François-Xavier Standaert

Orcid: 0000-0001-7444-0285

Affiliations:
  • Université catholique de Louvain, Louvain-la-Neuve, Belgium


According to our database1, François-Xavier Standaert authored at least 316 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate.
IACR Cryptol. ePrint Arch., 2024

Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks.
IACR Cryptol. ePrint Arch., 2024

Generalized Feistel Ciphers for Efficient Prime Field Masking - Full Version.
IACR Cryptol. ePrint Arch., 2024

Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking.
IACR Cryptol. ePrint Arch., 2024

A Question on the Explainability of Large Language Models and the Word-Level Univariate First-Order Plausibility Assumption.
CoRR, 2024

2023
Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks.
Proc. ACM Program. Lang., October, 2023

An In-Depth Evaluation of Externally Amplified Coupling (EAC) Attacks - A Concrete Threat for Masked Cryptographic Implementations.
IEEE Trans. Circuits Syst. I Regul. Pap., February, 2023

Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Information Bounds and Convergence Rates for Side-Channel Security Evaluators.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs.
IACR Cryptol. ePrint Arch., 2023

Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

Prouff & Rivain's Formal Security Proof of Masking, Revisited: Tight Bounds in the Noisy Leakage Model.
IACR Cryptol. ePrint Arch., 2023

The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm.
IACR Cryptol. ePrint Arch., 2023

Combined Private Circuits - Combined Security Refurbished.
IACR Cryptol. ePrint Arch., 2023

Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue.
IACR Cryptol. ePrint Arch., 2023

Towards Achieving Provable Side-Channel Security in Practice.
IACR Cryptol. ePrint Arch., 2023

POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations.
Proceedings of the IEEE Information Theory Workshop, 2023

Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Learning with Physical Rounding for Linear and Quadratic Leakage Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Leveraging Coprocessors as Noise Engines in Off-the-Shelf Microcontrollers.
Proceedings of the Smart Card Research and Advanced Applications, 2023

2022
Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended.
IEEE Trans. Inf. Forensics Secur., 2022

Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Tight-ES-TRNG: Improved Construction and Robustness Analysis.
SN Comput. Sci., 2022

Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Competition's Finalists.
IACR Cryptol. ePrint Arch., 2022

Unprotected and Masked Hardware Implementations of Spook v2.
IACR Cryptol. ePrint Arch., 2022

Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations.
IACR Cryptol. ePrint Arch., 2022

A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations.
IACR Cryptol. ePrint Arch., 2022

Effective and Efficient Masking with Low Noise using Small-Mersenne-Prime Ciphers.
IACR Cryptol. ePrint Arch., 2022

Don’t Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking.
IACR Cryptol. ePrint Arch., 2022

Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2022

Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher.
IACR Cryptol. ePrint Arch., 2022

Secure Message Authentication in the Presence of Leakage and Faults.
IACR Cryptol. ePrint Arch., 2022

Removing the Field Size Loss from Duc et al.'s Conjectured Bound for Masked Encodings.
IACR Cryptol. ePrint Arch., 2022

Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber.
IACR Cryptol. ePrint Arch., 2022

Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations.
IACR Cryptol. ePrint Arch., 2022

A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding.
IACR Cryptol. ePrint Arch., 2022

Automated news recommendation in front of adversarial examples and the technical limits of transparency in algorithmic accountability.
AI Soc., 2022

Fully-Digital Randomization Based Side-Channel Security - Toward Ultra-Low Cost-per-Security.
IEEE Access, 2022

Automatic and Manual Detection of Generated News: Case Study, Limitations and Challenges.
Proceedings of the MAD@ICMR 2022: Proceedings of the 1st International Workshop on Multimedia AI against Disinformation, Newark, NJ, USA, June 27, 2022

Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

S-box Pooling: Towards More Efficient Side-Channel Security Evaluations.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Provable Security of SP Networks with Partial Non-Linear Layers.
IACR Trans. Symmetric Cryptol., 2021

MOE: Multiplication Operated Encryption with Trojan Resilience.
IACR Trans. Symmetric Cryptol., 2021

Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Hardware Private Circuits: From Trivial Composition to Full Verification.
IEEE Trans. Computers, 2021

Side-channel analysis of a learning parity with physical noise processor.
J. Cryptogr. Eng., 2021

Reducing risks through simplicity: high side-channel security for lazy engineers.
J. Cryptogr. Eng., 2021

Towards Tight Random Probing Security.
IACR Cryptol. ePrint Arch., 2021

Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace.
IACR Cryptol. ePrint Arch., 2021

Efficient Leakage-Resilient MACs without Idealized Assumptions.
IACR Cryptol. ePrint Arch., 2021

How to fool a black box machine learning based side-channel security evaluation.
Cryptogr. Commun., 2021

A stealthy Hardware Trojan based on a Statistical Fault Attack.
Cryptogr. Commun., 2021

Evaluating and Designing against Side-Channel Leakage: White Box or Black Box?
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design.
Proceedings of the 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2021

Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021

Towards a Better Understanding of Side-Channel Analysis Measurements Setups.
Proceedings of the Smart Card Research and Advanced Applications, 2021

2020
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
IACR Trans. Symmetric Cryptol., 2020

Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking.
IACR Trans. Symmetric Cryptol., 2020

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020

Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference.
IEEE Trans. Inf. Forensics Secur., 2020

Learning with Physical Noise or Errors.
IEEE Trans. Dependable Secur. Comput., 2020

Efficient and Private Computations with Code-Based Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Ask Less, Get More: Side-Channel Signal Hiding, Revisited.
IEEE Trans. Circuits Syst., 2020

Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks.
J. Cryptogr. Eng., 2020

Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
J. Cryptogr. Eng., 2020

Beyond algorithmic noise or how to shuffle parallel implementations?
Int. J. Circuit Theory Appl., 2020

Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
IACR Cryptol. ePrint Arch., 2020

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle.
IACR Cryptol. ePrint Arch., 2020

On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices.
IACR Cryptol. ePrint Arch., 2020

A Systematic Appraisal of Side Channel Evaluation Strategies.
IACR Cryptol. ePrint Arch., 2020

Fidelity Leakages: Applying Membership Inference Attacks to Preference Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Scatter: a Missing Case?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020

On the Security of Off-the-Shelf Microcontrollers: Hardware Is Not Enough.
Proceedings of the Smart Card Research and Advanced Applications, 2020

2019
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations.
IEEE Trans. Inf. Forensics Secur., 2019

Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Reducing a Masked Implementation's Effective Security Order with Setup Manipulations And an Explanation Based on Externally-Amplified Couplings.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Multi-Tuple Leakage Detection and the Dependent Signal Issue.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version.
J. Cryptol., 2019

A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs.
Integr., 2019

Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations.
IACR Cryptol. ePrint Arch., 2019

Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version).
IACR Cryptol. ePrint Arch., 2019

Efficient Side-Channel Secure Message Authentication with Better Bounds.
IACR Cryptol. ePrint Arch., 2019

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptol. ePrint Arch., 2019

Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations.
IACR Cryptol. ePrint Arch., 2019

Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
IACR Cryptol. ePrint Arch., 2019

Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions.
IACR Cryptol. ePrint Arch., 2019

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
IACR Cryptol. ePrint Arch., 2019

Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?
IACR Cryptol. ePrint Arch., 2019

Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder.
IACR Cryptol. ePrint Arch., 2019

SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Improved Filter Permutators for Efficient FHE: Better Instances and Implementations.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019

Towards an Open Approach to Side-Channel Resistant Authenticated Encryption.
Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2019

Key Enumeration from the Adversarial Viewpoint.
Proceedings of the Smart Card Research and Advanced Applications, 2019

Revisiting Location Privacy from a Side-Channel Analysis Viewpoint.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

2018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
IEEE Trans. Inf. Forensics Secur., 2018

Leakage Detection with the x2-Test.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling.
IEEE Trans. Computers, 2018

Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version.
J. Cryptogr. Eng., 2018

Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptol. ePrint Arch., 2018

Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
IACR Cryptol. ePrint Arch., 2018

Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
IACR Cryptol. ePrint Arch., 2018

Improved Bitslice Masking: from Optimized Non-Interference to Probe Isolation.
IACR Cryptol. ePrint Arch., 2018

Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptol. ePrint Arch., 2018

Side-channel attacks against the human brain: the PIN code case study (extended version).
Brain Informatics, 2018

Let's make it Noisy: A Simulation Methodology for adding Intrinsic Physical Noise to Cryptographic Designs.
Proceedings of the 14th Conference on Ph.D. Research in Microelectronics and Electronics, 2018

A Transient Noise Analysis of Secured Dual-Rail Based Logic Style.
Proceedings of the 2018 New Generation of CAS, 2018

Demonstrating an LPPN Processor.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
On Leakage-Resilient Authenticated Encryption with Decryption Leakages.
IACR Trans. Symmetric Cryptol., 2017

Towards easy leakage certification: extended version.
J. Cryptogr. Eng., 2017

Towards Sound and Optimal Leakage Detection Procedure.
IACR Cryptol. ePrint Arch., 2017

How (not) to Use Welch's T-test in Side-Channel Security Evaluations.
IACR Cryptol. ePrint Arch., 2017

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks.
IACR Cryptol. ePrint Arch., 2017

Very High Order Masking: Efficient Implementation and Security Evaluation.
IACR Cryptol. ePrint Arch., 2017

Masking Proofs are Tight (and How to Exploit it in Security Evaluations).
IACR Cryptol. ePrint Arch., 2017

Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
IACR Cryptol. ePrint Arch., 2017

Gimli: a cross-platform permutation.
IACR Cryptol. ePrint Arch., 2017

Consolidating Inner Product Masking.
IACR Cryptol. ePrint Arch., 2017

Improving the security and efficiency of block ciphers based on LS-designs.
Des. Codes Cryptogr., 2017

Ridge-Based Profiled Differential Power Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Getting the Most Out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

Side-Channel Attacks Against the Human Brain: The PIN Code Case Study.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

Connecting and Improving Direct Sum Masking and Inner Product Masking.
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016

Evaluation and Improvement of Generic-Emulating DPA Attacks.
IACR Cryptol. ePrint Arch., 2016

Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms.
IACR Cryptol. ePrint Arch., 2016

A note on the security of threshold implementations with d+1 input shares.
IACR Cryptol. ePrint Arch., 2016

Blind Source Separation from Single Measurements using Singular Spectrum Analysis.
IACR Cryptol. ePrint Arch., 2016

Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach.
IACR Cryptol. ePrint Arch., 2016

Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.
IACR Cryptol. ePrint Arch., 2016

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
IACR Cryptol. ePrint Arch., 2016

Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.
IACR Cryptol. ePrint Arch., 2016

Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2016

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
IACR Cryptol. ePrint Arch., 2016

Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I (Invited Talk).
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Score-Based vs. Probability-Based Enumeration - A Cautionary Note.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Leverage Emerging Technologies For DPA-Resilient Block Cipher Design.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

Towards Easy Leakage Certification.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016

An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2016

Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Automatic Application of Power Analysis Countermeasures.
IEEE Trans. Computers, 2015

ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
IACR Cryptol. ePrint Arch., 2015

Towards Easy Leakage Certification.
IACR Cryptol. ePrint Arch., 2015

From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.
IACR Cryptol. ePrint Arch., 2015

Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
IACR Cryptol. ePrint Arch., 2015

Masking and leakage-resilient primitives: One, the other(s) or both?
Cryptogr. Commun., 2015

On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Proceedings of the Information Security Practice and Experience, 2015

Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015

Side-channel attacks from static power: when should we care?
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014

A Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to Low Voltage Fault Attacks.
IEEE Trans. Emerg. Top. Comput., 2014

Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations.
J. Cryptogr. Eng., 2014

Masking vs. multiparty computation: how large is the gap for AES?
J. Cryptogr. Eng., 2014

Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptogr. Eng., 2014

Soft Analytical Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2014

Moments-Correlating DPA.
IACR Cryptol. ePrint Arch., 2014

Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices).
IACR Cryptol. ePrint Arch., 2014

Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment.
IACR Cryptol. ePrint Arch., 2014

Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits.
IACR Cryptol. ePrint Arch., 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
IACR Cryptol. ePrint Arch., 2014

LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Hardware Implementation and Side-Channel Analysis of Lapin.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Efficient Masked S-Boxes Processing - A Step Forward -.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

A Survey of Recent Results in FPGA Security and Intellectual Property Protection.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version.
J. Cryptogr. Eng., 2013

On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards.
IACR Cryptol. ePrint Arch., 2013

Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers.
IACR Cryptol. ePrint Arch., 2013

Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions.
IACR Cryptol. ePrint Arch., 2013

Block Ciphers that are Easier to Mask: How Far Can we Go?
IACR Cryptol. ePrint Arch., 2013

On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption.
IACR Cryptol. ePrint Arch., 2013

How to Certify the Leakage of a Chip?
IACR Cryptol. ePrint Arch., 2013

Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

Security Evaluations beyond Computing Power.
Proceedings of the Advances in Cryptology, 2013

Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Strong PUFs and their (physical) unpredictability: a case study with power PUFs.
Proceedings of the Workshop on Embedded Systems Security, 2013

From New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical Security.
Proceedings of the Smart Card Research and Advanced Applications, 2013

Low Entropy Masking Schemes, Revisited.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Side-Channel Analysis and Its Relevance to Fault Attacks.
Proceedings of the Fault Analysis in Cryptography, 2012

Analysis and experimental evaluation of image-based PUFs.
J. Cryptogr. Eng., 2012

The myth of generic DPA...and the magic of learning.
IACR Cryptol. ePrint Arch., 2012

Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure.
IACR Cryptol. ePrint Arch., 2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations.
IACR Cryptol. ePrint Arch., 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012

Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Security Analysis of Image-Based PUFs for Anti-counterfeiting.
Proceedings of the Communications and Multimedia Security, 2012

Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Time-Memory Trade-offs.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Physical Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Mutual Information Analysis: a Comprehensive Study.
J. Cryptol., 2011

Extractors against side-channel attacks: weak or strong?
J. Cryptogr. Eng., 2011

Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags.
J. Cryptogr. Eng., 2011

Univariate side channel attacks and leakage modeling.
J. Cryptogr. Eng., 2011

One for all - all for one: unifying standard differential power analysis attacks.
IET Inf. Secur., 2011

Generic Side-Channel Distinguishers: Improvements and Limitations.
IACR Cryptol. ePrint Arch., 2011

An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2011

Spectral Coherence Analysis - First Experimental Results -.
IACR Cryptol. ePrint Arch., 2011

Leftover Hash Lemma, Revisited.
IACR Cryptol. ePrint Arch., 2011

A Formalization of the Security Features of Physical Functions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

A first step towards automatic application of power analysis countermeasures.
Proceedings of the 48th Design Automation Conference, 2011

Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2011

Compact FPGA Implementations of the Five SHA-3 Finalists.
Proceedings of the Smart Card Research and Advanced Applications, 2011

FPGA Implementation of a Statistical Saturation Attack against PRESENT.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Leakage Resilient Cryptography in Practice.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

How to strongly link data and its medium: the paper case.
IET Inf. Secur., 2010

The World is Not Enough: Another Look on Second-Order DPA.
IACR Cryptol. ePrint Arch., 2010

Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

How Leaky Is an Extractor?
Proceedings of the Progress in Cryptology, 2010

Randomly driven fuzzy key extraction of unclonable images.
Proceedings of the International Conference on Image Processing, 2010

Glitch-induced within-die variations of dynamic energy in voltage-scaled nano-CMOS circuits.
Proceedings of the 36th European Solid-State Circuits Conference, 2010

Practical leakage-resilient pseudorandom generators.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.
Proceedings of the Progress in Cryptology, 2010

Adaptive Chosen-Message Side-Channel Attacks.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Multi-trail Statistical Saturation Attacks.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Introduction to Side-Channel Attacks.
Proceedings of the Secure Integrated Circuits and Systems, 2010

2009
Leakage Resilient Cryptography in Practice.
IACR Cryptol. ePrint Arch., 2009

Algebraic Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2009

One for All - All for One: Unifying Standard DPA Attacks.
IACR Cryptol. ePrint Arch., 2009

Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Des. Codes Cryptogr., 2009

Scaling Trends of the AES S-box Low Power Consumption in 130 and 65 nm CMOS Technology Nodes.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
Proceedings of the Advances in Cryptology, 2009

A Statistical Saturation Attack against the Block Cipher PRESENT.
Proceedings of the Topics in Cryptology, 2009

Mutual Information Analysis: How, When and Why?.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

How to Compare Profiled Side-Channel Attacks?.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs.
Proceedings of the Cryptographic Engineering, 2009

2008
Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking).
IET Inf. Secur., 2008

Improving the Rules of the DPA Contest.
IACR Cryptol. ePrint Arch., 2008

Information Theoretic Evaluation of Side-Channel Resistant Logic Styles.
IACR Cryptol. ePrint Arch., 2008

On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk).
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices.
Proceedings of the Information Security and Cryptology, 2008

The Swiss-Knife RFID Distance Bounding Protocol.
Proceedings of the Information Security and Cryptology, 2008

Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Implementation of the AES-128 on Virtex-5 FPGAs.
Proceedings of the Progress in Cryptology, 2008

2007
FPGA implementations of the ICEBERG block cipher.
Integr., 2007

Power and electromagnetic analysis: Improved model, consequences and comparisons.
Integr., 2007

Towards Security Limits in Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2007

A Block Cipher based PRNG Secure Against Side-Channel Key Recovery.
IACR Cryptol. ePrint Arch., 2007

Improving the Time Complexity of Matsui's Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology, 2007

Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays.
Proc. IEEE, 2006

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version).
IACR Cryptol. ePrint Arch., 2006

FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks.
Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), 2006

A Comparative Cost/Security Analysis of Fault Attack Countermeasures.
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006

Template Attacks in Principal Subspaces.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

SEA: A Scalable Encryption Algorithm for Small Embedded Applications.
Proceedings of the Smart Card Research and Advanced Applications, 2006

Updates on the Security of FPGAs Against Power Analysis Attacks.
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006

2005
Time-memory tradeoffs.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

A Design Methodology for Secured ICs Using Dynamic Current Mode Logic.
Proceedings of the Integrated Circuit and System Design, 2005

On the Masking Countermeasure and Higher-Order Power Analysis Attacks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Practical Evaluation of a Radial Soft Hash Algorithm.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Improved Higher-Order Side-Channel Attacks with FPGA Experiments.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Power Analysis Attacks Against FPGA Implementations of the DES.
Proceedings of the Field Programmable Logic and Application, 2004

A Tutorial on Physical Security and Side-Channel Attacks.
Proceedings of the Foundations of Security Analysis and Design III, 2004

Hardware implementation of a fingerprinting algorithm suited for digital cinema.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Reconfigurable hardware solutions for the digital rights management of digital cinema.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

On the Security of the DeKaRT Primitive.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2003
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis.
IEEE Trans. Computers, 2003

Efficient FPGA Implementation of Block Cipher MISTY1.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Power Analysis of FPGAs: How Practical is the Attack?
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003

A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL.
Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2003

Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES.
Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2003

Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation.
Proceedings of the Field-Programmable Logic and Applications, 2002

An FPGA Implementation of the Linear Cryptanalysis.
Proceedings of the Field-Programmable Logic and Applications, 2002

A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002


  Loading...