Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: François-Xavier Standaert
@article{DBLP:journals/corr/abs-2403-10275, author = {J{\'{e}}r{\'{e}}mie Bogaert and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A Question on the Explainability of Large Language Models and the Word-Level Univariate First-Order Plausibility Assumption}, journal = {CoRR}, volume = {abs/2403.10275}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.10275}, doi = {10.48550/ARXIV.2403.10275}, eprinttype = {arXiv}, eprint = {2403.10275}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-10275.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoosSS24, author = {Thorben Moos and Sayandeep Saha and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2024}, url = {https://eprint.iacr.org/2024/147}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MoosSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetersSS24, author = {Thomas Peters and Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2024}, url = {https://eprint.iacr.org/2024/294}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetersSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMMOS24, author = {Sebastian Faust and Lo{\"{\i}}c Masure and Elena Micheli and Maximilian Orlt and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2024}, url = {https://eprint.iacr.org/2024/377}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustMMOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrassiMMMS24, author = {Lorenzo Grassi and Lo{\"{\i}}c Masure and Pierrick M{\'{e}}aux and Thorben Moos and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2024}, url = {https://eprint.iacr.org/2024/431}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrassiMMMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/GaoZSCS23, author = {Pengfei Gao and Yedi Zhang and Fu Song and Taolue Chen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks}, journal = {Proc. {ACM} Program. Lang.}, volume = {7}, number = {{OOPSLA2}}, pages = {1817--1847}, year = {2023}, url = {https://doi.org/10.1145/3622862}, doi = {10.1145/3622862}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/GaoZSCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcasI/GurGBSL23, author = {Ofek Gur and Tomer Gross and Davide Bellizia and Fran{\c{c}}ois{-}Xavier Standaert and Itamar Levi}, title = {An In-Depth Evaluation of Externally Amplified Coupling {(EAC)} Attacks - {A} Concrete Threat for Masked Cryptographic Implementations}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {70}, number = {2}, pages = {783--796}, year = {2023}, url = {https://doi.org/10.1109/TCSI.2022.3222176}, doi = {10.1109/TCSI.2022.3222176}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcasI/GurGBSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MasureCLS23, author = {Lo{\"{\i}}c Masure and Valence Cristiani and Maxime Lecomte and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {32--59}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.32-59}, doi = {10.46586/TCHES.V2023.I1.32-59}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/MasureCLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CamuratiDS23, author = {Giovanni Camurati and Matteo Dell'Amico and Fran{\c{c}}ois{-}Xavier Standaert}, title = {MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {277--300}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.277-300}, doi = {10.46586/TCHES.V2023.I1.277-300}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CamuratiDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersMMMS23, author = {Ga{\"{e}}tan Cassiers and Lo{\"{\i}}c Masure and Charles Momin and Thorben Moos and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Prime-Field Masking in Hardware and its Soundness against Low-Noise {SCA} Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {482--518}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.482-518}, doi = {10.46586/TCHES.V2023.I2.482-518}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersMMMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersDSU23, author = {Ga{\"{e}}tan Cassiers and Henri Devillez and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi}, title = {Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {270--293}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.270-293}, doi = {10.46586/TCHES.V2023.I3.270-293}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersDSU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MasureCHS23, author = {Lo{\"{\i}}c Masure and Ga{\"{e}}tan Cassiers and Julien M. Hendrickx and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Information Bounds and Convergence Rates for Side-Channel Security Evaluators}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {522--569}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.522-569}, doi = {10.46586/TCHES.V2023.I3.522-569}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MasureCHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AzouaouiBCHKRSSSV23, author = {Melissa Azouaoui and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Cl{\'{e}}ment Hoffmann and Yulia Kuzovkova and Joost Renes and Tobias Schneider and Markus Sch{\"{o}}nauer and Fran{\c{c}}ois{-}Xavier Standaert and Christine van Vredendaal}, title = {Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {58--79}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.58-79}, doi = {10.46586/TCHES.V2023.I4.58-79}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AzouaouiBCHKRSSSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BertiGPSS23, author = {Francesco Berti and Chun Guo and Thomas Peters and Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Secure Message Authentication in the Presence of Leakage and Faults}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {288--315}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.288-315}, doi = {10.46586/TOSC.V2023.I1.288-315}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BertiGPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ShenS23, author = {Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {47--68}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.47-68}, doi = {10.46586/TOSC.V2023.I2.47-68}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ShenS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ShenSW23, author = {Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert and Lei Wang}, editor = {Jian Guo and Ron Steinfeld}, title = {Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14440}, pages = {169--189}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8727-6\_6}, doi = {10.1007/978-981-99-8727-6\_6}, timestamp = {Sun, 07 Jan 2024 14:24:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ShenSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/UdvarhelyiS23, author = {Balazs Udvarhelyi and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Shivam Bhasin and Thomas Roche}, title = {Leveraging Coprocessors as Noise Engines in Off-the-Shelf Microcontrollers}, booktitle = {Smart Card Research and Advanced Applications - 22nd International Conference, {CARDIS} 2023, Amsterdam, The Netherlands, November 14-16, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14530}, pages = {148--165}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54409-5\_8}, doi = {10.1007/978-3-031-54409-5\_8}, timestamp = {Tue, 05 Mar 2024 11:32:26 +0100}, biburl = {https://dblp.org/rec/conf/cardis/UdvarhelyiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeldtkellerGMRS23, author = {Jakob Feldtkeller and Tim G{\"{u}}neysu and Thorben Moos and Jan Richter{-}Brockmann and Sayandeep Saha and Pascal Sasdrich and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Combined Private Circuits - Combined Security Refurbished}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {990--1004}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623129}, doi = {10.1145/3576915.3623129}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FeldtkellerGMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BeguinotCGLMRS23, author = {Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Yi Liu and Lo{\"{\i}}c Masure and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Elif Bilge Kavun and Michael Pehl}, title = {Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 14th International Workshop, {COSADE} 2023, Munich, Germany, April 3-4, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13979}, pages = {86--104}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-29497-6\_5}, doi = {10.1007/978-3-031-29497-6\_5}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BeguinotCGLMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MasureS23, author = {Lo{\"{\i}}c Masure and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {343--376}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_12}, doi = {10.1007/978-3-031-38548-3\_12}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MasureS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoffmannMMRSU23, author = {Cl{\'{e}}ment Hoffmann and Pierrick M{\'{e}}aux and Charles Momin and Yann Rotella and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Learning with Physical Rounding for Linear and Quadratic Leakage Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {410--439}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_14}, doi = {10.1007/978-3-031-38548-3\_14}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoffmannMMRSU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MasureMMS23, author = {Lo{\"{\i}}c Masure and Pierrick M{\'{e}}aux and Thorben Moos and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Carmit Hazay and Martijn Stam}, title = {Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {596--627}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_20}, doi = {10.1007/978-3-031-30634-1\_20}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MasureMMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/HoffmannMS23, author = {Cl{\'{e}}ment Hoffmann and Pierrick M{\'{e}}aux and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Anupam Chattopadhyay and Shivam Bhasin and Stjepan Picek and Chester Rebeiro}, title = {The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14459}, pages = {134--156}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56232-7\_7}, doi = {10.1007/978-3-031-56232-7\_7}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/HoffmannMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/LiuBCGMRS23, author = {Yi Liu and Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Lo{\"{\i}}c Masure and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2023, Saint-Malo, France, April 23-28, 2023}, pages = {81--86}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ITW55543.2023.10161608}, doi = {10.1109/ITW55543.2023.10161608}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/LiuBCGMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HoffmannLMPS23, author = {Cl{\'{e}}ment Hoffmann and Beno{\^{\i}}t Libert and Charles Momin and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {{POLKA:} Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {114--144}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_5}, doi = {10.1007/978-3-031-31368-4\_5}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HoffmannLMPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShenS23, author = {Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {790}, year = {2023}, url = {https://eprint.iacr.org/2023/790}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShenS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureS23, author = {Lo{\"{\i}}c Masure and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Prou{\"{\i}}{\(\lnot\)}{\mbox{\texteuro}} {\&} Rivain's Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {883}, year = {2023}, url = {https://eprint.iacr.org/2023/883}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CassiersMMM0S23, author = {Ga{\"{e}}tan Cassiers and Lo{\"{\i}}c Masure and Charles Momin and Thorben Moos and Amir Moradi and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1134}, year = {2023}, url = {https://eprint.iacr.org/2023/1134}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CassiersMMM0S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidCMRRST23, author = {Sonia Bela{\"{\i}}d and Ga{\"{e}}tan Cassiers and Camille Mutschler and Matthieu Rivain and Thomas Roche and Fran{\c{c}}ois{-}Xavier Standaert and Abdul Rahman Taleb}, title = {Towards Achieving Provable Side-Channel Security in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1198}, year = {2023}, url = {https://eprint.iacr.org/2023/1198}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidCMRRST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeldtkellerGMRSSS23, author = {Jakob Feldtkeller and Tim G{\"{u}}neysu and Thorben Moos and Jan Richter{-}Brockmann and Sayandeep Saha and Pascal Sasdrich and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Combined Private Circuits - Combined Security Refurbished}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1341}, year = {2023}, url = {https://eprint.iacr.org/2023/1341}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeldtkellerGMRSSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShenSW23, author = {Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert and Lei Wang}, title = {Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1431}, year = {2023}, url = {https://eprint.iacr.org/2023/1431}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShenSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffmannMS23, author = {Cl{\'{e}}ment Hoffmann and Pierrick M{\'{e}}aux and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1895}, year = {2023}, url = {https://eprint.iacr.org/2023/1895}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HoffmannMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BreuerSL22, author = {Rinat Breuer and Fran{\c{c}}ois{-}Xavier Standaert and Itamar Levi}, title = {Fully-Digital Randomization Based Side-Channel Security - Toward Ultra-Low Cost-per-Security}, journal = {{IEEE} Access}, volume = {10}, pages = {68440--68449}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3185995}, doi = {10.1109/ACCESS.2022.3185995}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BreuerSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ais/DescampeMPSS22, author = {Antonin Descampe and Cl{\'{e}}ment Massart and Simon Poelman and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Standaert}, title = {Automated news recommendation in front of adversarial examples and the technical limits of transparency in algorithmic accountability}, journal = {{AI} Soc.}, volume = {37}, number = {1}, pages = {67--80}, year = {2022}, url = {https://doi.org/10.1007/s00146-021-01159-3}, doi = {10.1007/S00146-021-01159-3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ais/DescampeMPSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/LeviBS22, author = {Itamar Levi and Davide Bellizia and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Tight-ES-TRNG: Improved Construction and Robustness Analysis}, journal = {{SN} Comput. Sci.}, volume = {3}, number = {4}, pages = {321}, year = {2022}, url = {https://doi.org/10.1007/s42979-022-01219-5}, doi = {10.1007/S42979-022-01219-5}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/LeviBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BertiBBHPSU22, author = {Francesco Berti and Shivam Bhasin and Jakub Breier and Xiaolu Hou and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi}, title = {A Finer-Grain Analysis of the Leakage (Non) Resilience of {OCB}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {461--481}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.461-481}, doi = {10.46586/TCHES.V2022.I1.461-481}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BertiBBHPSU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AzouaouiBGP22, author = {Melissa Azouaoui and Olivier Bronchain and Vincent Grosso and Kostas Papagiannopoulos and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {140--165}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.140-165}, doi = {10.46586/TCHES.V2022.I2.140-165}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AzouaouiBGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BelliziaHKMS22, author = {Davide Bellizia and Cl{\'{e}}ment Hoffmann and Dina Kamel and Pierrick M{\'{e}}aux and Fran{\c{c}}ois{-}Xavier Standaert}, title = {When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {1--24}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.1-24}, doi = {10.46586/TCHES.V2022.I4.1-24}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BelliziaHKMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShenPSCV22, author = {Yaobin Shen and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}tan Cassiers and Corentin Verhamme}, title = {Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {135--162}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.135-162}, doi = {10.46586/TCHES.V2022.I4.135-162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShenPSCV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BronchainDMS22, author = {Olivier Bronchain and Fran{\c{c}}ois Durvaux and Lo{\"{\i}}c Masure and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {574--584}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3144871}, doi = {10.1109/TIFS.2022.3144871}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BronchainDMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhouS22, author = {Yuanyuan Zhou and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {S-box Pooling: Towards More Efficient Side-Channel Security Evaluations}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, pages = {146--164}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4\_9}, doi = {10.1007/978-3-031-16815-4\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ZhouS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CosseronHMS22, author = {Orel Cosseron and Cl{\'{e}}ment Hoffmann and Pierrick M{\'{e}}aux and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {32--67}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_2}, doi = {10.1007/978-3-031-22969-5\_2}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CosseronHMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZhouPYS22, author = {Yuanyuan Zhou and Joop van de Pol and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Shweta Agrawal and Dongdai Lin}, title = {A Third is All You Need: Extended Partial Key Exposure Attack on {CRT-RSA} with Additive Exponent Blinding}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, pages = {508--536}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5\_18}, doi = {10.1007/978-3-031-22972-5\_18}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZhouPYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/MasureRS22, author = {Lo{\"{\i}}c Masure and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Ileana Buhan and Tobias Schneider}, title = {A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations}, booktitle = {Smart Card Research and Advanced Applications - 21st International Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13820}, pages = {69--81}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25319-5\_4}, doi = {10.1007/978-3-031-25319-5\_4}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/MasureRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/VerhammeCS22, author = {Corentin Verhamme and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Ileana Buhan and Tobias Schneider}, title = {Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists}, booktitle = {Smart Card Research and Advanced Applications - 21st International Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13820}, pages = {290--308}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25319-5\_15}, doi = {10.1007/978-3-031-25319-5\_15}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/VerhammeCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/AzouaouiBHKSS22, author = {Melissa Azouaoui and Olivier Bronchain and Cl{\'{e}}ment Hoffmann and Yulia Kuzovkova and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Josep Balasch and Colin O'Flynn}, title = {Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13211}, pages = {236--256}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99766-3\_11}, doi = {10.1007/978-3-030-99766-3\_11}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/AzouaouiBHKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MominCS22, author = {Charles Momin and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Josep Balasch and Colin O'Flynn}, title = {Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13211}, pages = {257--275}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99766-3\_12}, doi = {10.1007/978-3-030-99766-3\_12}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MominCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mir/BogaertMDS22, author = {J{\'{e}}r{\'{e}}mie Bogaert and Marie{-}Catherine de Marneffe and Antonin Descampe and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Bogdan Ionescu and Giorgos Kordopatis{-}Zilos and Symeon Papadopoulos and Adrian Popescu and Luca Cuccovillo}, title = {Automatic and Manual Detection of Generated News: Case Study, Limitations and Challenges}, booktitle = {MAD@ICMR 2022: Proceedings of the 1st International Workshop on Multimedia {AI} against Disinformation, Newark, NJ, USA, June 27 - 30, 2022}, pages = {18--26}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3512732.3533589}, doi = {10.1145/3512732.3533589}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mir/BogaertMDS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzouaouiBHKSS22, author = {Melissa Azouaoui and Olivier Bronchain and Cl{\'{e}}ment Hoffmann and Yulia Kuzovkova and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2022}, url = {https://eprint.iacr.org/2022/036}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AzouaouiBHKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CosseronHMS22, author = {Orel Cosseron and Cl{\'{e}}ment Hoffmann and Pierrick M{\'{e}}aux and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2022}, url = {https://eprint.iacr.org/2022/180}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CosseronHMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MominCS22, author = {Charles Momin and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2022}, url = {https://eprint.iacr.org/2022/252}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MominCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MominCS22a, author = {Charles Momin and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Unprotected and Masked Hardware Implementations of Spook v2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2022}, url = {https://eprint.iacr.org/2022/254}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MominCS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureCHS22, author = {Lo{\"{\i}}c Masure and Ga{\"{e}}tan Cassiers and Julien M. Hendrickx and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Information Bounds and Convergence Rates for Side-Channel Security Evaluators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2022}, url = {https://eprint.iacr.org/2022/490}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureCHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureCLS22, author = {Lo{\"{\i}}c Masure and Valence Cristiani and Maxime Lecomte and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Don{\^{a}}{\mbox{\texteuro}}{\texttrademark}t Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {493}, year = {2022}, url = {https://eprint.iacr.org/2022/493}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureCLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureRS22, author = {Lo{\"{\i}}c Masure and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2022}, url = {https://eprint.iacr.org/2022/600}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureMMS22, author = {Lo{\"{\i}}c Masure and Pierrick M{\'{e}}aux and Thorben Moos and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2022}, url = {https://eprint.iacr.org/2022/863}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffmannLMPS22, author = {Cl{\'{e}}ment Hoffmann and Beno{\^{\i}}t Libert and Charles Momin and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {873}, year = {2022}, url = {https://eprint.iacr.org/2022/873}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffmannLMPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Berti0PSS22, author = {Francesco Berti and Chun Guo and Thomas Peters and Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Secure Message Authentication in the Presence of Leakage and Faults}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1142}, year = {2022}, url = {https://eprint.iacr.org/2022/1142}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Berti0PSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0006P0S22, author = {Yuanyuan Zhou and Joop van de Pol and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A Third is All You Need: Extended Partial Key Exposure Attack on {CRT-RSA} with Additive Exponent Blinding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1163}, year = {2022}, url = {https://eprint.iacr.org/2022/1163}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0006P0S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzouaouiBCHKRSS22, author = {Melissa Azouaoui and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Cl{\'{e}}ment Hoffmann and Yulia Kuzovkova and Joost Renes and Markus Sch{\"{o}}nauer and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert and Christine van Vredendaal}, title = {Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1406}, year = {2022}, url = {https://eprint.iacr.org/2022/1406}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AzouaouiBCHKRSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VerhammeCS22, author = {Corentin Verhamme and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1628}, year = {2022}, url = {https://eprint.iacr.org/2022/1628}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VerhammeCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeguinotCGLMRS22, author = {Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Yi Liu and Lo{\"{\i}}c Masure and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1738}, year = {2022}, url = {https://eprint.iacr.org/2022/1738}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeguinotCGLMRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OuytselBCS21, author = {Charles{-}Henry Bertrand Van Ouytsel and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {How to fool a black box machine learning based side-channel security evaluation}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {573--585}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00479-x}, doi = {10.1007/S12095-021-00479-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/OuytselBCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MominBS21, author = {Charles Momin and Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A stealthy Hardware Trojan based on a Statistical Fault Attack}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {587--600}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00480-4}, doi = {10.1007/S12095-021-00480-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MominBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BronchainSS21, author = {Olivier Bronchain and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Reducing risks through simplicity: high side-channel security for lazy engineers}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {1}, pages = {39--55}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00241-8}, doi = {10.1007/S13389-020-00241-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BronchainSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KamelBBS21, author = {Dina Kamel and Davide Bellizia and Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Side-channel analysis of a learning parity with physical noise processor}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {171--179}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00238-3}, doi = {10.1007/S13389-020-00238-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KamelBBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/CassiersGLS21, author = {Ga{\"{e}}tan Cassiers and Benjamin Gr{\'{e}}goire and Itamar Levi and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Hardware Private Circuits: From Trivial Composition to Full Verification}, journal = {{IEEE} Trans. Computers}, volume = {70}, number = {10}, pages = {1677--1690}, year = {2021}, url = {https://doi.org/10.1109/TC.2020.3022979}, doi = {10.1109/TC.2020.3022979}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/CassiersGLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DuvalMMS21, author = {S{\'{e}}bastien Duval and Pierrick M{\'{e}}aux and Charles Momin and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {373--401}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.373-401}, doi = {10.46586/TCHES.V2021.I1.373-401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/DuvalMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersS21, author = {Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {136--158}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.136-158}, doi = {10.46586/TCHES.V2021.I2.136-158}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainS21, author = {Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {202--234}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.202-234}, doi = {10.46586/TCHES.V2021.I3.202-234}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BronchainS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BelliziaHKLMSY21, author = {Davide Bellizia and Cl{\'{e}}ment Hoffmann and Dina Kamel and Hanlin Liu and Pierrick M{\'{e}}aux and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, title = {Learning Parity with Physical Noise: Imperfections, Reductions and {FPGA} Prototype}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {390--417}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.390-417}, doi = {10.46586/TCHES.V2021.I3.390-417}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BelliziaHKLMSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainMPS21, author = {Olivier Bronchain and Charles Momin and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Leakage-Resistant Authenticated Encryption based on Hardware {AES} Coprocessors}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {641--676}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.641-676}, doi = {10.46586/TCHES.V2021.I3.641-676}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BronchainMPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BronchainFLLPS21, author = {Olivier Bronchain and Sebastian Faust and Virginie Lallemand and Gregor Leander and L{\'{e}}o Perrin and Fran{\c{c}}ois{-}Xavier Standaert}, title = {{MOE:} Multiplication Operated Encryption with Trojan Resilience}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {78--129}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.78-129}, doi = {10.46586/TOSC.V2021.I1.78-129}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BronchainFLLPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoSWWY21, author = {Chun Guo and Fran{\c{c}}ois{-}Xavier Standaert and Weijia Wang and Xiao Wang and Yu Yu}, title = {Provable Security of {SP} Networks with Partial Non-Linear Layers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {353--388}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.353-388}, doi = {10.46586/TOSC.V2021.I2.353-388}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoSWWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BertiGPS21, author = {Francesco Berti and Chun Guo and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Efficient Leakage-Resilient MACs Without Idealized Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {95--123}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_4}, doi = {10.1007/978-3-030-92075-3\_4}, timestamp = {Fri, 03 Dec 2021 17:36:49 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BertiGPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BelliziaUS21, author = {Davide Bellizia and Balazs Udvarhelyi and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Vincent Grosso and Thomas P{\"{o}}ppelmann}, title = {Towards a Better Understanding of Side-Channel Analysis Measurements Setups}, booktitle = {Smart Card Research and Advanced Applications - 20th International Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13173}, pages = {64--79}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97348-3\_4}, doi = {10.1007/978-3-030-97348-3\_4}, timestamp = {Thu, 10 Mar 2022 15:30:57 +0100}, biburl = {https://dblp.org/rec/conf/cardis/BelliziaUS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/UdvarhelyiBS21, author = {Balazs Udvarhelyi and Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Shivam Bhasin and Fabrizio De Santis}, title = {Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to {ISAP}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12910}, pages = {168--183}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89915-8\_8}, doi = {10.1007/978-3-030-89915-8\_8}, timestamp = {Fri, 29 Oct 2021 16:42:34 +0200}, biburl = {https://dblp.org/rec/conf/cosade/UdvarhelyiBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CassiersFOS21, author = {Ga{\"{e}}tan Cassiers and Sebastian Faust and Maximilian Orlt and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Tal Malkin and Chris Peikert}, title = {Towards Tight Random Probing Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {185--214}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_7}, doi = {10.1007/978-3-030-84252-9\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CassiersFOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/BelliziaMFPRSTV21, author = {Davide Bellizia and Nadia El Mrabet and Apostolos P. Fournaris and Simon Ponti{\'{e}} and Francesco Regazzoni and Fran{\c{c}}ois{-}Xavier Standaert and {\'{E}}lise Tasso and Emanuele Valea}, editor = {Luigi Dilillo and Luca Cassano and Athanasios Papadimitriou}, title = {Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure {HW} Design}, booktitle = {36th {IEEE} International Symposium on Defect and Fault Tolerance in {VLSI} and Nanotechnology Systems, {DFT} 2021, Athens, Greece, October 6-8, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DFT52944.2021.9568301}, doi = {10.1109/DFT52944.2021.9568301}, timestamp = {Fri, 22 Oct 2021 15:23:35 +0200}, biburl = {https://dblp.org/rec/conf/dft/BelliziaMFPRSTV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Standaert21, author = {Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Evaluating and Designing against Side-Channel Leakage: White Box or Black Box?}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {1}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3458441}, doi = {10.1145/3437880.3458441}, timestamp = {Wed, 07 Jul 2021 17:13:20 +0200}, biburl = {https://dblp.org/rec/conf/ih/Standaert21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2021-1, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5}, doi = {10.1007/978-3-030-77870-5}, isbn = {978-3-030-77869-9}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2021-2, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6}, doi = {10.1007/978-3-030-77886-6}, isbn = {978-3-030-77885-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2021-3, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5}, doi = {10.1007/978-3-030-77883-5}, isbn = {978-3-030-77882-8}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2021-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BronchainCS21, author = {Olivier Bronchain and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Give Me 5 Minutes: Attacking {ASCAD} with a Single Side-Channel Trace}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2021}, url = {https://eprint.iacr.org/2021/817}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BronchainCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CassiersFOS21, author = {Ga{\"{e}}tan Cassiers and Sebastian Faust and Maximilian Orlt and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Tight Random Probing Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {880}, year = {2021}, url = {https://eprint.iacr.org/2021/880}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CassiersFOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuvalMMS21, author = {S{\'{e}}bastien Duval and Pierrick M{\'{e}}aux and Charles Momin and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {950}, year = {2021}, url = {https://eprint.iacr.org/2021/950}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuvalMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzouaouiBGPS21, author = {Melissa Azouaoui and Olivier Bronchain and Vincent Grosso and Kostas Papagiannopoulos and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {951}, year = {2021}, url = {https://eprint.iacr.org/2021/951}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AzouaouiBGPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiGPS21, author = {Francesco Berti and Chun Guo and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Efficient Leakage-Resilient MACs without Idealized Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2021}, url = {https://eprint.iacr.org/2021/1250}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertiGPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcta/LeviBS20, author = {Itamar Levi and Davide Bellizia and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Beyond algorithmic noise or how to shuffle parallel implementations?}, journal = {Int. J. Circuit Theory Appl.}, volume = {48}, number = {5}, pages = {674--695}, year = {2020}, url = {https://doi.org/10.1002/cta.2756}, doi = {10.1002/CTA.2756}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcta/LeviBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BartheBDFGSS20, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, title = {Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {17--26}, year = {2020}, url = {https://doi.org/10.1007/s13389-018-00202-2}, doi = {10.1007/S13389-018-00202-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BartheBDFGSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ZhouS20, author = {Yuanyuan Zhou and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {85--95}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00209-3}, doi = {10.1007/S13389-019-00209-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ZhouS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/LeviBBS20, author = {Itamar Levi and Davide Bellizia and David Bol and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Ask Less, Get More: Side-Channel Signal Hiding, Revisited}, journal = {{IEEE} Trans. Circuits Syst.}, volume = {67-I}, number = {12}, pages = {4904--4917}, year = {2020}, url = {https://doi.org/10.1109/TCSI.2020.3005338}, doi = {10.1109/TCSI.2020.3005338}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcas/LeviBBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BertiGPPS20, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {TEDT, a Leakage-Resist {AEAD} Mode for High Physical Security Applications}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {256--320}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.256-320}, doi = {10.13154/TCHES.V2020.I1.256-320}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BertiGPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainS20, author = {Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {1--25}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.1-25}, doi = {10.13154/TCHES.V2020.I2.1-25}, timestamp = {Mon, 30 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BronchainS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WangMCS20, author = {Weijia Wang and Pierrick M{\'{e}}aux and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Efficient and Private Computations with Code-Based Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {128--171}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.128-171}, doi = {10.13154/TCHES.V2020.I2.128-171}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WangMCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CamuratiFS20, author = {Giovanni Camurati and Aur{\'{e}}lien Francillon and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {358--401}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.358-401}, doi = {10.13154/TCHES.V2020.I3.358-401}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CamuratiFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuoGSB20, author = {Qian Guo and Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Bronchain}, title = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {209--238}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.209-238}, doi = {10.13154/TCHES.V2020.I4.209-238}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GuoGSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KamelSDFB20, author = {Dina Kamel and Fran{\c{c}}ois{-}Xavier Standaert and Alexandre Duc and Denis Flandre and Francesco Berti}, title = {Learning with Physical Noise or Errors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {957--971}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2830763}, doi = {10.1109/TDSC.2018.2830763}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KamelSDFB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CassiersS20, author = {Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2542--2555}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2971153}, doi = {10.1109/TIFS.2020.2971153}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CassiersS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoPPS20, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {6--42}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.6-42}, doi = {10.13154/TOSC.V2020.I1.6-42}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BilginMDLS20, author = {Beg{\"{u}}l Bilgin and Lauren De Meyer and S{\'{e}}bastien Duval and Itamar Levi and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Low {AND} Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {144--184}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.144-184}, doi = {10.13154/TOSC.V2020.I1.144-184}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BilginMDLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BelliziaBBCDGLL20, author = {Davide Bellizia and Francesco Berti and Olivier Bronchain and Ga{\"{e}}tan Cassiers and S{\'{e}}bastien Duval and Chun Guo and Gregor Leander and Ga{\"{e}}tan Leurent and Itamar Levi and Charles Momin and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi and Friedrich Wiemer}, title = {Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {295--349}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.295-349}, doi = {10.13154/TOSC.V2020.IS1.295-349}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BelliziaBBCDGLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Wang0S0C20, author = {Weijia Wang and Chun Guo and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu and Ga{\"{e}}tan Cassiers}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {851--880}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_28}, doi = {10.1007/978-3-030-64837-4\_28}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Wang0S0C20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/UdvarhelyiWBS20, author = {Balazs Udvarhelyi and Antoine van Wassenhove and Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Pierre{-}Yvan Liardet and Nele Mentens}, title = {On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough}, booktitle = {Smart Card Research and Advanced Applications - 19th International Conference, {CARDIS} 2020, Virtual Event, November 18-19, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12609}, pages = {103--118}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68487-7\_7}, doi = {10.1007/978-3-030-68487-7\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/UdvarhelyiWBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/0006DS20, author = {Yuanyuan Zhou and S{\'{e}}bastien Duval and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Scatter: a Missing Case?}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {90--103}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_5}, doi = {10.1007/978-3-030-68773-1\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/0006DS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BelliziaBCGGMPP20, author = {Davide Bellizia and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - {A} Practical Guide Through the Leakage-Resistance Jungle}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {369--400}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_13}, doi = {10.1007/978-3-030-56784-2\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BelliziaBCGGMPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AzouaouiDPSPV20, author = {Melissa Azouaoui and Fran{\c{c}}ois Durvaux and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Kostas Papagiannopoulos and Vincent Verneuil}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {On the Worst-Case Side-Channel Security of {ECC} Point Randomization in Embedded Devices}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {205--227}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_9}, doi = {10.1007/978-3-030-65277-7\_9}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AzouaouiDPSPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/DanhierMS20, author = {Pierre Danhier and Cl{\'{e}}ment Massart and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Fidelity Leakages: Applying Membership Inference Attacks to Preference Data}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {728--733}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9163032}, doi = {10.1109/INFOCOMWKSHPS50562.2020.9163032}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/DanhierMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/AzouaouiBBDD0JK20, author = {Melissa Azouaoui and Davide Bellizia and Ileana Buhan and Nicolas Debande and S{\'{e}}bastien Duval and Christophe Giraud and {\'{E}}liane Jaulmes and Fran{\c{c}}ois Koeune and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert and Carolyn Whitnall}, editor = {Thyla van der Merwe and Chris J. Mitchell and Maryam Mehrnezhad}, title = {A Systematic Appraisal of Side Channel Evaluation Strategies}, booktitle = {Security Standardisation Research - 6th International Conference, {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12529}, pages = {46--66}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64357-7\_3}, doi = {10.1007/978-3-030-64357-7\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/AzouaouiBBDD0JK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CassiersGLS20, author = {Ga{\"{e}}tan Cassiers and Benjamin Gr{\'{e}}goire and Itamar Levi and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Hardware Private Circuits: From Trivial Composition to Full Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2020}, url = {https://eprint.iacr.org/2020/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CassiersGLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelliziaBCGGMPP20, author = {Davide Bellizia and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: {A} Practical Guide Through the Leakage-Resistance Jungle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2020}, url = {https://eprint.iacr.org/2020/211}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BelliziaBCGGMPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangGSYC20, author = {Weijia Wang and Chun Guo and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu and Ga{\"{e}}tan Cassiers}, title = {Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1103}, year = {2020}, url = {https://eprint.iacr.org/2020/1103}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangGSYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzouaouiBBDDGJK20, author = {Melissa Azouaoui and Davide Bellizia and Ileana Buhan and Nicolas Debande and S{\'{e}}bastien Duval and Christophe Giraud and {\'{E}}liane Jaulmes and Fran{\c{c}}ois Koeune and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert and Carolyn Whitnall}, title = {A Systematic Appraisal of Side Channel Evaluation Strategies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1347}, year = {2020}, url = {https://eprint.iacr.org/2020/1347}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AzouaouiBBDDGJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzouaouiDPSPV20, author = {Melissa Azouaoui and Fran{\c{c}}ois Durvaux and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Kostas Papagiannopoulos and Vincent Verneuil}, title = {On the Worst-Case Side-Channel Security of {ECC} Point Randomization in Embedded Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1368}, year = {2020}, url = {https://eprint.iacr.org/2020/1368}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AzouaouiDPSPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/NawazBLSF19, author = {Kashif Nawaz and L{\'{e}}opold Van Brandt and Itamar Levi and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre}, title = {A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs}, journal = {Integr.}, volume = {68}, pages = {71--79}, year = {2019}, url = {https://doi.org/10.1016/j.vlsi.2019.06.006}, doi = {10.1016/J.VLSI.2019.06.006}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/NawazBLSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DucFS19, author = {Alexandre Duc and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1263--1297}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9277-0}, doi = {10.1007/S00145-018-9277-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DucFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersS19, author = {Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {162--198}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.162-198}, doi = {10.13154/TCHES.V2019.I2.162-198}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MoosMSS19, author = {Thorben Moos and Amir Moradi and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {256--292}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.256-292}, doi = {10.13154/TCHES.V2019.I2.256-292}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MoosMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LeviBS19, author = {Itamar Levi and Davide Bellizia and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Reducing a Masked Implementation's Effective Security Order with Setup Manipulations And an Explanation Based on Externally-Amplified Couplings}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {293--317}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.293-317}, doi = {10.13154/TCHES.V2019.I2.293-317}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/LeviBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainSS19, author = {Olivier Bronchain and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Multi-Tuple Leakage Detection and the Dependent Signal Issue}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {318--345}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.318-345}, doi = {10.13154/TCHES.V2019.I2.318-345}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BronchainSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYS19, author = {Weijia Wang and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {11}, pages = {3069--3082}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2912549}, doi = {10.1109/TIFS.2019.2912549}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoSWY19, author = {Chun Guo and Fran{\c{c}}ois{-}Xavier Standaert and Weijia Wang and Yu Yu}, title = {Efficient Side-Channel Secure Message Authentication with Better Bounds}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {23--53}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.23-53}, doi = {10.13154/TOSC.V2019.I4.23-53}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoSWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BertiPS19, author = {Francesco Berti and Olivier Pereira and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Johannes Buchmann and Abderrahmane Nitaj and Tajje{-}eddine Rachidi}, title = {Reducing the Cost of Authenticity with Leakages: a {\textbackslash}mathsf {CIML2} -Secure {\textbackslash}mathsf {AE} Scheme with One Call to a Strongly Protected Tweakable Block Cipher}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11627}, pages = {229--249}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23696-0\_12}, doi = {10.1007/978-3-030-23696-0\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BertiPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/MassartS19, author = {Cl{\'{e}}ment Massart and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Johannes Buchmann and Abderrahmane Nitaj and Tajje{-}eddine Rachidi}, title = {Revisiting Location Privacy from a Side-Channel Analysis Viewpoint}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11627}, pages = {333--351}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23696-0\_17}, doi = {10.1007/978-3-030-23696-0\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/MassartS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AzouaouiPSV19, author = {Melissa Azouaoui and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Vincent Verneuil}, editor = {Sonia Bela{\"{\i}}d and Tim G{\"{u}}neysu}, title = {Key Enumeration from the Adversarial Viewpoint}, booktitle = {Smart Card Research and Advanced Applications - 18th International Conference, {CARDIS} 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11833}, pages = {252--267}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42068-0\_15}, doi = {10.1007/978-3-030-42068-0\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AzouaouiPSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Standaert19, author = {Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Daniel E. Holcomb and Patrick Schaumont}, title = {Towards an Open Approach to Side-Channel Resistant Authenticated Encryption}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2019, London, UK, November 15, 2019}, pages = {1}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338508.3359579}, doi = {10.1145/3338508.3359579}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Standaert19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/BertiGPPS19, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Zhe Liu and Moti Yung}, title = {Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {517--532}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_31}, doi = {10.1007/978-3-030-42921-8\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/BertiGPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/AzouaouiPS19, author = {Melissa Azouaoui and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Ilia Polian and Marc St{\"{o}}ttinger}, title = {Fast Side-Channel Security Evaluation of {ECC} Implementations - Shortcut Formulas for Horizontal Side-Channel Attacks Against {ECSM} with the Montgomery Ladder}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, {COSADE} 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11421}, pages = {25--42}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16350-1\_3}, doi = {10.1007/978-3-030-16350-1\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/AzouaouiPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BronchainHMOS19, author = {Olivier Bronchain and Julien M. Hendrickx and Cl{\'{e}}ment Massart and Alex Olshevsky and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {713--737}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_25}, doi = {10.1007/978-3-030-26948-7\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BronchainHMOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BartheBCFGS19, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Ga{\"{e}}tan Cassiers and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {300--318}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_15}, doi = {10.1007/978-3-030-29959-0\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BartheBCFGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MeauxCJS19, author = {Pierrick M{\'{e}}aux and Claude Carlet and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Feng Hao and Sushmita Ruj and Sourav Sen Gupta}, title = {Improved Filter Permutators for Efficient {FHE:} Better Instances and Implementations}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11898}, pages = {68--91}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35423-7\_4}, doi = {10.1007/978-3-030-35423-7\_4}, timestamp = {Wed, 20 Mar 2024 15:23:22 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MeauxCJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/GuoPPS19, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Peter Schwabe and Nicolas Th{\'{e}}riault}, title = {Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11774}, pages = {150--172}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30530-7\_8}, doi = {10.1007/978-3-030-30530-7\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/GuoPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/CassiersGPPS19, author = {Ga{\"{e}}tan Cassiers and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Shivam Bhasin and Avi Mendelson and Mridul Nandi}, title = {SpookChain: Chaining a Sponge-Based {AEAD} with Beyond-Birthday Security}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11947}, pages = {67--85}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35869-3\_7}, doi = {10.1007/978-3-030-35869-3\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/CassiersGPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BronchainHMOS19, author = {Olivier Bronchain and Julien M. Hendrickx and Cl{\'{e}}ment Massart and Alex Olshevsky and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2019}, url = {https://eprint.iacr.org/2019/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BronchainHMOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiGPPS19, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {TEDT, a Leakage-Resilient {AEAD} mode for High (Physical) Security Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2019}, url = {https://eprint.iacr.org/2019/137}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BertiGPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzouaouiPS19, author = {Melissa Azouaoui and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Fast Side-Channel Security Evaluation of {ECC} Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against {ECSM} with the Montgomery ladder}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2019}, url = {https://eprint.iacr.org/2019/163}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AzouaouiPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoPPS19, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2019}, url = {https://eprint.iacr.org/2019/193}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoPPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiPS19, author = {Francesco Berti and Olivier Pereira and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Reducing the Cost of Authenticity with Leakages: a CIML2-Secure {AE} Scheme with One Call to a Strongly Protected Tweakable Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2019}, url = {https://eprint.iacr.org/2019/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertiPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MassartS19, author = {Cl{\'{e}}ment Massart and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2019}, url = {https://eprint.iacr.org/2019/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MassartS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeauxCJS19, author = {Pierrick M{\'{e}}aux and Claude Carlet and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2019}, url = {https://eprint.iacr.org/2019/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeauxCJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BronchainS19, author = {Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1008}, year = {2019}, url = {https://eprint.iacr.org/2019/1008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BronchainS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzouaouiPSV19, author = {Melissa Azouaoui and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Vincent Verneuil}, title = {Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1331}, year = {2019}, url = {https://eprint.iacr.org/2019/1331}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AzouaouiPSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiGPPS19a, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1413}, year = {2019}, url = {https://eprint.iacr.org/2019/1413}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BertiGPPS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoSW019, author = {Chun Guo and Fran{\c{c}}ois{-}Xavier Standaert and Weijia Wang and Yu Yu}, title = {Efficient Side-Channel Secure Message Authentication with Better Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1424}, year = {2019}, url = {https://eprint.iacr.org/2019/1424}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoSW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/braininf/LangeMMS18, author = {Joseph Lange and Cl{\'{e}}ment Massart and Andr{\'{e}} Mouraux and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Side-channel attacks against the human brain: the {PIN} code case study (extended version)}, journal = {Brain Informatics}, volume = {5}, number = {2}, year = {2018}, url = {https://doi.org/10.1186/s40708-018-0090-1}, doi = {10.1186/S40708-018-0090-1}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/braininf/LangeMMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LermanPMS18, author = {Liran Lerman and Romain Poussier and Olivier Markowitch and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {4}, pages = {301--313}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0162-9}, doi = {10.1007/S13389-017-0162-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LermanPMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LermanVMS18, author = {Liran Lerman and Nikita Veshchikov and Olivier Markowitch and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {2}, pages = {268--283}, year = {2018}, url = {https://doi.org/10.1109/TC.2017.2731342}, doi = {10.1109/TC.2017.2731342}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/LermanVMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MoradiRSS18, author = {Amir Moradi and Bastian Richter and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage Detection with the x2-Test}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {209--237}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.209-237}, doi = {10.13154/TCHES.V2018.I1.209-237}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/MoradiRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FaustGPPS18, author = {Sebastian Faust and Vincent Grosso and Santos Merino Del Pozo and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Composable Masking Schemes in the Presence of Physical Defaults {\&} the Robust Probing Model}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {89--120}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.89-120}, doi = {10.13154/TCHES.V2018.I3.89-120}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/FaustGPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYSLGG18, author = {Weijia Wang and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Junrong Liu and Zheng Guo and Dawu Gu}, title = {Ridge-Based {DPA:} Improvement of Differential Power Analysis For Nanoscale Chips}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1301--1316}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2787985}, doi = {10.1109/TIFS.2017.2787985}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYSLGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Standaert18, author = {Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Beg{\"{u}}l Bilgin and Jean{-}Bernard Fischer}, title = {How (Not) to Use Welch's T-Test in Side-Channel Security Evaluations}, booktitle = {Smart Card Research and Advanced Applications, 17th International Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11389}, pages = {65--79}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15462-2\_5}, doi = {10.1007/978-3-030-15462-2\_5}, timestamp = {Sat, 30 Sep 2023 09:35:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Standaert18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BronchainDFS18, author = {Olivier Bronchain and Louis Dassy and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Daniel E. Holcomb and Jorge Guajardo}, title = {Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers}, booktitle = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {1--10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3266444.3266447}, doi = {10.1145/3266444.3266447}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BronchainDFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KamelBSFB18, author = {Dina Kamel and Davide Bellizia and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre and David Bol}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Daniel E. Holcomb and Jorge Guajardo}, title = {Demonstrating an {LPPN} Processor}, booktitle = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {18--23}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3266444.3266445}, doi = {10.1145/3266444.3266445}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KamelBSFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BertiKPPS18, author = {Francesco Berti and Fran{\c{c}}ois Koeune and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {37--50}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196525}, doi = {10.1145/3196494.3196525}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BertiKPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/GoudarziJRS18, author = {Dahmun Goudarzi and Anthony Journault and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Junfeng Fan and Benedikt Gierlichs}, title = {Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10815}, pages = {3--22}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89641-0\_1}, doi = {10.1007/978-3-319-89641-0\_1}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/GoudarziJRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrossoS18, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Masking Proofs Are Tight and How to Exploit it in Security Evaluations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {385--412}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_13}, doi = {10.1007/978-3-319-78375-8\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrossoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ngcas/NawazLSF18, author = {Kashif Nawaz and Itamar Levi and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre}, title = {A Transient Noise Analysis of Secured Dual-Rail Based Logic Style}, booktitle = {2018 New Generation of CAS, {NGCAS} 2018, Valletta, Malta, November 20-23, 2018}, pages = {146--149}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NGCAS.2018.8572199}, doi = {10.1109/NGCAS.2018.8572199}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ngcas/NawazLSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prime/NawazBSF18, author = {Kashif Nawaz and L{\'{e}}opold Van Brandt and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre}, title = {Let's make it Noisy: {A} Simulation Methodology for adding Intrinsic Physical Noise to Cryptographic Designs}, booktitle = {14th Conference on Ph.D. Research in Microelectronics and Electronics, {PRIME} 2018, Prague, Czech Republic, July 2-5, 2018}, pages = {61--64}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/PRIME.2018.8430315}, doi = {10.1109/PRIME.2018.8430315}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prime/NawazBSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoudarziJRS18, author = {Dahmun Goudarzi and Anthony Journault and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2018}, url = {https://eprint.iacr.org/2018/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoudarziJRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CassiersS18, author = {Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Bitslice Masking: from Optimized Non-Interference to Probe Isolation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2018}, url = {https://eprint.iacr.org/2018/438}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CassiersS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoPPS18, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2018}, url = {https://eprint.iacr.org/2018/484}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoosMSS18, author = {Thorben Moos and Amir Moradi and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2018}, url = {https://eprint.iacr.org/2018/490}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoosMSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoGS18, author = {Qian Guo and Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2018}, url = {https://eprint.iacr.org/2018/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheBDFGSS18, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, title = {Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference {\&} Automated Optimizations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2018}, url = {https://eprint.iacr.org/2018/505}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BartheBDFGSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JournaultSV17, author = {Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert and Kerem Varici}, title = {Improving the security and efficiency of block ciphers based on LS-designs}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {495--509}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0193-8}, doi = {10.1007/S10623-016-0193-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JournaultSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DurvauxSP17, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Santos Merino Del Pozo}, title = {Towards easy leakage certification: extended version}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {129--147}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0150-0}, doi = {10.1007/S13389-017-0150-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/DurvauxSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BertiPPS17, author = {Francesco Berti and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On Leakage-Resilient Authenticated Encryption with Decryption Leakages}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {271--293}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.271-293}, doi = {10.13154/TOSC.V2017.I3.271-293}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BertiPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BalaschFGPS17, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Consolidating Inner Product Masking}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {724--754}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_25}, doi = {10.1007/978-3-319-70694-8\_25}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BalaschFGPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DingZDSF17, author = {A. Adam Ding and Liwei Zhang and Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Yunsi Fei}, editor = {Thomas Eisenbarth and Yannick Teglia}, title = {Towards Sound and Optimal Leakage Detection Procedure}, booktitle = {Smart Card Research and Advanced Applications - 16th International Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10728}, pages = {105--122}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75208-2\_7}, doi = {10.1007/978-3-319-75208-2\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DingZDSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PoussierGSCG17, author = {Romain Poussier and Qian Guo and Fran{\c{c}}ois{-}Xavier Standaert and Claude Carlet and Sylvain Guilley}, editor = {Thomas Eisenbarth and Yannick Teglia}, title = {Connecting and Improving Direct Sum Masking and Inner Product Masking}, booktitle = {Smart Card Research and Advanced Applications - 16th International Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10728}, pages = {123--141}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75208-2\_8}, doi = {10.1007/978-3-319-75208-2\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/PoussierGSCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinKLMMN017, author = {Daniel J. Bernstein and Stefan K{\"{o}}lbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and Fran{\c{c}}ois{-}Xavier Standaert and Yosuke Todo and Beno{\^{\i}}t Viguier}, editor = {Wieland Fischer and Naofumi Homma}, title = {Gimli : {A} Cross-Platform Permutation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {299--320}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_15}, doi = {10.1007/978-3-319-66787-4\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BernsteinKLMMN017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoussierZS17, author = {Romain Poussier and Yuanyuan Zhou and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Wieland Fischer and Naofumi Homma}, title = {A Systematic Approach to the Side-Channel Analysis of {ECC} Implementations with Worst-Case Horizontal Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {534--554}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_26}, doi = {10.1007/978-3-319-66787-4\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoussierZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JournaultS17, author = {Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Wieland Fischer and Naofumi Homma}, title = {Very High Order Masking: Efficient Implementation and Security Evaluation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {623--643}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_30}, doi = {10.1007/978-3-319-66787-4\_30}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/JournaultS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/NawazKSF17, author = {Kashif Nawaz and Dina Kamel and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre}, editor = {Sylvain Guilley}, title = {Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: {A} Case-Study}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {19--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_2}, doi = {10.1007/978-3-319-64647-3\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/NawazKSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/LangeMMS17, author = {Joseph Lange and Cl{\'{e}}ment Massart and Andr{\'{e}} Mouraux and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Sylvain Guilley}, title = {Side-Channel Attacks Against the Human Brain: The {PIN} Code Case Study}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {171--189}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_11}, doi = {10.1007/978-3-319-64647-3\_11}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/LangeMMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/PozoS17, author = {Santos Merino Del Pozo and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Sylvain Guilley}, title = {Getting the Most Out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {264--281}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_16}, doi = {10.1007/978-3-319-64647-3\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/PozoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WangYSGSZ17, author = {Weijia Wang and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Dawu Gu and Sen Xu and Chi Zhang}, editor = {Helena Handschuh}, title = {Ridge-Based Profiled Differential Power Analysis}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {347--362}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_20}, doi = {10.1007/978-3-319-52153-4\_20}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/WangYSGSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartheDFGSS17, author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and Sebastian Faust and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {535--566}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_19}, doi = {10.1007/978-3-319-56620-7\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartheDFGSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossoS17, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Masking Proofs are Tight (and How to Exploit it in Security Evaluations)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2017}, url = {http://eprint.iacr.org/2017/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Standaert17, author = {Fran{\c{c}}ois{-}Xavier Standaert}, title = {How (not) to Use Welch's T-test in Side-Channel Security Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2017}, url = {http://eprint.iacr.org/2017/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Standaert17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangDDSF17, author = {Liwei Zhang and A. Adam Ding and Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Yunsi Fei}, title = {Towards Sound and Optimal Leakage Detection Procedure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2017}, url = {http://eprint.iacr.org/2017/287}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangDDSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoussierZS17, author = {Romain Poussier and Yuanyuan Zhou and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A Systematic Approach to the Side-Channel Analysis of {ECC} Implementations with Worst-Case Horizontal Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2017}, url = {http://eprint.iacr.org/2017/629}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoussierZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinKLMMNS17, author = {Daniel J. Bernstein and Stefan K{\"{o}}lbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and Fran{\c{c}}ois{-}Xavier Standaert and Yosuke Todo and Beno{\^{\i}}t Viguier}, title = {Gimli: a cross-platform permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2017}, url = {http://eprint.iacr.org/2017/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinKLMMNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JournaultS17, author = {Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Very High Order Masking: Efficient Implementation and Security Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2017}, url = {http://eprint.iacr.org/2017/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JournaultS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustGPPS17, author = {Sebastian Faust and Vincent Grosso and Santos Merino Del Pozo and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2017}, url = {http://eprint.iacr.org/2017/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustGPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschFGPS17, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Consolidating Inner Product Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1047}, year = {2017}, url = {http://eprint.iacr.org/2017/1047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschFGPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangGZWYSG16, author = {Fan Zhang and Shize Guo and Xinjie Zhao and Tao Wang and Jian Yang and Fran{\c{c}}ois{-}Xavier Standaert and Dawu Gu}, title = {A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1039--1054}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516905}, doi = {10.1109/TIFS.2016.2516905}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangGZWYSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BruneauGHRST16, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul and Fran{\c{c}}ois{-}Xavier Standaert and Yannick Teglia}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {573--601}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_21}, doi = {10.1007/978-3-662-53887-6\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BruneauGHRST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MedwedSNF16, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert and Ventzislav Nikov and Martin Feldhofer}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Unknown-Input Attacks in the Parallel Setting: Improving the Security of the {CHES} 2012 Leakage-Resilient {PRF}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {602--623}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_22}, doi = {10.1007/978-3-662-53887-6\_22}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/MedwedSNF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/WangSYPLGG16, author = {Weijia Wang and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu and Sihang Pu and Junrong Liu and Zheng Guo and Dawu Gu}, editor = {Kerstin Lemke{-}Rust and Michael Tunstall}, title = {Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages}, booktitle = {Smart Card Research and Advanced Applications - 15th International Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10146}, pages = {174--191}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54669-8\_11}, doi = {10.1007/978-3-319-54669-8\_11}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/WangSYPLGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BertiS16, author = {Francesco Berti and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Kerstin Lemke{-}Rust and Michael Tunstall}, title = {An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks}, booktitle = {Smart Card Research and Advanced Applications - 15th International Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10146}, pages = {245--264}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54669-8\_15}, doi = {10.1007/978-3-319-54669-8\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BertiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoradiS16, author = {Amir Moradi and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, title = {Moments-Correlating {DPA}}, booktitle = {Proceedings of the {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016}, pages = {5--15}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996366.2996369}, doi = {10.1145/2996366.2996369}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MoradiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DziembowskiFS16, author = {Stefan Dziembowski and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {142--153}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978419}, doi = {10.1145/2976749.2978419}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DziembowskiFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DurvauxSP16, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Santos Merino Del Pozo}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Towards Easy Leakage Certification}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {40--60}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_3}, doi = {10.1007/978-3-662-53140-2\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DurvauxSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoussierSG16, author = {Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Vincent Grosso}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {61--81}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_4}, doi = {10.1007/978-3-662-53140-2\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoussierSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DziembowskiFHJM16, author = {Stefan Dziembowski and Sebastian Faust and Gottfried Herold and Anthony Journault and Daniel Masny and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {272--301}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_10}, doi = {10.1007/978-3-662-53008-5\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DziembowskiFHJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BiSYSJ16, author = {Yu Bi and Kaveh Shamsi and Jiann{-}Shiun Yuan and Fran{\c{c}}ois{-}Xavier Standaert and Yier Jin}, editor = {Luca Fanucci and J{\"{u}}rgen Teich}, title = {Leverage Emerging Technologies For DPA-Resilient Block Cipher Design}, booktitle = {2016 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016}, pages = {1538--1543}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7459558/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/BiSYSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DurvauxS16, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {240--262}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_10}, doi = {10.1007/978-3-662-49890-3\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DurvauxS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MeauxJSC16, author = {Pierrick M{\'{e}}aux and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert and Claude Carlet}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {311--343}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_13}, doi = {10.1007/978-3-662-49890-3\_13}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MeauxJSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChoudaryPS16, author = {Marios O. Choudary and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Orr Dunkelman and Somitra Kumar Sanadhya}, title = {Score-Based vs. Probability-Based Enumeration - {A} Cautionary Note}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10095}, pages = {137--152}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49890-4\_8}, doi = {10.1007/978-3-319-49890-4\_8}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ChoudaryPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/00020SG16, author = {Tobias Schneider and Amir Moradi and Fran{\c{c}}ois{-}Xavier Standaert and Tim G{\"{u}}neysu}, editor = {Roberto Avanzi and Howard M. Heys}, title = {Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms}, booktitle = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10532}, pages = {58--78}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69453-5\_4}, doi = {10.1007/978-3-319-69453-5\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/00020SG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/KamelSPNSFB16, author = {Dina Kamel and Guerric de Streel and Santos Merino Del Pozo and Kashif Nawaz and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre and David Bol}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {233--248}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_13}, doi = {10.1007/978-3-319-49445-6\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/space/KamelSPNSFB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/Standaert16, author = {Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the {ERC} Project CRASH, Part {I} (Invited Talk)}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {353--362}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_20}, doi = {10.1007/978-3-319-49445-6\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/Standaert16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2016, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0}, doi = {10.1007/978-3-319-43283-0}, isbn = {978-3-319-43282-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeauxJSC16, author = {Pierrick M{\'{e}}aux and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert and Claude Carlet}, title = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2016}, url = {http://eprint.iacr.org/2016/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeauxJSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangYLGSGXF16, author = {Weijia Wang and Yu Yu and Junrong Liu and Zheng Guo and Fran{\c{c}}ois{-}Xavier Standaert and Dawu Gu and Sen Xu and Rong Fu}, title = {Evaluation and Improvement of Generic-Emulating {DPA} Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2016}, url = {http://eprint.iacr.org/2016/294}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangYLGSGXF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PozoS16, author = {Santos Merino Del Pozo and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Blind Source Separation from Single Measurements using Singular Spectrum Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2016}, url = {http://eprint.iacr.org/2016/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PozoS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PozoS16a, author = {Santos Merino Del Pozo and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A note on the security of threshold implementations with d+1 input shares}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2016}, url = {http://eprint.iacr.org/2016/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PozoS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoussierSG16, author = {Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Vincent Grosso}, title = {Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2016}, url = {http://eprint.iacr.org/2016/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoussierSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFHJM16, author = {Stefan Dziembowski and Sebastian Faust and Gottfried Herold and Anthony Journault and Daniel Masny and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2016}, url = {http://eprint.iacr.org/2016/573}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFHJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchneiderMSG16, author = {Tobias Schneider and Amir Moradi and Fran{\c{c}}ois{-}Xavier Standaert and Tim G{\"{u}}neysu}, title = {Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2016}, url = {http://eprint.iacr.org/2016/719}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchneiderMSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheDFGSS16, author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and Sebastian Faust and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, title = {Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {912}, year = {2016}, url = {http://eprint.iacr.org/2016/912}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheDFGSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiKPPS16, author = {Francesco Berti and Fran{\c{c}}ois Koeune and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage-Resilient and Misuse-Resistant Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2016}, url = {http://eprint.iacr.org/2016/996}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertiKPPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFS16, author = {Stefan Dziembowski and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1004}, year = {2016}, url = {http://eprint.iacr.org/2016/1004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BelaidGS15, author = {Sonia Bela{\"{\i}}d and Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Masking and leakage-resilient primitives: One, the other(s) or both?}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {163--184}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0113-6}, doi = {10.1007/S12095-014-0113-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BelaidGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BayrakRNBSI15, author = {Ali Galip Bayrak and Francesco Regazzoni and David Novo and Philip Brisk and Fran{\c{c}}ois{-}Xavier Standaert and Paolo Ienne}, title = {Automatic Application of Power Analysis Countermeasures}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {2}, pages = {329--341}, year = {2015}, url = {https://doi.org/10.1109/TC.2013.219}, doi = {10.1109/TC.2013.219}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/BayrakRNBSI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GrossoS15, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {ASCA, {SASCA} and {DPA} with Enumeration: Which One Beats the Other and When?}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {291--312}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_12}, doi = {10.1007/978-3-662-48800-3\_12}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GrossoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PoussierGS15, author = {Romain Poussier and Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Naofumi Homma and Marcel Medwed}, title = {Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {125--142}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_8}, doi = {10.1007/978-3-319-31271-2\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/PoussierGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DobraunigKMMS15, author = {Christoph Dobraunig and Fran{\c{c}}ois Koeune and Stefan Mangard and Florian Mendel and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Naofumi Homma and Marcel Medwed}, title = {Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {225--241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_14}, doi = {10.1007/978-3-319-31271-2\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/DobraunigKMMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PereiraSV15, author = {Olivier Pereira and Fran{\c{c}}ois{-}Xavier Standaert and Srinivas Vivek}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {96--108}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813626}, doi = {10.1145/2810103.2813626}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PereiraSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PozoS15, author = {Santos Merino Del Pozo and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Blind Source Separation from Single Measurements Using Singular Spectrum Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {42--59}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_3}, doi = {10.1007/978-3-662-48324-4\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PozoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WangYLGSGXF15, author = {Weijia Wang and Yu Yu and Junrong Liu and Zheng Guo and Fran{\c{c}}ois{-}Xavier Standaert and Dawu Gu and Sen Xu and Rong Fu}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Evaluation and Improvement of Generic-Emulating {DPA} Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {416--432}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_21}, doi = {10.1007/978-3-662-48324-4\_21}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/WangYLGSGXF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/LermanPBMS15, author = {Liran Lerman and Romain Poussier and Gianluca Bontempi and Olivier Markowitch and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Stefan Mangard and Axel Y. Poschmann}, title = {Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9064}, pages = {20--33}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21476-4\_2}, doi = {10.1007/978-3-319-21476-4\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/LermanPBMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DurvauxSVMD15, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Jean{-}Baptiste Mairy and Yves Deville}, editor = {Stefan Mangard and Axel Y. Poschmann}, title = {Efficient Selection of Time Samples for Higher-Order {DPA} with Projection Pursuits}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9064}, pages = {34--50}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21476-4\_3}, doi = {10.1007/978-3-319-21476-4\_3}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/DurvauxSVMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/PozoSKM15, author = {Santos Merino Del Pozo and Fran{\c{c}}ois{-}Xavier Standaert and Dina Kamel and Amir Moradi}, editor = {Wolfgang Nebel and David Atienza}, title = {Side-channel attacks from static power: when should we care?}, booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March 9-13, 2015}, pages = {145--150}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2755785}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/PozoSKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuYSGGSGX15, author = {Junrong Liu and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Zheng Guo and Dawu Gu and Wei Sun and Yijie Ge and Xinjun Xie}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Small Tweaks Do Not Help: Differential Power Analysis of {MILENAGE} Implementations in 3G/4G {USIM} Cards}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {468--480}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_24}, doi = {10.1007/978-3-319-24174-6\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuYSGGSGX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucFS15, author = {Alexandre Duc and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {401--429}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_16}, doi = {10.1007/978-3-662-46800-5\_16}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GlowaczGPSS15, author = {Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Sch{\"{u}}th and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Gregor Leander}, title = {Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {117--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_6}, doi = {10.1007/978-3-662-48116-5\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GlowaczGPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FanZSF15, author = {Guangjun Fan and Yongbin Zhou and Fran{\c{c}}ois{-}Xavier Standaert and Dengguo Feng}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {469--484}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_32}, doi = {10.1007/978-3-319-17533-1\_32}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FanZSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucFS15, author = {Alexandre Duc and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2015}, url = {http://eprint.iacr.org/2015/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossoSF15, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Sebastian Faust}, title = {Masking vs. Multiparty Computation: How Large is the Gap for AES?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2015}, url = {http://eprint.iacr.org/2015/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossoSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossoS15, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {ASCA, {SASCA} and {DPA} with Enumeration: Which One Beats the Other and When?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2015}, url = {http://eprint.iacr.org/2015/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurvauxS15, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert}, title = {From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2015}, url = {http://eprint.iacr.org/2015/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurvauxS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurvauxS15a, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Easy Leakage Certification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2015}, url = {http://eprint.iacr.org/2015/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurvauxS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GrossoSF14, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Sebastian Faust}, title = {Masking vs. multiparty computation: how large is the gap for AES?}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {47--57}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0073-y}, doi = {10.1007/S13389-014-0073-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GrossoSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BelaidSHMMSST14, author = {Sonia Bela{\"{\i}}d and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and J{\"{o}}rn{-}Marc Schmidt and Fran{\c{c}}ois{-}Xavier Standaert and Stefan Tillich}, title = {Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {3}, pages = {157--171}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0079-5}, doi = {10.1007/S13389-014-0079-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BelaidSHMMSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KamelRFS14, author = {Dina Kamel and Mathieu Renauld and Denis Flandre and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Understanding the limitations and improving the relevance of {SPICE} simulations in side-channel security evaluations}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {3}, pages = {187--195}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0080-z}, doi = {10.1007/S13389-014-0080-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KamelRFS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/BarenghiHBSRK14, author = {Alessandro Barenghi and C{\'{e}}dric Hocquet and David Bol and Fran{\c{c}}ois{-}Xavier Standaert and Francesco Regazzoni and Israel Koren}, title = {A Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to Low Voltage Fault Attacks}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {2}, number = {2}, pages = {107--118}, year = {2014}, url = {https://doi.org/10.1109/TETC.2014.2316509}, doi = {10.1109/TETC.2014.2316509}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/BarenghiHBSRK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GuoZZWSSM14, author = {Shize Guo and Xinjie Zhao and Fan Zhang and Tao Wang and Zhijie Jerry Shi and Fran{\c{c}}ois{-}Xavier Standaert and Chujiao Ma}, title = {Exploiting the Incomplete Diffusion Feature: {A} Specialized Analytical Side-Channel Attack Against the {AES} and Its Application to Microcontroller Implementations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {6}, pages = {999--1014}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2315534}, doi = {10.1109/TIFS.2014.2315534}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GuoZZWSSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GrossoPS14, author = {Vincent Grosso and Emmanuel Prouff and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {David Pointcheval and Damien Vergnaud}, title = {Efficient Masked S-Boxes Processing - {A} Step Forward -}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {251--266}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_16}, doi = {10.1007/978-3-319-06734-6\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GrossoPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Veyrat-CharvillonGS14, author = {Nicolas Veyrat{-}Charvillon and Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Soft Analytical Side-Channel Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {282--296}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_15}, doi = {10.1007/978-3-662-45611-8\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Veyrat-CharvillonGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BalaschGGRS14, author = {Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Joye and Amir Moradi}, title = {On the Cost of Lazy Engineering for Masked Software Implementations}, booktitle = {Smart Card Research and Advanced Applications - 13th International Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8968}, pages = {64--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16763-3\_5}, doi = {10.1007/978-3-319-16763-3\_5}, timestamp = {Thu, 14 Oct 2021 10:29:55 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BalaschGGRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GrossoPSG14, author = {Vincent Grosso and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Lubos Gaspar}, editor = {Marc Joye and Amir Moradi}, title = {Combining Leakage-Resilient PRFs and Shuffling - Towards Bounded Security for Small Embedded Devices}, booktitle = {Smart Card Research and Advanced Applications - 13th International Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8968}, pages = {122--136}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16763-3\_8}, doi = {10.1007/978-3-319-16763-3\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/GrossoPSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BrennerGLRS14, author = {Hai Brenner and Lubos Gaspar and Ga{\"{e}}tan Leurent and Alon Rosen and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Lejla Batina and Matthew Robshaw}, title = {{FPGA} Implementations of {SPRING} - And Their Countermeasures against Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {414--432}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_23}, doi = {10.1007/978-3-662-44709-3\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BrennerGLRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/GustinDKSV14, author = {Ludovic{-}Henri Gustin and Fran{\c{c}}ois Durvaux and St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois{-}Xavier Standaert and Michel Verleysen}, editor = {Emmanuel Prouff}, title = {Support Vector Machines for Improved {IP} Detection with Soft Physical Hash Functions}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {112--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_9}, doi = {10.1007/978-3-319-10175-0\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cosade/GustinDKSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WhitnallOS14, author = {Carolyn Whitnall and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Josh Benaloh}, title = {The Myth of Generic DPA...and the Magic of Learning}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {183--205}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_10}, doi = {10.1007/978-3-319-04852-9\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/WhitnallOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GasparLS14, author = {Lubos Gaspar and Ga{\"{e}}tan Leurent and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Josh Benaloh}, title = {Hardware Implementation and Side-Channel Analysis of Lapin}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {206--226}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_11}, doi = {10.1007/978-3-319-04852-9\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GasparLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DurvauxSV14, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {How to Certify the Leakage of a Chip?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {459--476}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_26}, doi = {10.1007/978-3-642-55220-5\_26}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DurvauxSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GrossoLSV14, author = {Vincent Grosso and Ga{\"{e}}tan Leurent and Fran{\c{c}}ois{-}Xavier Standaert and Kerem Varici}, editor = {Carlos Cid and Christian Rechberger}, title = {LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {18--37}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_2}, doi = {10.1007/978-3-662-46706-0\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GrossoLSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/DurvauxKRS14, author = {Fran{\c{c}}ois Durvaux and St{\'{e}}phanie Kerckhof and Francesco Regazzoni and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Konstantinos Markantonakis and Keith Mayes}, title = {A Survey of Recent Results in {FPGA} Security and Intellectual Property Protection}, booktitle = {Secure Smart Embedded Devices, Platforms and Applications}, pages = {201--224}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7915-4\_9}, doi = {10.1007/978-1-4614-7915-4\_9}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/14/DurvauxKRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidGS14, author = {Sonia Bela{\"{\i}}d and Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2014}, url = {http://eprint.iacr.org/2014/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiS14, author = {Amir Moradi and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Moments-Correlating {DPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2014}, url = {http://eprint.iacr.org/2014/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Veyrat-CharvillonGS14, author = {Nicolas Veyrat{-}Charvillon and Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Soft Analytical Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2014}, url = {http://eprint.iacr.org/2014/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossoPSG14, author = {Vincent Grosso and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Lubos Gaspar}, title = {Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2014}, url = {http://eprint.iacr.org/2014/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossoPSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurvauxSVMD14, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Jean{-}Baptiste Mairy and Yves Deville}, title = {Efficient Selection of Time Samples for Higher-Order {DPA} with Projection Pursuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2014}, url = {http://eprint.iacr.org/2014/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurvauxSVMD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschGGRS14, author = {Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On the Cost of Lazy Engineering for Masked Software Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2014}, url = {http://eprint.iacr.org/2014/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschGGRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GlowaczGPSS14, author = {Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {920}, year = {2014}, url = {http://eprint.iacr.org/2014/920}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GlowaczGPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GerardS13, author = {Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {1}, pages = {45--58}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0051-9}, doi = {10.1007/S13389-013-0051-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GerardS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/KerckhofSP13, author = {St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {From New Technologies to New Solutions - Exploiting {FRAM} Memories to Enhance Physical Security}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {16--29}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_2}, doi = {10.1007/978-3-319-08302-5\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/KerckhofSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GrossoSP13, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Emmanuel Prouff}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Low Entropy Masking Schemes, Revisited}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {33--43}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_3}, doi = {10.1007/978-3-319-08302-5\_3}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/GrossoSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/ParusinskiSKS13, author = {Michal Parusinski and Saloomeh Shariati and Dina Kamel and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Strong PUFs and their (physical) unpredictability: a case study with power PUFs}, booktitle = {Proceedings of the Workshop on Embedded Systems Security, {WESS} 2013, Montreal, Quebec, Canada, September 29 - October 4, 2013}, pages = {5:1--5:10}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2527317.2527322}, doi = {10.1145/2527317.2527322}, timestamp = {Tue, 06 Nov 2018 11:07:42 +0100}, biburl = {https://dblp.org/rec/conf/cases/ParusinskiSKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GerardGNS13, author = {Beno{\^{\i}}t G{\'{e}}rard and Vincent Grosso and Mar{\'{\i}}a Naya{-}Plasencia and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Block Ciphers That Are Easier to Mask: How Far Can We Go?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {383--399}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_22}, doi = {10.1007/978-3-642-40349-1\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GerardGNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossoSF13, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Sebastian Faust}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Masking vs. Multiparty Computation: How Large Is the Gap for AES?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {400--416}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_23}, doi = {10.1007/978-3-642-40349-1\_23}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GrossoSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/StandaertPY13, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu}, editor = {Ran Canetti and Juan A. Garay}, title = {Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {335--352}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_19}, doi = {10.1007/978-3-642-40041-4\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/StandaertPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/YuS13, author = {Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Ed Dawson}, title = {Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {223--238}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_15}, doi = {10.1007/978-3-642-36095-4\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/YuS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Veyrat-CharvillonGS13, author = {Nicolas Veyrat{-}Charvillon and Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Security Evaluations beyond Computing Power}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {126--141}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_8}, doi = {10.1007/978-3-642-38348-9\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Veyrat-CharvillonGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZhouYSQ13, author = {Yuanyuan Zhou and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Ahmad{-}Reza Sadeghi}, title = {On the Need of Physical Security for Small Embedded Devices: {A} Case Study with {COMP128-1} Implementations in {SIM} Cards}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {230--238}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_20}, doi = {10.1007/978-3-642-39884-1\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ZhouYSQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KerckhofDSG13, author = {St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Beno{\^{\i}}t G{\'{e}}rard}, title = {Intellectual property protection for {FPGA} designs with soft physical hash functions: First experimental results}, booktitle = {2013 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2013, Austin, TX, USA, June 2-3, 2013}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/HST.2013.6581557}, doi = {10.1109/HST.2013.6581557}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/KerckhofDSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhaoZSZ13, author = {Hui Zhao and Yongbin Zhou and Fran{\c{c}}ois{-}Xavier Standaert and Hailong Zhang}, editor = {Robert H. Deng and Tao Feng}, title = {Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers}, booktitle = {Information Security Practice and Experience - 9th International Conference, {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7863}, pages = {336--352}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38033-4\_24}, doi = {10.1007/978-3-642-38033-4\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhaoZSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZSZ13, author = {Hui Zhao and Yongbin Zhou and Fran{\c{c}}ois{-}Xavier Standaert and Hailong Zhang}, title = {Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2013}, url = {http://eprint.iacr.org/2013/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanZSF13, author = {Guangjun Fan and Yongbin Zhou and Fran{\c{c}}ois{-}Xavier Standaert and Dengguo Feng}, title = {On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2013}, url = {http://eprint.iacr.org/2013/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanZSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouYSQ13, author = {Yuanyuan Zhou and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {On the Need of Physical Security for Small Embedded Devices: a Case Study with {COMP128-1} Implementations in {SIM} Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2013}, url = {http://eprint.iacr.org/2013/224}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouYSQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidSHMMSST13, author = {Sonia Bela{\"{\i}}d and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and J{\"{o}}rn{-}Marc Schmidt and Fran{\c{c}}ois{-}Xavier Standaert and Stefan Tillich}, title = {Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2013}, url = {http://eprint.iacr.org/2013/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidSHMMSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GerardGNS13, author = {Beno{\^{\i}}t G{\'{e}}rard and Vincent Grosso and Mar{\'{\i}}a Naya{-}Plasencia and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Block Ciphers that are Easier to Mask: How Far Can we Go?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2013}, url = {http://eprint.iacr.org/2013/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GerardGNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertPY13, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu}, title = {Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2013}, url = {http://eprint.iacr.org/2013/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurvauxSV13, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, title = {How to Certify the Leakage of a Chip?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {706}, year = {2013}, url = {http://eprint.iacr.org/2013/706}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurvauxSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ShariatiSJM12, author = {Saloomeh Shariati and Fran{\c{c}}ois{-}Xavier Standaert and Laurent Jacques and Beno{\^{\i}}t Macq}, title = {Analysis and experimental evaluation of image-based PUFs}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {3}, pages = {189--206}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0041-3}, doi = {10.1007/S13389-012-0041-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ShariatiSJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/EisenbarthGGHIKKNPRSO12, author = {Thomas Eisenbarth and Zheng Gong and Tim G{\"{u}}neysu and Stefan Heyse and Sebastiaan Indesteege and St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Koeune and Tomislav Nad and Thomas Plos and Francesco Regazzoni and Fran{\c{c}}ois{-}Xavier Standaert and Lo{\"{\i}}c van Oldeneel tot Oldenzeel}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {172--187}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_11}, doi = {10.1007/978-3-642-31410-0\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/EisenbarthGGHIKKNPRSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Veyrat-CharvillonMKS12, author = {Nicolas Veyrat{-}Charvillon and Marcel Medwed and St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Shuffling against Side-Channel Attacks: {A} Comprehensive Study with Cautionary Note}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {740--757}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_44}, doi = {10.1007/978-3-642-34961-4\_44}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Veyrat-CharvillonMKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/StandaertPV12, author = {Fran{\c{c}}ois{-}Xavier Standaert and Christophe Petit and Nicolas Veyrat{-}Charvillon}, editor = {David Naccache}, title = {Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {283--299}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_19}, doi = {10.1007/978-3-642-28368-0\_19}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/StandaertPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DurvauxRSOV12, author = {Fran{\c{c}}ois Durvaux and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Lo{\"{\i}}c van Oldeneel tot Oldenzeel and Nicolas Veyrat{-}Charvillon}, editor = {Stefan Mangard}, title = {Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {123--140}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_9}, doi = {10.1007/978-3-642-37288-9\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DurvauxRSOV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BalaschEEGGGHKKPPRSAKOM12, author = {Josep Balasch and Baris Ege and Thomas Eisenbarth and Beno{\^{\i}}t G{\'{e}}rard and Zheng Gong and Tim G{\"{u}}neysu and Stefan Heyse and St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Koeune and Thomas Plos and Thomas P{\"{o}}ppelmann and Francesco Regazzoni and Fran{\c{c}}ois{-}Xavier Standaert and Gilles Van Assche and Ronny Van Keer and Lo{\"{\i}}c van Oldeneel tot Oldenzeel and Ingo von Maurich}, editor = {Stefan Mangard}, title = {Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {158--172}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_11}, doi = {10.1007/978-3-642-37288-9\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BalaschEEGGGHKKPPRSAKOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrenRSW12, author = {Yossef Oren and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Avishai Wool}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {140--154}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_9}, doi = {10.1007/978-3-642-33027-8\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrenRSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GerardS12, author = {Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {175--192}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_11}, doi = {10.1007/978-3-642-33027-8\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GerardS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MedwedSJ12, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert and Antoine Joux}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {193--212}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_12}, doi = {10.1007/978-3-642-33027-8\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MedwedSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KerckhofDHBS12, author = {St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Durvaux and C{\'{e}}dric Hocquet and David Bol and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Towards Green Cryptography: {A} Comparison of Lightweight Ciphers from the Energy Viewpoint}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {390--407}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_23}, doi = {10.1007/978-3-642-33027-8\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KerckhofDHBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/ShariatiKS12, author = {Saloomeh Shariati and Fran{\c{c}}ois Koeune and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Bart De Decker and David W. Chadwick}, title = {Security Analysis of Image-Based PUFs for Anti-counterfeiting}, booktitle = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2012, Canterbury, UK, September 3-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7394}, pages = {26--38}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32805-3\_3}, doi = {10.1007/978-3-642-32805-3\_3}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/ShariatiKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BogdanovKLSST12, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Fran{\c{c}}ois{-}Xavier Standaert and John P. Steinberger and Elmar Tischhauser}, editor = {David Pointcheval and Thomas Johansson}, title = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {45--62}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_5}, doi = {10.1007/978-3-642-29011-4\_5}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BogdanovKLSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Veyrat-CharvillonGRS12, author = {Nicolas Veyrat{-}Charvillon and Beno{\^{\i}}t G{\'{e}}rard and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {390--406}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_25}, doi = {10.1007/978-3-642-35999-6\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Veyrat-CharvillonGRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DurvauxGKKS12, author = {Fran{\c{c}}ois Durvaux and Beno{\^{\i}}t G{\'{e}}rard and St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Koeune and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Dong Hoon Lee and Moti Yung}, title = {Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {208--225}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_15}, doi = {10.1007/978-3-642-35416-8\_15}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DurvauxGKKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/OswaldS12, author = {Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Joye and Michael Tunstall}, title = {Side-Channel Analysis and Its Relevance to Fault Attacks}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {3--15}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_1}, doi = {10.1007/978-3-642-29656-7\_1}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/OswaldS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovKLSST12, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Fran{\c{c}}ois{-}Xavier Standaert and John P. Steinberger and Elmar Tischhauser}, title = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2012}, url = {http://eprint.iacr.org/2012/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovKLSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurvauxRSOV12, author = {Fran{\c{c}}ois Durvaux and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Lo{\"{\i}}c van Oldeneel tot Oldenzeel and Nicolas Veyrat{-}Charvillon}, title = {Cryptanalysis of the {CHES} 2009/2010 Random Delay Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2012}, url = {http://eprint.iacr.org/2012/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurvauxRSOV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallOS12, author = {Carolyn Whitnall and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The myth of generic DPA...and the magic of learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2012}, url = {http://eprint.iacr.org/2012/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschEEGGGHKKPPRSAKOM12, author = {Josep Balasch and Baris Ege and Thomas Eisenbarth and Beno{\^{\i}}t G{\'{e}}rard and Zheng Gong and Tim G{\"{u}}neysu and Stefan Heyse and St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Koeune and Thomas Plos and Thomas P{\"{o}}ppelmann and Francesco Regazzoni and Fran{\c{c}}ois{-}Xavier Standaert and Gilles Van Assche and Ronny Van Keer and Lo{\"{\i}}c van Oldeneel tot Oldenzeel and Ingo von Maurich}, title = {Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2012}, url = {http://eprint.iacr.org/2012/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschEEGGGHKKPPRSAKOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Veyrat-CharvillonGS12, author = {Nicolas Veyrat{-}Charvillon and Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2012}, url = {http://eprint.iacr.org/2012/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MangardOS11, author = {Stefan Mangard and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {One for all - all for one: unifying standard differential power analysis attacks}, journal = {{IET} Inf. Secur.}, volume = {5}, number = {2}, pages = {100--110}, year = {2011}, url = {https://doi.org/10.1049/iet-ifs.2010.0096}, doi = {10.1049/IET-IFS.2010.0096}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MangardOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HocquetKRLFBS11, author = {C{\'{e}}dric Hocquet and Dina Kamel and Francesco Regazzoni and Jean{-}Didier Legat and Denis Flandre and David Bol and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm {AES} coprocessor for passive {RFID} tags}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {79--86}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0005-z}, doi = {10.1007/S13389-011-0005-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HocquetKRLFBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DogetPRS11, author = {Julien Doget and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Univariate side channel attacks and leakage modeling}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {123--144}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0010-2}, doi = {10.1007/S13389-011-0010-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DogetPRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MedwedS11, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Extractors against side-channel attacks: weak or strong?}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {231--241}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0014-y}, doi = {10.1007/S13389-011-0014-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MedwedS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BatinaGPRSV11, author = {Lejla Batina and Benedikt Gierlichs and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, title = {Mutual Information Analysis: a Comprehensive Study}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {269--291}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9084-8}, doi = {10.1007/S00145-010-9084-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/KerckhofCS11, author = {St{\'{e}}phanie Kerckhof and Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {{FPGA} Implementation of a Statistical Saturation Attack against {PRESENT}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {100--116}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_7}, doi = {10.1007/978-3-642-21969-6\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/KerckhofCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/MedwedPRRS11, author = {Marcel Medwed and Christophe Petit and Francesco Regazzoni and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Emmanuel Prouff}, title = {Fresh Re-keying {II:} Securing Multiple Parties against Side-Channel and Fault Attacks}, booktitle = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7079}, pages = {115--132}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27257-8\_8}, doi = {10.1007/978-3-642-27257-8\_8}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/MedwedPRRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/KerckhofDVRDS11, author = {St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Durvaux and Nicolas Veyrat{-}Charvillon and Francesco Regazzoni and Guerric Meurice de Dormale and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Emmanuel Prouff}, title = {Compact {FPGA} Implementations of the Five {SHA-3} Finalists}, booktitle = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7079}, pages = {217--233}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27257-8\_14}, doi = {10.1007/978-3-642-27257-8\_14}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/KerckhofDVRDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RenauldKSF11, author = {Mathieu Renauld and Dina Kamel and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Information Theoretic and Security Analysis of a 65-Nanometer {DDSLL} {AES} S-Box}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {223--239}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_15}, doi = {10.1007/978-3-642-23951-9\_15}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/RenauldKSF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MedwedS11, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Extractors against Side-Channel Attacks: Weak or Strong?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {256--272}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_17}, doi = {10.1007/978-3-642-23951-9\_17}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MedwedS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarakDKPPSY11, author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, editor = {Phillip Rogaway}, title = {Leftover Hash Lemma, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {1--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_1}, doi = {10.1007/978-3-642-22792-9\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarakDKPPSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Veyrat-CharvillonS11, author = {Nicolas Veyrat{-}Charvillon and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Phillip Rogaway}, title = {Generic Side-Channel Distinguishers: Improvements and Limitations}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {354--372}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_20}, doi = {10.1007/978-3-642-22792-9\_20}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Veyrat-CharvillonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/BayrakRBSI11, author = {Ali Galip Bayrak and Francesco Regazzoni and Philip Brisk and Fran{\c{c}}ois{-}Xavier Standaert and Paolo Ienne}, editor = {Leon Stok and Nikil D. Dutt and Soha Hassoun}, title = {A first step towards automatic application of power analysis countermeasures}, booktitle = {Proceedings of the 48th Design Automation Conference, {DAC} 2011, San Diego, California, USA, June 5-10, 2011}, pages = {230--235}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2024724.2024778}, doi = {10.1145/2024724.2024778}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/BayrakRBSI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RenauldSVKF11, author = {Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Dina Kamel and Denis Flandre}, editor = {Kenneth G. Paterson}, title = {A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {109--128}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_8}, doi = {10.1007/978-3-642-20465-4\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RenauldSVKF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/BarenghiHBSRK11, author = {Alessandro Barenghi and C{\'{e}}dric Hocquet and David Bol and Fran{\c{c}}ois{-}Xavier Standaert and Francesco Regazzoni and Israel Koren}, editor = {Ari Juels and Christof Paar}, title = {Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm {AES} Implementation}, booktitle = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, pages = {48--60}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25286-0\_4}, doi = {10.1007/978-3-642-25286-0\_4}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/BarenghiHBSRK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ArmknechtMSSW11, author = {Frederik Armknecht and Roel Maes and Ahmad{-}Reza Sadeghi and Fran{\c{c}}ois{-}Xavier Standaert and Christian Wachsmann}, title = {A Formalization of the Security Features of Physical Functions}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {397--412}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.10}, doi = {10.1109/SP.2011.10}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ArmknechtMSSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/StandaertQ11, author = {Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Physical Security}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {928--929}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_130}, doi = {10.1007/978-1-4419-5906-5\_130}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/StandaertQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/StandaertQ11a, author = {Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Time-Memory Trade-offs}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1297--1299}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_137}, doi = {10.1007/978-1-4419-5906-5\_137}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/StandaertQ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehbaouiTMSV11, author = {Amine Dehbaoui and S{\'{e}}bastien Tiran and Philippe Maurine and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, title = {Spectral Coherence Analysis - First Experimental Results -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2011}, url = {http://eprint.iacr.org/2011/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehbaouiTMSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakDKPPSY11, author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, title = {Leftover Hash Lemma, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2011}, url = {http://eprint.iacr.org/2011/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakDKPPSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Veyrat-CharvillonS11, author = {Nicolas Veyrat{-}Charvillon and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Generic Side-Channel Distinguishers: Improvements and Limitations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2011}, url = {http://eprint.iacr.org/2011/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DogetPRS11, author = {Julien Doget and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Univariate Side Channel Attacks and Leakage Modeling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2011}, url = {http://eprint.iacr.org/2011/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DogetPRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MedwedS11, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Extractors Against Side-Channel Attacks: Weak or Strong?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2011}, url = {http://eprint.iacr.org/2011/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MedwedS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Veyrat-CharvillonGRS11, author = {Nicolas Veyrat{-}Charvillon and Beno{\^{\i}}t G{\'{e}}rard and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert}, title = {An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2011}, url = {http://eprint.iacr.org/2011/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BulensSQ10, author = {Philippe Bulens and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {How to strongly link data and its medium: the paper case}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {125--136}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0032}, doi = {10.1049/IET-IFS.2009.0032}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BulensSQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CollardS10, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Jianying Zhou and Moti Yung}, title = {Multi-trail Statistical Saturation Attacks}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {123--138}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_8}, doi = {10.1007/978-3-642-13708-2\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CollardS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Veyrat-CharvillonS10, author = {Nicolas Veyrat{-}Charvillon and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Jianying Zhou and Moti Yung}, title = {Adaptive Chosen-Message Side-Channel Attacks}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {186--199}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_12}, doi = {10.1007/978-3-642-13708-2\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Veyrat-CharvillonS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/MedwedSGR10, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert and Johann Gro{\ss}sch{\"{a}}dl and Francesco Regazzoni}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {279--296}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_17}, doi = {10.1007/978-3-642-12678-9\_17}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/MedwedSGR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/StandaertVOGMKM10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, editor = {Masayuki Abe}, title = {The World Is Not Enough: Another Look on Second-Order {DPA}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {112--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_7}, doi = {10.1007/978-3-642-17373-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/StandaertVOGMKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuSPY10, author = {Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Moti Yung}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Practical leakage-resilient pseudorandom generators}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {141--151}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866324}, doi = {10.1145/1866307.1866324}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuSPY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esscirc/KamelHSFB10, author = {Dina Kamel and C{\'{e}}dric Hocquet and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre and David Bol}, title = {Glitch-induced within-die variations of dynamic energy in voltage-scaled nano-CMOS circuits}, booktitle = {36th European Solid-State Circuits Conference, {ESSCIRC} 2010, Sevilla, Spain, September 13-17, 2010}, pages = {518--521}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ESSCIRC.2010.5619757}, doi = {10.1109/ESSCIRC.2010.5619757}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esscirc/KamelHSFB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ShariatiJSMSA10, author = {Saloomeh Shariati and Laurent Jacques and Fran{\c{c}}ois{-}Xavier Standaert and Beno{\^{\i}}t Macq and Mohamed Amin Salhi and Philippe Antoine}, title = {Randomly driven fuzzy key extraction of unclonable images}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2010, September 26-29, Hong Kong, China}, pages = {4329--4332}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICIP.2010.5652420}, doi = {10.1109/ICIP.2010.5652420}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/ShariatiJSMSA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/Standaert10, author = {Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {How Leaky Is an Extractor?}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {294--304}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_18}, doi = {10.1007/978-3-642-14712-8\_18}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/Standaert10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobilight/MeulenaerS10, author = {Giacomo de Meulenaer and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Periklis Chatzimisios and Christos V. Verikoukis and Ignacio Santamar{\'{\i}}a and Massimiliano Laddomada and Oliver Hoffmann}, title = {Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks}, booktitle = {Mobile Lightweight Wireless Systems - Second International {ICST} Conference, {MOBILIGHT} 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {45}, pages = {229--242}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16644-0\_21}, doi = {10.1007/978-3-642-16644-0\_21}, timestamp = {Sat, 24 Nov 2018 11:59:43 +0100}, biburl = {https://dblp.org/rec/conf/mobilight/MeulenaerS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/Standaert10, author = {Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Ingrid M. R. Verbauwhede}, title = {Introduction to Side-Channel Attacks}, booktitle = {Secure Integrated Circuits and Systems}, series = {Integrated Circuits and Systems}, pages = {27--42}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-71829-3\_2}, doi = {10.1007/978-0-387-71829-3\_2}, timestamp = {Wed, 26 Jun 2019 18:00:01 +0200}, biburl = {https://dblp.org/rec/books/sp/10/Standaert10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/StandaertPYQYO10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu and Jean{-}Jacques Quisquater and Moti Yung and Elisabeth Oswald}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Leakage Resilient Cryptography in Practice}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {99--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_5}, doi = {10.1007/978-3-642-14452-3\_5}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2010, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9}, doi = {10.1007/978-3-642-15031-9}, isbn = {978-3-642-15030-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertVOGMKM10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, title = {The World is Not Enough: Another Look on Second-Order {DPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2010}, url = {http://eprint.iacr.org/2010/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PiretS09, author = {Gilles Piret and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Provable security of block ciphers against linear cryptanalysis: a mission impossible?}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {325--338}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9234-2}, doi = {10.1007/S10623-008-9234-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PiretS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/StandaertKS09, author = {Fran{\c{c}}ois{-}Xavier Standaert and Fran{\c{c}}ois Koeune and Werner Schindler}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {How to Compare Profiled Side-Channel Attacks?}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {485--498}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_30}, doi = {10.1007/978-3-642-01957-9\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/StandaertKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RenauldSV09, author = {Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, editor = {Christophe Clavier and Kris Gaj}, title = {Algebraic Side-Channel Attacks on the {AES:} Why Time also Matters in {DPA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {97--111}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_8}, doi = {10.1007/978-3-642-04138-9\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/RenauldSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RegazzoniCSBKBLI09, author = {Francesco Regazzoni and Alessandro Cevrero and Fran{\c{c}}ois{-}Xavier Standaert and St{\'{e}}phane Badel and Theo Kluter and Philip Brisk and Yusuf Leblebici and Paolo Ienne}, editor = {Christophe Clavier and Kris Gaj}, title = {A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {205--219}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_15}, doi = {10.1007/978-3-642-04138-9\_15}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RegazzoniCSBKBLI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Veyrat-CharvillonS09, author = {Nicolas Veyrat{-}Charvillon and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Christophe Clavier and Kris Gaj}, title = {Mutual Information Analysis: How, When and Why?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {429--443}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_30}, doi = {10.1007/978-3-642-04138-9\_30}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Veyrat-CharvillonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/RenauldS09, author = {Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Algebraic Side-Channel Attacks}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {393--410}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_29}, doi = {10.1007/978-3-642-16342-5\_29}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/RenauldS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CollardS09, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Fischlin}, title = {A Statistical Saturation Attack against the Block Cipher {PRESENT}}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {195--210}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_13}, doi = {10.1007/978-3-642-00862-7\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/CollardS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/StandaertMY09, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, editor = {Antoine Joux}, title = {A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {443--461}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_26}, doi = {10.1007/978-3-642-01001-9\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/StandaertMY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/KamelSF09, author = {Dina Kamel and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre}, title = {Scaling Trends of the {AES} S-box Low Power Consumption in 130 and 65 nm {CMOS} Technology Nodes}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2009), 24-17 May 2009, Taipei, Taiwan}, pages = {1385--1388}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISCAS.2009.5118023}, doi = {10.1109/ISCAS.2009.5118023}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/KamelSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Standaert09, author = {Fran{\c{c}}ois{-}Xavier Standaert}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs}, booktitle = {Cryptographic Engineering}, pages = {295--320}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_11}, doi = {10.1007/978-0-387-71817-0\_11}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/koc09/Standaert09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RenauldS09, author = {Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Algebraic Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2009}, url = {http://eprint.iacr.org/2009/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RenauldS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertPYQYO09, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu and Jean{-}Jacques Quisquater and Moti Yung and Elisabeth Oswald}, title = {Leakage Resilient Cryptography in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2009}, url = {http://eprint.iacr.org/2009/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertPYQYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MangardOS09, author = {Stefan Mangard and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {One for All - All for One: Unifying Standard {DPA} Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2009}, url = {http://eprint.iacr.org/2009/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MangardOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/PiretS08, author = {Gilles Piret and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {1}, pages = {1--11}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070066}, doi = {10.1049/IET-IFS:20070066}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/PiretS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BulensSQPR08, author = {Philippe Bulens and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Pascal Pellegrin and Ga{\"{e}}l Rouvroy}, editor = {Serge Vaudenay}, title = {Implementation of the {AES-128} on Virtex-5 FPGAs}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {16--26}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_2}, doi = {10.1007/978-3-540-68164-9\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BulensSQPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PetitSPMY08, author = {Christophe Petit and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Tal Malkin and Moti Yung}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {A block cipher based pseudo random number generator secure against side-channel key recovery}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {56--65}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368322}, doi = {10.1145/1368310.1368322}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PetitSPMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertA08, author = {Fran{\c{c}}ois{-}Xavier Standaert and C{\'{e}}dric Archambeau}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {411--425}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_26}, doi = {10.1007/978-3-540-85053-3\_26}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/StandaertA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CollardSQ08, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Kaisa Nyberg}, title = {Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {382--397}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_24}, doi = {10.1007/978-3-540-71039-4\_24}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CollardSQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimAKSP08, author = {Chong Hee Kim and Gildas Avoine and Fran{\c{c}}ois Koeune and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {The Swiss-Knife {RFID} Distance Bounding Protocol}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {98--115}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_7}, doi = {10.1007/978-3-642-00730-9\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimAKSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/StandaertGV08, author = {Fran{\c{c}}ois{-}Xavier Standaert and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected {CMOS} Devices}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {253--267}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_16}, doi = {10.1007/978-3-642-00730-9\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/StandaertGV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/StandaertMY08, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, editor = {Reihaneh Safavi{-}Naini}, title = {Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_7}, doi = {10.1007/978-3-540-85093-9\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/StandaertMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/MeulenaerGSP08, author = {Giacomo de Meulenaer and Fran{\c{c}}ois Gosset and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira}, title = {On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks}, booktitle = {{IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, Avignon, France, 12-14 October 2008, Proceedings}, pages = {580--585}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WiMob.2008.16}, doi = {10.1109/WIMOB.2008.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/MeulenaerGSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2008, editor = {Gilles Grimaud and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2008, London, UK, September 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5189}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85893-5}, doi = {10.1007/978-3-540-85893-5}, isbn = {978-3-540-85892-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaceSQ08, author = {Fran{\c{c}}ois Mac{\'{e}} and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2008}, url = {http://eprint.iacr.org/2008/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaceSQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertBMV08, author = {Fran{\c{c}}ois{-}Xavier Standaert and Philippe Bulens and Giacomo de Meulenaer and Nicolas Veyrat{-}Charvillon}, title = {Improving the Rules of the {DPA} Contest}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2008}, url = {http://eprint.iacr.org/2008/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertBMV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/StandaertPRQ07, author = {Fran{\c{c}}ois{-}Xavier Standaert and Gilles Piret and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, title = {{FPGA} implementations of the {ICEBERG} block cipher}, journal = {Integr.}, volume = {40}, number = {1}, pages = {20--27}, year = {2007}, url = {https://doi.org/10.1016/j.vlsi.2005.12.008}, doi = {10.1016/J.VLSI.2005.12.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/StandaertPRQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/PeetersSQ07, author = {Eric Peeters and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {Power and electromagnetic analysis: Improved model, consequences and comparisons}, journal = {Integr.}, volume = {40}, number = {1}, pages = {52--60}, year = {2007}, url = {https://doi.org/10.1016/j.vlsi.2005.12.013}, doi = {10.1016/J.VLSI.2005.12.013}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/PeetersSQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MaceSQ07, author = {Fran{\c{c}}ois Mac{\'{e}} and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {427--442}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_29}, doi = {10.1007/978-3-540-74735-2\_29}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/MaceSQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CollardSQ08, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {51--65}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_6}, doi = {10.1007/978-3-540-79499-8\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/CollardSQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CollardSQ07, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Improving the Time Complexity of Matsui's Linear Cryptanalysis}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {77--88}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_7}, doi = {10.1007/978-3-540-76788-6\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/CollardSQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertPAQ07, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and C{\'{e}}dric Archambeau and Jean{-}Jacques Quisquater}, title = {Towards Security Limits in Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2007}, url = {http://eprint.iacr.org/2007/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertPAQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitSPMY07, author = {Christophe Petit and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Tal Malkin and Moti Yung}, title = {A Block Cipher based {PRNG} Secure Against Side-Channel Key Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2007}, url = {http://eprint.iacr.org/2007/356}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitSPMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/StandaertPRQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, title = {An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays}, journal = {Proc. {IEEE}}, volume = {94}, number = {2}, pages = {383--394}, year = {2006}, url = {https://doi.org/10.1109/JPROC.2005.862437}, doi = {10.1109/JPROC.2005.862437}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/StandaertPRQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/StandaertMPQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Fran{\c{c}}ois Mac{\'{e}} and Eric Peeters and Jean{-}Jacques Quisquater}, editor = {Koen Bertels and Jo{\~{a}}o M. P. Cardoso and Stamatis Vassiliadis}, title = {Updates on the Security of FPGAs Against Power Analysis Attacks}, booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3985}, pages = {335--346}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802839\_42}, doi = {10.1007/11802839\_42}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/StandaertMPQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/StandaertPGQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Gilles Piret and Neil Gershenfeld and Jean{-}Jacques Quisquater}, editor = {Josep Domingo{-}Ferrer and Joachim Posegga and Daniel Schreckling}, title = {{SEA:} {A} Scalable Encryption Algorithm for Small Embedded Applications}, booktitle = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3928}, pages = {222--236}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11733447\_16}, doi = {10.1007/11733447\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/StandaertPGQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ArchambeauPSQ06, author = {C{\'{e}}dric Archambeau and Eric Peeters and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Template Attacks in Principal Subspaces}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_1}, doi = {10.1007/11894063\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ArchambeauPSQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertPAQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and C{\'{e}}dric Archambeau and Jean{-}Jacques Quisquater}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Towards Security Limits in Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {30--45}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_3}, doi = {10.1007/11894063\_3}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/StandaertPAQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/MalkinSY06, author = {Tal Malkin and Fran{\c{c}}ois{-}Xavier Standaert and Moti Yung}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {A Comparative Cost/Security Analysis of Fault Attack Countermeasures}, booktitle = {Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4236}, pages = {159--172}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889700\_15}, doi = {10.1007/11889700\_15}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/MalkinSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/StandaertRQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, title = {{FPGA} Implementations of the {DES} and Triple-DES Masked Against Power Analysis Attacks}, booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}, pages = {1--4}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/FPL.2006.311315}, doi = {10.1109/FPL.2006.311315}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/StandaertRQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertMY06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Tal Malkin and Moti Yung}, title = {A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2006}, url = {http://eprint.iacr.org/2006/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertMY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PeetersSDQ05, author = {Eric Peeters and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Donckers and Jean{-}Jacques Quisquater}, editor = {Josyula R. Rao and Berk Sunar}, title = {Improved Higher-Order Side-Channel Attacks with {FPGA} Experiments}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {309--323}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_23}, doi = {10.1007/11545262\_23}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/PeetersSDQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/StandaertLRMQL05, author = {Fran{\c{c}}ois{-}Xavier Standaert and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Ga{\"{e}}l Rouvroy and Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Practical Evaluation of a Radial Soft Hash Algorithm}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {89--94}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.229}, doi = {10.1109/ITCC.2005.229}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/StandaertLRMQL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/StandaertPRQ05, author = {Fran{\c{c}}ois{-}Xavier Standaert and Gilles Piret and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, title = {{FPGA} Implementations of the {ICEBERG} Block Cipher}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {556--561}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.155}, doi = {10.1109/ITCC.2005.155}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/StandaertPRQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/StandaertPQ05, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and Jean{-}Jacques Quisquater}, title = {On the Masking Countermeasure and Higher-Order Power Analysis Attacks}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {562--567}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.213}, doi = {10.1109/ITCC.2005.213}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/StandaertPQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/patmos/MaceSQL05, author = {Fran{\c{c}}ois Mac{\'{e}} and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Vassilis Paliouras and Johan Vounckx and Diederik Verkest}, title = {A Design Methodology for Secured ICs Using Dynamic Current Mode Logic}, booktitle = {Integrated Circuit and System Design, Power and Timing Modeling, Optimization and Simulation, 15th International Workshop, {PATMOS} 2005, Leuven, Belgium, September 21-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3728}, pages = {550--560}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556930\_56}, doi = {10.1007/11556930\_56}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/patmos/MaceSQL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/QuisquaterS05b, author = {Jean{-}Jacques Quisquater and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Henk C. A. van Tilborg}, title = {Time-memory tradeoffs}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_430}, doi = {10.1007/0-387-23483-7\_430}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/QuisquaterS05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PiretSRQ04, author = {Gilles Piret and Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater}, editor = {Jean{-}Jacques Quisquater and Pierre Paradinas and Yves Deswarte and Anas Abou El Kalam}, title = {On the Security of the DeKaRT Primitive}, booktitle = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {153}, pages = {241--254}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8147-2\_16}, doi = {10.1007/1-4020-8147-2\_16}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/PiretSRQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertOP04, author = {Fran{\c{c}}ois{-}Xavier Standaert and Siddika Berna {\"{O}}rs and Bart Preneel}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Power Analysis of an {FPGA:} Implementation of Rijndael: Is Pipelining a {DPA} Countermeasure?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {30--44}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_3}, doi = {10.1007/978-3-540-28632-5\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/StandaertOP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/RouvroySLQML04, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Jean{-}Jacques Quisquater and Beno{\^{\i}}t Macq and Jean{-}Didier Legat}, editor = {Aggelos Kiayias and Moti Yung}, title = {Reconfigurable hardware solutions for the digital rights management of digital cinema}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {40--53}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029147}, doi = {10.1145/1029146.1029147}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/RouvroySLQML04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/RouvroyLSMQL04, author = {Ga{\"{e}}l Rouvroy and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Fran{\c{c}}ois{-}Xavier Standaert and Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Hardware implementation of a fingerprinting algorithm suited for digital cinema}, booktitle = {2004 12th European Signal Processing Conference, Vienna, Austria, September 6-10, 2004}, pages = {1497--1500}, publisher = {{IEEE}}, year = {2004}, url = {https://ieeexplore.ieee.org/document/7080100/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/RouvroyLSMQL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/KoeuneS04, author = {Fran{\c{c}}ois Koeune and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Alessandro Aldini and Roberto Gorrieri and Fabio Martinelli}, title = {A Tutorial on Physical Security and Side-Channel Attacks}, booktitle = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {3655}, pages = {78--108}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11554578\_3}, doi = {10.1007/11554578\_3}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/fosad/KoeuneS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/StandaertOQP04, author = {Fran{\c{c}}ois{-}Xavier Standaert and Siddika Berna {\"{O}}rs and Jean{-}Jacques Quisquater and Bart Preneel}, editor = {J{\"{u}}rgen Becker and Marco Platzner and Serge Vernalde}, title = {Power Analysis Attacks Against {FPGA} Implementations of the {DES}}, booktitle = {Field Programmable Logic and Application, 14th International Conference , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3203}, pages = {84--94}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30117-2\_11}, doi = {10.1007/978-3-540-30117-2\_11}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/StandaertOQP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/StandaertPRQL04, author = {Fran{\c{c}}ois{-}Xavier Standaert and Gilles Piret and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Bimal K. Roy and Willi Meier}, title = {{ICEBERG} : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {279--299}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_18}, doi = {10.1007/978-3-540-25937-4\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/StandaertPRQL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/RouvroySQL04, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Compact and Efficient Encryption/Decryption Module for {FPGA} Implementation of the {AES} Rijndael Very Well Suited for Small Embedded Applications}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {583--587}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286716}, doi = {10.1109/ITCC.2004.1286716}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/RouvroySQL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/RouvroySQL03, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Efficient Uses of FPGAs for Implementations of {DES} and Its Experimental Linear Cryptanalysis}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {4}, pages = {473--482}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1190588}, doi = {10.1109/TC.2003.1190588}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/RouvroySQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertRQL03, author = {Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {334--350}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_27}, doi = {10.1007/978-3-540-45238-6\_27}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/StandaertRQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/StandaertRQL03, author = {Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Steve Trimberger and Russell Tessier}, title = {A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact {AES} {RIJNDAEL}}, booktitle = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable Gate Arrays, {FPGA} 2003, Monterey, CA, USA, February 23-25, 2003}, pages = {216--224}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/611817.611849}, doi = {10.1145/611817.611849}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpga/StandaertRQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/RouvroySQL03, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Steve Trimberger and Russell Tessier}, title = {Design strategies and modified descriptions to optimize cipher {FPGA} implementations: fast and compact results for {DES} and triple-DES}, booktitle = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable Gate Arrays, {FPGA} 2003, Monterey, CA, USA, February 23-25, 2003}, pages = {247}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/611817.611879}, doi = {10.1145/611817.611879}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpga/RouvroySQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/RouvroySQL03, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Peter Y. K. Cheung and George A. Constantinides and Jos{\'{e}} T. de Sousa}, title = {Design Strategies and Modified Descriptions to Optimize Cipher {FPGA} Implementations: Fast and Compact Results for {DES} and Triple-DES}, booktitle = {Field Programmable Logic and Application, 13th International Conference, {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2778}, pages = {181--193}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45234-8\_19}, doi = {10.1007/978-3-540-45234-8\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/fpl/RouvroySQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/StandaertOSQ03, author = {Fran{\c{c}}ois{-}Xavier Standaert and Lo{\"{\i}}c van Oldeneel tot Oldenzeel and David Samyde and Jean{-}Jacques Quisquater}, editor = {Peter Y. K. Cheung and George A. Constantinides and Jos{\'{e}} T. de Sousa}, title = {Power Analysis of FPGAs: How Practical is the Attack?}, booktitle = {Field Programmable Logic and Application, 13th International Conference, {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2778}, pages = {701--711}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45234-8\_68}, doi = {10.1007/978-3-540-45234-8\_68}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/StandaertOSQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/RouvroySQL03, author = {Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, title = {Efficient {FPGA} Implementation of Block Cipher {MISTY1}}, booktitle = {17th International Parallel and Distributed Processing Symposium {(IPDPS} 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings}, pages = {185}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IPDPS.2003.1213343}, doi = {10.1109/IPDPS.2003.1213343}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/RouvroySQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertRQL02, author = {Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Time-Memory Tradeoff Using Distinguished Points: New Analysis {\&} {FPGA} Results}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {593--609}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_43}, doi = {10.1007/3-540-36400-5\_43}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/StandaertRQL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/QuisquaterSRDL02, author = {Jean{-}Jacques Quisquater and Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Pierre David and Jean{-}Didier Legat}, editor = {Manfred Glesner and Peter Zipf and Michel Renovell}, title = {A Cryptanalytic Time-Memory Tradeoff: First {FPGA} Implementation}, booktitle = {Field-Programmable Logic and Applications, Reconfigurable Computing Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier, France, September 2-4, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2438}, pages = {780--789}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46117-5\_80}, doi = {10.1007/3-540-46117-5\_80}, timestamp = {Sat, 30 Sep 2023 09:41:27 +0200}, biburl = {https://dblp.org/rec/conf/fpl/QuisquaterSRDL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/KoeuneRSQDL02, author = {Fran{\c{c}}ois Koeune and Ga{\"{e}}l Rouvroy and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater and Jean{-}Pierre David and Jean{-}Didier Legat}, editor = {Manfred Glesner and Peter Zipf and Michel Renovell}, title = {An {FPGA} Implementation of the Linear Cryptanalysis}, booktitle = {Field-Programmable Logic and Applications, Reconfigurable Computing Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier, France, September 2-4, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2438}, pages = {845--852}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46117-5\_87}, doi = {10.1007/3-540-46117-5\_87}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/KoeuneRSQDL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.