François-Xavier Standaert

According to our database1, François-Xavier Standaert authored at least 269 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations.
IEEE Trans. Information Forensics and Security, 2019

Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Reducing a Masked Implementation's Effective Security Order with Setup Manipulations And an Explanation Based on Externally-Amplified Couplings.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Multi-Tuple Leakage Detection and the Dependent Signal Issue.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version.
J. Cryptology, 2019

A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs.
Integration, 2019

Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations.
IACR Cryptology ePrint Archive, 2019

Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version).
IACR Cryptology ePrint Archive, 2019

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge.
IACR Cryptology ePrint Archive, 2019

Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations.
IACR Cryptology ePrint Archive, 2019

Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations.
IACR Cryptology ePrint Archive, 2019

Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
IACR Cryptology ePrint Archive, 2019

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications.
IACR Cryptology ePrint Archive, 2019

Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder.
IACR Cryptology ePrint Archive, 2019

Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019

Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Fast Side-Channel Security Evaluation of ECC Implementations - Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

Revisiting Location Privacy from a Side-Channel Analysis Viewpoint.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

2018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
IEEE Trans. Information Forensics and Security, 2018

Leakage Detection with the x2-Test.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling.
IEEE Trans. Computers, 2018

Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version.
J. Cryptographic Engineering, 2018

Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed.
IACR Cryptology ePrint Archive, 2018

Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions.
IACR Cryptology ePrint Archive, 2018

Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
IACR Cryptology ePrint Archive, 2018

Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
IACR Cryptology ePrint Archive, 2018

Improved Bitslice Masking: from Optimized Non-Interference to Probe Isolation.
IACR Cryptology ePrint Archive, 2018

Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptology ePrint Archive, 2018

Let's make it Noisy: A Simulation Methodology for adding Intrinsic Physical Noise to Cryptographic Designs.
Proceedings of the 14th Conference on Ph.D. Research in Microelectronics and Electronics, 2018

A Transient Noise Analysis of Secured Dual-Rail Based Logic Style.
Proceedings of the 2018 New Generation of CAS, 2018

Masking Proofs Are Tight and How to Exploit it in Security Evaluations.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

Demonstrating an LPPN Processor.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

How (Not) to Use Welch's T-Test in Side-Channel Security Evaluations.
Proceedings of the Smart Card Research and Advanced Applications, 2018

2017
On Leakage-Resilient Authenticated Encryption with Decryption Leakages.
IACR Trans. Symmetric Cryptol., 2017

Towards easy leakage certification: extended version.
J. Cryptographic Engineering, 2017

Towards Sound and Optimal Leakage Detection Procedure.
IACR Cryptology ePrint Archive, 2017

How (not) to Use Welch's T-test in Side-Channel Security Evaluations.
IACR Cryptology ePrint Archive, 2017

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks.
IACR Cryptology ePrint Archive, 2017

Very High Order Masking: Efficient Implementation and Security Evaluation.
IACR Cryptology ePrint Archive, 2017

Masking Proofs are Tight (and How to Exploit it in Security Evaluations).
IACR Cryptology ePrint Archive, 2017

Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
IACR Cryptology ePrint Archive, 2017

Gimli: a cross-platform permutation.
IACR Cryptology ePrint Archive, 2017

Consolidating Inner Product Masking.
IACR Cryptology ePrint Archive, 2017

Improving the security and efficiency of block ciphers based on LS-designs.
Des. Codes Cryptogr., 2017

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Ridge-Based Profiled Differential Power Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Getting the Most Out of Leakage Detection - Statistical Tools and Measurement Setups Hand in Hand.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks: A Case-Study.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

Side-Channel Attacks Against the Human Brain: The PIN Code Case Study.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Very High Order Masking: Efficient Implementation and Security Evaluation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Gimli : A Cross-Platform Permutation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Connecting and Improving Direct Sum Masking and Inner Product Masking.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Towards Sound and Optimal Leakage Detection Procedure.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Consolidating Inner Product Masking.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Information Forensics and Security, 2016

Evaluation and Improvement of Generic-Emulating DPA Attacks.
IACR Cryptology ePrint Archive, 2016

Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms.
IACR Cryptology ePrint Archive, 2016

A note on the security of threshold implementations with d+1 input shares.
IACR Cryptology ePrint Archive, 2016

Blind Source Separation from Single Measurements using Singular Spectrum Analysis.
IACR Cryptology ePrint Archive, 2016

Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach.
IACR Cryptology ePrint Archive, 2016

Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.
IACR Cryptology ePrint Archive, 2016

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
IACR Cryptology ePrint Archive, 2016

Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.
IACR Cryptology ePrint Archive, 2016

Leakage-Resilient and Misuse-Resistant Authenticated Encryption.
IACR Cryptology ePrint Archive, 2016

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
IACR Cryptology ePrint Archive, 2016

Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I (Invited Talk).
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Score-Based vs. Probability-Based Enumeration - A Cautionary Note.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Leverage Emerging Technologies For DPA-Resilient Block Cipher Design.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Towards Easy Leakage Certification.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Moments-Correlating DPA.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016

An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2016

Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Automatic Application of Power Analysis Countermeasures.
IEEE Trans. Computers, 2015

Masking vs. Multiparty Computation: How Large is the Gap for AES?
IACR Cryptology ePrint Archive, 2015

ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
IACR Cryptology ePrint Archive, 2015

Towards Easy Leakage Certification.
IACR Cryptology ePrint Archive, 2015

From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.
IACR Cryptology ePrint Archive, 2015

Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
IACR Cryptology ePrint Archive, 2015

Masking and leakage-resilient primitives: One, the other(s) or both?
Cryptography and Communications, 2015

On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Proceedings of the Information Security Practice and Experience, 2015

Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015

Side-channel attacks from static power: when should we care?
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Evaluation and Improvement of Generic-Emulating DPA Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

Blind Source Separation from Single Measurements Using Singular Spectrum Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security.
Proceedings of the Smart Card Research and Advanced Applications, 2015

ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Information Forensics and Security, 2014

A Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to Low Voltage Fault Attacks.
IEEE Trans. Emerging Topics Comput., 2014

Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations.
J. Cryptographic Engineering, 2014

Masking vs. multiparty computation: how large is the gap for AES?
J. Cryptographic Engineering, 2014

Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptographic Engineering, 2014

Soft Analytical Side-Channel Attacks.
IACR Cryptology ePrint Archive, 2014

Moments-Correlating DPA.
IACR Cryptology ePrint Archive, 2014

Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices).
IACR Cryptology ePrint Archive, 2014

Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment.
IACR Cryptology ePrint Archive, 2014

Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits.
IACR Cryptology ePrint Archive, 2014

Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?
IACR Cryptology ePrint Archive, 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
IACR Cryptology ePrint Archive, 2014

LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

How to Certify the Leakage of a Chip?
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

The Myth of Generic DPA...and the Magic of Learning.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Hardware Implementation and Side-Channel Analysis of Lapin.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Combining Leakage-Resilient PRFs and Shuffling - Towards Bounded Security for Small Embedded Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
Proceedings of the Smart Card Research and Advanced Applications, 2014

Soft Analytical Side-Channel Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Efficient Masked S-Boxes Processing - A Step Forward -.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

A Survey of Recent Results in FPGA Security and Intellectual Property Protection.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version.
J. Cryptographic Engineering, 2013

On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards.
IACR Cryptology ePrint Archive, 2013

Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers.
IACR Cryptology ePrint Archive, 2013

Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions.
IACR Cryptology ePrint Archive, 2013

Block Ciphers that are Easier to Mask: How Far Can we Go?
IACR Cryptology ePrint Archive, 2013

On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption.
IACR Cryptology ePrint Archive, 2013

How to Certify the Leakage of a Chip?
IACR Cryptology ePrint Archive, 2013

Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis.
IACR Cryptology ePrint Archive, 2013

Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers.
Proceedings of the Information Security Practice and Experience, 2013

Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards.
Proceedings of the Financial Cryptography and Data Security, 2013

Security Evaluations beyond Computing Power.
Proceedings of the Advances in Cryptology, 2013

Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

Block Ciphers That Are Easier to Mask: How Far Can We Go?
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

Strong PUFs and their (physical) unpredictability: a case study with power PUFs.
Proceedings of the Workshop on Embedded Systems Security, 2013

From New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical Security.
Proceedings of the Smart Card Research and Advanced Applications, 2013

Low Entropy Masking Schemes, Revisited.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Side-Channel Analysis and Its Relevance to Fault Attacks.
Proceedings of the Fault Analysis in Cryptography, 2012

Analysis and experimental evaluation of image-based PUFs.
J. Cryptographic Engineering, 2012

The myth of generic DPA...and the magic of learning.
IACR Cryptology ePrint Archive, 2012

Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
IACR Cryptology ePrint Archive, 2012

Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure.
IACR Cryptology ePrint Archive, 2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations.
IACR Cryptology ePrint Archive, 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptology ePrint Archive, 2012

Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Security Analysis of Image-Based PUFs for Anti-counterfeiting.
Proceedings of the Communications and Multimedia Security, 2012

Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Time-Memory Trade-offs.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Physical Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Mutual Information Analysis: a Comprehensive Study.
J. Cryptology, 2011

Extractors against side-channel attacks: weak or strong?
J. Cryptographic Engineering, 2011

Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags.
J. Cryptographic Engineering, 2011

Univariate side channel attacks and leakage modeling.
J. Cryptographic Engineering, 2011

One for all - all for one: unifying standard differential power analysis attacks.
IET Information Security, 2011

Generic Side-Channel Distinguishers: Improvements and Limitations.
IACR Cryptology ePrint Archive, 2011

An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks.
IACR Cryptology ePrint Archive, 2011

Extractors Against Side-Channel Attacks: Weak or Strong?
IACR Cryptology ePrint Archive, 2011

Univariate Side Channel Attacks and Leakage Modeling.
IACR Cryptology ePrint Archive, 2011

Spectral Coherence Analysis - First Experimental Results -.
IACR Cryptology ePrint Archive, 2011

Leftover Hash Lemma, Revisited.
IACR Cryptology ePrint Archive, 2011

A Formalization of the Security Features of Physical Functions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

A first step towards automatic application of power analysis countermeasures.
Proceedings of the 48th Design Automation Conference, 2011

Generic Side-Channel Distinguishers: Improvements and Limitations.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Leftover Hash Lemma, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Extractors against Side-Channel Attacks: Weak or Strong?
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2011

Compact FPGA Implementations of the Five SHA-3 Finalists.
Proceedings of the Smart Card Research and Advanced Applications, 2011

FPGA Implementation of a Statistical Saturation Attack against PRESENT.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Leakage Resilient Cryptography in Practice.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

How to strongly link data and its medium: the paper case.
IET Information Security, 2010

The World is Not Enough: Another Look on Second-Order DPA.
IACR Cryptology ePrint Archive, 2010

Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

How Leaky Is an Extractor?
Proceedings of the Progress in Cryptology, 2010

Randomly driven fuzzy key extraction of unclonable images.
Proceedings of the International Conference on Image Processing, 2010

Practical leakage-resilient pseudorandom generators.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

The World Is Not Enough: Another Look on Second-Order DPA.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.
Proceedings of the Progress in Cryptology, 2010

Adaptive Chosen-Message Side-Channel Attacks.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Multi-trail Statistical Saturation Attacks.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Introduction to Side-Channel Attacks.
Proceedings of the Secure Integrated Circuits and Systems, 2010

2009
Leakage Resilient Cryptography in Practice.
IACR Cryptology ePrint Archive, 2009

Algebraic Side-Channel Attacks.
IACR Cryptology ePrint Archive, 2009

One for All - All for One: Unifying Standard DPA Attacks.
IACR Cryptology ePrint Archive, 2009

Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Des. Codes Cryptogr., 2009

Scaling Trends of the AES S-box Low Power Consumption in 130 and 65 nm CMOS Technology Nodes.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
Proceedings of the Advances in Cryptology, 2009

A Statistical Saturation Attack against the Block Cipher PRESENT.
Proceedings of the Topics in Cryptology, 2009

Algebraic Side-Channel Attacks.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Mutual Information Analysis: How, When and Why?.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

How to Compare Profiled Side-Channel Attacks?.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs.
Proceedings of the Cryptographic Engineering, 2009

2008
Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking).
IET Information Security, 2008

Improving the Rules of the DPA Contest.
IACR Cryptology ePrint Archive, 2008

Information Theoretic Evaluation of Side-Channel Resistant Logic Styles.
IACR Cryptology ePrint Archive, 2008

On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk).
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices.
Proceedings of the Information Security and Cryptology, 2008

The Swiss-Knife RFID Distance Bounding Protocol.
Proceedings of the Information Security and Cryptology, 2008

Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

A block cipher based pseudo random number generator secure against side-channel key recovery.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Implementation of the AES-128 on Virtex-5 FPGAs.
Proceedings of the Progress in Cryptology, 2008

2007
FPGA implementations of the ICEBERG block cipher.
Integration, 2007

Power and electromagnetic analysis: Improved model, consequences and comparisons.
Integration, 2007

Towards Security Limits in Side-Channel Attacks.
IACR Cryptology ePrint Archive, 2007

A Block Cipher based PRNG Secure Against Side-Channel Key Recovery.
IACR Cryptology ePrint Archive, 2007

Improving the Time Complexity of Matsui's Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology, 2007

Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Information Theoretic Evaluation of Side-Channel Resistant Logic Styles.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays.
Proceedings of the IEEE, 2006

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version).
IACR Cryptology ePrint Archive, 2006

FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks.
Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), 2006

A Comparative Cost/Security Analysis of Fault Attack Countermeasures.
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006

Towards Security Limits in Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Template Attacks in Principal Subspaces.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

SEA: A Scalable Encryption Algorithm for Small Embedded Applications.
Proceedings of the Smart Card Research and Advanced Applications, 2006

Updates on the Security of FPGAs Against Power Analysis Attacks.
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006

2005
Time-memory tradeoffs.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

A Design Methodology for Secured ICs Using Dynamic Current Mode Logic.
Proceedings of the Integrated Circuit and System Design, 2005

FPGA Implementations of the ICEBERG Block Cipher.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

On the Masking Countermeasure and Higher-Order Power Analysis Attacks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Practical Evaluation of a Radial Soft Hash Algorithm.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Improved Higher-Order Side-Channel Attacks with FPGA Experiments.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Power Analysis Attacks Against FPGA Implementations of the DES.
Proceedings of the Field Programmable Logic and Application, 2004

A Tutorial on Physical Security and Side-Channel Attacks.
Proceedings of the Foundations of Security Analysis and Design III, 2004

Hardware implementation of a fingerprinting algorithm suited for digital cinema.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Reconfigurable hardware solutions for the digital rights management of digital cinema.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

On the Security of the DeKaRT Primitive.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2003
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis.
IEEE Trans. Computers, 2003

Efficient FPGA Implementation of Block Cipher MISTY1.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Power Analysis of FPGAs: How Practical is the Attack?
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003

Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES.
Proceedings of the Field Programmable Logic and Application, 13th International Conference, 2003

A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL.
Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2003

Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation.
Proceedings of the Field-Programmable Logic and Applications, 2002

An FPGA Implementation of the Linear Cryptanalysis.
Proceedings of the Field-Programmable Logic and Applications, 2002

A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002


  Loading...