What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
François-Xavier Standaert
Google Scholar
164
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study (Pleading for Standardized Leakage-Resilient Cryptography).
Charles Momin
François-Xavier Standaert
Corentin Verhamme
2025
journals/cic
Algebraic Side-Channel Attacks against ISAP's Re-Keying: one Ascon Round May not be Enough for Serial Implementations.
Vincent Grosso
François-Xavier Standaert
2025
journals/cic
SoK: A Methodology to Achieve Provable Side-Channel Security in Real-World Implementations.
Sonia Belaïd
Gaëtan Cassiers
Camille Mutschler
Matthieu Rivain
Thomas Roche
François-Xavier Standaert
Abdul Rahman Taleb
2025
journals/tches
mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software.
Brieuc Balon
Lorenzo Grassi
Pierrick Méaux
Thorben Moos
François-Xavier Standaert
Matthias Johann Steiner
2025
journals/cic
Fly Away: Lifting Fault Security through Canaries and the Uniform Random Fault Model.
Gaëtan Cassiers
Siemen Dhooghe
Thorben Moos
Sayandeep Saha
François-Xavier Standaert
2024
journals/tches
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks.
Thorben Moos
Sayandeep Saha
François-Xavier Standaert
2024
journals/tches
Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon.
Gaëtan Cassiers
François-Xavier Standaert
Corentin Verhamme
2024
journals/cic
Information Theoretic Evaluation of Raccoon's Side-Channel Leakage.
Dina Kamel
François-Xavier Standaert
Olivier Bronchain
2024
journals/cic
Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue.
Gaëtan Cassiers
Loïc Masure
Charles Momin
Thorben Moos
Amir Moradi
François-Xavier Standaert
2024
journals/cic
Authenticity in the Presence of Leakage using a Forkcipher.
Francesco Berti
François-Xavier Standaert
Itamar Levi
2024
journals/tosc
Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate.
Yaobin Shen
Thomas Peters
François-Xavier Standaert
2024
conf/ccs
Leakage-Resilient Circuit Garbling.
Ruiyang Li
Yiteng Sun
Chun Guo
François-Xavier Standaert
Weijia Wang
Xiao Wang
2024
conf/crypto
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences.
Maciej Obremski
João Ribeiro
Lawrence Roy
François-Xavier Standaert
Daniele Venturi
2024
conf/eurocrypt
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking.
Sebastian Faust
Loïc Masure
Elena Micheli
Maximilian Orlt
François-Xavier Standaert
2024
conf/eurocrypt
Generalized Feistel Ciphers for Efficient Prime Field Masking.
Lorenzo Grassi
Loïc Masure
Pierrick Méaux
Thorben Moos
François-Xavier Standaert
2024
conf/africacrypt
Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber.
Duyên Pay
François-Xavier Standaert
2023
journals/tches
Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking.
Loïc Masure
Valence Cristiani
Maxime Lecomte
François-Xavier Standaert
2023
journals/tches
Information Bounds and Convergence Rates for Side-Channel Security Evaluators.
Loïc Masure
Gaëtan Cassiers
Julien M. Hendrickx
François-Xavier Standaert
2023
journals/tches
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations.
Giovanni Camurati
Matteo Dell'Amico
François-Xavier Standaert
2023
journals/tches
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks.
Gaëtan Cassiers
Loïc Masure
Charles Momin
Thorben Moos
François-Xavier Standaert
2023
journals/tches
Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations.
Melissa Azouaoui
Olivier Bronchain
Gaëtan Cassiers
Clément Hoffmann
Yulia Kuzovkova
Joost Renes
Tobias Schneider
Markus Schönauer
François-Xavier Standaert
Christine van Vredendaal
2023
journals/tches
Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations.
Gaëtan Cassiers
Henri Devillez
François-Xavier Standaert
Balazs Udvarhelyi
2023
journals/tosc
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers.
Yaobin Shen
François-Xavier Standaert
2023
journals/tosc
Secure Message Authentication in the Presence of Leakage and Faults.
Francesco Berti
Chun Guo
Thomas Peters
Yaobin Shen
François-Xavier Standaert
2023
conf/ccs
Combined Private Circuits - Combined Security Refurbished.
Jakob Feldtkeller
Tim Güneysu
Thorben Moos
Jan Richter-Brockmann
Sayandeep Saha
Pascal Sasdrich
François-Xavier Standaert
2023
conf/crypto
Learning with Physical Rounding for Linear and Quadratic Leakage Functions.
Clément Hoffmann
Pierrick Méaux
Charles Momin
Yann Rotella
François-Xavier Standaert
Balazs Udvarhelyi
2023
conf/crypto
Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model.
Loïc Masure
François-Xavier Standaert
2023
conf/pkc
POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption.
Clément Hoffmann
Benoît Libert
Charles Momin
Thomas Peters
François-Xavier Standaert
2023
conf/eurocrypt
Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers.
Loïc Masure
Pierrick Méaux
Thorben Moos
François-Xavier Standaert
2023
conf/asiacrypt
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs.
Yaobin Shen
François-Xavier Standaert
Lei Wang
2022
journals/tches
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation.
Yaobin Shen
Thomas Peters
François-Xavier Standaert
Gaëtan Cassiers
Corentin Verhamme
2022
journals/tches
When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors.
Davide Bellizia
Clément Hoffmann
Dina Kamel
Pierrick Méaux
François-Xavier Standaert
2022
journals/tches
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?
Melissa Azouaoui
Olivier Bronchain
Vincent Grosso
Kostas Papagiannopoulos
François-Xavier Standaert
2022
journals/tches
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB.
Francesco Berti
Shivam Bhasin
Jakub Breier
Xiaolu Hou
Romain Poussier
François-Xavier Standaert
Balazs Udvarhelyi
2022
journals/tifs
Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended.
Olivier Bronchain
François Durvaux
Loïc Masure
François-Xavier Standaert
2022
conf/acns
S-box Pooling: Towards More Efficient Side-Channel Security Evaluations.
Yuanyuan Zhou
François-Xavier Standaert
2022
conf/asiacrypt
Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher.
Orel Cosseron
Clément Hoffmann
Pierrick Méaux
François-Xavier Standaert
2022
conf/asiacrypt
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding.
Yuanyuan Zhou
Joop van de Pol
Yu Yu
François-Xavier Standaert
2021
journals/tches
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying.
Sébastien Duval
Pierrick Méaux
Charles Momin
François-Xavier Standaert
2021
journals/tches
Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry.
Gaëtan Cassiers
François-Xavier Standaert
2021
journals/tches
Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype.
Davide Bellizia
Clément Hoffmann
Dina Kamel
Hanlin Liu
Pierrick Méaux
François-Xavier Standaert
Yu Yu
2021
journals/tches
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter.
Olivier Bronchain
François-Xavier Standaert
2021
journals/tches
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.
Olivier Bronchain
Charles Momin
Thomas Peters
François-Xavier Standaert
2021
journals/tosc
MOE: Multiplication Operated Encryption with Trojan Resilience.
Olivier Bronchain
Sebastian Faust
Virginie Lallemand
Gregor Leander
Léo Perrin
François-Xavier Standaert
2021
journals/tosc
Provable Security of SP Networks with Partial Non-Linear Layers.
Chun Guo
François-Xavier Standaert
Weijia Wang
Xiao Wang
Yu Yu
2021
conf/crypto
Towards Tight Random Probing Security.
Gaëtan Cassiers
Sebastian Faust
Maximilian Orlt
François-Xavier Standaert
2021
conf/ih
Evaluating and Designing against Side-Channel Leakage: White Box or Black Box?
François-Xavier Standaert
2021
conf/asiacrypt
Efficient Leakage-Resilient MACs Without Idealized Assumptions.
Francesco Berti
Chun Guo
Thomas Peters
François-Xavier Standaert
2020
journals/tches
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations.
Olivier Bronchain
François-Xavier Standaert
2020
journals/tches
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks.
Giovanni Camurati
Aurélien Francillon
François-Xavier Standaert
2020
journals/tches
Efficient and Private Computations with Code-Based Masking.
Weijia Wang
Pierrick Méaux
Gaëtan Cassiers
François-Xavier Standaert
2020
journals/tches
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications.
Francesco Berti
Chun Guo
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2020
journals/tches
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint.
Qian Guo
Vincent Grosso
François-Xavier Standaert
Olivier Bronchain
2020
journals/tosc
Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking.
Begül Bilgin
Lauren De Meyer
Sébastien Duval
Itamar Levi
François-Xavier Standaert
2020
journals/tosc
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction.
Chun Guo
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2020
journals/tosc
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
Davide Bellizia
Francesco Berti
Olivier Bronchain
Gaëtan Cassiers
Sébastien Duval
Chun Guo
Gregor Leander
Gaëtan Leurent
Itamar Levi
Charles Momin
Olivier Pereira
Thomas Peters
François-Xavier Standaert
Balazs Udvarhelyi
Friedrich Wiemer
2020
journals/tifs
Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference.
Gaëtan Cassiers
François-Xavier Standaert
2020
conf/crypto
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle.
Davide Bellizia
Olivier Bronchain
Gaëtan Cassiers
Vincent Grosso
Chun Guo
Charles Momin
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2020
conf/asiacrypt
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
Weijia Wang
Chun Guo
François-Xavier Standaert
Yu Yu
Gaëtan Cassiers
2019
journals/tches
Multi-Tuple Leakage Detection and the Dependent Signal Issue.
Olivier Bronchain
Tobias Schneider
François-Xavier Standaert
2019
journals/tches
Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks.
Gaëtan Cassiers
François-Xavier Standaert
2019
journals/tches
Reducing a Masked Implementation's Effective Security Order with Setup Manipulations And an Explanation Based on Externally-Amplified Couplings.
Itamar Levi
Davide Bellizia
François-Xavier Standaert
2019
journals/tches
Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed.
Thorben Moos
Amir Moradi
Tobias Schneider
François-Xavier Standaert
2019
journals/tosc
Efficient Side-Channel Secure Message Authentication with Better Bounds.
Chun Guo
François-Xavier Standaert
Weijia Wang
Yu Yu
2019
journals/tifs
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations.
Weijia Wang
Yu Yu
François-Xavier Standaert
2019
journals/joc
Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version.
Alexandre Duc
Sebastian Faust
François-Xavier Standaert
2019
conf/latincrypt
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract).
Chun Guo
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2019
conf/ccs
Towards an Open Approach to Side-Channel Resistant Authenticated Encryption.
François-Xavier Standaert
2019
conf/crypto
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations.
Olivier Bronchain
Julien M. Hendrickx
Clément Massart
Alex Olshevsky
François-Xavier Standaert
2019
conf/esorics
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Gilles Barthe
Sonia Belaïd
Gaëtan Cassiers
Pierre-Alain Fouque
Benjamin Grégoire
François-Xavier Standaert
2019
conf/africacrypt
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint.
Clément Massart
François-Xavier Standaert
2019
conf/africacrypt
Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.
Francesco Berti
Olivier Pereira
François-Xavier Standaert
2018
journals/tches
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.
Sebastian Faust
Vincent Grosso
Santos Merino Del Pozo
Clara Paglialonga
François-Xavier Standaert
2018
journals/tches
Leakage Detection with the x2-Test.
Amir Moradi
Bastian Richter
Tobias Schneider
François-Xavier Standaert
2018
journals/tifs
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
Weijia Wang
Yu Yu
François-Xavier Standaert
Junrong Liu
Zheng Guo
Dawu Gu
2018
conf/ccs
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Francesco Berti
François Koeune
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2018
conf/ccs
Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers.
Olivier Bronchain
Louis Dassy
Sebastian Faust
François-Xavier Standaert
2018
conf/ccs
Demonstrating an LPPN Processor.
Dina Kamel
Davide Bellizia
François-Xavier Standaert
Denis Flandre
David Bol
2018
conf/eurocrypt
Masking Proofs Are Tight and How to Exploit it in Security Evaluations.
Vincent Grosso
François-Xavier Standaert
2017
journals/tosc
On Leakage-Resilient Authenticated Encryption with Decryption Leakages.
Francesco Berti
Olivier Pereira
Thomas Peters
François-Xavier Standaert
2017
conf/ches
Gimli : A Cross-Platform Permutation.
Daniel J. Bernstein
Stefan Kölbl
Stefan Lucks
Pedro Maat Costa Massolino
Florian Mendel
Kashif Nawaz
Tobias Schneider
Peter Schwabe
François-Xavier Standaert
Yosuke Todo
Benoît Viguier
2017
conf/ches
Very High Order Masking: Efficient Implementation and Security Evaluation.
Anthony Journault
François-Xavier Standaert
2017
conf/ches
A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks.
Romain Poussier
Yuanyuan Zhou
François-Xavier Standaert
2017
conf/ctrsa
Ridge-Based Profiled Differential Power Analysis.
Weijia Wang
Yu Yu
François-Xavier Standaert
Dawu Gu
Sen Xu
Chi Zhang
2017
conf/eurocrypt
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
Gilles Barthe
François Dupressoir
Sebastian Faust
Benjamin Grégoire
François-Xavier Standaert
Pierre-Yves Strub
2017
conf/asiacrypt
Consolidating Inner Product Masking.
Josep Balasch
Sebastian Faust
Benedikt Gierlichs
Clara Paglialonga
François-Xavier Standaert
2016
journals/tifs
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
Fan Zhang
Shize Guo
Xinjie Zhao
Tao Wang
Jian Yang
François-Xavier Standaert
Dawu Gu
2016
conf/ccs
Moments-Correlating DPA.
Amir Moradi
François-Xavier Standaert
2016
conf/ccs
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
Stefan Dziembowski
Sebastian Faust
François-Xavier Standaert
2016
conf/crypto
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
Stefan Dziembowski
Sebastian Faust
Gottfried Herold
Anthony Journault
Daniel Masny
François-Xavier Standaert
2016
conf/ches
Towards Easy Leakage Certification.
François Durvaux
François-Xavier Standaert
Santos Merino Del Pozo
2016
conf/ches
Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach.
Romain Poussier
François-Xavier Standaert
Vincent Grosso
2016
conf/eurocrypt
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.
Pierrick Méaux
Anthony Journault
François-Xavier Standaert
Claude Carlet
2016
conf/eurocrypt
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.
François Durvaux
François-Xavier Standaert
2016
conf/asiacrypt
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
Nicolas Bruneau
Sylvain Guilley
Annelie Heuser
Olivier Rioul
François-Xavier Standaert
Yannick Teglia
2016
conf/asiacrypt
Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
Marcel Medwed
François-Xavier Standaert
Ventzislav Nikov
Martin Feldhofer
2016
conf/sacrypt
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms.
Tobias Schneider
Amir Moradi
François-Xavier Standaert
Tim Güneysu
2015
conf/fse
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment.
Cezary Glowacz
Vincent Grosso
Romain Poussier
Joachim Schüth
François-Xavier Standaert
2015
conf/ccs
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives.
Olivier Pereira
François-Xavier Standaert
Srinivas Vivek
2015
conf/esorics
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Junrong Liu
Yu Yu
François-Xavier Standaert
Zheng Guo
Dawu Gu
Wei Sun
Yijie Ge
Xinjun Xie
2015
conf/ches
Blind Source Separation from Single Measurements Using Singular Spectrum Analysis.
Santos Merino Del Pozo
François-Xavier Standaert
2015
conf/ches
Evaluation and Improvement of Generic-Emulating DPA Attacks.
Weijia Wang
Yu Yu
Junrong Liu
Zheng Guo
François-Xavier Standaert
Dawu Gu
Sen Xu
Rong Fu
2015
conf/eurocrypt
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.
Alexandre Duc
Sebastian Faust
François-Xavier Standaert
2015
conf/asiacrypt
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Vincent Grosso
François-Xavier Standaert
2014
journals/tifs
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
Shize Guo
Xinjie Zhao
Fan Zhang
Tao Wang
Zhijie Jerry Shi
François-Xavier Standaert
Chujiao Ma
2014
conf/fse
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations.
Vincent Grosso
Gaëtan Leurent
François-Xavier Standaert
Kerem Varici
2014
conf/ches
FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
Hai Brenner
Lubos Gaspar
Gaëtan Leurent
Alon Rosen
François-Xavier Standaert
2014
conf/ctrsa
The Myth of Generic DPA...and the Magic of Learning.
Carolyn Whitnall
Elisabeth Oswald
François-Xavier Standaert
2014
conf/ctrsa
Hardware Implementation and Side-Channel Analysis of Lapin.
Lubos Gaspar
Gaëtan Leurent
François-Xavier Standaert
2014
conf/eurocrypt
How to Certify the Leakage of a Chip?
François Durvaux
François-Xavier Standaert
Nicolas Veyrat-Charvillon
2014
conf/asiacrypt
Soft Analytical Side-Channel Attacks.
Nicolas Veyrat-Charvillon
Benoît Gérard
François-Xavier Standaert
2014
conf/africacrypt
Efficient Masked S-Boxes Processing - A Step Forward -.
Vincent Grosso
Emmanuel Prouff
François-Xavier Standaert
2013
conf/crypto
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions.
François-Xavier Standaert
Olivier Pereira
Yu Yu
2013
conf/fc
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards.
Yuanyuan Zhou
Yu Yu
François-Xavier Standaert
Jean-Jacques Quisquater
2013
conf/ches
Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Vincent Grosso
François-Xavier Standaert
Sebastian Faust
2013
conf/ches
Block Ciphers That Are Easier to Mask: How Far Can We Go?
Benoît Gérard
Vincent Grosso
María Naya-Plasencia
François-Xavier Standaert
2013
conf/host
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results.
Stéphanie Kerckhof
François Durvaux
François-Xavier Standaert
Benoît Gérard
2013
conf/ctrsa
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness.
Yu Yu
François-Xavier Standaert
2013
conf/eurocrypt
Security Evaluations beyond Computing Power.
Nicolas Veyrat-Charvillon
Benoît Gérard
François-Xavier Standaert
2012
conf/ches
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model.
Yossef Oren
Mathieu Renauld
François-Xavier Standaert
Avishai Wool
2012
conf/ches
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting.
Benoît Gérard
François-Xavier Standaert
2012
conf/ches
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint.
Stéphanie Kerckhof
François Durvaux
Cédric Hocquet
David Bol
François-Xavier Standaert
2012
conf/ches
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs.
Marcel Medwed
François-Xavier Standaert
Antoine Joux
2012
conf/wisa
Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.
François Durvaux
Benoît Gérard
Stéphanie Kerckhof
François Koeune
François-Xavier Standaert
2012
conf/eurocrypt
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Andrey Bogdanov
Lars R. Knudsen
Gregor Leander
François-Xavier Standaert
John P. Steinberger
Elmar Tischhauser
2012
conf/asiacrypt
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note.
Nicolas Veyrat-Charvillon
Marcel Medwed
Stéphanie Kerckhof
François-Xavier Standaert
2012
conf/africacrypt
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Thomas Eisenbarth
Zheng Gong
Tim Güneysu
Stefan Heyse
Sebastiaan Indesteege
Stéphanie Kerckhof
François Koeune
Tomislav Nad
Thomas Plos
Francesco Regazzoni
François-Xavier Standaert
Loïc van Oldeneel tot Oldenzeel
2012
conf/sacrypt
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.
Nicolas Veyrat-Charvillon
Benoît Gérard
Mathieu Renauld
François-Xavier Standaert
2011
journals/joc
Mutual Information Analysis: a Comprehensive Study.
Lejla Batina
Benedikt Gierlichs
Emmanuel Prouff
Matthieu Rivain
François-Xavier Standaert
Nicolas Veyrat-Charvillon
2011
conf/crypto
Generic Side-Channel Distinguishers: Improvements and Limitations.
Nicolas Veyrat-Charvillon
François-Xavier Standaert
2011
conf/crypto
Leftover Hash Lemma, Revisited.
Boaz Barak
Yevgeniy Dodis
Hugo Krawczyk
Olivier Pereira
Krzysztof Pietrzak
François-Xavier Standaert
Yu Yu
2011
conf/sp
A Formalization of the Security Features of Physical Functions.
Frederik Armknecht
Roel Maes
Ahmad-Reza Sadeghi
François-Xavier Standaert
Christian Wachsmann
2011
conf/ches
Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box.
Mathieu Renauld
Dina Kamel
François-Xavier Standaert
Denis Flandre
2011
conf/ches
Extractors against Side-Channel Attacks: Weak or Strong?
Marcel Medwed
François-Xavier Standaert
2011
conf/eurocrypt
A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices.
Mathieu Renauld
François-Xavier Standaert
Nicolas Veyrat-Charvillon
Dina Kamel
Denis Flandre
2011
conf/africacrypt
FPGA Implementation of a Statistical Saturation Attack against PRESENT.
Stéphanie Kerckhof
Baudoin Collard
François-Xavier Standaert
2010
conf/latincrypt
How Leaky Is an Extractor?
François-Xavier Standaert
2010
conf/ccs
Practical leakage-resilient pseudorandom generators.
Yu Yu
François-Xavier Standaert
Olivier Pereira
Moti Yung
2010
conf/acns
Multi-trail Statistical Saturation Attacks.
Baudoin Collard
François-Xavier Standaert
2010
conf/acns
Adaptive Chosen-Message Side-Channel Attacks.
Nicolas Veyrat-Charvillon
François-Xavier Standaert
2010
conf/asiacrypt
The World Is Not Enough: Another Look on Second-Order DPA.
François-Xavier Standaert
Nicolas Veyrat-Charvillon
Elisabeth Oswald
Benedikt Gierlichs
Marcel Medwed
Markus Kasper
Stefan Mangard
2010
conf/africacrypt
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.
Marcel Medwed
François-Xavier Standaert
Johann Großschädl
Francesco Regazzoni
2009
conf/acns
How to Compare Profiled Side-Channel Attacks?.
François-Xavier Standaert
François Koeune
Werner Schindler
2009
conf/ches
Mutual Information Analysis: How, When and Why?.
Nicolas Veyrat-Charvillon
François-Xavier Standaert
2009
conf/ches
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions.
Francesco Regazzoni
Alessandro Cevrero
François-Xavier Standaert
Stéphane Badel
Theo Kluter
Philip Brisk
Yusuf Leblebici
Paolo Ienne
2009
conf/ches
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA.
Mathieu Renauld
François-Xavier Standaert
Nicolas Veyrat-Charvillon
2009
conf/ctrsa
A Statistical Saturation Attack against the Block Cipher PRESENT.
Baudoin Collard
François-Xavier Standaert
2009
conf/eurocrypt
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.
François-Xavier Standaert
Tal Malkin
Moti Yung
2008
conf/fse
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent.
Baudoin Collard
François-Xavier Standaert
Jean-Jacques Quisquater
2008
conf/ccs
A block cipher based pseudo random number generator secure against side-channel key recovery.
Christophe Petit
François-Xavier Standaert
Olivier Pereira
Tal Malkin
Moti Yung
2008
conf/icisc
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices.
François-Xavier Standaert
Benedikt Gierlichs
Ingrid Verbauwhede
2008
conf/icisc
The Swiss-Knife RFID Distance Bounding Protocol.
Chong Hee Kim
Gildas Avoine
François Koeune
François-Xavier Standaert
Olivier Pereira
2008
conf/ches
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages.
François-Xavier Standaert
Cédric Archambeau
2008
conf/africacrypt
Implementation of the AES-128 on Virtex-5 FPGAs.
Philippe Bulens
François-Xavier Standaert
Jean-Jacques Quisquater
Pascal Pellegrin
Gaël Rouvroy
2007
conf/icisc
Improving the Time Complexity of Matsui's Linear Cryptanalysis.
Baudoin Collard
François-Xavier Standaert
Jean-Jacques Quisquater
2007
conf/ches
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles.
François Macé
François-Xavier Standaert
Jean-Jacques Quisquater
2006
conf/ches
Towards Security Limits in Side-Channel Attacks.
François-Xavier Standaert
Eric Peeters
Cédric Archambeau
Jean-Jacques Quisquater
2006
conf/ches
Template Attacks in Principal Subspaces.
Cédric Archambeau
Eric Peeters
François-Xavier Standaert
Jean-Jacques Quisquater
2006
conf/fdtc
A Comparative Cost/Security Analysis of Fault Attack Countermeasures.
Tal Malkin
François-Xavier Standaert
Moti Yung
2005
conf/ches
Improved Higher-Order Side-Channel Attacks with FPGA Experiments.
Eric Peeters
François-Xavier Standaert
Nicolas Donckers
Jean-Jacques Quisquater
2004
conf/fse
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware.
François-Xavier Standaert
Gilles Piret
Gaël Rouvroy
Jean-Jacques Quisquater
Jean-Didier Legat
2004
conf/ches
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
François-Xavier Standaert
Siddika Berna Örs
Bart Preneel
2003
conf/ches
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs.
François-Xavier Standaert
Gaël Rouvroy
Jean-Jacques Quisquater
Jean-Didier Legat
2002
conf/ches
A Time-Memory Tradeoff Using Distinguished Points: New Analysis & FPGA Results.
François-Xavier Standaert
Gaël Rouvroy
Jean-Jacques Quisquater
Jean-Didier Legat
Coauthors
Abdul Rahman Taleb
(1)
Ahmad-Reza Sadeghi
(1)
Alessandro Cevrero
(1)
Alex Olshevsky
(1)
Alexandre Duc
(2)
Alon Rosen
(1)
Amir Moradi
(5)
Andrey Bogdanov
(1)
Annelie Heuser
(1)
Anthony Journault
(3)
Antoine Joux
(1)
Aurélien Francillon
(1)
Avishai Wool
(1)
Balazs Udvarhelyi
(4)
Bart Preneel
(1)
Bastian Richter
(1)
Baudoin Collard
(5)
Begül Bilgin
(1)
Benedikt Gierlichs
(4)
Benjamin Grégoire
(2)
Benoît Gérard
(7)
Benoît Libert
(1)
Benoît Viguier
(1)
Boaz Barak
(1)
Brieuc Balon
(1)
Camille Mutschler
(1)
Carolyn Whitnall
(1)
Cédric Archambeau
(3)
Cédric Hocquet
(1)
Cezary Glowacz
(1)
Charles Momin
(9)
Chi Zhang
(1)
Chong Hee Kim
(1)
Christian Wachsmann
(1)
Christine van Vredendaal
(1)
Christophe Petit
(1)
Chujiao Ma
(1)
Chun Guo
(11)
Clara Paglialonga
(2)
Claude Carlet
(1)
Clément Hoffmann
(6)
Clément Massart
(2)
Corentin Verhamme
(3)
Daniel J. Bernstein
(1)
Daniel Masny
(1)
Daniele Venturi
(1)
David Bol
(2)
Davide Bellizia
(6)
Dawu Gu
(5)
Denis Flandre
(3)
Dina Kamel
(6)
Duyên Pay
(1)
Elena Micheli
(1)
Elisabeth Oswald
(2)
Elmar Tischhauser
(1)
Emmanuel Prouff
(2)
Eric Peeters
(3)
Fan Zhang
(2)
Florian Mendel
(1)
Francesco Berti
(9)
Francesco Regazzoni
(3)
François Dupressoir
(1)
François Durvaux
(7)
François Koeune
(5)
François Macé
(1)
François-Xavier Standaert
(164)
Frederik Armknecht
(1)
Friedrich Wiemer
(1)
Gaël Rouvroy
(4)
Gaëtan Cassiers
(18)
Gaëtan Leurent
(4)
Gildas Avoine
(1)
Gilles Barthe
(2)
Gilles Piret
(1)
Giovanni Camurati
(2)
Gottfried Herold
(1)
Gregor Leander
(3)
Hai Brenner
(1)
Hanlin Liu
(1)
Henri Devillez
(1)
Hugo Krawczyk
(1)
Ingrid Verbauwhede
(1)
Itamar Levi
(4)
Jakob Feldtkeller
(1)
Jakub Breier
(1)
Jan Richter-Brockmann
(1)
Jean-Didier Legat
(3)
Jean-Jacques Quisquater
(11)
Jian Yang
(1)
Joachim Schüth
(1)
João Ribeiro
(1)
Johann Großschädl
(1)
John P. Steinberger
(1)
Joop van de Pol
(1)
Joost Renes
(1)
Josep Balasch
(1)
Julien M. Hendrickx
(2)
Junrong Liu
(3)
Kashif Nawaz
(1)
Kerem Varici
(1)
Kostas Papagiannopoulos
(1)
Krzysztof Pietrzak
(1)
Lars R. Knudsen
(1)
Lauren De Meyer
(1)
Lawrence Roy
(1)
Lei Wang
(1)
Lejla Batina
(1)
Léo Perrin
(1)
Loïc Masure
(9)
Loïc van Oldeneel tot Oldenzeel
(1)
Lorenzo Grassi
(2)
Louis Dassy
(1)
Lubos Gaspar
(2)
Maciej Obremski
(1)
Marcel Medwed
(6)
María Naya-Plasencia
(1)
Markus Kasper
(1)
Markus Schönauer
(1)
Martin Feldhofer
(1)
Mathieu Renauld
(5)
Matteo Dell'Amico
(1)
Matthias Johann Steiner
(1)
Matthieu Rivain
(2)
Maxime Lecomte
(1)
Maximilian Orlt
(2)
Melissa Azouaoui
(2)
Moti Yung
(4)
Nicolas Bruneau
(1)
Nicolas Donckers
(1)
Nicolas Veyrat-Charvillon
(12)
Olivier Bronchain
(14)
Olivier Pereira
(14)
Olivier Rioul
(1)
Orel Cosseron
(1)
Paolo Ienne
(1)
Pascal Pellegrin
(1)
Pascal Sasdrich
(1)
Pedro Maat Costa Massolino
(1)
Peter Schwabe
(1)
Philip Brisk
(1)
Philippe Bulens
(1)
Pierre-Alain Fouque
(1)
Pierre-Yves Strub
(1)
Pierrick Méaux
(10)
Qian Guo
(1)
Roel Maes
(1)
Romain Poussier
(4)
Rong Fu
(1)
Ruiyang Li
(1)
Santos Merino Del Pozo
(3)
Sayandeep Saha
(3)
Sebastiaan Indesteege
(1)
Sebastian Faust
(12)
Sébastien Duval
(3)
Sen Xu
(2)
Shivam Bhasin
(1)
Shize Guo
(2)
Siddika Berna Örs
(1)
Siemen Dhooghe
(1)
Sonia Belaïd
(2)
Srinivas Vivek
(1)
Stefan Dziembowski
(2)
Stefan Heyse
(1)
Stefan Kölbl
(1)
Stefan Lucks
(1)
Stefan Mangard
(1)
Stéphane Badel
(1)
Stéphanie Kerckhof
(6)
Sylvain Guilley
(1)
Tal Malkin
(3)
Tao Wang
(2)
Theo Kluter
(1)
Thomas Eisenbarth
(1)
Thomas Peters
(13)
Thomas Plos
(1)
Thomas Roche
(1)
Thorben Moos
(9)
Tim Güneysu
(3)
Tobias Schneider
(6)
Tomislav Nad
(1)
Valence Cristiani
(1)
Ventzislav Nikov
(1)
Vincent Grosso
(13)
Virginie Lallemand
(1)
Wei Sun
(1)
Weijia Wang
(9)
Werner Schindler
(1)
Xiao Wang
(2)
Xiaolu Hou
(1)
Xinjie Zhao
(2)
Xinjun Xie
(1)
Yann Rotella
(1)
Yannick Teglia
(1)
Yaobin Shen
(5)
Yevgeniy Dodis
(1)
Yijie Ge
(1)
Yiteng Sun
(1)
Yossef Oren
(1)
Yosuke Todo
(1)
Yu Yu
(15)
Yuanyuan Zhou
(4)
Yulia Kuzovkova
(1)
Yusuf Leblebici
(1)
Zheng Gong
(1)
Zheng Guo
(3)
Zhijie Jerry Shi
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to