All cryptography & information security publications


Journal Articles


1. Cassiers, Gaëtan; Bronchain, Olivier. Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit : with Application to Lattice-Based KEMs. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, no.4, p. 553-588 (2022). doi:10.46586/tches.v2022.i4.553-588. https://hdl.handle.net/2078.1/265497

2. Standaert, François-Xavier; Bronchain, Olivier; Masure, Loïc; Durvaux, François. Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended. In: IEEE Transactions on Information Forensics and Security, Vol. 17, p. 574-584 (2022). doi:10.1109/TIFS.2022.3144871. http://hdl.handle.net/2078.1/257142

3. Yu, Yu; Méaux, Pierrick; Standaert, François-Xavier; Hoffmann, Clément; Kamel, Dina; Bellizia, Davide; Liu, Hanlin. Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, no.3, p. 390-417 (2021). doi:10.46586/tches.v2021.i3.390-417. http://hdl.handle.net/2078.1/256817

4. Standaert, François-Xavier; Bronchain, Olivier. Breaking Masked Implementations with ManyShares on 32-bit Software Platformsor or When the Security Order Does Not Matter. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, no.3, p. 202-234 (2021). doi:10.46586/tches.v2021.i3.202-234. http://hdl.handle.net/2078.1/256816

5. Berti, Francesco; Poussier, Romain; Breier, Jakub; Udvarhelyi, Balazs; Standaert, François-Xavier; Hou, Xiaolu; Bhasin, Shivam. A Finer-Grain Analysis of the Leakage (Non)Resilience of OCB. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, no.1, p. 461-481 (2022). doi:10.46586/tches.v2022.i1.461-481. http://hdl.handle.net/2078.1/260810

6. Standaert, François-Xavier; Momin, Charles; Peters, Thomas; Bronchain, Olivier. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors. In: IACR Transactions on Cryptographic Hardware and Emebedded Systems, Vol. 2021, no.3, p. 641-676 (2021). doi:10.46586/tches.v2021.i3.641-676. http://hdl.handle.net/2078.1/256821

7. Momin, Charles; Standaert, François-Xavier; Bronchain, Olivier. A Stealthy Hardware Trojan based on a Statistical Fault Attack. In: Cryptography and Communications, Vol. 13, no.4, p. 587-600 (2021). doi:10.1007/s12095-021-00480-4. http://hdl.handle.net/2078.1/256360

8. Yu, Yu; Guo, Chun; Standaert, François-Xavier; Wang, Xiao; Wang, Weijia. Provable Security of SP Networks with Partial Non-Linear Layers. In: IACR Transactions on Symmetric Cryptography, Vol. 2021, no.2, p. 353-388 (2021). doi:10.46586/tosc.v2021.i2.353-388. http://hdl.handle.net/2078.1/256823

9. Cassiers, Gaëtan; Standaert, François-Xavier. Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, no.2, p. 136-158 (2021). doi:10.46586/tches.v2021.i2.136-158. http://hdl.handle.net/2078.1/256805

10. Standaert, François-Xavier; Bellizia, Davide; Levi, Itamar. Beyond algorithmic noise or how to shuffle parallel implementations?. In: International Journal of Circuit Theory and Applications, Vol. 48, no.5, p. 674-695 (2020). doi:10.1002/cta.2756. http://hdl.handle.net/2078.1/230058

11. Guo, Chun; Standaert, François-Xavier; Yu, Yu; Wang, Weijia. Efficient Side-Channel Secure Message Authentication with Better Bounds. In: Transactions on Symmetric Cryptology, Vol. 2019, no.4, p. 23-53 (2019). doi:10.13154/tosc.v2019.i4.23-53. http://hdl.handle.net/2078.1/241384

12. Zhou, Yuanyuan; Standaert, François-Xavier. Deep Learning Mitigates but Does Not Annihilate the Need of Aligned Traces and a Generalized ResNet Model For Side-channel Attacks. In: Journal of Cryptographic Engineering, Vol. 10, no.1, p. 85-95 (2020). doi:10.1007/s13389-019-00209-3. http://hdl.handle.net/2078.1/241375

13. Pereira, Olivier; Guo, Chun; Peters, Thomas; Standaert, François-Xavier. Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction. In: IACR Transactions on Symmetric Cryptology, Vol. 2020, no.1, p. 6-42 (2020). doi:10.13154/tosc.v2020.i1.6-42; 10.13154/tosc.v2020.i1.6-42. http://hdl.handle.net/2078.1/241403

14. Méaux, Pierrick; Cassiers, Gaëtan; Standaert, François-Xavier; Wang, Weijia. Efficient and Private Computations with Code-Based Masking. In: ransactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, no.2, p. 128-171 (2020). doi:10.13154/tches.v2020.i2.128-171. http://hdl.handle.net/2078.1/241391

15. Cassiers, Gaëtan; Standaert, François-Xavier. Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference. In: IEEE Transactions on Information Forensics and Security, Vol. 15 , p. 2542--2555 (2020). doi:10.1109/TIFS.2020.2971153. http://hdl.handle.net/2078.1/241397

16. Standaert, François-Xavier; Francillon, Aurélien; Camurati, Giovanni. Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, no.3, p. 358-401 (2020). doi:10.13154/tches.v2020.i3.358-401. http://hdl.handle.net/2078.1/241540

17. De Meyer, Lauren; Standaert, François-Xavier; Duval, Sébastien; Levi, Itamar; Bilgin, Begül. Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking. In: IACR Transactions on Symmetric Cryptology, Vol. 2020, no.1, p. 144-184 (2020). doi:10.13154/tosc.v2020.i1.144-184. http://hdl.handle.net/2078.1/241398

18. Berti, Francesco; Flandre, Denis; Standaert, François-Xavier; Duc, Alexandre; Kamel, Dina. Learning with Physical Noise or Errors. In: IEEE Transactions on Dependable and Secure Computing, Vol. 17, no. 5, p. 957-971 (2020). doi:10.1109/TDSC.2018.2830763. http://hdl.handle.net/2078.1/241336

19. Guo, Qian; Standaert, François-Xavier; Bronchain, Olivier; Grosso, Vincent. Modeling Soft Analytical Side-Channel Attacksfrom a Coding Theory Viewpoint. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, no.4, p. 209-238 (2020). doi:10.13154/tches.v2020.i4.209-238. http://hdl.handle.net/2078.1/241556

20. Standaert, François-Xavier; Bellizia, Davide; Bronchain, Olivier; Kamel, Dina. Side-channel analysis of a learning parity with physical noise processor. In: Journal of Cryptographic Engineering, Vol. 10, no.3, p. 9 (2020). doi:10.1007/s13389-020-00238-3. http://hdl.handle.net/2078.1/240388

21. Cassiers, Gaëtan; Grégoire, Benjamin; Standaert, François-Xavier; Levi, Itamar. Hardware Private Circuits: From Trivial Composition to Full Verification. In: IEEE Transactions on Sustainable Computing70, Vol. 70, no.10, p. 1677-1690 (2020). doi:10.1109/TC.2020.3022979. http://hdl.handle.net/2078.1/256974

22. Berti, Francesco; Guo, Chun; Peters, Thomas; Cassiers, Gaëtan; Udvarhelyi, Balazs; Leander, Gregor; Leurent, Gaëtan; Standaert, François-Xavier; Duval, Sébastien; Levi, Itamar; Pereira, Olivier; Wiemer, Friedrich; Momin, Charles; Bellizia, Davide; Bronchain, Olivier. Spook: Sponge-Based Leakage-ResistantAuthenticated Encryption with a MaskedTweakable Block Cipher. In: IACR Transactions on Symmetric Cryptology, Vol. 2020, no.1, p. 295-349 (2020). doi:10.13154/tosc.v2020.iS1.295-349. http://hdl.handle.net/2078.1/241411

23. Méaux, Pierrick; Momin, Charles; Standaert, François-Xavier; Duval, Sébastien. Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying. In: Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, no.1, p. 373-401 (2021). doi:10.46586/tches.v2021.i1.373-401. http://hdl.handle.net/2078.1/256796

24. Standaert, François-Xavier; Bol, David; Bellizia, Davide; Levi, Itamar. Ask Less, Get More: Side-Channel Signal Hiding, Revisited. In: IEEE Transactions on Circuits and Systems Part 1: Regular Papers, Vol. 67, no.12, p. 4904 - 4917 (2020). doi:10.1109/TCSI.2020.3005338. http://hdl.handle.net/2078.1/239167

25. Pereira, Olivier; Rochet, Florentin; Dinh, Thien-Nam; Wallach, Dan S. Scaling Up Anonymous Communication with Efficient Nanopayment Channels. In: Proceedings on Privacy Enhancing Technologies, Vol. 2020, no.3, p. 175-203 (2020). doi:10.2478/popets-2020-0048. http://hdl.handle.net/2078.1/236539

26. Cassiers, Gaëtan; Standaert, François-Xavier. Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 162-198 (2019). doi:10.13154/tches.v2019.i2.162-198. http://hdl.handle.net/2078.1/226238

27. Standaert, François-Xavier; Faust, Sebastian; Duc, Alexandre. Making Masking Security Proofs Concrete. Or How to Evaluate the Security of any Leaking Device -Extended Version-. In: Journal of Cryptology, Vol. 32, no.4, p. 1263-1297 (2019). doi:10.1007/s00145-018-9277-0. http://hdl.handle.net/2078.1/225460

28. Moradi, Amir; Schneider, Tobias; Standaert, François-Xavier; Moos, Thorben. Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 256-292 (2019). doi:10.13154/tches.v2019.i2.256-292. http://hdl.handle.net/2078.1/225487

29. Standaert, François-Xavier; Bellizia, Davide; Levi, Itamar. Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 293-317 (2019). doi:10.13154/tches.v2019.i2.293-317. http://hdl.handle.net/2078.1/226195

30. Standaert, François-Xavier; Yu, Yu; Wang, Weijia. Provable Order Amplification for Code-based Masking: How to Avoid Non-linear Leakages due to Masked Operations. In: IEEE Transactions on Information Forensics and Security, Vol. 14, no.11, p. 3069-3082 (2019). doi:10.1109/TIFS.2019.2912549. http://hdl.handle.net/2078.1/226265

31. Schneider, Tobias; Standaert, François-Xavier; Bronchain, Olivier. Multi-Tuple Leakage Detection and the Dependent Signal Issue. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, no.2, p. 318-345 (2019). doi:10.13154/tches.v2019.i2.318-345. http://hdl.handle.net/2078.1/225499

32. Berti, Francesco; Flandre, Denis; Standaert, François-Xavier; Duc, Alexandre; Kamel, Dina. Learning with Physical Noise or Errors. In: IEEE Transaction on Dependable and Secure Computing, , p. 14 (2018). http://hdl.handle.net/2078.1/199135

33. Standaert, François-Xavier; Moradi, Amir; Schneider, Tobias; Richter, Bastian. Leakage detection with the X²-Test. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, no.1, p. 209-237. doi:10.13154/tches.v2018.i1.209-237. http://hdl.handle.net/2078.1/199339

34. Pereira, Olivier; Rochet, Florentin. Waterfilling: Balancing the Tor network with maximum diversity. In: PoPETS "Proceedings on Privacy Enhancing Technologies", Vol. 2, p. 4-22 (2017). doi:10.1515/popets-2017-0013. http://hdl.handle.net/2078.1/192336

35. Varici, Kerem; Standaert, François-Xavier; Journault, Anthony. Improving the security and efficiency of block ciphers based on LS-designs. In: Designs, Codes and Cryptography, Vol. 82, no.1-2, p. 495-509 (09/01/2017). doi:10.1007/s10623-016-0193-8. http://hdl.handle.net/2078.1/181827

36. Standaert, François-Xavier; Merino Del Pozo, Santos; Durvaux, François. Towards Easy Leakage Certification. In: Journal of Cryptographic Engineering, Vol. 7, no.2, p. 12-147 (17/05/2017). doi:10.1007/s13389-017-0150-0. http://hdl.handle.net/2078.1/187223

37. Zhao, Xinjie; Wang, Tao; Standaert, François-Xavier; Guo, Shize; Zhang, Fan; Yang, Jian. A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. In: IEEE Transactions on Information Forensics and Security, Vol. 11, no.5, p. 1039-1054 (2016). doi:10.1109/TIFS.2016.2516905. http://hdl.handle.net/2078.1/176459

38. Yung, Moti; Joye, Marc; Peters, Thomas; Libert, Benoît. Linearly homomorphic structure-preserving signatures and their applications. In: Designs, Codes and Cryptography, Vol. 77, no.2-3, p. 441-477 (01/10/2015). doi:10.1007/s10623-015-0079-1. http://hdl.handle.net/2078.1/170330

39. Standaert, François-Xavier; Belaïd, Sonia; Grosso, Vincent. Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?. In: Cryptography and Communications, Vol. 7, no.1, p. 163-184 (2015). doi:10.1007/s12095-014-0113-6. http://hdl.handle.net/2078.1/156594

40. Novo, David; Bayrak, Ali Galip; Ienne, Paolo; Standaert, François-Xavier; Ragazzoni, Francesco; Brisk, Philip. Automatic Application of Power Analysis Countermeasures. In: IEEE Transactions on Computers, Vol. 64, no.2, p. 329-341 (2015). doi:10.1109/TC.2013.219. http://hdl.handle.net/2078.1/156457

41. Quisquater, Jean-Jacques; Petit, Christophe. Rubik's for Cryptographers (Chinese version). In: Mathematical Advance in Translation, Vol. 33, no.1, p. 5-13 (April 2014). http://hdl.handle.net/2078.1/143015

42. Petit, Christophe. Finding Roots in GF(p^n) with the Successive Resultant Algorithm. In: London Mathematical Society. Journal of Computation and Mathematics, Vol. 0, no.0, p. 0 (0). (Accepté/Sous presse). http://hdl.handle.net/2078.1/143016

43. Coisel, Iwen; Avoine, Gildas; Martin, Tania. Untraceability model for RFID. In: IEEE Transactions on Mobile Computing, Vol. 99 (2014). doi:10.1109/TMC.2013.161. http://hdl.handle.net/2078.1/139953

44. Belaïd, Sonia; Mangard, Stefan; De Santis, Frabrizio; Standaert, François-Xavier; Medwed, Marcel; Schmidt, Jörn-Marc; Tillich, Stefan; Heyszl, Johann. Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. In: Journal of Cryptographic Engineering, Vol. 4, no.3, p. 157-171 (2014). doi:10.1007/s13389-014-0079-5. http://hdl.handle.net/2078.1/152905

45. Flandre, Denis; Renauld, Mathieu; Standaert, François-Xavier; Kamel, Dina. Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations. In: Journal of Cryptographic Engineering, , no.4, p. 1987-1995 (18/04/2014). doi:10.1007/S13389-014-0080-z. http://hdl.handle.net/2078.1/152051

46. Ma, Chujiao; Zhao, Xinjie; Guo, Shize; Shi, Zhijie; Standaert, François-Xavier; Zhang, Fan; Wa,g, Tao. Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations. In: IEEE Transactions on Information Forensics and Security, Vol. 9, no.6, p. 999-1014 (2014). doi:10.1109/TIFS.2014.2315534. http://hdl.handle.net/2078.1/152911

47. Renauld, Mathieu; Standaert, François-Xavier; Petit, Christophe. On a particular case of the bisymmetric equation for quasigroupes. In: Acta Mathematica Hungarica, Vol. 143, no. 2, p. 330-336 (2013). doi:10.1007/s10474-014-0428-y. http://hdl.handle.net/2078.1/137229

48. Benaloh, Josh; DeBeauvoir, Dana; Stark, Philip B.; McBurnett, Neal; Fisher, Gail; Eakin, Bryce; Montoya, Julian; Winn, Michael; Wallach, Dan S.; Parker, Michelle; Byrne, Michael D.; Bell, Susan; Kortum, Philip; Pereira, Olivier. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. In: USENIX Journal of Election Technology and Systems (JETS), Vol. 1, no.1, p. 18--37 (August 2013). http://hdl.handle.net/2078.1/142427

49. Quisquater, Jean-Jacques; Petit, Christophe. Rubik's for Cryptographers. In: American Mathematical Society. Notices, Vol. 60, no. 6, p. 733-739 (June-July 2013). doi:10.1090/notil1001. http://hdl.handle.net/2078.1/128157

50. Avoine, Gildas; Kim, Chong Hee. Mutual Distance Bounding Protocols. In: IEEE Transactions on Mobile Computing, Vol. 12, no.5, p. 830 - 839 (2013). doi:10.1109/TMC.2012.47. http://hdl.handle.net/2078.1/139946

51. Quisquater, Jean-Jacques; Petit, Christophe. Rubik's for cryptographers. http://hdl.handle.net/2078.1/120251

52. Bol, David; Renauld, Mathieu; Standaert, François-Xavier; Flandre, Denis; Kamel, Dina. Analysis of Dynamic Differential Swing Limited Logic for Low-Power Secure Applications. In: Journal of Low Power Electronics and Applications, Vol. 2, no.1, p. 98-126 (16/03/2012). doi:10.3390/jlpea2010098. http://hdl.handle.net/2078.1/115608

53. Petit, Christophe. Towards factoring in SL(2, F2n). In: Designs, Codes and Cryptography, Vol. 71, no. 3, p. 409-471 (June 2014). doi:10.1007/s10623-012-9743-x. http://hdl.handle.net/2078.1/120244

54. Bingol, Muhammed Ali; Avoine, Gildas; Yalcin, Siddika Berna Ors; Carpent, Xavier. Privacy-friendly authentication in RFID systems : on sub-linear protocols based on symmetric-key cryptography. In: IEEE Transactions on Mobile Computing, no. Issue: 99, p. 1-14 (2012). doi:10.1109/TMC.2012.174. http://hdl.handle.net/2078.1/118158

55. Macq, Benoît; Standaert, François-Xavier; Shariati, Saloomeh; Jacques, Laurent. Analysis and experimental evaluation of Image-based PUFs. In: Journal of Cryptographic Engineering, Vol. 2, no.3, p. 189-206 (23/09/2012). doi:10.1007/s13389-012-0041-3. http://hdl.handle.net/2078/123470

56. Avoine, Gildas. RFID for newbies, sauce security. In: Hakin 9 : IT security magazine, Vol. 6, no. 8, p. 14-19 (2011). http://hdl.handle.net/2078.1/81718

57. Kim, Chong Hee. Security analysis of YKHL distance bounding protocol with adjustable false acceptance rate. In: IEEE Communications Letters, , p. 1-3 (2011). http://hdl.handle.net/2078.1/81758

58. Kim, Chong Hee. Improved differential fault analysis on AES key schedule. In: IEEE Transactions on Information Forensics and Security, Vol. 99, p. 1-10 (2011). doi:10.1109/TIFS.2011.2161289. http://hdl.handle.net/2078.1/81760

59. Avoine, Gildas; Kim, Chong Hee. RFID distance bounding protocols with mixed challenges. In: IEEE Transactions on Wireless Communications, Vol. 11, no. 5, p. 1818-1626 (2011). doi:10.1109/TWC.2011.030411.101158. http://hdl.handle.net/2078.1/81878

60. Standaert, François-Xavier; Doget, Julien; Rivain, Matthieu; Prouff, Emmanuel. Univariate side channel attacks and leakage modeling. In: Journal of Cryptographic Engineering, Vol. 1, no. 2, p. 123-144 (2011). doi:10.1007/s13389-011-0010-2. http://hdl.handle.net/2078.1/92179

61. Legat, Jean-Didier; Bol, David; Regazzoni, Francesco; Standaert, François-Xavier; Kamel, Dina; Hocquet, Cédric; Flandre, Denis. Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags. In: Journal of Cryptographic Engineering, Vol. 1, no. 1, p. 79-86 (Février 2011). doi:10.1007/s13389-011-0005-z. http://hdl.handle.net/2078.1/87835

62. Kim, Chong Hee. New fault attacks using Jacobi symbol and application to regular right-to-left algorithms. In: Information Processing Letters, Vol. 110, no. 20, p. 882-886 (2010). doi:10.1016/j.ipl.2010.07.013. http://hdl.handle.net/2078.1/34607

63. Szikora, Jean-Pierre; Avoine, Gildas; Martin, Tania. Lire son passe navigo en un clin d'oeil. In: Multi-System and Internet Security Cookbook - MISC, Vol. 48, no. 2, p. 74-82 (2010). http://hdl.handle.net/2078.1/82595


Conference Papers


1. Pereira, Olivier. Individual Verifiability and Revoting in the Estonian Internet Voting System. 2022 xxx. http://hdl.handle.net/2078.1/260855

2. Azouaoui, Melissa; Standaert, François-Xavier; Kuzovkova,Yulia; Hoffmann, Clément; Schneider, Tobias; Bronchain, Olivier. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber. In: Lecture Notes in Computer Science. Vol. 13211, p. 236-256 (2022). In: Proceedings of COSADE 2022, Springer: Heidelberg, 2022 xxx. doi:10.1007/978-3-030-99766-3\_11. http://hdl.handle.net/2078.1/260879

3. Cassiers, Gaëtan; Momin, Charles; Standaert, François-Xavier. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations. In: Lecture Notes in Computer Science. Vol. 13211, p. 257-275 (2022). In: Proceedings of COSADE 2022, Springer: Heidelberg, 2022 xxx. doi:10.1007/978-3-030-99766-3\_12. http://hdl.handle.net/2078.1/260882

4. Standaert, François-Xavier; Udvarhelyi, Balazs; Bellizia, Davide. Towards a Better Understanding of Side-Channel Analysis Measurements Setups. In: Lecture Notes in Computer Science. Vol. 13173, p. 64-79 (2021). Springer: Heidelberg, 2021 xxx. doi:10.1007/978-3-030-97348-3\_4. http://hdl.handle.net/2078.1/260814

5. Yung, Moti; Nguyen, Khoa; Devevey, Julien; Peters, Thomas; Libert, Benoît. Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. In: Lecture Notes in Computer Science. Vol. 12710, p. 659-690 (2021). Springer, 2021 xxx. doi:10.1007/978-3-030-75245-3/_24; https://doi.org/10.1007/978-3-030-75245-3/_24. http://hdl.handle.net/2078.1/255902

6. Udvarhelyi, Balazs; Standaert, François-Xavier; Bronchain, Olivier. Security Analysis of Deterministic Re-Keying with Masking & Shuffling: Application to ISAP. In: Lecture Notes in Computer Science. Vol. 12910, p. 168-183. In: Proceedings of COSADE 2021, Shivam Bhasin and Fabrizio De Santis, 2021 xxx. doi:10.1007/978-3-030-89915-8\_8. http://hdl.handle.net/2078.1/260809

7. Standaert, François-Xavier; Bronchain, Olivier; Papagiannopoulos, Kostas; Azouaoui, Melissa; Grosso, Vincent. Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?. In: IACR Transactions on Cryptographic Hardware and Embedded Systems. p. 25 (2021). In: Transactions of Cryptographic Hardware and Embedded Systems (TCHES)., IACR, 2021 xxx. http://hdl.handle.net/2078.1/257136

8. Cassiers, Gaëtan; Orlt, Maximilian; Standaert, François-Xavier; Faust, Sebastian. Towards Tight Random Probing Security - extended version. In: Lecture Notes in Computer Science. Vol. 12827, p. 185-214 (2021). Springer: Heidelberg, 2021 xxx. doi:10.1007/978-3-030-84252-9\_7. http://hdl.handle.net/2078.1/256920

9. Pereira, Olivier; Lewis, Sarah Jamie; Haines, Thomas; Teague, Vanessa. How not to prove your election outcome. In: 2020 {IEEE} Symposium on Security and Privacy, SP 2020, 2020 xxx. http://hdl.handle.net/2078.1/223906

10. Standaert, François-Xavier; Danhier, Pierre; Massart, Clément. Fidelity Leakages: Applying Membership Inference Attacks to Preference Data. In: Proceedings of INFOCOM 2020, 2020 xxx. doi:10.1109/INFOCOMWKSHPS50562.2020.9163032. http://hdl.handle.net/2078.1/241408

11. Pereira, Olivier; Teague, Vanessa; McMurtry, Eleanor. When Is a Test Not a Proof?. In: Proceedings of the 25th European Symposium on Research in Computer Security, (ESORICS 2020) (Lecture Notes in Computer Science), Springer, 2020, p. 23-41 xxx. doi:10.1007/978-3-030-59013-0\_2. http://hdl.handle.net/2078.1/236519

12. Zhou, Yuanyuan; Standaert, François-Xavier; Duval, Sébastien. Scatter: a Missing Case?. In: Lecture Notes in Computer Science. Vol. 12244, p. 90--103 (2020). Springer, 2020 xxx. doi:10.1007/978-3-030-68773-1\_5. http://hdl.handle.net/2078.1/256349

13. Udvarhelyi, Balazs; Standaert, François-Xavier; Bronchain, Olivier; van Wassenhove, Antoine. On the Security of Off-the-Shelf Microcontrollers: Hardware is not Enough. In: Lecture Notes in Computer Science. Vol. 12609, p. 103-118 (2020). Springer: Heidelberg, 2020 xxx. doi:10.1007/978-3-030-68487-7\_7. http://hdl.handle.net/2078.1/256569

14. Guo, Chun; Peters, Thomas; Cassiers, Gaëtan; Standaert, François-Xavier; Pereira, Olivier; Momin, Charles; Bellizia, Davide; Bronchain, Olivier; Grosso, Vincent. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle. In: Lecture Notes in Computer Science. Vol. 12170, p. 369-400 (2020). (Lecture Notes in Computer Science), Springer: Heidelberg, 2020 xxx. doi:10.1007/978-3-030-56784-2\_13. http://hdl.handle.net/2078.1/241551

15. Standaert, François-Xavier; Massart, Clément. Revisiting Location Privacy from a Side-Channel Analysis Viewpoint. In: Proceedings of the 11th International Conference on Cryptology in Africa - Progress in Cryptology (AFRICACRYPT 2019) (Lecture Notes in Computer Science), Springer, 2019, 978-3-030-23695-3, 333-351 xxx. doi:10.1007/978-3-030-23696-0. http://hdl.handle.net/2078.1/226278

16. Standaert, François-Xavier. Analyzing the Leakage-Resistance of some Round-2 Candidates of the NIST’s Lightweight Crypto Standardization Process. In: Proceedings of the NIST Lightweight Cryptography Workshop 2019, 2019 xxx. http://hdl.handle.net/2078.1/226506

17. Belaïd, Sonia; Barthe, Gilles; Fouque, Pierre-Alain; Cassiers, Gaëtan; Standaert, François-Xavier; Grégoire, Benjamin. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults. In: Proceedings of the 24th European Symposium on Research in Computer Security (ESORICS 2019) (Lecture Notes in Computer Science), Springer, 2019, 978-3-030-29958-3, p. 300-318 xxx. doi:10.1007/978-3-030-29959-0. http://hdl.handle.net/2078.1/226296

18. Standaert, François-Xavier. How (not) to Use Welch’s T-test in Side-Channel Security Evaluations. In: Lecture Notes in Computational Science and Engineering. Vol. 11389, p. 65-79 (2019). In: Proceedings of the 17th International Conference on Smart Card Research and Advanced Applications (CARDIS 2018), Springer: Heidelberg, 2019, 978-3-030-15461-5 xxx. doi:10.1007/978-3-030-15462-2_5. http://hdl.handle.net/2078.1/225476

19. Poussier, Romain; Standaert, François-Xavier; Azouaoui, Melissa. Fast Side-Channel Security Evaluation of ECC Implementations - Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder. In: Proceedings of COSADE 2019 (Lecture Notes in Computer Science), Springer: Heidelberg, 2019, 978-3-030-16349-5, p. 25-42 xxx. doi:10.1007/978-3-030-16350-1_3. http://hdl.handle.net/2078.1/226243

20. Pereira, Olivier; Ramchen, Kim; Teague, Vanessa; Culnane, Chris. Universally Verifiable MPC and IRV Ballot Counting. In: Proceedings of the 2019 International Conference on Financial Cryptography and Data Security (Lecture Notes in Computer Science), Springer: Heidelberg, 2019, 978-3-030-32100-0, p. 301-319 xxx. doi:10.1007/978-3-030-32101-7_19. http://hdl.handle.net/2078.1/223908

21. Pereira, Olivier; Ronne, Peter B.. End-to-End Verifiable Quadratic Voting with Everlasting Privacy. In: Lecture Notes in Computer Science. (2019). Springer: Heidelberg, 2019 xxx. http://hdl.handle.net/2078.1/223809

22. Poussier, Romain; Standaert, François-Xavier; Verneuil, Vincent; Azouaoui, Melissa. Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?. In: 18th International Conference, CARDIS 2019, 2019, 978-3-030-42068-0 xxx. http://hdl.handle.net/2078.1/241376

23. Berti, Francesco; Pereira, Olivier; Guo, Chun; Peters, Thomas; Standaert, François-Xavier. Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions. In: Information Security and Cryptology (LNCS), Springer, 2019, 978-3-030-42921-8 xxx. http://hdl.handle.net/2078.1/241383

24. Méaux, Pierrick; Standaert, François-Xavier; Carlet, Claude; Journault, Anthony. Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations. In: Proceedings of INDOCRYPT 2019. 2019 xxx. http://hdl.handle.net/2078.1/241381

25. Olshevsky, Alex; Standaert, François-Xavier; Bronchain, Olivier; Hendrickx, Julien M.; Massart, Clément. Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations. In: Proceedings of the 39th Annual International Cryptology Conference - Advances in Cryptology (CRYPTO 2019)-Part I (Lecture Notes in Computer Science), Springer, 2019, 978-3-030-26947-0, p. 713-737 xxx. doi:10.1007/978-3-030-26948-7_25. http://hdl.handle.net/2078.1/226294

26. Standaert, François-Xavier. Towards an Open Approach to Side-Channel Resistant Authenticated Encryption. 2019 xxx. doi:10.1145/3338508.3359579. http://hdl.handle.net/2078.1/226272

27. Standaert, François-Xavier; Massart, Clément. Towards Long-Term Privacy Bounds in Open Data Publishing. In: Proceedings of the 40th WIC Symposium on Information Theory in the Benelux, 2019 xxx. http://hdl.handle.net/2078.1/226277

28. Zhou, Yuanyuan; Standaert, François-Xavier. Simplified Single-Trace Side-Channel Attacks on Elliptic Curve Scalar Multiplication using Fully Convolutional Networks. In: Proceedings of the 40th WIC Symposium on Information Theory in the Benelux, 2019 xxx. http://hdl.handle.net/2078.1/226275

29. Momin, Charles; Standaert, François-Xavier; Bronchain, Olivier. Time-Modulated Hardware Trojans: Clock-Based and Interface-Based Examples. In: Proceedings of the 40th WIC Symposium on Information Theory in the Benelux, 2019 xxx. http://hdl.handle.net/2078.1/226276

30. Goudarzi, Dahmun; Standaert, François-Xavier; Rivain, Matthieu; Journault, Anthony. Secure Multiplication for Bitslice Higher-Order - Masking: Optimisation and Comparison. In: Lecture Notes in Computer Science. Vol. 10815, p. 3-22 (2018). Junfeng Fan, Benedikt Gierlichs, 2018 xxx. doi:10.1007/978-3-319-89641-0_1. http://hdl.handle.net/2078.1/199606

31. Berti, Francesco; Pereira, Olivier; Peters, Thomas; Koeune, François; Standaert, François-Xavier. Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. In: Asia-CCS 2018. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Association for Computing Machinery (ACM), 2018, p. 37-50 xxx. doi:10.1145/3196494.3196525. http://hdl.handle.net/2078.1/199233

32. Standaert, François-Xavier; Grosso, Vincent. Masking Proofs are Tight and How to Exploit it in Security Evaluations. In: Proceedings of EUROCRYPT 2018 (Lecture Notes in Computer Science), Jesper Buus Nielsen, Vincent Rijmen, 2018, 978-3-319-78374-1, p. 385-412 xxx. doi:10.1007/978-3-319-78375-8_13. http://hdl.handle.net/2078.1/199349

33. Dassy, Louis; Standaert, François-Xavier; Bronchain, Olivier; Faust, Sebastian. Implementing Trojan-Resilient Hardware from(Mostly) Untrusted Components Designed by Colluding Manufacturers. In: Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security (ASHES@CCS 2018), Chip-Hong Chip, Ulrich Rührmair, Daniel Holcomb, Jorge Guajardo, 2018, 978-1-4503-5996-2, 1-10 xxx. doi:10.1145/3266444.3266447. http://hdl.handle.net/2078.1/210728

34. Pereira, Olivier; Rochet, Florentin; Wiedling, Cyrille. Formal Analysis of the FIDO 1.x Protocol. In: Lecture Notes in Computer Science. no.10723, p. 68-83 (2017). Springer, 2017 xxx. doi:10.1007/978-3-319-75650-9_5. http://hdl.handle.net/2078.1/197245

35. Lange, Joseph; Standaert, François-Xavier; Mouraux, André; Massart, Clément. Side-Channel Attacks Against the Human Brain: the PIN Code Case Study. In: Lecture Notes in Computer Science. Vol. 10348, p. 171-189 (2017). Springer: Heidelberg, 2017 xxx. doi:10.1007/978-3-319-64647-3_11. http://hdl.handle.net/2078.1/193639

36. Zhang, Liwei; Ding, A. Adam; Standaert, François-Xavier; Fei, Yunsi; Durvaux, François. Towards Sound and Optimal Leakage Detection Procedure. In: Proceedings of CARDIS 2017 (Lecture Notes in Computer Sciences), 2017 xxx. doi:10.1007/978-3-319-75208-2_7. http://hdl.handle.net/2078.1/210684

37. Standaert, François-Xavier; Journault, Anthony. Very High Order Masking: Efficient Implementation and Security Evaluation. In: Proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017) (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-66786-7, p. 623-643 xxx. doi:10.1007/978-3-319-66787-4_30. http://hdl.handle.net/2078.1/193913

38. Pereira, Olivier; Rivest, Ronald L.. Marked Mix-Nets. In: Proceedings of Financial Cryptography and Data Security, FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-70277-3, p. 353-369 xxx. doi:10.1007/978-3-319-70278-0_22. http://hdl.handle.net/2078.1/192446

39. Pereira, Olivier; Wallach, Dan S.. Clash attacks and the STAR-Vote system. In: Proceesings of Electronic Voting - Second International Joint Conference, E-Vote-ID (Lecture Notes in Computer Science), Springer: Heidelberg, 2017, 978-3-319-68686-8, p. 228-247 xxx. doi:10.1007/978-3-319-68687-5_14. http://hdl.handle.net/2078.1/192372

40. Schwabe, Peter; Kölbl, Stefan; Mendel, Florian; Lucks, Stefan; Standaert, François-Xavier; Bernstein, Daniel J.; Nawaz, Kashif; Todo, Yosuke; Schneider, Tobias; Maat Costa Massolino, Pedro. Gimli: a cross-platform permutation. In: Lecture Notes in Computer Science. Vol. 10529, p. 299-320 (2017). Springer: Heidelberg, 2017 xxx. doi:10.1007/978-3-319-66787-4_15. http://hdl.handle.net/2078.1/193646

41. Flandre, Denis; Nawaz, Kashif; Standaert, François-Xavier; Kamel, Dina. Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: a Case-Study. In: Proceedings of the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2017) (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-64646-6, p. 19-33 xxx. http://hdl.handle.net/2078.1/192538

42. Peters, Thomas; Libert, Benoît; Qian, Chen. Structure-Preserving Chosen-Ciphertext Security With Shorter Verifiable Ciphertexts. In: Proceedings of the 20th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2017. Vol. LNCS, no. 10174, p. 247-276 (2017). Serge Fehr, 2017 xxx. http://hdl.handle.net/2078.1/189877

43. Poussier, Romain; Zhou, Yuanyuan; Standaert, François-Xavier. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks. In: Proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017) (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-66786-7, p. 534-554 xxx. doi:10.1007/978-3-319-66787-4_26. http://hdl.handle.net/2078.1/193909

44. Paglialonga, Clara; Balasch, Josep; Gierlichs, Benedikt; Faust, Sebastian; Standaert, François-Xavier. Consolidating Inner Product Masking. In: Proceedings of EUROCRYPT 2017 (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-66786-7, p. 724-754 xxx. doi:10.1007/978-3-319-66787-4_26. http://hdl.handle.net/2078.1/193914

45. Gu, Dawu; Zhang, Chi; Sen, XU; Yu, Yu; Standaert, François-Xavier; Wang, Weijia. Ridge-Based Profiled Differential Power Analysis. In: Proceedings of the Topics in Cryptology (CT-RSA) 2017 - The Cryptographers' Track at the RSA Conference 2017 (Lecture Notes in Computer Science), Springer: Trier, 2017, 978-3-319-52152-7, p. 347-362 xxx. doi:10.1007/3-319-52153-4_20. http://hdl.handle.net/2078.1/187191

46. Dupressoir, François; Barthe, Gilles; Faust, Sebastian; Standaert, François-Xavier; Grégoire, Benjamin; Strub, Pierre-Yves. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model. In: Proceedings of the 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017) (Lecture Notes in Computer Science), Springer: Trier, 2017, 978-3-319-56619-1, p. 535-566 xxx. doi:10.1007/978-3-319-56620-7_19. http://hdl.handle.net/2078.1/187166

47. Mouhartem, Fabrice; Peters, Thomas; LIBERT, Benoît. Practical "Signatures with Efficient Protocols" from Simple Assumptions. In: Proceedings of the 11th ACM Asia Conference on Computer and Communication Security (ASIACCS 2016). p. 308-338. In: Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) (Lecture Notes in Computer Science), Springer, 2016 xxx. http://hdl.handle.net/2078.1/182380

48. Peters, Thomas; Pointcheval, David; Couteau, Geoffroy. Encryption Switching Protocols. In: Proceedings of the 36th Annual International Cryptology Conference - Advances in Cryptology (CRYPTO 2016), Springer: (Germany) Heidelberg, 2016, 308-338 xxx. doi:10.1007/978-3-662-53018-4_12. http://hdl.handle.net/2078.1/182381

49. Dziembowski, Stefan; Standaert, François-Xavier; Faust, Sebastian. Private Circuits III: Hardware Trojan-Resilience via Testing Amplification. 2016 xxx. doi:10.1145/2976749.2978419. http://hdl.handle.net/2078.1/181926

50. Standaert, François-Xavier; Durvaux, François. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces. In: Proceedings of EUROCRYPT 2016 (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-49889-7, p. 240-262 xxx. doi:10.1007/978-3-662-49890-3_10. http://hdl.handle.net/2078.1/176465

51. Choudary, Marios O.; Poussier, Romain; Standaert, François-Xavier. Score-Based vs. Probability-Based Enumeration - A Cautionary Note. In: Proceedings of the 17th International Conference in Cryptology in India - Progress in cryptology (INDIACRYPT 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-319-49889-8, p. 137-152 xxx. doi:10.1007/978-3-319-49890-4_8. http://hdl.handle.net/2078.1/181829

52. Standaert, François-Xavier; Merino Del Pozo, Santos; Durvaux, François. Towards Easy Leakage Certification. In: Proceedings of CHES 2016 (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-53139-6, p. 40-60 xxx. doi:10.1007/978-3-662-53140-2_3. http://hdl.handle.net/2078.1/176490

53. Berti, Francesco; Standaert, François-Xavier. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks. In: Proceedings of the 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016) (Lecture Notes in Computer Science), Springer: Trier, 2016, 978-3-319-54668-1, p. 245-264 xxx. doi:10.1007/978-3-319-54669-8_15. http://hdl.handle.net/2078.1/187154

54. Standaert, François-Xavier. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I -. In: Proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-319-49444-9, p. 353-362 xxx. doi:10.1007/978-3-319-49445-6_20. http://hdl.handle.net/2078.1/181916

55. Nikov, Ventzislav; Standaert, François-Xavier; Medwed, Marcel; Feldhofer, Martin. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF. In: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-53886-9, p. 602-623 xxx. doi:10.1007/978-3-662-53887-6_22. http://hdl.handle.net/2078.1/181924

56. Journault, Anthony; Masny, Daniel; Faust, Sebastian; Standaert, François-Xavier; Dziembowski, Stefan; Herold, Gottfried. Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems. In: Proceedings of CRYPTO 2016 (Springer), Lecture Notes in Computer Science, 2016, 978-3-662-53007-8, p. 272-301 xxx. doi:10.1007/978-3-662-53008-5_10. http://hdl.handle.net/2078.1/176515

57. Standaert, François-Xavier. Leakage-Resilient Symmetric Cryptography - Overview of the ERC Project CRASH, Part II -. In: Proceedings of the 17th International Conference on Cryptology in India (INDOCRYPT 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-319-49890-8 xxx. doi:10.1007/978-3-319-49890-4. http://hdl.handle.net/2078.1/181910

58. Gu, Dawu; Yu, Yu; Standaert, François-Xavier; Guo, Zheng; Liu, Junrong; Pu, Sihang; Wang, Weijia. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages. In: Proceedings of the 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016) (Lecture Notes in Computer Science), Springer: Trier, 2016, 978-3-319-54668-1, p. 174-191 xxx. doi:10.1007/978-3-319-54669-8_11. http://hdl.handle.net/2078.1/187158

59. Standaert, François-Xavier; Pierrick, Méaux; Journault, Anthony; Carlet, Claude. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts. In: Proceedings of EUROCRYPT 2016 (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-49889-7, p. 311-343 xxx. doi:10.1007/978-3-662-49890-3_13. http://hdl.handle.net/2078.1/176517

60. Poussier, Romain; Standaert, François-Xavier; Grosso, Vincent. Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach. In: Proceedings of CHES 2016 (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-53139-6, p. 61-81 xxx. doi:10.1007/978-3-662-53140-2_4. http://hdl.handle.net/2078.1/176486

61. Rioul, Olivier; Guilley, Sylvain; Standaert, François-Xavier; Heuser, Annelie; Teglia, Yannick; Bruneau, Nicolas. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. In: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-53886-9, p. 573-601 xxx. doi:10.1007/978-3-662-53887-6_21. http://hdl.handle.net/2078.1/181828

62. Yung, Moti; Joye, Marc; Peters, Thomas; Libert, Benoît. Secure Efficient History-Hiding Append-Only Signatures in the Standard Model. In: Proceedings of Public-Key Cryptography 2015 - PKC 2015 (Lecture Notes in Computer Science), Springer, 2015, 978-3-662-46446-5, p. 450-473 xxx. doi:10.1007/978-3-662-46447-2_20. http://hdl.handle.net/2078.1/170318

63. Yung, Moti; Joye, Marc; Peters, Thomas; Libert, Benoît. Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. In: Proceedings of Advances in Cryptology - ASIACRYPT 2015 - Part I (Lecture Notes in Computer Science), Springer, 2015, 978-3-662-48796-9, p. 681-707 xxx. doi:10.1007/978-3-662-48797-6_28. http://hdl.handle.net/2078.1/170335

64. Yung, Moti; Peters, Thomas; Libert, Benoît. Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. In: Proceedings of Advances in Cryptology - CRYPTO 2015 - Part II (Lecture Notes in Computer Science), Springer, 2015, 978-3-662-47999-5, p. 296-316 xxx. doi:10.1007/978-3-662-48000-7_15. http://hdl.handle.net/2078.1/170325

65. Pereira, Olivier; Standaert, François-Xavier; Venkatesh, Srinivas Vivek. Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives. In: CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, 2015, 978-1-4503-3832-5, p. 96-108 xxx. doi:10.1145/2810103.2813626. http://hdl.handle.net/2078.1/165722

66. Cortier, Véronique; Pereira, Olivier; Galindo, David; Bernhard, David; Warinschi, Bogdan. SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions. In: Security and Privacy (SP), 2015 IEEE Symposium on, 2015, 978-1-4673-6949-7, p. 499 - 516 xxx. doi:10.1109/SP.2015.37. http://hdl.handle.net/2078.1/165721

67. Peters, Thomas; Pointcheval, David; Couteau, Geoffroy. Secure Distributed Computation on Private Inputs. In: Proceedings of the 8th International Symposium on Foundations and Practice Security (FPS 2015), 2015, 9 xxx. http://hdl.handle.net/2078.1/182382

68. Moradi, Amir; Standaert, François-Xavier; Merino Del Pozo, Santos; Kamel, Dina. Side-Channel Attacks from Static Power: When Should we Care?. In: Proceedings of the 2015 Design, Automation and Test Europe Conference & Exhibition, ACM: Trier (Germany), 2015, 978-3-9815370-4-8, 145-150 xxx. http://hdl.handle.net/2078.1/167530

69. Poussier, Romain; Standaert, François-Xavier; Grosso, Vincent. Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations. In: Proceedings of the 14th International Conference on Smart card Research and Advanced Applications (CARDIS 2015) (Lecture Notes in Computer Science), Springer, 2015, 978-3-319-31270-5, p. 125-142 xxx. doi:10.1007/978-3-319-31271-2_8. http://hdl.handle.net/2078.1/176461

70. Standaert, François-Xavier; Merino Del Poso, Santos. Blind Source Separation from Single Measurements using Singular Spectrum Analysis. In: Proceedings of CHES 2015 (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-662-48323-7, p. 42-59 xxx. doi:10.1007/978-3-662-48324-4_3. http://hdl.handle.net/2078.1/171626

71. Mangard, Stefan; Mendel, Florian; Standaert, François-Xavier; Dobraunig, Christoph; Koeune, François. Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. In: Proceedings of CARDIS 2015 (Lecture Notes in Computer Science), Springer, 2015, 978-3-319-31270-5, p. 225-241 xxx. doi:10.1007/978-3-319-31271-2_14. http://hdl.handle.net/2078.1/176510

72. Xu, Sen; Guo, Zheng; Fu, Rong; Yu, Yu; Standaert, François-Xavier; Liu, Junrong; Gu, Dawu; Wang, Weijia. Evaluation and Improvement of Generic-Emulating DPA Attacks. In: Proceedings of CHES 2015 (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-662-48323-7, p. 416-432 xxx. doi:10.1007/978-3-662-48324-4_21. http://hdl.handle.net/2078.1/171624

73. Standaert, François-Xavier; Faust, Sebastian; Duc, Alexandre. Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device. In: Proceedings of EUROCRYPT 2015 (Lecture Notes in Computer Sciences), Springer: Trier, 2015, 978-3-662-46799-2, p. 401-429 xxx. doi:10.1007/978-3-662-46800-5_16. http://hdl.handle.net/2078.1/171491

74. Lerman, Liran; Poussier, Romain; Standaert, François-Xavier; Markowitch, Olivier; Bontempi, Gianluca. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis). In: Constructive Side-Channel Analysis and Secure Design (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-319-21475-7, p. 20-33 xxx. doi:10.1007/978-3-319-21476-4_2. http://hdl.handle.net/2078.1/171551

75. Standaert, François-Xavier; Grosso, Vincent. ASCA, SASCA and DPA with Enumeration: Which One Beats the other and When?. In: Proceedings of ASIACRYPT 2015 (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-662-48799-0, p. 291-312 xxx. doi:10.1007/978-3-662-48800-3_12. http://hdl.handle.net/2078.1/171639

76. Xie, Xinjun; Guo, Zheng; Yu, Yu; Sun, Wei; Standaert, François-Xavier; Liu, Junrong; Gu, Dawu; Ge, Yijie. Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. In: Proceedings of ESORICS 2015 (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-319-24173-9, p. 468-480 xxx. doi:10.1007/978-3-319-24174-6_24. http://hdl.handle.net/2078.1/171638

77. Poussier, Romain; Schüth, Joachim; Standaert, François-Xavier; Glowacz, Cezary; Grosso, Vincent. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment. In: Proceedings of the 22nd International Workshop on Fast Software Encryption (FSE 2015) (Lecture Notes in Computer Science), Springer, 2015, 978-3-662-48115-8, p. 117-129 xxx. doi:10.1007/978-3-662-48116-5. http://hdl.handle.net/2078.1/167539

78. Mairy, Jean-Baptiste; Standaert, François-Xavier; Veyrat-Charvillon, Nicolas; Durvaux, François; Deville, Yves. Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits. In: Constructive Side-Channel Analysis and Secure Design (Lecture Notes in Computer Science), Springer, 2015, 978-3-319-21475-7, p. 34-50 xxx. doi:10.1007/978-3-319-21476-4. http://hdl.handle.net/2078.1/171547

79. Pereira, Olivier; Cuvelier, Édouard. Multi-party Function Evaluation with Perfectly Private Audit Trail. In: Proceedings of the first Symposium on Digital Trust in Auvergne (SDTA'14), 2014 xxx. http://hdl.handle.net/2078.1/153510

80. Yung, Moti; Joye, Marc; Peters, Thomas; Libert, Benoît. Traceable Group Encryption. In: Proceedings of Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, 2014 xxx. doi:10.1007/978-3-642-54631-0_34. http://hdl.handle.net/2078.1/137953

81. Yung, Moti; Joye, Marc; Peters, Thomas; Libert, Benoît. Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. In: Proceedings of Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2014 xxx. doi:10.1007/978-3-642-55220-5_29. http://hdl.handle.net/2078.1/137948

82. Yung, Moti; Joye, Marc; Peters, Thomas; LIBERT, Benoît. Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security. In: Proceedings of Advances in Cryptology - ASIACRYPT 2014 - Part II (Lecture Notes in Computer Science), Springer, 2014, 978-3-662-45607-1, p. 1-21 xxx. doi:10.1007/978-3-662-45608-8_1. http://hdl.handle.net/2078.1/170315

83. Standaert, François-Xavier; Balasch, Josep; Gierlichs, Benedikt; Reparaz, Oscar; Grosso, Vincent. On the Cost of Lazy Engineering for Masked Software implementations. In: Proceedings of the 13th Smart Card Research and Advanced Application Conference - Revised Selected Papers (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-16762-6, p. 64-81 xxx. doi:10.1007/978-3-319-16763-3_5. http://hdl.handle.net/2078.1/166259

84. Poussier, Romain; Standaert, François-Xavier; Gaspar, Lubos; Grosso, Vincent. Combining Leakage-Resilient PRFs and Shuffling Towards Bounded Security for Small Embedded Devices. In: Proceedings of the 13th Smart Card Research and Advanced Application Conference - Revised Selected Papers (Lecture Notes in Computer Science), Springer, 2014, 9783319167626, p. 122-136 xxx. doi:10.1007/978-3-319-16763-3_8. http://hdl.handle.net/2078.1/166237

85. Brenner, Hai; Standaert, François-Xavier; Rosen, Alan; Leurent, Gaëtan; Gaspar, Lubos. FPGA implementations of SPRING - And their Countermeasures against Side-Channel Attacks. In: Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014) (Lecture Notes in Computer Science), Springer, 2014, 978-3-662-44708-6, p. 414-432 xxx. doi:10.1007/978-3-662-44709-3_23. http://hdl.handle.net/2078.1/156562

86. Durvaux, François; Kerckhof, Stéphanie; Standaert, François-Xavier; Verleysen, Michel; Gustin, Ludovic. Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions. In: Proceedings of the 5th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2014) (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-10174-3, p. 112-128 xxx. doi:10.1007/978-3-319-10175-0_9. http://hdl.handle.net/2078.1/156462

87. Varici, Kerem; Standaert, François-Xavier; Leurent, Gaëtan; Grosso, Vincent. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. In: Proceedings of the 21st International Workshop on Fast Software Encryption (Lecture Notes in Computer Science), Springer, 2014, 978-3-662-46705-3, p. 18-37 xxx. doi:10.1007/978-3-662-46706-0_2. http://hdl.handle.net/2078.1/166262

88. Standaert, François-Xavier; Leurent, Gaëtan; Gaspar, Lubos. Hardware Implementation and Side-Channel Analysis of Lapin. In: Proceedings of The Cryptographer's Track at the RSA Conference 2014 (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-04851-2, p. 206-226 xxx. doi:10.1007/978-3-319-04852-9_11. http://hdl.handle.net/2078.1/152959

89. Standaert, François-Xavier; Prouff, Emmanuel; Grosso, Vincent. Efficient Masked S-Boxes Processing - A Step Forward -. In: Proceedings of AFRICACRYPT 2014 - Progress in Cryptology - 7th International Conference on Cryptology in Africa (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-06733-9, p. 251-266 xxx. doi:10.1007/978-3-319-06734-6_6. http://hdl.handle.net/2078.1/155669

90. Oswald, Elisabeth; Standaert, François-Xavier; Whitnall, Carolyn. The myth of generic DPA. . . and the magic of learning. In: Topics in Cryptology - The Cryptographer's Track at the {RSA} Conference 2014 (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-04851-2, p. 183-205 xxx. doi:10.1007/978-3-319-04852-9_10. http://hdl.handle.net/2078.1/155653

91. Standaert, François-Xavier; Veyrat-Charvillon, Nicolas; Durvaux, François. How to Certify the Leakage of a Chip?. In: Lecture Notes in Computer Science. Vol. 8441, p. 459-476 (2014). In: Proceedings d'EUROCRYPT 2014 (Lecture Notes in Computer Science), Springer, 2014, 978-3-642-55219-9, 459-476 xxx. doi:10.1007/978-3-642-55220-5_26. http://hdl.handle.net/2078.1/155656

92. Standaert, François-Xavier; Gérard, Benoît; Veyrat-Charvillon, Nicolas. Soft Analytical Side-Channel Attacks. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information security (ASIACRYPT 2014) (Lecture Notes in Computer Science), Springer, 2014, 978-3-662-45610-1, p. 282-296 xxx. doi:10.1007/978-3-662-45611-8_15. http://hdl.handle.net/2078.1/156593

93. Kerckhof, Stéphanie; Standaert, François-Xavier; Gérard, Benoît; Durvaux, François. Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results. In: Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2013) (HOST), IEEE, 2013, 978-1-4799-0559-1, p. 7-12 xxx. doi:10.1109/HST.2013.6581557. http://hdl.handle.net/2078.1/133715

94. Peters, Thomas; Devigne, Julien; Coisel, Iwen; Sanders, Olivier; Canard, Sébastien; Gallais, Cécilia. Toward Generic method for Server-Aided Cryptography. In: Proceedings of Information and Communications Security - 15th International Conference, ICICS 2013 (Lecture Notes in Computer Science), Springer International Publishing: Switzerland, 2013, 978-3-319-02725-8, p. 373-392 xxx. doi:10.1007/978-3-319-02726-5_27. http://hdl.handle.net/2078.1/137935

95. Pereira, Olivier; Cuvelier, Édouard; Peters, Thomas. Election Verifiability or Ballot Privacy: Do We Need to Choose?. In: Proceedings of Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40202-9, p. 481-498 xxx. doi:10.1007/978-3-642-40203-6_27. http://hdl.handle.net/2078.1/137932

96. Bingöl, Muhammed Ali; Carpent, Xavier; Avoine, Gildas; Kardas, Süleyman. Deploying OSK on low-resource mobile Devices. 2013 xxx. doi:10.1007/978-3-642-41332-2_1. http://hdl.handle.net/2078.1/133145

97. Standaert, François-Xavier; Gérard, Benoît; Veyrat-Charvillon, Nicolas. Security Evaluations beyond Computing Power. In: Proceedings of Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-38347-2, p. 126-141 xxx. doi:10.1007/978-3-642-38348-9_8. http://hdl.handle.net/2078.1/133720

98. Pereira, Olivier; Standaert, François-Xavier; Yu, Yu. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions. In: Proceedings of Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptography Conference - Part I (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40040-7, p. 335-352 xxx. doi:10.1007/978-3-642-40041-4_19. http://hdl.handle.net/2078.1/133680

99. Huang, Yun-Ju; Shinohara, Naoyuki; Petit, Christophe; Takagi, Tsuyoshi. Improvement of Faugère et al.'s Method to Solve ECDLP. In: Lecture Notes in Computer Science. Vol. 8231, p. 115-132 (2013). Springer: (Germany) Heidelberg, 2013 xxx. doi:10.1007/978-3-642-41383-4; 10.1007/978-3-642-41383-4. http://hdl.handle.net/2078.1/137230

100. Pöppelmann, Thomas; Plos, Thomas; Koeune, François; van Oldeneel tot Oldenzeel, Loïc; Eisenbarth, Thomas; Regazzoni, Francesco; Heyse, Stefan; Van Assche, Gilles; Kerckhof, Stéphanie; Standaert, François-Xavier; Balasch, Josep; Güneysu, Tim; von Maurich, Ingo; Van Keer, Ronny; Zheng, Gong; Ege, Baris; Gérard, Benoît. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. In: Proceedings of CARDIS 2012 (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-37287-2, p. 158-172 xxx. doi:10.1007/978-3-642-37288-9_11. http://hdl.handle.net/2078.1/129985

101. Quisquater, Jean-Jacques; Petit, Christophe. Rubik's for cryptographers. In: Proceedings of the Workshop on Algebraic Constructions for the fundations of a safe society, 2013 xxx. http://hdl.handle.net/2078.1/137232

102. Pereira, Olivier; Mawet, Sophie; Cuvelier, Édouard; Van Vyve, Mathieu; Aly, Abdelrahaman. Securely Solving Simple Combinatorial Graph Problems. In: Lecture Notes in Computer Science. Vol. 7859, pp. 239-257 (2013). Springer: (Germany) Heidelberg, 2013 xxx. doi:10.1007/978-3-642-39884-1_21. http://hdl.handle.net/2078.1/130439

103. Yung, Moti; Joye, Marc; Peters, Thomas; Libert, Benoît. Linearly Homomorphic Structure-Preserving Signatures and Their Applications. In: Proceedings of Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40083-4, p. 289-307 xxx. doi:10.1007/978-3-642-40084-1_17. http://hdl.handle.net/2078.1/137929

104. Peters, Thomas; Libert, Benoît; Attrapadung, Nuttapong. Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. In: Proceedings of Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-36361-0, p. 386-404 xxx. doi:10.1007/978-3-642-36362-7_24. http://hdl.handle.net/2078.1/137922

105. Petit, Christophe. On the complexity of ECDLP for composite fields. In: Proceedings of the Workshop on Algebraic Constructions for the fundations of a safe society, 2013 xxx. http://hdl.handle.net/2078.1/137249

106. Standaert, François-Xavier; Gérard, Benoît; Naya Plasencia, Maria; Grosso, Vincent. Block Ciphers That Are Easier to Mask: How far Can We GO?. In: Proceedings of Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40348-4, p. 383-399 xxx. doi:10.1007/978-3-642-40349-1_22. http://hdl.handle.net/2078.1/133693

107. Pereira, Olivier; Palmieri, Paolo. Unconditionally Secure Oblivious Transfer from Real Network Behavior. In: Advances in Information and Computer Security (Lecture Notes in Computer Science), Springer, 2013, 978-3-642-41382-7 xxx. doi:10.1007/978-3-642-41383-4_11. http://hdl.handle.net/2078.1/141530

108. Zhou, Yuanyuan; Standaert, François-Xavier; Quisquater, Jean-Jacques; Yu, Yu. On the Need of Physical Security for Small Embedded Systems: A Case Study with COMP128-1 Implementations in SIM Cards. In: Proceedings of Financial Cryptography and Data Security - 17th International Conference (FC 2013) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-39883-4, p. 230-238 xxx. doi:10.1007/978-3-642-39884-1_20. http://hdl.handle.net/2078.1/133722

109. Standaert, François-Xavier; Faust, Sebastian; Grosso, Vincent. Masking vs. Multiparty Computation: How Large Is the Gap for AES?. In: Proceedings of Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40348-4, p. 400-416 xxx. doi:10.1007/978-3-642-40349-1_23. http://hdl.handle.net/2078.1/133689

110. Standaert, François-Xavier; Prouff, Emmanuel; Grosso, Vincent. Low Entropy Masking Schemes, Revisited. In: Proceedings of CARDIS 2013 (Lecture Notes in Computer Science), Springer, 2013, 978-3-319-08301-8, 33-43 xxx. doi:10.1007/978-3-319-08302-5_3; 10.1007/978-3-319-08302-5_3. http://hdl.handle.net/2078.1/152922

111. Kerckhof, Stéphanie; Peeters, Eric; Standaert, François-Xavier. From New Technologies to New SolutionsExploiting FRAM Memories to Enhance Physical Security. In: Proceedings of CARDIS 2013 (Lecture Notes in Computer Science), Springer, 2013, p. 16-29 xxx. doi:10.1007/978-3-319-08302-5_2. http://hdl.handle.net/2078.1/152948

112. Peters, Thomas; Libert, Benoît; Attrapadung, Nuttapong. Computing on Authenticated Data: New Privacy Definitions and Constructions. In: Proceedings of ASIACRYPT 2012 (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-34960-7, p. 367-385 xxx. doi:10.1007/978-3-642-34961-4_23. http://hdl.handle.net/2078.1/137919

113. Carpent, Xavier; Avoine, Gildas. Yet Another Ultralightweight Authentication Protocol that is Broken. In: Workshop on RFID Security, 2012 xxx. doi:10.1007/978-3-642-36140-1_2. http://hdl.handle.net/2078.1/113808

114. Perret, Ludovic; Faugère, Jean-Charles; Renault, Guénaël; Petit, Christophe. Improving the complexity of index calculus algorithms in elliptic curves over binary fields. In: Proceeedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2012), D. Pointcheval and T. Johansson (Eds.), 2012, 27-44 xxx. doi:10.1007/978-3-642-29011-4_4. http://hdl.handle.net/2078.1/106682

115. Standaert, François-Xavier; Medwed, Marcel; Joux, Antoine. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs. In: Lecture Notes in Computer Science. Vol. 7428, p. 193-212 (2012). Springer: (Germany) Heidelberg, 2012 xxx. doi:10.1007/978-3-642-33027-8_12. http://hdl.handle.net/2078.1/116486

116. Leurent, Gaëtan. Analysis of differential attacks in ARX constructions. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2012) (Lecture Notes in Computer Science), Springer, 2012, 978-3-642-34960-7, p. 226-243 xxx. doi:10.1007/978-3-642-34961-4; 10.1007/978-3-642-34961-4_15. http://hdl.handle.net/2078.1/125087

117. Flandre, Denis; Renauld, Mathieu; Standaert, François-Xavier; Kamel, Dina. Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box. In: Lecture Notes in Computer Science, Springer, 2012, 223-239 xxx. doi:10.1007/978-3-642-23951-9_15. http://hdl.handle.net/2078.1/110632

118. Cortier, Véronique; Pereira, Olivier; Bernhard, David; Warinschi, Bogdan. Measuring vote privacy, revisited.. In: Proceedings of the 2012 ACM conference on Computer and communications security, ACM, 2012, 978-1-4503-1651-4, p. 941-952 xxx. doi:10.1145/2382196.2382295. http://hdl.handle.net/2078.1/124908

119. Hocquet, Cédric; Kerckhof, Stéphanie; Bol, David; Standaert, François-Xavier; Durvaux, François. Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint. In: Lecture Notes in Computer Science. Vol. 7428, p. 390-407 (2012). Springer: (Germany) Heidelberg, 2012 xxx. doi:10.1007/978-3-642-33027-8. http://hdl.handle.net/2078.1/116447

120. Pereira, Olivier; Warinschi, Bogdan; Bernhard, David. How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. In: Advances in Cryptology - ASIACRYPT 2012 (Lecture Notes in Computer Science), Springer, 2012, 978-3-642-34960-7, p. 626-643 xxx. doi:10.1007/978-3-642-34961-4_38. http://hdl.handle.net/2078.1/124905

121. Yung, Moti; Peters, Thomas; Libert, Benoît. Group Signatures with Almost-for-Free Revocation. In: Proceedings of Advances in Cryptology - CRYPTO 2012 (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-32008-8, p. 571-589 xxx. doi:10.1007/978-3-642-32009-5_34. http://hdl.handle.net/2078.1/137914

122. Van Oldeneel Tot Oldenzeel, Loïc; Renauld, Mathieu; Standaert, François-Xavier; Durvaux, François. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models. In: Proceedings of CARDIS 2012 (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-37287-2, p. 123-140 xxx. doi:10.1007/978-3-642-37288-9_9. http://hdl.handle.net/2078.1/129942

123. Coisel, Iwen; Avoine, Gildas; Martin, Tania. A privacy-restoring mechanism for offline RFID systems. In: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, ACM: New York, NY, USA, 2012, 978-1-4503-1265-3, p. 63-74 xxx. doi:10.1145/2185448.2185458. http://hdl.handle.net/2078.1/118147

124. Standaert, François-Xavier; Shariati, Saloomeh; Koeune, François. Security Analysis of Image-Based PUFs for Anti-counterfeiting. In: Lecture Notes in Computer Science. Vol. 7394, p. 26-38 (09/2012). Springer: (Germany) Heidelberg, 2012 xxx. doi:10.1007/978-3-642-32805-3_3. http://hdl.handle.net/2078.1/115647

125. Standaert, François-Xavier; Gérard, Benoît. Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting. In: Lecture Notes in Computer Science. Vol. 7428, p. 175-192 (2012). Springer: (Germany) Heidelberg, 2012 xxx. doi:10.1007/978-3-642-33027-8_11. http://hdl.handle.net/2078.1/116479

126. Oren, Yossef; Renauld, Mathieu; Standaert, François-Xavier; Wool, Avishai. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model. In: Lecture Notes in Computer Science. Vol. 7428, p. 140-154 (2012). Springer: (Germany) Heidelberg, 2012 xxx. doi:10.1007/978-3-642-33027-8_9. http://hdl.handle.net/2078.1/115648

127. Leander, Gregor; Tischhauser, Elmar; Steinberger, John; Bogdanov, Andrey; Standaert, François-Xavier; Knudsen, Lars R.. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2012) (Lecture Notes in Computer Science), Springer, 2012, 978-3-642-29010-7, p. 45-62 xxx. doi:10.1007/978-3-642-29011-4; 10.1007/978-3-642-29011-4. http://hdl.handle.net/2078.1/115606

128. Renauld, Mathieu; Standaert, François-Xavier; Gérard, benoît; Veyrat-Charvillon, Nicolas. An Optimal key Enumeration Algorithm and Its Application to Side-Channel Attacks. In: Proceedings of the 19th International Conference on Selected Areas in Cryptography (SAC 2012) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-35999-6, p. 390-406 xxx. doi:10.1007/978-3-642-35999-6_25. http://hdl.handle.net/2078.1/130010

129. Kerckhof, Stéphanie; Standaert, François-Xavier; Gérard², Benoît; Koeune, François; Durvaux, François. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions. In: Proceedings of the 13th International Workshop on Information Security Applications (WISA 2012) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-35415-1, p. 208-225 xxx. doi:10.1007/978-3-642-35416-8_15. http://hdl.handle.net/2078.1/130014

130. Gong, Zheng; Koeune, François; van Oldeneel tot Oldenzeel, Loïc; Eisenbarth, Thomas; Regazzoni, Francesco; Heyse, Stefan; Kerckhof, Stéphanie; Standaert, François-Xavier; Indesteege, Sebastiaan; Güneysu, Tim; Plos, Thomas; Nad, Topmislav. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. In: Proceedings of the 5th International Conference on Cryptology in Africa (AFRICACRYPT 2012) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-31409-4, p. 172-187 xxx. doi:10.1007/978-3-642-31410-0_11. http://hdl.handle.net/2078.1/115581

131. Petit, Christophe. On polynomial systems arising from a Weil descent. 2012, 136 pages xxx. http://hdl.handle.net/2078.1/120080

132. Petit, Christophe. Complexity of index calculus algorithms for ECDLP over composite fields. 2012, 158 pages xxx. http://hdl.handle.net/2078.1/119988

133. Hodges, Timothy; Petit, Christophe; Schlather, Jacob. Degree of regularity of systems arising from a Weil descent. 2012, 17 pages xxx. http://hdl.handle.net/2078.1/119951

134. Quisquater, Jean-Jacques; Petit, Christophe. On Polynomial Systems Arising from a Weil Descent. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2012), 2012, 451-466 xxx. http://hdl.handle.net/2078.1/120094

135. Kerckhof, Stéphanie; Standaert, François-Xavier; Medwed, Marcel; Veyrat-Charvillon, Nicolas. Shuffling against Side-Channel Attacks: A comprehensive Study with Cautionary Note. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2012) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-34960-7, p. 740-757 xxx. doi:10.1007/978-3-642-34961-4_44. http://hdl.handle.net/2078.1/130004

136. Boura, Christina; Standaert, François-Xavier; Gérard, Benoît; Grosso, Vincent. A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks (with Application to Low Cost-Ciphers LED and Piccolo). In: Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux: Enschede (the netherlands), 2012, 978-90-365-3383-6, p. 52-59 xxx. http://hdl.handle.net/2078.1/115610

137. yung, Moti; Peters, Thomas; Libert, Benoît. Scalable Group Signatures with Revocation. In: Proceedings of Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques (Lecture Notes in Computer Science), Springer-Verlag, 2012, 978-3-642-29010-7, p. 609-627 xxx. doi:10.1007/978-3-642-29011-4_36. http://hdl.handle.net/2078.1/137907

138. Pereira, Olivier; Palmieri, Paolo. Secure Two-Party Computation Over a Z-Channel. In: Provable Security - 5th International Conference, ProvSec 2011, 2011, 978-3-642-24315-8, p. 3-15 xxx. doi:10.1007/978-3-642-24316-5_3. http://hdl.handle.net/2078.1/92131

139. Kamel, Dina; Flandre, Denis; Renauld, Mathieu; Standaert, François-Xavier; Veyrat-Charvillon, Nicolas. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. In: Lecture Notes in Computer Science. Vol. 6632, p. 109-128 (2011). Springer: (Germany) Heidelberg, 2011 xxx. doi:10.1007/978-3-642-20465-4_8. http://hdl.handle.net/2078.1/86611

140. Standaert, François-Xavier; Wang, Yi; Regazzoni, Francesco. FPGA Implementations of the AES Masked Against Power Analysis Attacks. 2011 xxx. http://hdl.handle.net/2078.1/87833

141. Lauradoux, Cédric; Avoine, Gildas; Martin, Benjamin. How secret-sharing can defeat terrorist fraud. In: Proceedings of the fourth ACM conference on Wireless network security, ACM, 2011, 978-1-4503-0692-8, p. 145-156 xxx. doi:10.1145/1998412.1998437. http://hdl.handle.net/2078.1/81730

142. Bol, David; Regazzoni, Francesco; Koren, Israel; Standaert, François-Xavier; Hocquet, Cédric; Barenghi, Alessandro. Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation. 2011 xxx. doi:10.1007/978-3-642-25286-0_4. http://hdl.handle.net/2078.1/87572

143. Prouff, Emmanuel. Smart Card Research and Advanced Applications. In: Proceedings of the 10th IFIP WG 8.8/11.2 International Conference (CARDIS 2011) (Lecture Notes in Computer Science), Springer, 2011, 978-3-642-27256-1 xxx. http://hdl.handle.net/2078/110949

144. Cortier, Véronique; Pereira, Olivier; Smyth, Ben; Bernhard, David; Warinschi, Bogdan. Adapting Helios for provable ballot privacy. In: ESORICS 2011 - 16th European Symposium on Research in Computer Security, 2011, 978-3-642-23821-5, p. 335-354 xxx. doi:10.1007/978-3-642-23822-2_19. http://hdl.handle.net/2078.1/92132

145. Pereira, Olivier; Palmieri, Paolo. Building Oblivious Transfer on Channel Delays. In: Information Security and Cryptology - 6th International Conference (Lecture Notes in Computer Science), 2011, 978-3-642-21517-9, p. 125-138 xxx. doi:10.1007/978-3-642-21518-6_10. http://hdl.handle.net/2078.1/92184

146. Canard, Sébastien; Coisel, Iwen; Pereira, Olivier; de Meulenaer, Giacomo. Group Signatures are Suitable for Constrained Devices. In: Information Security and Cryptology - ICISC 2010 (Lecture Notes in Computer Science), 2011, 978-3-642-24208-3, p. 133-150 xxx. doi:10.1007/978-3-642-24209-0_9. http://hdl.handle.net/2078.1/92181

147. Maes, Roel; Standaert, François-Xavier; Armknecht, Frederik; Sadeghi, Ahmad-Reza; Wachsmann, Christian. A Formalization of the Security Features of Physical Functions. In: Proceedings of the 32nd IEEE Symposium od Security and Privacy, IEEE Computer Society, 2011, 978-1-4577-0147-4, p. 397-412 xxx. http://hdl.handle.net/2078.1/92315

148. Petit, Christophe. Computing paths in large Cayley graphs and cryptanalytic applications. 2011, 57 pages xxx. http://hdl.handle.net/2078.1/120083

149. Krawczyk, Hugo; Dodis, Yevgeniy; Standaert, François-Xavier; Yu, Yu; Pereira, Olivier; Pietrzak, Krzysztof; Barak, Boaz. Leftover Hash Lemma, Revisited. In: Advances in Cryptology - CRYPTO 2011 (Lecture Notes in Computer Science), 2011, 978-3-642-22791-2, p. 1-20 xxx. doi:10.1007/978-3-642-22792-9. http://hdl.handle.net/2078.1/92133

150. Pereira, Olivier. Leakage-resilient Stream Ciphers: an Overview. 2011 xxx. http://hdl.handle.net/2078.1/92135

151. Kerckhof, Stéphanie; Standaert, François-Xavier; Collard, Baudoin. FPGA Implementation of a Statistical Saturation Attack against PRESENT. In: Lecture Notes in Computer Science. Vol. 6737, p. 100-116 (2011). Springer: (Germany) Heidelberg, 2011 xxx. doi:10.1007/978-3-642-21969-6. http://hdl.handle.net/2078.1/92188

152. Pereira, Olivier; Giry, Damien; Bulens, Philippe. Running Mixnet-Based Elections with Helios. In: Proceedings of EVT/WOTE 2011, 2011 xxx. http://hdl.handle.net/2078.1/92134

153. Avoine, Gildas; Martin, Benjamin; Martin, Tania. Tree-Based RFID authentication protocols are definitively not privacy-friendly. In: Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, 2010, 3-642-16821-3 xxx. http://hdl.handle.net/2078.1/82063

154. Renauld, Mathieu; Standaert, François-Xavier. Representation-, Leakage- and Cipher-Dependencies in Algebric Sidde-Channel Attacks. 2010 xxx. http://hdl.handle.net/2078.1/81806

155. Macq, Benoît; Shariati, Saloomeh; Salhi, Mohamed Amine; Jacques, Laurent; Standaert, François-Xavier; Antoine, Philippe. Randomly Driven Fuzzy Key Extraction of Unclonable Images. In: Image Processing (ICIP), 2010 17th IEEE International Conference on, IEEE, 2010, 4329-4332 xxx. doi:10.1109/ICIP.2010.5652420; 10.1109/ICIP.2010.5652420. http://hdl.handle.net/2078.1/81809

156. Bingöl, Muhammed Ali; Kara, Orhun; Avoine, Gildas; Kardas, Süleyman. Optimal Security Limits of RFID Distance Bounding Protocols. In: Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, I O S Press: (Netherlands) Amsterdam, 2010, 3-642-16821-3 xxx. http://hdl.handle.net/2078.1/82497

157. Carpent, Xavier; Avoine, Gildas; Martin, Benjamin. Strong authentication and strong integrity (SASI) is not that strong. In: Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, ACM, 2010, 3-642-16821-3, p. 50-64 xxx. http://hdl.handle.net/2078.1/82466

158. Medwed, M.; Gierlichs, B.; Oswald, E.; Kasper, M.; Standaert, François-Xavier; Mangard, S.; Veyrat-Charvillon, Nicolas. The World is Not Enough: Another Look on Second-Order DPA. 2010 xxx. http://hdl.handle.net/2078.1/81811

159. Petit, Christophe. Hash functions and Cayley graphs: The end of the story ?. 2010, 33 pages xxx. http://hdl.handle.net/2078.1/120081

160. Kim, Chong Hee. Differential fault analysis against AES-192 and AES-256 with minimal faults. In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010, 978-0-7695-4169-3 xxx. http://hdl.handle.net/2078.1/81968

161. Coisel, Iwen; Avoine, Gildas; Martin, Tania. Time Measurement threatens privacy-friendly RFID authentication protocols. In: RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, 2010, 3-642-16821-3 xxx. http://hdl.handle.net/2078.1/82049

162. Avoine, Gildas; Martin, Benjamin; Rasua, Rolando Trujillo. The Poulidor distance-bounding protocol. In: Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, 2010, 3-642-16821-3 xxx. http://hdl.handle.net/2078.1/82589

163. Standaert, François-Xavier; Regazzoni, F.; Medwed, M.; Groszschaedl, J.. Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. 2010 xxx. http://hdl.handle.net/2078.1/81805

164. Macq, Benoît; Salhi, M.; Shariati, Saloomeh; Jacques, Laurent; Standaert, François-Xavier; Antoine, Philippe. Random Profiles of Laser Marks. In: PROCEEDINGS OF THE SYMPOSIUM ON INFORMATION THEORY IN THE BENELUX, 2010, 9789071048234, 27-34 xxx. http://hdl.handle.net/2078.1/81802

165. de Meulenaer, Giacomo; Standaert, François-Xavier. Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks. 2010 xxx. http://hdl.handle.net/2078.1/81803

166. Pereira, Olivier; Standaert, François-Xavier; Yung, M.; Yu, Yu. Practical Leakage-Resilient Pseudorandom Generators. In: Proceedings of the 17th ACM conference on Computer and communications security, ACM: New York, 2010, 978-1-4503-0245-6, 141-151 xxx. http://hdl.handle.net/2078.1/81810


Book Chapters


1. Pereira, Olivier. Internet Voting with Helios. In: Real-World Electronic Voting , CRC Press: Floride (USA), 2016, p. 277-308. 978-1-4987-1471-3. xxx xxx. doi:10.1201/9781315371290-12. http://hdl.handle.net/2078.1/181803

2. Benaloh, Josh; Byme, Michael D.; Stark, Philip B.; Fisher, Gail; Eakin, Bryce; Montoya, Julian; DeBeauvoir, Dana; Wallach, Dan S.; Winn, Michael; Parker, Michelle; Bell, Susan; Kortum, Philip; Pereira, Olivier. STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System. In: Real-World Electronic Voting, Design, analysis and deployment , Taylor & Francis Group, 2016, p. 375-404. 978-1-4987-1469-3. xxx xxx. http://hdl.handle.net/2078.1/183150

3. Kerckhof, Stéphanie; Standaert, François-Xavier; Regazzoni, Francesco; Durvaux, François. A Survey of Recent Results in FPGA Security and Intellectual Property protection. In: Secure Smart Embedded Devices, Platforms and Applications (Security and Cryptology; xxx), Springer, 2014, p. 201-224. 978-1-4614-7914-7. xxx xxx. doi:10.1007/978-1-4614-7914_1. http://hdl.handle.net/2078.1/155683

4. Avoine, Gildas; Oechslin, Philippe; Junod, Pascal. Sécurité informatique - Cours et exercices corrigés. In: Sécurité informatique - Cours et exercices corrigés , Vuibert: Paris, 2010, XII, 286 p.. 978-2-7117-4860-0. xxx xxx. http://hdl.handle.net/2078.1/92427

5. Yu, Yu; Yung, Moti; Standaert, François-Xavier; Oswald, Elisabeth; Pereira, Olivier; Quisquater, Jean-Jacques. Leakage Resilient Cryptography in Practice. In: Towards Hardware-Intrisic Security (Information Security and Cryptography; xxx), Springer: Berlin Heidelberg, 2010, p. 99-134. 978-3-642-14452-3. xxx xxx. http://hdl.handle.net/2078.1/87809


Books


1. Krimmer, Robert; Braun Binder, Nadja; Volkamer, Melanie; Kersting, Norbert; Pereira, Olivier; Schürmann, Carsten. Electronic Voting -- Second International Joint Conference, E-Vote-ID 2017. 2017. 978-3-319-68686-8.pages. http://hdl.handle.net/2078.1/189581

2. Pereira, Olivier; Halderman, J. Alex. 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. USENIX, 2012. Online publication.pages. http://hdl.handle.net/2078.1/124924

3. Mangard, Stefan; Standaert, François-Xavier. Cryptographic Hardware and Embedded Systems -- CHES 2010. Springer: Berlin Heidelberg, 2010. 978-3-642-15030-2. 458 pages. http://hdl.handle.net/2078.1/87865

4. Standaert, François-Xavier. Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010. 2010. 159 pages. http://hdl.handle.net/2078.1/87868


Reports


1. Pilet, Jean-Benoit; Dandoy, Régis; Preneel, Bart; Carpent, Xavier; Tibbaut, Aurélie; Erzeel, Silvia; Sbaraglia, Fanny; Pereira, Olivier. Étude sur la possibilité d’introduire le vote Internet en Belgique, Projet NETVOTING_BE – Rapport Volet 1 xxx. 2020. 170 p. http://hdl.handle.net/2078.1/260856

2. Pilet, Jean-Benoit; Dandoy, Régis; Preneel, Bart; Carpent, Xavier; Erzeel? Silvia; Sbaraglia, Fanny; Tibbaut , Aurélie; Pereira, Olivier. Etude sur la possibilité d’introduire le vote Internet en Belgique, PROJECT NETVOTING_BE Volet 2. 2020. 43 p. http://hdl.handle.net/2078.1/260858

3. Pereira, Olivier. Why Should We Install the Coronalert Contact Tracing App?, xxx xxx. 2020. 7 p. http://hdl.handle.net/2078.1/232991

4. Quisquater, Jean-Jacques; Lauter, kristin; Petit, Christophe. Cayley Hashes: A Class of Efficient Graph-based Hash Functions, xxx xxx. 2012. 14 p. http://hdl.handle.net/2078.1/119980