}t G{\'{e}}rard},
  title        = {Intellectual property protection for {FPGA} designs with soft physical
                  hash functions: First experimental results},
  booktitle    = {2013 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2013, Austin, TX, USA, June 2-3, 2013},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HST.2013.6581557},
  doi          = {10.1109/HST.2013.6581557},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KerckhofDSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhaoZSZ13,
  author       = {Hui Zhao and
                  Yongbin Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Hailong Zhang},
  editor       = {Robert H. Deng and
                  Tao Feng},
  title        = {Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov
                  Test Based Side-Channel Distinguishers},
  booktitle    = {Information Security Practice and Experience - 9th International Conference,
                  {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7863},
  pages        = {336--352},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38033-4\_24},
  doi          = {10.1007/978-3-642-38033-4\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhaoZSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZSZ13,
  author       = {Hui Zhao and
                  Yongbin Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Hailong Zhang},
  title        = {Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov
                  Test based Side-Channel Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanZSF13,
  author       = {Guangjun Fan and
                  Yongbin Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dengguo Feng},
  title        = {On (Destructive) Impacts of Mathematical Realizations over the Security
                  of Leakage Resilient ElGamal Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanZSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouYSQ13,
  author       = {Yuanyuan Zhou and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {On the Need of Physical Security for Small Embedded Devices: a Case
                  Study with {COMP128-1} Implementations in {SIM} Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/224},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouYSQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidSHMMSST13,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrizio De Santis and
                  Johann Heyszl and
                  Stefan Mangard and
                  Marcel Medwed and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Stefan Tillich},
  title        = {Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design
                  Principles and Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidSHMMSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GerardGNS13,
  author       = {Beno{\^{\i}}t G{\'{e}}rard and
                  Vincent Grosso and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Block Ciphers that are Easier to Mask: How Far Can we Go?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GerardGNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertPY13,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu},
  title        = {Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxSV13,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {How to Certify the Leakage of a Chip?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/706},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ShariatiSJM12,
  author       = {Saloomeh Shariati and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Laurent Jacques and
                  Beno{\^{\i}}t Macq},
  title        = {Analysis and experimental evaluation of image-based PUFs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {189--206},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0041-3},
  doi          = {10.1007/S13389-012-0041-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ShariatiSJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/EisenbarthGGHIKKNPRSO12,
  author       = {Thomas Eisenbarth and
                  Zheng Gong and
                  Tim G{\"{u}}neysu and
                  Stefan Heyse and
                  Sebastiaan Indesteege and
                  St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Koeune and
                  Tomislav Nad and
                  Thomas Plos and
                  Francesco Regazzoni and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Compact Implementation and Performance Evaluation of Block Ciphers
                  in ATtiny Devices},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {172--187},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_11},
  doi          = {10.1007/978-3-642-31410-0\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/EisenbarthGGHIKKNPRSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Veyrat-CharvillonMKS12,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Marcel Medwed and
                  St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Shuffling against Side-Channel Attacks: {A} Comprehensive Study with
                  Cautionary Note},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {740--757},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_44},
  doi          = {10.1007/978-3-642-34961-4\_44},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Veyrat-CharvillonMKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/StandaertPV12,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Christophe Petit and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {David Naccache},
  title        = {Masking with Randomized Look Up Tables - Towards Preventing Side-Channel
                  Attacks of All Orders},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {283--299},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_19},
  doi          = {10.1007/978-3-642-28368-0\_19},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/StandaertPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DurvauxRSOV12,
  author       = {Fran{\c{c}}ois Durvaux and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {Stefan Mangard},
  title        = {Efficient Removal of Random Delays from Embedded Software Implementations
                  Using Hidden Markov Models},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {123--140},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_9},
  doi          = {10.1007/978-3-642-37288-9\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DurvauxRSOV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BalaschEEGGGHKKPPRSAKOM12,
  author       = {Josep Balasch and
                  Baris Ege and
                  Thomas Eisenbarth and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Zheng Gong and
                  Tim G{\"{u}}neysu and
                  Stefan Heyse and
                  St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Koeune and
                  Thomas Plos and
                  Thomas P{\"{o}}ppelmann and
                  Francesco Regazzoni and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Van Assche and
                  Ronny Van Keer and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  Ingo von Maurich},
  editor       = {Stefan Mangard},
  title        = {Compact Implementation and Performance Evaluation of Hash Functions
                  in ATtiny Devices},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_11},
  doi          = {10.1007/978-3-642-37288-9\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BalaschEEGGGHKKPPRSAKOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrenRSW12,
  author       = {Yossef Oren and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Avishai Wool},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {140--154},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_9},
  doi          = {10.1007/978-3-642-33027-8\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrenRSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GerardS12,
  author       = {Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Unified and Optimized Linear Collision Attacks and Their Application
                  in a Non-profiled Setting},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_11},
  doi          = {10.1007/978-3-642-33027-8\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GerardS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MedwedSJ12,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Antoine Joux},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient
                  PRFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {193--212},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_12},
  doi          = {10.1007/978-3-642-33027-8\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MedwedSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KerckhofDHBS12,
  author       = {St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Durvaux and
                  C{\'{e}}dric Hocquet and
                  David Bol and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Towards Green Cryptography: {A} Comparison of Lightweight Ciphers
                  from the Energy Viewpoint},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {390--407},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_23},
  doi          = {10.1007/978-3-642-33027-8\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KerckhofDHBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/ShariatiKS12,
  author       = {Saloomeh Shariati and
                  Fran{\c{c}}ois Koeune and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Bart De Decker and
                  David W. Chadwick},
  title        = {Security Analysis of Image-Based PUFs for Anti-counterfeiting},
  booktitle    = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2012, Canterbury, UK, September 3-5,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7394},
  pages        = {26--38},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32805-3\_3},
  doi          = {10.1007/978-3-642-32805-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/ShariatiKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BogdanovKLSST12,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  John P. Steinberger and
                  Elmar Tischhauser},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a
                  Small Number of Public Permutations - (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {45--62},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_5},
  doi          = {10.1007/978-3-642-29011-4\_5},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BogdanovKLSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Veyrat-CharvillonGRS12,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {An Optimal Key Enumeration Algorithm and Its Application to Side-Channel
                  Attacks},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {390--406},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_25},
  doi          = {10.1007/978-3-642-35999-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Veyrat-CharvillonGRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DurvauxGKKS12,
  author       = {Fran{\c{c}}ois Durvaux and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Koeune and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Intellectual Property Protection for Integrated Systems Using Soft
                  Physical Hash Functions},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {208--225},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_15},
  doi          = {10.1007/978-3-642-35416-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/DurvauxGKKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/OswaldS12,
  author       = {Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Side-Channel Analysis and Its Relevance to Fault Attacks},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_1},
  doi          = {10.1007/978-3-642-29656-7\_1},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/OswaldS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovKLSST12,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  John P. Steinberger and
                  Elmar Tischhauser},
  title        = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a
                  Small Number of Public Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovKLSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxRSOV12,
  author       = {Fran{\c{c}}ois Durvaux and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Cryptanalysis of the {CHES} 2009/2010 Random Delay Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxRSOV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallOS12,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {The myth of generic DPA...and the magic of learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschEEGGGHKKPPRSAKOM12,
  author       = {Josep Balasch and
                  Baris Ege and
                  Thomas Eisenbarth and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Zheng Gong and
                  Tim G{\"{u}}neysu and
                  Stefan Heyse and
                  St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Koeune and
                  Thomas Plos and
                  Thomas P{\"{o}}ppelmann and
                  Francesco Regazzoni and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Van Assche and
                  Ronny Van Keer and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  Ingo von Maurich},
  title        = {Compact Implementation and Performance Evaluation of Hash Functions
                  in ATtiny Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschEEGGGHKKPPRSAKOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonGS12,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Security Evaluations Beyond Computing Power: How to Analyze Side-Channel
                  Attacks you Cannot Mount?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MangardOS11,
  author       = {Stefan Mangard and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {One for all - all for one: unifying standard differential power analysis
                  attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {100--110},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0096},
  doi          = {10.1049/IET-IFS.2010.0096},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/MangardOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HocquetKRLFBS11,
  author       = {C{\'{e}}dric Hocquet and
                  Dina Kamel and
                  Francesco Regazzoni and
                  Jean{-}Didier Legat and
                  Denis Flandre and
                  David Bol and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Harvesting the potential of nano-CMOS for lightweight cryptography:
                  an ultra-low-voltage 65 nm {AES} coprocessor for passive {RFID} tags},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {79--86},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0005-z},
  doi          = {10.1007/S13389-011-0005-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HocquetKRLFBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DogetPRS11,
  author       = {Julien Doget and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Univariate side channel attacks and leakage modeling},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {123--144},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0010-2},
  doi          = {10.1007/S13389-011-0010-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DogetPRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MedwedS11,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Extractors against side-channel attacks: weak or strong?},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {231--241},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0014-y},
  doi          = {10.1007/S13389-011-0014-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MedwedS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BatinaGPRSV11,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Mutual Information Analysis: a Comprehensive Study},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {269--291},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9084-8},
  doi          = {10.1007/S00145-010-9084-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/KerckhofCS11,
  author       = {St{\'{e}}phanie Kerckhof and
                  Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {{FPGA} Implementation of a Statistical Saturation Attack against {PRESENT}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {100--116},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_7},
  doi          = {10.1007/978-3-642-21969-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/KerckhofCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/MedwedPRRS11,
  author       = {Marcel Medwed and
                  Christophe Petit and
                  Francesco Regazzoni and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Emmanuel Prouff},
  title        = {Fresh Re-keying {II:} Securing Multiple Parties against Side-Channel
                  and Fault Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2011, Leuven, Belgium, September
                  14-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7079},
  pages        = {115--132},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27257-8\_8},
  doi          = {10.1007/978-3-642-27257-8\_8},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/MedwedPRRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/KerckhofDVRDS11,
  author       = {St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Durvaux and
                  Nicolas Veyrat{-}Charvillon and
                  Francesco Regazzoni and
                  Guerric Meurice de Dormale and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Emmanuel Prouff},
  title        = {Compact {FPGA} Implementations of the Five {SHA-3} Finalists},
  booktitle    = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2011, Leuven, Belgium, September
                  14-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7079},
  pages        = {217--233},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27257-8\_14},
  doi          = {10.1007/978-3-642-27257-8\_14},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/KerckhofDVRDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RenauldKSF11,
  author       = {Mathieu Renauld and
                  Dina Kamel and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Information Theoretic and Security Analysis of a 65-Nanometer {DDSLL}
                  {AES} S-Box},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_15},
  doi          = {10.1007/978-3-642-23951-9\_15},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RenauldKSF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MedwedS11,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Extractors against Side-Channel Attacks: Weak or Strong?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {256--272},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_17},
  doi          = {10.1007/978-3-642-23951-9\_17},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MedwedS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakDKPPSY11,
  author       = {Boaz Barak and
                  Yevgeniy Dodis and
                  Hugo Krawczyk and
                  Olivier Pereira and
                  Krzysztof Pietrzak and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  editor       = {Phillip Rogaway},
  title        = {Leftover Hash Lemma, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_1},
  doi          = {10.1007/978-3-642-22792-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarakDKPPSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Veyrat-CharvillonS11,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Phillip Rogaway},
  title        = {Generic Side-Channel Distinguishers: Improvements and Limitations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {354--372},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_20},
  doi          = {10.1007/978-3-642-22792-9\_20},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Veyrat-CharvillonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/BayrakRBSI11,
  author       = {Ali Galip Bayrak and
                  Francesco Regazzoni and
                  Philip Brisk and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Paolo Ienne},
  editor       = {Leon Stok and
                  Nikil D. Dutt and
                  Soha Hassoun},
  title        = {A first step towards automatic application of power analysis countermeasures},
  booktitle    = {Proceedings of the 48th Design Automation Conference, {DAC} 2011,
                  San Diego, California, USA, June 5-10, 2011},
  pages        = {230--235},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2024724.2024778},
  doi          = {10.1145/2024724.2024778},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/BayrakRBSI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RenauldSVKF11,
  author       = {Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Dina Kamel and
                  Denis Flandre},
  editor       = {Kenneth G. Paterson},
  title        = {A Formal Study of Power Variability Issues and Side-Channel Attacks
                  for Nanoscale Devices},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_8},
  doi          = {10.1007/978-3-642-20465-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RenauldSVKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/BarenghiHBSRK11,
  author       = {Alessandro Barenghi and
                  C{\'{e}}dric Hocquet and
                  David Bol and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Francesco Regazzoni and
                  Israel Koren},
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold
                  Devices through an Example of a 65nm {AES} Implementation},
  booktitle    = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  pages        = {48--60},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25286-0\_4},
  doi          = {10.1007/978-3-642-25286-0\_4},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/BarenghiHBSRK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ArmknechtMSSW11,
  author       = {Frederik Armknecht and
                  Roel Maes and
                  Ahmad{-}Reza Sadeghi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Christian Wachsmann},
  title        = {A Formalization of the Security Features of Physical Functions},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {397--412},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.10},
  doi          = {10.1109/SP.2011.10},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ArmknechtMSSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/StandaertQ11,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Physical Security},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {928--929},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_130},
  doi          = {10.1007/978-1-4419-5906-5\_130},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/StandaertQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/StandaertQ11a,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Time-Memory Trade-offs},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1297--1299},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_137},
  doi          = {10.1007/978-1-4419-5906-5\_137},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/StandaertQ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehbaouiTMSV11,
  author       = {Amine Dehbaoui and
                  S{\'{e}}bastien Tiran and
                  Philippe Maurine and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Spectral Coherence Analysis - First Experimental Results -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehbaouiTMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakDKPPSY11,
  author       = {Boaz Barak and
                  Yevgeniy Dodis and
                  Hugo Krawczyk and
                  Olivier Pereira and
                  Krzysztof Pietrzak and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  title        = {Leftover Hash Lemma, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakDKPPSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonS11,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Generic Side-Channel Distinguishers: Improvements and Limitations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DogetPRS11,
  author       = {Julien Doget and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Univariate Side Channel Attacks and Leakage Modeling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DogetPRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MedwedS11,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Extractors Against Side-Channel Attacks: Weak or Strong?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MedwedS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonGRS11,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {An optimal Key Enumeration Algorithm and its Application to Side-Channel
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BulensSQ10,
  author       = {Philippe Bulens and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {How to strongly link data and its medium: the paper case},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {125--136},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0032},
  doi          = {10.1049/IET-IFS.2009.0032},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BulensSQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CollardS10,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Multi-trail Statistical Saturation Attacks},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {123--138},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_8},
  doi          = {10.1007/978-3-642-13708-2\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CollardS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Veyrat-CharvillonS10,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Adaptive Chosen-Message Side-Channel Attacks},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {186--199},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_12},
  doi          = {10.1007/978-3-642-13708-2\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Veyrat-CharvillonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MedwedSGR10,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Francesco Regazzoni},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Fresh Re-keying: Security against Side-Channel and Fault Attacks for
                  Low-Cost Devices},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {279--296},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_17},
  doi          = {10.1007/978-3-642-12678-9\_17},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/MedwedSGR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  editor       = {Masayuki Abe},
  title        = {The World Is Not Enough: Another Look on Second-Order {DPA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_7},
  doi          = {10.1007/978-3-642-17373-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuSPY10,
  author       = {Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Moti Yung},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Practical leakage-resilient pseudorandom generators},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {141--151},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866324},
  doi          = {10.1145/1866307.1866324},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuSPY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esscirc/KamelHSFB10,
  author       = {Dina Kamel and
                  C{\'{e}}dric Hocquet and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre and
                  David Bol},
  title        = {Glitch-induced within-die variations of dynamic energy in voltage-scaled
                  nano-CMOS circuits},
  booktitle    = {36th European Solid-State Circuits Conference, {ESSCIRC} 2010, Sevilla,
                  Spain, September 13-17, 2010},
  pages        = {518--521},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ESSCIRC.2010.5619757},
  doi          = {10.1109/ESSCIRC.2010.5619757},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esscirc/KamelHSFB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/ShariatiJSMSA10,
  author       = {Saloomeh Shariati and
                  Laurent Jacques and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Beno{\^{\i}}t Macq and
                  Mohamed Amin Salhi and
                  Philippe Antoine},
  title        = {Randomly driven fuzzy key extraction of unclonable images},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2010, September 26-29, Hong Kong, China},
  pages        = {4329--4332},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICIP.2010.5652420},
  doi          = {10.1109/ICIP.2010.5652420},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/ShariatiJSMSA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/Standaert10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {How Leaky Is an Extractor?},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {294--304},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_18},
  doi          = {10.1007/978-3-642-14712-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/Standaert10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobilight/MeulenaerS10,
  author       = {Giacomo de Meulenaer and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Periklis Chatzimisios and
                  Christos V. Verikoukis and
                  Ignacio Santamar{\'{\i}}a and
                  Massimiliano Laddomada and
                  Oliver Hoffmann},
  title        = {Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks},
  booktitle    = {Mobile Lightweight Wireless Systems - Second International {ICST}
                  Conference, {MOBILIGHT} 2010, Barcelona, Spain, May 10-12, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {45},
  pages        = {229--242},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16644-0\_21},
  doi          = {10.1007/978-3-642-16644-0\_21},
  timestamp    = {Sat, 24 Nov 2018 11:59:43 +0100},
  biburl       = {https://dblp.org/rec/conf/mobilight/MeulenaerS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/Standaert10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Ingrid M. R. Verbauwhede},
  title        = {Introduction to Side-Channel Attacks},
  booktitle    = {Secure Integrated Circuits and Systems},
  series       = {Integrated Circuits and Systems},
  pages        = {27--42},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-71829-3\_2},
  doi          = {10.1007/978-0-387-71829-3\_2},
  timestamp    = {Wed, 26 Jun 2019 18:00:01 +0200},
  biburl       = {https://dblp.org/rec/books/sp/10/Standaert10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/StandaertPYQYO10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu and
                  Jean{-}Jacques Quisquater and
                  Moti Yung and
                  Elisabeth Oswald},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Leakage Resilient Cryptography in Practice},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {99--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_5},
  doi          = {10.1007/978-3-642-14452-3\_5},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2010,
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9},
  doi          = {10.1007/978-3-642-15031-9},
  isbn         = {978-3-642-15030-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  title        = {The World is Not Enough: Another Look on Second-Order {DPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PiretS09,
  author       = {Gilles Piret and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Provable security of block ciphers against linear cryptanalysis: a
                  mission impossible?},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {325--338},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9234-2},
  doi          = {10.1007/S10623-008-9234-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PiretS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/StandaertKS09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Fran{\c{c}}ois Koeune and
                  Werner Schindler},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {How to Compare Profiled Side-Channel Attacks?},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {485--498},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_30},
  doi          = {10.1007/978-3-642-01957-9\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/StandaertKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RenauldSV09,
  author       = {Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Algebraic Side-Channel Attacks on the {AES:} Why Time also Matters
                  in {DPA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_8},
  doi          = {10.1007/978-3-642-04138-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RenauldSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RegazzoniCSBKBLI09,
  author       = {Francesco Regazzoni and
                  Alessandro Cevrero and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  St{\'{e}}phane Badel and
                  Theo Kluter and
                  Philip Brisk and
                  Yusuf Leblebici and
                  Paolo Ienne},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {A Design Flow and Evaluation Framework for DPA-Resistant Instruction
                  Set Extensions},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_15},
  doi          = {10.1007/978-3-642-04138-9\_15},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RegazzoniCSBKBLI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Veyrat-CharvillonS09,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Mutual Information Analysis: How, When and Why?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {429--443},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_30},
  doi          = {10.1007/978-3-642-04138-9\_30},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Veyrat-CharvillonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/RenauldS09,
  author       = {Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Algebraic Side-Channel Attacks},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_29},
  doi          = {10.1007/978-3-642-16342-5\_29},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/RenauldS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CollardS09,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Marc Fischlin},
  title        = {A Statistical Saturation Attack against the Block Cipher {PRESENT}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_13},
  doi          = {10.1007/978-3-642-00862-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CollardS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/StandaertMY09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {A Unified Framework for the Analysis of Side-Channel Key Recovery
                  Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {443--461},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_26},
  doi          = {10.1007/978-3-642-01001-9\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/StandaertMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KamelSF09,
  author       = {Dina Kamel and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre},
  title        = {Scaling Trends of the {AES} S-box Low Power Consumption in 130 and
                  65 nm {CMOS} Technology Nodes},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2009), 24-17
                  May 2009, Taipei, Taiwan},
  pages        = {1385--1388},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISCAS.2009.5118023},
  doi          = {10.1109/ISCAS.2009.5118023},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/KamelSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Standaert09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Secure and Efficient Implementation of Symmetric Encryption Schemes
                  using FPGAs},
  booktitle    = {Cryptographic Engineering},
  pages        = {295--320},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_11},
  doi          = {10.1007/978-0-387-71817-0\_11},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Standaert09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RenauldS09,
  author       = {Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Algebraic Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RenauldS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertPYQYO09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu and
                  Jean{-}Jacques Quisquater and
                  Moti Yung and
                  Elisabeth Oswald},
  title        = {Leakage Resilient Cryptography in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertPYQYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MangardOS09,
  author       = {Stefan Mangard and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {One for All - All for One: Unifying Standard {DPA} Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MangardOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/PiretS08,
  author       = {Gilles Piret and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Security analysis of higher-order Boolean masking schemes for block
                  ciphers (with conditions of perfect masking)},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {1--11},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070066},
  doi          = {10.1049/IET-IFS:20070066},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/PiretS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BulensSQPR08,
  author       = {Philippe Bulens and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Pascal Pellegrin and
                  Ga{\"{e}}l Rouvroy},
  editor       = {Serge Vaudenay},
  title        = {Implementation of the {AES-128} on Virtex-5 FPGAs},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {16--26},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_2},
  doi          = {10.1007/978-3-540-68164-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BulensSQPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PetitSPMY08,
  author       = {Christophe Petit and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {A block cipher based pseudo random number generator secure against
                  side-channel key recovery},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {56--65},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368322},
  doi          = {10.1145/1368310.1368322},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PetitSPMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertA08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  C{\'{e}}dric Archambeau},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Using Subspace-Based Template Attacks to Compare and Combine Power
                  and Electromagnetic Information Leakages},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {411--425},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_26},
  doi          = {10.1007/978-3-540-85053-3\_26},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CollardSQ08,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Kaisa Nyberg},
  title        = {Experiments on the Multiple Linear Cryptanalysis of Reduced Round
                  Serpent},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {382--397},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_24},
  doi          = {10.1007/978-3-540-71039-4\_24},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CollardSQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimAKSP08,
  author       = {Chong Hee Kim and
                  Gildas Avoine and
                  Fran{\c{c}}ois Koeune and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {The Swiss-Knife {RFID} Distance Bounding Protocol},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_7},
  doi          = {10.1007/978-3-642-00730-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimAKSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/StandaertGV08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {Partition vs. Comparison Side-Channel Distinguishers: An Empirical
                  Evaluation of Statistical Tests for Univariate Side-Channel Attacks
                  against Two Unprotected {CMOS} Devices},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {253--267},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_16},
  doi          = {10.1007/978-3-642-00730-9\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/StandaertGV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/StandaertMY08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Does Physical Security of Cryptographic Devices Need a Formal Study?
                  (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_7},
  doi          = {10.1007/978-3-540-85093-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/StandaertMY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/MeulenaerGSP08,
  author       = {Giacomo de Meulenaer and
                  Fran{\c{c}}ois Gosset and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira},
  title        = {On the Energy Cost of Communication and Cryptography in Wireless Sensor
                  Networks},
  booktitle    = {{IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2008, Avignon, France, 12-14
                  October 2008, Proceedings},
  pages        = {580--585},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WiMob.2008.16},
  doi          = {10.1109/WIMOB.2008.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/MeulenaerGSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/2008,
  editor       = {Gilles Grimaud and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2008, London, UK, September 8-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5189},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85893-5},
  doi          = {10.1007/978-3-540-85893-5},
  isbn         = {978-3-540-85892-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaceSQ08,
  author       = {Fran{\c{c}}ois Mac{\'{e}} and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaceSQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertBMV08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Philippe Bulens and
                  Giacomo de Meulenaer and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Improving the Rules of the {DPA} Contest},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertBMV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/StandaertPRQ07,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Piret and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  title        = {{FPGA} implementations of the {ICEBERG} block cipher},
  journal      = {Integr.},
  volume       = {40},
  number       = {1},
  pages        = {20--27},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.vlsi.2005.12.008},
  doi          = {10.1016/J.VLSI.2005.12.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/StandaertPRQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/PeetersSQ07,
  author       = {Eric Peeters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {Power and electromagnetic analysis: Improved model, consequences and
                  comparisons},
  journal      = {Integr.},
  volume       = {40},
  number       = {1},
  pages        = {52--60},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.vlsi.2005.12.013},
  doi          = {10.1016/J.VLSI.2005.12.013},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/PeetersSQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MaceSQ07,
  author       = {Fran{\c{c}}ois Mac{\'{e}} and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {427--442},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_29},
  doi          = {10.1007/978-3-540-74735-2\_29},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MaceSQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CollardSQ08,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {51--65},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_6},
  doi          = {10.1007/978-3-540-79499-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/CollardSQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CollardSQ07,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Improving the Time Complexity of Matsui's Linear Cryptanalysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {77--88},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_7},
  doi          = {10.1007/978-3-540-76788-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/CollardSQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertPAQ07,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  C{\'{e}}dric Archambeau and
                  Jean{-}Jacques Quisquater},
  title        = {Towards Security Limits in Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertPAQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitSPMY07,
  author       = {Christophe Petit and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Tal Malkin and
                  Moti Yung},
  title        = {A Block Cipher based {PRNG} Secure Against Side-Channel Key Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/356},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitSPMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/StandaertPRQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  title        = {An Overview of Power Analysis Attacks Against Field Programmable Gate
                  Arrays},
  journal      = {Proc. {IEEE}},
  volume       = {94},
  number       = {2},
  pages        = {383--394},
  year         = {2006},
  url          = {https://doi.org/10.1109/JPROC.2005.862437},
  doi          = {10.1109/JPROC.2005.862437},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/StandaertPRQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/StandaertMPQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Fran{\c{c}}ois Mac{\'{e}} and
                  Eric Peeters and
                  Jean{-}Jacques Quisquater},
  editor       = {Koen Bertels and
                  Jo{\~{a}}o M. P. Cardoso and
                  Stamatis Vassiliadis},
  title        = {Updates on the Security of FPGAs Against Power Analysis Attacks},
  booktitle    = {Reconfigurable Computing: Architectures and Applications, Second International
                  Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3985},
  pages        = {335--346},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11802839\_42},
  doi          = {10.1007/11802839\_42},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/StandaertMPQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/StandaertPGQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Piret and
                  Neil Gershenfeld and
                  Jean{-}Jacques Quisquater},
  editor       = {Josep Domingo{-}Ferrer and
                  Joachim Posegga and
                  Daniel Schreckling},
  title        = {{SEA:} {A} Scalable Encryption Algorithm for Small Embedded Applications},
  booktitle    = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3928},
  pages        = {222--236},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11733447\_16},
  doi          = {10.1007/11733447\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/StandaertPGQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ArchambeauPSQ06,
  author       = {C{\'{e}}dric Archambeau and
                  Eric Peeters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Template Attacks in Principal Subspaces},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_1},
  doi          = {10.1007/11894063\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ArchambeauPSQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertPAQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  C{\'{e}}dric Archambeau and
                  Jean{-}Jacques Quisquater},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Towards Security Limits in Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {30--45},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_3},
  doi          = {10.1007/11894063\_3},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertPAQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/MalkinSY06,
  author       = {Tal Malkin and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Moti Yung},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {A Comparative Cost/Security Analysis of Fault Attack Countermeasures},
  booktitle    = {Fault Diagnosis and Tolerance in Cryptography, Third International
                  Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4236},
  pages        = {159--172},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889700\_15},
  doi          = {10.1007/11889700\_15},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/MalkinSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/StandaertRQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  title        = {{FPGA} Implementations of the {DES} and Triple-DES Masked Against
                  Power Analysis Attacks},
  booktitle    = {Proceedings of the 2006 International Conference on Field Programmable
                  Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/FPL.2006.311315},
  doi          = {10.1109/FPL.2006.311315},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/StandaertRQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertMY06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  title        = {A Unified Framework for the Analysis of Side-Channel Key Recovery
                  Attacks (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertMY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PeetersSDQ05,
  author       = {Eric Peeters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Donckers and
                  Jean{-}Jacques Quisquater},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Improved Higher-Order Side-Channel Attacks with {FPGA} Experiments},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_23},
  doi          = {10.1007/11545262\_23},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PeetersSDQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/StandaertLRMQL05,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Ga{\"{e}}l Rouvroy and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Practical Evaluation of a Radial Soft Hash Algorithm},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {89--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.229},
  doi          = {10.1109/ITCC.2005.229},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/StandaertLRMQL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/StandaertPRQ05,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Piret and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  title        = {{FPGA} Implementations of the {ICEBERG} Block Cipher},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {556--561},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.155},
  doi          = {10.1109/ITCC.2005.155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/StandaertPRQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/StandaertPQ05,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  Jean{-}Jacques Quisquater},
  title        = {On the Masking Countermeasure and Higher-Order Power Analysis Attacks},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {562--567},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.213},
  doi          = {10.1109/ITCC.2005.213},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/StandaertPQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/patmos/MaceSQL05,
  author       = {Fran{\c{c}}ois Mac{\'{e}} and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Vassilis Paliouras and
                  Johan Vounckx and
                  Diederik Verkest},
  title        = {A Design Methodology for Secured ICs Using Dynamic Current Mode Logic},
  booktitle    = {Integrated Circuit and System Design, Power and Timing Modeling, Optimization
                  and Simulation, 15th International Workshop, {PATMOS} 2005, Leuven,
                  Belgium, September 21-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3728},
  pages        = {550--560},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556930\_56},
  doi          = {10.1007/11556930\_56},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/patmos/MaceSQL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/QuisquaterS05b,
  author       = {Jean{-}Jacques Quisquater and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Henk C. A. van Tilborg},
  title        = {Time-memory tradeoffs},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_430},
  doi          = {10.1007/0-387-23483-7\_430},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/QuisquaterS05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PiretSRQ04,
  author       = {Gilles Piret and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater},
  editor       = {Jean{-}Jacques Quisquater and
                  Pierre Paradinas and
                  Yves Deswarte and
                  Anas Abou El Kalam},
  title        = {On the Security of the DeKaRT Primitive},
  booktitle    = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World
                  Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International
                  Conference on Smart Card Research and Advanced Applications (CARDIS),
                  22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {153},
  pages        = {241--254},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8147-2\_16},
  doi          = {10.1007/1-4020-8147-2\_16},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/PiretSRQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertOP04,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Siddika Berna {\"{O}}rs and
                  Bart Preneel},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Power Analysis of an {FPGA:} Implementation of Rijndael: Is Pipelining
                  a {DPA} Countermeasure?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_3},
  doi          = {10.1007/978-3-540-28632-5\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertOP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/RouvroySLQML04,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Jean{-}Jacques Quisquater and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Didier Legat},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Reconfigurable hardware solutions for the digital rights management
                  of digital cinema},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {40--53},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029147},
  doi          = {10.1145/1029146.1029147},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/RouvroySLQML04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/RouvroyLSMQL04,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Hardware implementation of a fingerprinting algorithm suited for digital
                  cinema},
  booktitle    = {2004 12th European Signal Processing Conference, Vienna, Austria,
                  September 6-10, 2004},
  pages        = {1497--1500},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://ieeexplore.ieee.org/document/7080100/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/RouvroyLSMQL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/KoeuneS04,
  author       = {Fran{\c{c}}ois Koeune and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Alessandro Aldini and
                  Roberto Gorrieri and
                  Fabio Martinelli},
  title        = {A Tutorial on Physical Security and Side-Channel Attacks},
  booktitle    = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {3655},
  pages        = {78--108},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11554578\_3},
  doi          = {10.1007/11554578\_3},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/KoeuneS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/StandaertOQP04,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Siddika Berna {\"{O}}rs and
                  Jean{-}Jacques Quisquater and
                  Bart Preneel},
  editor       = {J{\"{u}}rgen Becker and
                  Marco Platzner and
                  Serge Vernalde},
  title        = {Power Analysis Attacks Against {FPGA} Implementations of the {DES}},
  booktitle    = {Field Programmable Logic and Application, 14th International Conference
                  , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3203},
  pages        = {84--94},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30117-2\_11},
  doi          = {10.1007/978-3-540-30117-2\_11},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/StandaertOQP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/StandaertPRQL04,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Piret and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {{ICEBERG} : An Involutional Cipher Efficient for Block Encryption
                  in Reconfigurable Hardware},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {279--299},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_18},
  doi          = {10.1007/978-3-540-25937-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/StandaertPRQL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/RouvroySQL04,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Compact and Efficient Encryption/Decryption Module for {FPGA} Implementation
                  of the {AES} Rijndael Very Well Suited for Small Embedded Applications},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {583--587},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286716},
  doi          = {10.1109/ITCC.2004.1286716},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/RouvroySQL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/RouvroySQL03,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Efficient Uses of FPGAs for Implementations of {DES} and Its Experimental
                  Linear Cryptanalysis},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {4},
  pages        = {473--482},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1190588},
  doi          = {10.1109/TC.2003.1190588},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/RouvroySQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertRQL03,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Implementation of Rijndael Encryption in Reconfigurable
                  Hardware: Improvements and Design Tradeoffs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {334--350},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_27},
  doi          = {10.1007/978-3-540-45238-6\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertRQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/StandaertRQL03,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Steve Trimberger and
                  Russell Tessier},
  title        = {A methodology to implement block ciphers in reconfigurable hardware
                  and its application to fast and compact {AES} {RIJNDAEL}},
  booktitle    = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable
                  Gate Arrays, {FPGA} 2003, Monterey, CA, USA, February 23-25, 2003},
  pages        = {216--224},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/611817.611849},
  doi          = {10.1145/611817.611849},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/StandaertRQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/RouvroySQL03,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Steve Trimberger and
                  Russell Tessier},
  title        = {Design strategies and modified descriptions to optimize cipher {FPGA}
                  implementations: fast and compact results for {DES} and triple-DES},
  booktitle    = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable
                  Gate Arrays, {FPGA} 2003, Monterey, CA, USA, February 23-25, 2003},
  pages        = {247},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/611817.611879},
  doi          = {10.1145/611817.611879},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/RouvroySQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/RouvroySQL03,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Peter Y. K. Cheung and
                  George A. Constantinides and
                  Jos{\'{e}} T. de Sousa},
  title        = {Design Strategies and Modified Descriptions to Optimize Cipher {FPGA}
                  Implementations: Fast and Compact Results for {DES} and Triple-DES},
  booktitle    = {Field Programmable Logic and Application, 13th International Conference,
                  {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2778},
  pages        = {181--193},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45234-8\_19},
  doi          = {10.1007/978-3-540-45234-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/RouvroySQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/StandaertOSQ03,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  David Samyde and
                  Jean{-}Jacques Quisquater},
  editor       = {Peter Y. K. Cheung and
                  George A. Constantinides and
                  Jos{\'{e}} T. de Sousa},
  title        = {Power Analysis of FPGAs: How Practical is the Attack?},
  booktitle    = {Field Programmable Logic and Application, 13th International Conference,
                  {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2778},
  pages        = {701--711},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45234-8\_68},
  doi          = {10.1007/978-3-540-45234-8\_68},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/StandaertOSQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/RouvroySQL03,
  author       = {Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  title        = {Efficient {FPGA} Implementation of Block Cipher {MISTY1}},
  booktitle    = {17th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings},
  pages        = {185},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IPDPS.2003.1213343},
  doi          = {10.1109/IPDPS.2003.1213343},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/RouvroySQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertRQL02,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Time-Memory Tradeoff Using Distinguished Points: New Analysis {\&}
                  {FPGA} Results},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {593--609},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_43},
  doi          = {10.1007/3-540-36400-5\_43},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertRQL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/QuisquaterSRDL02,
  author       = {Jean{-}Jacques Quisquater and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Pierre David and
                  Jean{-}Didier Legat},
  editor       = {Manfred Glesner and
                  Peter Zipf and
                  Michel Renovell},
  title        = {A Cryptanalytic Time-Memory Tradeoff: First {FPGA} Implementation},
  booktitle    = {Field-Programmable Logic and Applications, Reconfigurable Computing
                  Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier,
                  France, September 2-4, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2438},
  pages        = {780--789},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46117-5\_80},
  doi          = {10.1007/3-540-46117-5\_80},
  timestamp    = {Sat, 30 Sep 2023 09:41:27 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/QuisquaterSRDL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/KoeuneRSQDL02,
  author       = {Fran{\c{c}}ois Koeune and
                  Ga{\"{e}}l Rouvroy and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Pierre David and
                  Jean{-}Didier Legat},
  editor       = {Manfred Glesner and
                  Peter Zipf and
                  Michel Renovell},
  title        = {An {FPGA} Implementation of the Linear Cryptanalysis},
  booktitle    = {Field-Programmable Logic and Applications, Reconfigurable Computing
                  Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier,
                  France, September 2-4, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2438},
  pages        = {845--852},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46117-5\_87},
  doi          = {10.1007/3-540-46117-5\_87},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/KoeuneRSQDL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics