All 'cryptography and information security' publications


Journal Articles


1. Moradi, Amir; Richter, Bastian; Schneider, Tobias; Standaert, François-Xavier. Leakage detection with the X²-Test. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, no.1, p. 209-237. doi:10.13154/tches.v2018.i1.209-237. http://hdl.handle.net/2078.1/199339

2. Kamel, Dina; Standaert, François-Xavier; Duc, Alexandre; Flandre, Denis; Berti, Francesco. Learning with Physical Noise or Errors. In: IEEE Transaction on Dependable and Secure Computing, , p. 14 (2018). http://hdl.handle.net/2078.1/199135

3. Durvaux, François; Standaert, François-Xavier; Merino Del Pozo, Santos. Towards Easy Leakage Certification. In: Journal of Cryptographic Engineering, Vol. 7, no.2, p. 12-147 (17/05/2017). doi:10.1007/s13389-017-0150-0. http://hdl.handle.net/2078.1/187223

4. Journault, Anthony; Standaert, François-Xavier; Varici, Kerem. Improving the security and efficiency of block ciphers based on LS-designs. In: Designs, Codes and Cryptography, Vol. 82, no.1-2, p. 495-509 (09/01/2017). doi:10.1007/s10623-016-0193-8. http://hdl.handle.net/2078.1/181827

5. Rochet, Florentin; Pereira, Olivier. Waterfilling: Balancing the Tor network with maximum diversity. In: PoPETS "Proceedings on Privacy Enhancing Technologies", Vol. 2, p. 4-22 (2017). doi:10.1515/popets-2017-0013. http://hdl.handle.net/2078.1/192336

6. Zhang, Fan; Guo, Shize; Zhao, Xinjie; Wang, Tao; Yang, Jian; Standaert, François-Xavier. A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. In: IEEE Transactions on Information Forensics and Security, Vol. 11, no.5, p. 1039-1054 (2016). doi:10.1109/TIFS.2016.2516905. http://hdl.handle.net/2078.1/176459

7. Bayrak, Ali Galip; Ragazzoni, Francesco; Novo, David; Brisk, Philip; Standaert, François-Xavier; Ienne, Paolo. Automatic Application of Power Analysis Countermeasures. In: IEEE Transactions on Computers, Vol. 64, no.2, p. 329-341 (2015). doi:10.1109/TC.2013.219. http://hdl.handle.net/2078.1/156457

8. Libert, Benoît; Peters, Thomas; Joye, Marc; Yung, Moti. Linearly homomorphic structure-preserving signatures and their applications. In: Designs, Codes and Cryptography, Vol. 77, no.2-3, p. 441-477 (01/10/2015). doi:10.1007/s10623-015-0079-1. http://hdl.handle.net/2078.1/170330

9. Belaïd, Sonia; Grosso, Vincent; Standaert, François-Xavier. Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?. In: Cryptography and Communications, Vol. 7, no.1, p. 163-184 (2015). doi:10.1007/s12095-014-0113-6. http://hdl.handle.net/2078.1/156594

10. Petit, Christophe; Quisquater, Jean-Jacques. Rubik's for Cryptographers (Chinese version). In: Mathematical Advance in Translation, Vol. 33, no.1, p. 5-13 (April 2014). http://hdl.handle.net/2078.1/143015

11. Kamel, Dina; Renauld, Mathieu; Flandre, Denis; Standaert, François-Xavier. Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations. In: Journal of Cryptographic Engineering, , no.4, p. 1987-1995 (18/04/2014). doi:10.1007/S13389-014-0080-z. http://hdl.handle.net/2078.1/152051

12. Petit, Christophe. Finding Roots in GF(p^n) with the Successive Resultant Algorithm. In: London Mathematical Society. Journal of Computation and Mathematics, Vol. 0, no.0, p. 0 (0). (Accepté/Sous presse). http://hdl.handle.net/2078.1/143016

13. Avoine, Gildas; Coisel, Iwen; Martin, Tania. Untraceability model for RFID. In: IEEE Transactions on Mobile Computing, Vol. 99 (2014). doi:10.1109/TMC.2013.161. http://hdl.handle.net/2078.1/139953

14. Guo, Shize; Zhao, Xinjie; Zhang, Fan; Wa,g, Tao; Shi, Zhijie; Standaert, François-Xavier; Ma, Chujiao. Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations. In: IEEE Transactions on Information Forensics and Security, Vol. 9, no.6, p. 999-1014 (2014). doi:10.1109/TIFS.2014.2315534. http://hdl.handle.net/2078.1/152911

15. Petit, Christophe; Renauld, Mathieu; Standaert, François-Xavier. On a particular case of the bisymmetric equation for quasigroupes. In: Acta Mathematica Hungarica, Vol. 143, no. 2, p. 330-336 (2013). doi:10.1007/s10474-014-0428-y. http://hdl.handle.net/2078.1/137229

16. Belaïd, Sonia; De Santis, Frabrizio; Heyszl, Johann; Mangard, Stefan; Medwed, Marcel; Schmidt, Jörn-Marc; Standaert, François-Xavier; Tillich, Stefan. Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. In: Journal of Cryptographic Engineering, Vol. 4, no.3, p. 157-171 (2014). doi:10.1007/s13389-014-0079-5. http://hdl.handle.net/2078.1/152905

17. Bell, Susan; Benaloh, Josh; Byrne, Michael D.; DeBeauvoir, Dana; Eakin, Bryce; Fisher, Gail; Kortum, Philip; McBurnett, Neal; Montoya, Julian; Parker, Michelle; Pereira, Olivier; Stark, Philip B.; Wallach, Dan S.; Winn, Michael. STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. In: USENIX Journal of Election Technology and Systems (JETS), Vol. 1, no.1, p. 18--37 (August 2013). http://hdl.handle.net/2078.1/142427

18. Avoine, Gildas; Kim, Chong Hee. Mutual Distance Bounding Protocols. In: IEEE Transactions on Mobile Computing, Vol. 12, no.5, p. 830 - 839 (2013). doi:10.1109/TMC.2012.47. http://hdl.handle.net/2078.1/139946

19. Petit, Christophe; Quisquater, Jean-Jacques. Rubik's for Cryptographers. In: American Mathematical Society. Notices, Vol. 60, no. 6, p. 733-739 (June-July 2013). doi:10.1090/notil1001. http://hdl.handle.net/2078.1/128157

20. Petit, Christophe. Towards factoring in SL(2, F2n). In: Designs, Codes and Cryptography, Vol. 71, no. 3, p. 409-471 (June 2014). doi:10.1007/s10623-012-9743-x. http://hdl.handle.net/2078.1/120244

21. Avoine, Gildas; Bingol, Muhammed Ali; Carpent, Xavier; Yalcin, Siddika Berna Ors. Privacy-friendly authentication in RFID systems : on sub-linear protocols based on symmetric-key cryptography. In: IEEE Transactions on Mobile Computing, no. Issue: 99, p. 1-14 (2012). doi:10.1109/TMC.2012.174. http://hdl.handle.net/2078.1/118158

22. Kamel, Dina; Renauld, Mathieu; Bol, David; Standaert, François-Xavier; Flandre, Denis. Analysis of Dynamic Differential Swing Limited Logic for Low-Power Secure Applications. In: Journal of Low Power Electronics and Applications, Vol. 2, no.1, p. 98-126 (16/03/2012). doi:10.3390/jlpea2010098. http://hdl.handle.net/2078.1/115608

23. Shariati, Saloomeh; Standaert, François-Xavier; Jacques, Laurent; Macq, Benoît. Analysis and experimental evaluation of Image-based PUFs. In: Journal of Cryptographic Engineering, Vol. 2, no.3, p. 189-206 (23/09/2012). doi:10.1007/s13389-012-0041-3. http://hdl.handle.net/2078/123470

24. Petit, Christophe; Quisquater, Jean-Jacques. Rubik's for cryptographers. http://hdl.handle.net/2078.1/120251

25. Avoine, Gildas. RFID for newbies, sauce security. In: Hakin 9 : IT security magazine, Vol. 6, no. 8, p. 14-19 (2011). http://hdl.handle.net/2078.1/81718

26. Kim, Chong Hee; Avoine, Gildas. RFID distance bounding protocols with mixed challenges. In: IEEE Transactions on Wireless Communications, Vol. 11, no. 5, p. 1818-1626 (2011). doi:10.1109/TWC.2011.030411.101158. http://hdl.handle.net/2078.1/81878

27. Doget, Julien; Prouff, Emmanuel; Rivain, Matthieu; Standaert, François-Xavier. Univariate side channel attacks and leakage modeling. In: Journal of Cryptographic Engineering, Vol. 1, no. 2, p. 123-144 (2011). doi:10.1007/s13389-011-0010-2. http://hdl.handle.net/2078.1/92179

28. Kim, Chong Hee. Security analysis of YKHL distance bounding protocol with adjustable false acceptance rate. In: IEEE Communications Letters, , p. 1-3 (2011). http://hdl.handle.net/2078.1/81758

29. Kim, Chong Hee. Improved differential fault analysis on AES key schedule. In: IEEE Transactions on Information Forensics and Security, Vol. 99, p. 1-10 (2011). doi:10.1109/TIFS.2011.2161289. http://hdl.handle.net/2078.1/81760

30. Hocquet, Cédric; Kamel, Dina; Regazzoni, Francesco; Legat, Jean-Didier; Flandre, Denis; Bol, David; Standaert, François-Xavier. Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags. In: Journal of Cryptographic Engineering, Vol. 1, no. 1, p. 79-86 (Février 2011). doi:10.1007/s13389-011-0005-z. http://hdl.handle.net/2078.1/87835

31. Kim, Chong Hee. New fault attacks using Jacobi symbol and application to regular right-to-left algorithms. In: Information Processing Letters, Vol. 110, no. 20, p. 882-886 (2010). doi:10.1016/j.ipl.2010.07.013. http://hdl.handle.net/2078.1/34607

32. Avoine, Gildas; Martin, Tania; Szikora, Jean-Pierre. Lire son passe navigo en un clin d'oeil. In: Multi-System and Internet Security Cookbook - MISC, Vol. 48, no. 2, p. 74-82 (2010). http://hdl.handle.net/2078.1/82595


Conference Papers


1. Goudarzi, Dahmun; Journault, Anthony; Rivain, Matthieu; Standaert, François-Xavier. Secure Multiplication for Bitslice Higher-Order - Masking: Optimisation and Comparison. In: Lecture Notes in Computer Science. Vol. 10815, p. 3-22 (2018). Junfeng Fan, Benedikt Gierlichs, 2018. doi:10.1007/978-3-319-89641-0_1. http://hdl.handle.net/2078.1/199606

2. Berti, Francesco; Koeune, François; Pereira, Olivier; Peters, Thomas; Standaert, François-Xavier. Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Association for Computing Machinery (ACM), 2018, p. 37-50. doi:10.1145/3196494.3196525. http://hdl.handle.net/2078.1/199233

3. Grosso, Vincent; Standaert, François-Xavier. Masking Proofs are Tight and How to Exploit it in Security Evaluations. In: Proceedings of EUROCRYPT 2018 (Lecture Notes in Computer Science), Jesper Buus Nielsen, Vincent Rijmen, 2018, 978-3-319-78374-1, p. 385-412. doi:10.1007/978-3-319-78375-8_13. http://hdl.handle.net/2078.1/199349

4. Bronchain, Olivier; Dassy, Louis; Faust, Sebastian; Standaert, François-Xavier. Implementing Trojan-Resilient Hardware from(Mostly) Untrusted Components Designed by Colluding Manufacturers. In: Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security (ASHES@CCS 2018), Chip-Hong Chip, Ulrich Rührmair, Daniel Holcomb, Jorge Guajardo, 2018, 978-1-4503-5996-2, 1-10. doi:10.1145/3266444.3266447. http://hdl.handle.net/2078.1/210728

5. Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves. Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model. In: Proceedings of the 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017) (Lecture Notes in Computer Science), Springer: Trier, 2017, 978-3-319-56619-1, p. 535-566. doi:10.1007/978-3-319-56620-7_19. http://hdl.handle.net/2078.1/187166

6. Wang, Weijia; Yu, Yu; Standaert, François-Xavier; Gu, Dawu; Sen, XU; Zhang, Chi. Ridge-Based Profiled Differential Power Analysis. In: Proceedings of the Topics in Cryptology (CT-RSA) 2017 - The Cryptographers' Track at the RSA Conference 2017 (Lecture Notes in Computer Science), Springer: Trier, 2017, 978-3-319-52152-7, p. 347-362. doi:10.1007/3-319-52153-4_20. http://hdl.handle.net/2078.1/187191

7. Libert, Benoît; Peters, Thomas; Qian, Chen. Structure-Preserving Chosen-Ciphertext Security With Shorter Verifiable Ciphertexts. In: Proceedings of the 20th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2017. Vol. LNCS, no. 10174, p. 247-276 (2017). Serge Fehr, 2017. http://hdl.handle.net/2078.1/189877

8. Journault, Anthony; Standaert, François-Xavier. Very High Order Masking: Efficient Implementation and Security Evaluation. In: Proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017) (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-66786-7, p. 623-643. doi:10.1007/978-3-319-66787-4_26. http://hdl.handle.net/2078.1/193913

9. Pereira, Olivier; Wallach, Dan S.. Clash attacks and the STAR-Vote system. In: Proceesings of Electronic Voting - Second International Joint Conference, E-Vote-ID (Lecture Notes in Computer Science), Springer: Heidelberg, 2017, 978-3-319-68686-8, p. 228-247. doi:10.1007/978-3-319-68687-5_14. http://hdl.handle.net/2078.1/192372

10. Balasch, Josep; Faust, Sebastian; Gierlichs, Benedikt; Paglialonga, Clara; Standaert, François-Xavier. Consolidating Inner Product Masking. In: Proceedings of EUROCRYPT 2017 (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-66786-7, p. 724-754. doi:10.1007/978-3-319-66787-4_26. http://hdl.handle.net/2078.1/193914

11. Pereira, Olivier; Rivest, Ronald L.. Marked Mix-Nets. In: Proceedings of Financial Cryptography and Data Security, FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-70277-3, p. 353-369. doi:10.1007/978-3-319-70278-0_22. http://hdl.handle.net/2078.1/192446

12. Nawaz, Kashif; Kamel, Dina; Standaert, François-Xavier; Flandre, Denis. Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: a Case-Study. In: Proceedings of the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2017) (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-64646-6, p. 19-33. http://hdl.handle.net/2078.1/192538

13. Bernstein, Daniel J.; Kölbl, Stefan; Lucks, Stefan; Maat Costa Massolino, Pedro; Mendel, Florian; Nawaz, Kashif; Schneider, Tobias; Schwabe, Peter; Standaert, François-Xavier; Todo, Yosuke. Gimli: a cross-platform permutation. In: Lecture Notes in Computer Science. Vol. 10529, p. 299-320 (2017). Springer: Heidelberg, 2017. doi:10.1007/978-3-319-66787-4_15. http://hdl.handle.net/2078.1/193646

14. Poussier, Romain; Zhou, Yuanyuan; Standaert, François-Xavier. A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks. In: Proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017) (Lecture Notes in Computer Science), Springer, 2017, 978-3-319-66786-7, p. 534-554. doi:10.1007/978-3-319-66787-4_26. http://hdl.handle.net/2078.1/193909

15. Rochet, Florentin; Pereira, Olivier; Wiedling, Cyrille. Formal Analysis of the FIDO 1.x Protocol. In: Lecture Notes in Computer Science. no.10723, p. 68-83 (2017). Springer, 2017. doi:10.1007/978-3-319-75650-9_5. http://hdl.handle.net/2078.1/197245

16. Lange, Joseph; Massart, Clément; Mouraux, André; Standaert, François-Xavier. Side-Channel Attacks Against the Human Brain: the PIN Code Case Study. In: Lecture Notes in Computer Science. Vol. 10348, p. 171-189 (2017). Springer: Heidelberg, 2017. doi:10.1007/978-3-319-64647-3_11. http://hdl.handle.net/2078.1/193639

17. Pierrick, Méaux; Journault, Anthony; Standaert, François-Xavier; Carlet, Claude. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts. In: Proceedings of EUROCRYPT 2016 (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-49889-7, p. 311-343. doi:10.1007/978-3-662-49890-3_13. http://hdl.handle.net/2078.1/176517

18. Dziembowski, Stefan; Faust, Sebastian; Standaert, François-Xavier. Private Circuits III: Hardware Trojan-Resilience via Testing Amplification. doi:10.1145/2976749.2978419. http://hdl.handle.net/2078.1/181926

19. Standaert, François-Xavier. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices - Overview of the ERC Project CRASH, Part I -. In: Proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-319-49444-9, p. 353-362. doi:10.1007/978-3-319-49445-6_20. http://hdl.handle.net/2078.1/181916

20. Bruneau, Nicolas; Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier; Standaert, François-Xavier; Teglia, Yannick. Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. In: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-53886-9, p. 573-601. doi:10.1007/978-3-662-53887-6_21. http://hdl.handle.net/2078.1/181828

21. Choudary, Marios O.; Poussier, Romain; Standaert, François-Xavier. Score-Based vs. Probability-Based Enumeration - A Cautionary Note. In: Proceedings of the 17th International Conference in Cryptology in India - Progress in cryptology (INDIACRYPT 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-319-49889-8, p. 137-152. doi:10.1007/978-3-319-49890-4_8. http://hdl.handle.net/2078.1/181829

22. LIBERT, Benoît; Mouhartem, Fabrice; Peters, Thomas. Practical "Signatures with Efficient Protocols" from Simple Assumptions. In: Proceedings of the 11th ACM Asia Conference on Computer and Communication Security (ASIACCS 2016). p. 308-338. In: Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016) (Lecture Notes in Computer Science), Springer, 2016. http://hdl.handle.net/2078.1/182380

23. Wang, Weijia; Standaert, François-Xavier; Yu, Yu; Pu, Sihang; Liu, Junrong; Guo, Zheng; Gu, Dawu. Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages. In: Proceedings of the 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016) (Lecture Notes in Computer Science), Springer: Trier, 2016, 978-3-319-54668-1, p. 174-191. doi:10.1007/978-3-319-54669-8_11. http://hdl.handle.net/2078.1/187158

24. Berti, Francesco; Standaert, François-Xavier. An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks. In: Proceedings of the 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016) (Lecture Notes in Computer Science), Springer: Trier, 2016, 978-3-319-54668-1, p. 245-264. doi:10.1007/978-3-319-54669-8_15. http://hdl.handle.net/2078.1/187154

25. Standaert, François-Xavier. Leakage-Resilient Symmetric Cryptography - Overview of the ERC Project CRASH, Part II -. In: Proceedings of the 17th International Conference on Cryptology in India (INDOCRYPT 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-319-49890-8. doi:10.1007/978-3-319-49890-4. http://hdl.handle.net/2078.1/181910

26. Poussier, Romain; Standaert, François-Xavier; Grosso, Vincent. Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach. In: Proceedings of CHES 2016 (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-53139-6, p. 61-81. doi:10.1007/978-3-662-53140-2_4. http://hdl.handle.net/2078.1/176486

27. Couteau, Geoffroy; Peters, Thomas; Pointcheval, David. Encryption Switching Protocols. In: Proceedings of the 36th Annual International Cryptology Conference - Advances in Cryptology (CRYPTO 2016), Springer: (Germany) Heidelberg, 2016, 308-338. doi:10.1007/978-3-662-53018-4_12. http://hdl.handle.net/2078.1/182381

28. Medwed, Marcel; Standaert, François-Xavier; Feldhofer, Martin; Nikov, Ventzislav. Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF. In: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016) (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-53886-9, p. 602-623. doi:10.1007/978-3-662-53887-6_22. http://hdl.handle.net/2078.1/181924

29. Durvaux, François; Standaert, François-Xavier; Merino Del Pozo, Santos. Towards Easy Leakage Certification. In: Proceedings of CHES 2016 (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-53139-6, p. 40-60. doi:10.1007/978-3-662-53140-2_3. http://hdl.handle.net/2078.1/176490

30. Durvaux, François; Standaert, François-Xavier. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces. In: Proceedings of EUROCRYPT 2016 (Lecture Notes in Computer Science), Springer, 2016, 978-3-662-49889-7, p. 240-262. doi:10.1007/978-3-662-49890-3_10. http://hdl.handle.net/2078.1/176465

31. Dziembowski, Stefan; Faust, Sebastian; Herold, Gottfried; Journault, Anthony; Masny, Daniel; Standaert, François-Xavier. Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems. In: Proceedings of CRYPTO 2016 (Springer), Lecture Notes in Computer Science, 2016, 978-3-662-53007-8, p. 272-301. doi:10.1007/978-3-662-53008-5_10. http://hdl.handle.net/2078.1/176515

32. Dobraunig, Christoph; Koeune, François; Mangard, Stefan; Mendel, Florian; Standaert, François-Xavier. Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. In: Proceedings of CARDIS 2015 (Lecture Notes in Computer Science), Springer, 2015, 978-3-319-31270-5, p. 225-241. doi:10.1007/978-3-319-31271-2_14. http://hdl.handle.net/2078.1/176510

33. Duc, Alexandre; Faust, Sebastian; Standaert, François-Xavier. Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device. In: Proceedings of EUROCRYPT 2015 (Lecture Notes in Computer Sciences), Springer: Trier, 2015, 978-3-662-46799-2, p. 401-429. doi:10.1007/978-3-662-46800-5_16. http://hdl.handle.net/2078.1/171491

34. Lerman, Liran; Poussier, Romain; Bontempi, Gianluca; Markowitch, Olivier; Standaert, François-Xavier. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis). In: Constructive Side-Channel Analysis and Secure Design (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-319-21475-7, p. 20-33. doi:10.1007/978-3-319-21476-4_2. http://hdl.handle.net/2078.1/171551

35. Glowacz, Cezary; Grosso, Vincent; Poussier, Romain; Schüth, Joachim; Standaert, François-Xavier. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment. In: Proceedings of the 22nd International Workshop on Fast Software Encryption (FSE 2015) (Lecture Notes in Computer Science), Springer, 2015, 978-3-662-48115-8, p. 117-129. doi:10.1007/978-3-662-48116-5. http://hdl.handle.net/2078.1/167539

36. Pereira, Olivier; Standaert, François-Xavier; Venkatesh, Srinivas Vivek. Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives. In: CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, 2015, 978-1-4503-3832-5, p. 96-108. doi:10.1145/2810103.2813626. http://hdl.handle.net/2078.1/165722

37. Libert, Benoît; Peters, Thomas; Yung, Moti. Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. In: Proceedings of Advances in Cryptology - CRYPTO 2015 - Part II (Lecture Notes in Computer Science), Springer, 2015, 978-3-662-47999-5, p. 296-316. doi:10.1007/978-3-662-48000-7_15. http://hdl.handle.net/2078.1/170325

38. Durvaux, François; Standaert, François-Xavier; Veyrat-Charvillon, Nicolas; Mairy, Jean-Baptiste; Deville, Yves. Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits. In: Constructive Side-Channel Analysis and Secure Design (Lecture Notes in Computer Science), Springer, 2015, 978-3-319-21475-7, p. 34-50. doi:10.1007/978-3-319-21476-4. http://hdl.handle.net/2078.1/171547

39. Merino Del Poso, Santos; Standaert, François-Xavier. Blind Source Separation from Single Measurements using Singular Spectrum Analysis. In: Proceedings of CHES 2015 (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-662-48323-7, p. 42-59. doi:10.1007/978-3-662-48324-4_3. http://hdl.handle.net/2078.1/171626

40. Bernhard, David; Cortier, Véronique; Galindo, David; Pereira, Olivier; Warinschi, Bogdan. SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions. In: Security and Privacy (SP), 2015 IEEE Symposium on, 2015, 978-1-4673-6949-7, p. 499 - 516. doi:10.1109/SP.2015.37. http://hdl.handle.net/2078.1/165721

41. Couteau, Geoffroy; Peters, Thomas; Pointcheval, David. Secure Distributed Computation on Private Inputs. In: Proceedings of the 8th International Symposium on Foundations and Practice Security (FPS 2015), 2015, 9. http://hdl.handle.net/2078.1/182382

42. Wang, Weijia; Yu, Yu; Liu, Junrong; Guo, Zheng; Standaert, François-Xavier; Gu, Dawu; Xu, Sen; Fu, Rong. Evaluation and Improvement of Generic-Emulating DPA Attacks. In: Proceedings of CHES 2015 (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-662-48323-7, p. 416-432. doi:10.1007/978-3-662-48324-4_21. http://hdl.handle.net/2078.1/171624

43. Grosso, Vincent; Standaert, François-Xavier. ASCA, SASCA and DPA with Enumeration: Which One Beats the other and When?. In: Proceedings of ASIACRYPT 2015 (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-662-48799-0, p. 291-312. doi:10.1007/978-3-662-48800-3_12. http://hdl.handle.net/2078.1/171639

44. Libert, Benoît; Joye, Marc; Yung, Moti; Peters, Thomas. Secure Efficient History-Hiding Append-Only Signatures in the Standard Model. In: Proceedings of Public-Key Cryptography 2015 - PKC 2015 (Lecture Notes in Computer Science), Springer, 2015, 978-3-662-46446-5, p. 450-473. doi:10.1007/978-3-662-46447-2_20. http://hdl.handle.net/2078.1/170318

45. Libert, Benoît; Peters, Thomas; Joye, Marc; Yung, Moti. Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. In: Proceedings of Advances in Cryptology - ASIACRYPT 2015 - Part I (Lecture Notes in Computer Science), Springer, 2015, 978-3-662-48796-9, p. 681-707. doi:10.1007/978-3-662-48797-6_28. http://hdl.handle.net/2078.1/170335

46. Poussier, Romain; Grosso, Vincent; Standaert, François-Xavier. Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations. In: Proceedings of the 14th International Conference on Smart card Research and Advanced Applications (CARDIS 2015) (Lecture Notes in Computer Science), Springer, 2015, 978-3-319-31270-5, p. 125-142. doi:10.1007/978-3-319-31271-2_8. http://hdl.handle.net/2078.1/176461

47. Merino Del Pozo, Santos; Standaert, François-Xavier; Kamel, Dina; Moradi, Amir. Side-Channel Attacks from Static Power: When Should we Care?. In: Proceedings of the 2015 Design, Automation and Test Europe Conference & Exhibition, ACM: Trier (Germany), 2015, 978-3-9815370-4-8, 145-150. http://hdl.handle.net/2078.1/167530

48. Liu, Junrong; Yu, Yu; Standaert, François-Xavier; Guo, Zheng; Gu, Dawu; Sun, Wei; Ge, Yijie; Xie, Xinjun. Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. In: Proceedings of ESORICS 2015 (Lecture Notes in Computer Science), Springer: Trier (Germany), 2015, 978-3-319-24173-9, p. 468-480. doi:10.1007/978-3-319-24174-6_24. http://hdl.handle.net/2078.1/171638

49. Gustin, Ludovic; Durvaux, François; Kerckhof, Stéphanie; Standaert, François-Xavier; Verleysen, Michel. Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions. In: Proceedings of the 5th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2014) (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-10174-3, p. 112-128. doi:10.1007/978-3-319-10175-0_9. http://hdl.handle.net/2078.1/156462

50. Brenner, Hai; Gaspar, Lubos; Leurent, Gaëtan; Rosen, Alan; Standaert, François-Xavier. FPGA implementations of SPRING - And their Countermeasures against Side-Channel Attacks. In: Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2014) (Lecture Notes in Computer Science), Springer, 2014, 978-3-662-44708-6, p. 414-432. doi:10.1007/978-3-662-44709-3_23. http://hdl.handle.net/2078.1/156562

51. Veyrat-Charvillon, Nicolas; Gérard, Benoît; Standaert, François-Xavier. Soft Analytical Side-Channel Attacks. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information security (ASIACRYPT 2014) (Lecture Notes in Computer Science), Springer, 2014, 978-3-662-45610-1, p. 282-296. doi:10.1007/978-3-662-45611-8_15. http://hdl.handle.net/2078.1/156593

52. Cuvelier, Édouard; Pereira, Olivier. Multi-party Function Evaluation with Perfectly Private Audit Trail. In: Proceedings of the first Symposium on Digital Trust in Auvergne (SDTA'14), 2014. http://hdl.handle.net/2078.1/153510

53. Libert, Benoît; Yung, Moti; Joye, Marc; Peters, Thomas. Traceable Group Encryption. In: Proceedings of Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, 2014. doi:10.1007/978-3-642-54631-0_34. http://hdl.handle.net/2078.1/137953

54. Balasch, Josep; Gierlichs, Benedikt; Grosso, Vincent; Reparaz, Oscar; Standaert, François-Xavier. On the Cost of Lazy Engineering for Masked Software implementations. In: Proceedings of the 13th Smart Card Research and Advanced Application Conference - Revised Selected Papers (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-16762-6, p. 64-81. doi:10.1007/978-3-319-16763-3_5. http://hdl.handle.net/2078.1/166259

55. Gaspar, Lubos; Leurent, Gaëtan; Standaert, François-Xavier. Hardware Implementation and Side-Channel Analysis of Lapin. In: Proceedings of The Cryptographer's Track at the RSA Conference 2014 (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-04851-2, p. 206-226. doi:10.1007/978-3-319-04852-9_11. http://hdl.handle.net/2078.1/152959

56. Libert, Benoît; Peters, Thomas; Joye, Marc; Yung, Moti. Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. In: Proceedings of Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2014. doi:10.1007/978-3-642-55220-5_29. http://hdl.handle.net/2078.1/137948

57. LIBERT, Benoît; Joye, Marc; Yung, Moti; Peters, Thomas. Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security. In: Proceedings of Advances in Cryptology - ASIACRYPT 2014 - Part II (Lecture Notes in Computer Science), Springer, 2014, 978-3-662-45607-1, p. 1-21. doi:10.1007/978-3-662-45608-8_1. http://hdl.handle.net/2078.1/170315

58. Whitnall, Carolyn; Oswald, Elisabeth; Standaert, François-Xavier. The myth of generic DPA. . . and the magic of learning. In: Topics in Cryptology - The Cryptographer's Track at the {RSA} Conference 2014 (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-04851-2, p. 183-205. doi:10.1007/978-3-319-04852-9_10. http://hdl.handle.net/2078.1/155653

59. Grosso, Vincent; Prouff, Emmanuel; Standaert, François-Xavier. Efficient Masked S-Boxes Processing - A Step Forward -. In: Proceedings of AFRICACRYPT 2014 - Progress in Cryptology - 7th International Conference on Cryptology in Africa (Lecture Notes in Computer Science), Springer, 2014, 978-3-319-06733-9, p. 251-266. doi:10.1007/978-3-319-06734-6_6. http://hdl.handle.net/2078.1/155669

60. Durvaux, François; Standaert, François-Xavier; Veyrat-Charvillon, Nicolas. How to Certify the Leakage of a Chip?. In: Lecture Notes in Computer Science. Vol. 8441, p. 459-476 (2014). In: Proceedings d'EUROCRYPT 2014 (Lecture Notes in Computer Science), Springer, 2014, 978-3-642-55219-9, 459-476. doi:10.1007/978-3-642-55220-5_26. http://hdl.handle.net/2078.1/155656

61. Grosso, Vincent; Poussier, Romain; Standaert, François-Xavier; Gaspar, Lubos. Combining Leakage-Resilient PRFs and Shuffling Towards Bounded Security for Small Embedded Devices. In: Proceedings of the 13th Smart Card Research and Advanced Application Conference - Revised Selected Papers (Lecture Notes in Computer Science), Springer, 2014, 9783319167626, p. 122-136. doi:10.1007/978-3-319-16763-3_8. http://hdl.handle.net/2078.1/166237

62. Grosso, Vincent; Leurent, Gaëtan; Standaert, François-Xavier; Varici, Kerem. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. In: Proceedings of the 21st International Workshop on Fast Software Encryption (Lecture Notes in Computer Science), Springer, 2014, 978-3-662-46705-3, p. 18-37. doi:10.1007/978-3-662-46706-0_2. http://hdl.handle.net/2078.1/166262

63. Petit, Christophe. On the complexity of ECDLP for composite fields. In: Proceedings of the Workshop on Algebraic Constructions for the fundations of a safe society, 2013. http://hdl.handle.net/2078.1/137249

64. Aly, Abdelrahaman; Cuvelier, Édouard; Mawet, Sophie; Pereira, Olivier; Van Vyve, Mathieu. Securely Solving Simple Combinatorial Graph Problems. In: Lecture Notes in Computer Science. Vol. 7859, pp. 239-257 (2013). Springer: (Germany) Heidelberg, 2013. doi:10.1007/978-3-642-39884-1_21. http://hdl.handle.net/2078.1/130439

65. Veyrat-Charvillon, Nicolas; Gérard, Benoît; Standaert, François-Xavier. Security Evaluations beyond Computing Power. In: Proceedings of Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-38347-2, p. 126-141. doi:10.1007/978-3-642-38348-9_8. http://hdl.handle.net/2078.1/133720

66. Balasch, Josep; Ege, Baris; Eisenbarth, Thomas; Gérard, Benoît; Zheng, Gong; Güneysu, Tim; Heyse, Stefan; Kerckhof, Stéphanie; Koeune, François; Plos, Thomas; Pöppelmann, Thomas; Regazzoni, Francesco; Standaert, François-Xavier; Van Assche, Gilles; Van Keer, Ronny; van Oldeneel tot Oldenzeel, Loïc; von Maurich, Ingo. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. In: Proceedings of CARDIS 2012 (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-37287-2, p. 158-172. doi:10.1007/978-3-642-37288-9_11. http://hdl.handle.net/2078.1/129985

67. Kerckhof, Stéphanie; Standaert, François-Xavier; Peeters, Eric. From New Technologies to New SolutionsExploiting FRAM Memories to Enhance Physical Security. In: Proceedings of CARDIS 2013 (Lecture Notes in Computer Science), Springer, 2013, p. 16-29. doi:10.1007/978-3-319-08302-5_2. http://hdl.handle.net/2078.1/152948

68. Gérard, Benoît; Grosso, Vincent; Naya Plasencia, Maria; Standaert, François-Xavier. Block Ciphers That Are Easier to Mask: How far Can We GO?. In: Proceedings of Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40348-4, p. 383-399. doi:10.1007/978-3-642-40349-1_22. http://hdl.handle.net/2078.1/133693

69. Attrapadung, Nuttapong; Libert, Benoît; Peters, Thomas. Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. In: Proceedings of Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-36361-0, p. 386-404. doi:10.1007/978-3-642-36362-7_24. http://hdl.handle.net/2078.1/137922

70. Palmieri, Paolo; Pereira, Olivier. Unconditionally Secure Oblivious Transfer from Real Network Behavior. In: Advances in Information and Computer Security (Lecture Notes in Computer Science), Springer, 2013, 978-3-642-41382-7. doi:10.1007/978-3-642-41383-4_11. http://hdl.handle.net/2078.1/141530

71. Zhou, Yuanyuan; Yu, Yu; Standaert, François-Xavier; Quisquater, Jean-Jacques. On the Need of Physical Security for Small Embedded Systems: A Case Study with COMP128-1 Implementations in SIM Cards. In: Proceedings of Financial Cryptography and Data Security - 17th International Conference (FC 2013) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-39883-4, p. 230-238. doi:10.1007/978-3-642-39884-1_20. http://hdl.handle.net/2078.1/133722

72. Grosso, Vincent; Standaert, François-Xavier; Faust, Sebastian. Masking vs. Multiparty Computation: How Large Is the Gap for AES?. In: Proceedings of Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40348-4, p. 400-416. doi:10.1007/978-3-642-40349-1_23. http://hdl.handle.net/2078.1/133689

73. Standaert, François-Xavier; Pereira, Olivier; Yu, Yu. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions. In: Proceedings of Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptography Conference - Part I (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40040-7, p. 335-352. doi:10.1007/978-3-642-40041-4_19. http://hdl.handle.net/2078.1/133680

74. Avoine, Gildas; Bingöl, Muhammed Ali; Carpent, Xavier; Kardas, Süleyman; Avoine, Gildas. Deploying OSK on low-resource mobile Devices. doi:10.1007/978-3-642-41332-2_1. http://hdl.handle.net/2078.1/133145

75. Huang, Yun-Ju; Petit, Christophe; Shinohara, Naoyuki; Takagi, Tsuyoshi. Improvement of Faugère et al.'s Method to Solve ECDLP. In: Lecture Notes in Computer Science. Vol. 8231, p. 115-132 (2013). Springer: (Germany) Heidelberg, 2013. doi:10.1007/978-3-642-41383-4; 10.1007/978-3-642-41383-4. http://hdl.handle.net/2078.1/137230

76. Grosso, Vincent; Standaert, François-Xavier; Prouff, Emmanuel. Low Entropy Masking Schemes, Revisited. In: Proceedings of CARDIS 2013 (Lecture Notes in Computer Science), Springer, 2013, 978-3-319-08301-8, 33-43. doi:10.1007/978-3-319-08302-5_3; 10.1007/978-3-319-08302-5_3. http://hdl.handle.net/2078.1/152922

77. Libert, Benoît; Peters, Thomas; Joye, Marc; Yung, Moti. Linearly Homomorphic Structure-Preserving Signatures and Their Applications. In: Proceedings of Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40083-4, p. 289-307. doi:10.1007/978-3-642-40084-1_17. http://hdl.handle.net/2078.1/137929

78. Cuvelier, Édouard; Pereira, Olivier; Peters, Thomas. Election Verifiability or Ballot Privacy: Do We Need to Choose?. In: Proceedings of Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2013, 978-3-642-40202-9, p. 481-498. doi:10.1007/978-3-642-40203-6_27. http://hdl.handle.net/2078.1/137932

79. Kerckhof, Stéphanie; Durvaux, François; Standaert, François-Xavier; Gérard, Benoît. Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results. In: Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2013) (HOST), IEEE, 2013, 978-1-4799-0559-1, p. 7-12. doi:10.1109/HST.2013.6581557. http://hdl.handle.net/2078.1/133715

80. Petit, Christophe; Quisquater, Jean-Jacques. Rubik's for cryptographers. In: Proceedings of the Workshop on Algebraic Constructions for the fundations of a safe society, 2013. http://hdl.handle.net/2078.1/137232

81. Canard, Sébastien; Coisel, Iwen; Devigne, Julien; Gallais, Cécilia; Peters, Thomas; Sanders, Olivier. Toward Generic method for Server-Aided Cryptography. In: Proceedings of Information and Communications Security - 15th International Conference, ICICS 2013 (Lecture Notes in Computer Science), Springer International Publishing: Switzerland, 2013, 978-3-319-02725-8, p. 373-392. doi:10.1007/978-3-319-02726-5_27. http://hdl.handle.net/2078.1/137935

82. Petit, Christophe. On polynomial systems arising from a Weil descent. 2012, 136 pages. http://hdl.handle.net/2078.1/120080

83. Hodges, Timothy; Petit, Christophe; Schlather, Jacob. Degree of regularity of systems arising from a Weil descent. 2012, 17 pages. http://hdl.handle.net/2078.1/119951

84. Grosso, Vincent; Boura, Christina; Gérard, Benoît; Standaert, François-Xavier. A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks (with Application to Low Cost-Ciphers LED and Piccolo). In: Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux: Enschede (the netherlands), 2012, 978-90-365-3383-6, p. 52-59. http://hdl.handle.net/2078.1/115610

85. Bernhard, David; Pereira, Olivier; Warinschi, Bogdan. How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios. In: Advances in Cryptology - ASIACRYPT 2012 (Lecture Notes in Computer Science), Springer, 2012, 978-3-642-34960-7, p. 626-643. doi:10.1007/978-3-642-34961-4_38. http://hdl.handle.net/2078.1/124905

86. Petit, Christophe. Complexity of index calculus algorithms for ECDLP over composite fields. 2012, 158 pages. http://hdl.handle.net/2078.1/119988

87. Petit, Christophe; Quisquater, Jean-Jacques. On Polynomial Systems Arising from a Weil Descent. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2012), 2012, 451-466. http://hdl.handle.net/2078.1/120094

88. Veyrat-Charvillon, Nicolas; Medwed, Marcel; Kerckhof, Stéphanie; Standaert, François-Xavier. Shuffling against Side-Channel Attacks: A comprehensive Study with Cautionary Note. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2012) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-34960-7, p. 740-757. doi:10.1007/978-3-642-34961-4_44. http://hdl.handle.net/2078.1/130004

89. Avoine, Gildas; Coisel, Iwen; Martin, Tania. A privacy-restoring mechanism for offline RFID systems. In: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, ACM: New York, NY, USA, 2012, 978-1-4503-1265-3, p. 63-74. doi:10.1145/2185448.2185458. http://hdl.handle.net/2078.1/118147

90. Veyrat-Charvillon, Nicolas; Gérard, benoît; Renauld, Mathieu; Standaert, François-Xavier. An Optimal key Enumeration Algorithm and Its Application to Side-Channel Attacks. In: Proceedings of the 19th International Conference on Selected Areas in Cryptography (SAC 2012) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-35999-6, p. 390-406. doi:10.1007/978-3-642-35999-6_25. http://hdl.handle.net/2078.1/130010

91. Shariati, Saloomeh; Koeune, François; Standaert, François-Xavier. Security Analysis of Image-Based PUFs for Anti-counterfeiting. In: Lecture Notes in Computer Science. Vol. 7394, p. 26-38 (09/2012). Springer: (Germany) Heidelberg, 2012. doi:10.1007/978-3-642-32805-3_3. http://hdl.handle.net/2078.1/115647

92. Oren, Yossef; Renauld, Mathieu; Standaert, François-Xavier; Wool, Avishai. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model. In: Lecture Notes in Computer Science. Vol. 7428, p. 140-154 (2012). Springer: (Germany) Heidelberg, 2012. doi:10.1007/978-3-642-33027-8_9. http://hdl.handle.net/2078.1/115648

93. Bogdanov, Andrey; Knudsen, Lars R.; Leander, Gregor; Standaert, François-Xavier; Steinberger, John; Tischhauser, Elmar. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2012) (Lecture Notes in Computer Science), Springer, 2012, 978-3-642-29010-7, p. 45-62. doi:10.1007/978-3-642-29011-4; 10.1007/978-3-642-29011-4. http://hdl.handle.net/2078.1/115606

94. Gérard, Benoît; Standaert, François-Xavier. Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting. In: Lecture Notes in Computer Science. Vol. 7428, p. 175-192 (2012). Springer: (Germany) Heidelberg, 2012. doi:10.1007/978-3-642-33027-8_11. http://hdl.handle.net/2078.1/116479

95. Durvaux, François; Gérard², Benoît; Kerckhof, Stéphanie; Koeune, François; Standaert, François-Xavier. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions. In: Proceedings of the 13th International Workshop on Information Security Applications (WISA 2012) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-35415-1, p. 208-225. doi:10.1007/978-3-642-35416-8_15. http://hdl.handle.net/2078.1/130014

96. Eisenbarth, Thomas; Gong, Zheng; Güneysu, Tim; Heyse, Stefan; Indesteege, Sebastiaan; Kerckhof, Stéphanie; Koeune, François; Nad, Topmislav; Plos, Thomas; Regazzoni, Francesco; Standaert, François-Xavier; van Oldeneel tot Oldenzeel, Loïc. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. In: Proceedings of the 5th International Conference on Cryptology in Africa (AFRICACRYPT 2012) (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-31409-4, p. 172-187. doi:10.1007/978-3-642-31410-0_11. http://hdl.handle.net/2078.1/115581

97. Renauld, Mathieu; Kamel, Dina; Standaert, François-Xavier; Flandre, Denis. Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-Box. In: Lecture Notes in Computer Science, Springer, 2012, 223-239. doi:10.1007/978-3-642-23951-9_15. http://hdl.handle.net/2078.1/110632

98. Libert, Benoît; Peters, Thomas; yung, Moti. Scalable Group Signatures with Revocation. In: Proceedings of Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques (Lecture Notes in Computer Science), Springer-Verlag, 2012, 978-3-642-29010-7, p. 609-627. doi:10.1007/978-3-642-29011-4_36. http://hdl.handle.net/2078.1/137907

99. Bernhard, David; Cortier, Véronique; Pereira, Olivier; Warinschi, Bogdan. Measuring vote privacy, revisited.. In: Proceedings of the 2012 ACM conference on Computer and communications security, ACM, 2012, 978-1-4503-1651-4, p. 941-952. doi:10.1145/2382196.2382295. http://hdl.handle.net/2078.1/124908

100. Attrapadung, Nuttapong; Libert, Benoît; Peters, Thomas. Computing on Authenticated Data: New Privacy Definitions and Constructions. In: Proceedings of ASIACRYPT 2012 (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-34960-7, p. 367-385. doi:10.1007/978-3-642-34961-4_23. http://hdl.handle.net/2078.1/137919

101. Durvaux, François; Renauld, Mathieu; Standaert, François-Xavier; Van Oldeneel Tot Oldenzeel, Loïc. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models. In: Proceedings of CARDIS 2012 (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-37287-2, p. 123-140. doi:10.1007/978-3-642-37288-9_9. http://hdl.handle.net/2078.1/129942

102. Libert, Benoît; Peters, Thomas; Yung, Moti. Group Signatures with Almost-for-Free Revocation. In: Proceedings of Advances in Cryptology - CRYPTO 2012 (Lecture Notes in Computer Science), Springer-Verlag: Berlin Heidelberg, 2012, 978-3-642-32008-8, p. 571-589. doi:10.1007/978-3-642-32009-5_34. http://hdl.handle.net/2078.1/137914

103. Faugère, Jean-Charles; Perret, Ludovic; Petit, Christophe; Renault, Guénaël. Improving the complexity of index calculus algorithms in elliptic curves over binary fields. In: Proceeedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2012), D. Pointcheval and T. Johansson (Eds.), 2012, 27-44. doi:10.1007/978-3-642-29011-4_4. http://hdl.handle.net/2078.1/106682

104. Medwed, Marcel; Standaert, François-Xavier; Joux, Antoine. Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs. In: Lecture Notes in Computer Science. Vol. 7428, p. 193-212 (2012). Springer: (Germany) Heidelberg, 2012. doi:10.1007/978-3-642-33027-8_12. http://hdl.handle.net/2078.1/116486

105. Avoine, Gildas; Carpent, Xavier. Yet Another Ultralightweight Authentication Protocol that is Broken. In: Workshop on RFID Security, 2012. doi:10.1007/978-3-642-36140-1_2. http://hdl.handle.net/2078.1/113808

106. Leurent, Gaëtan. Analysis of differential attacks in ARX constructions. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2012) (Lecture Notes in Computer Science), Springer, 2012, 978-3-642-34960-7, p. 226-243. doi:10.1007/978-3-642-34961-4; 10.1007/978-3-642-34961-4_15. http://hdl.handle.net/2078.1/125087

107. Kerckhof, Stéphanie; Durvaux, François; Hocquet, Cédric; Bol, David; Standaert, François-Xavier. Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint. In: Lecture Notes in Computer Science. Vol. 7428, p. 390-407 (2012). Springer: (Germany) Heidelberg, 2012. doi:10.1007/978-3-642-33027-8. http://hdl.handle.net/2078.1/116447

108. Prouff, Emmanuel. Smart Card Research and Advanced Applications. In: Proceedings of the 10th IFIP WG 8.8/11.2 International Conference (CARDIS 2011) (Lecture Notes in Computer Science), Springer, 2011, 978-3-642-27256-1. http://hdl.handle.net/2078/110949

109. Pereira, Olivier. Leakage-resilient Stream Ciphers: an Overview. http://hdl.handle.net/2078.1/92135

110. Bulens, Philippe; Giry, Damien; Pereira, Olivier. Running Mixnet-Based Elections with Helios. In: Proceedings of EVT/WOTE 2011, 2011. http://hdl.handle.net/2078.1/92134

111. Kerckhof, Stéphanie; Collard, Baudoin; Standaert, François-Xavier. FPGA Implementation of a Statistical Saturation Attack against PRESENT. In: Lecture Notes in Computer Science. Vol. 6737, p. 100-116 (2011). Springer: (Germany) Heidelberg, 2011. doi:10.1007/978-3-642-21969-6. http://hdl.handle.net/2078.1/92188

112. Petit, Christophe. Computing paths in large Cayley graphs and cryptanalytic applications. 2011, 57 pages. http://hdl.handle.net/2078.1/120083

113. Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu. Leftover Hash Lemma, Revisited. In: Advances in Cryptology - CRYPTO 2011 (Lecture Notes in Computer Science), 2011, 978-3-642-22791-2, p. 1-20. doi:10.1007/978-3-642-22792-9. http://hdl.handle.net/2078.1/92133

114. Bernhard, David; Cortier, Véronique; Pereira, Olivier; Smyth, Ben; Warinschi, Bogdan. Adapting Helios for provable ballot privacy. In: ESORICS 2011 - 16th European Symposium on Research in Computer Security, 2011, 978-3-642-23821-5, p. 335-354. doi:10.1007/978-3-642-23822-2_19. http://hdl.handle.net/2078.1/92132

115. Canard, Sébastien; Coisel, Iwen; de Meulenaer, Giacomo; Pereira, Olivier. Group Signatures are Suitable for Constrained Devices. In: Information Security and Cryptology - ICISC 2010 (Lecture Notes in Computer Science), 2011, 978-3-642-24208-3, p. 133-150. doi:10.1007/978-3-642-24209-0_9. http://hdl.handle.net/2078.1/92181

116. Palmieri, Paolo; Pereira, Olivier. Building Oblivious Transfer on Channel Delays. In: Information Security and Cryptology - 6th International Conference (Lecture Notes in Computer Science), 2011, 978-3-642-21517-9, p. 125-138. doi:10.1007/978-3-642-21518-6_10. http://hdl.handle.net/2078.1/92184

117. Armknecht, Frederik; Maes, Roel; Sadeghi, Ahmad-Reza; Wachsmann, Christian; Standaert, François-Xavier. A Formalization of the Security Features of Physical Functions. In: Proceedings of the 32nd IEEE Symposium od Security and Privacy, IEEE Computer Society, 2011, 978-1-4577-0147-4, p. 397-412. http://hdl.handle.net/2078.1/92315

118. Regazzoni, Francesco; Wang, Yi; Standaert, François-Xavier. FPGA Implementations of the AES Masked Against Power Analysis Attacks. http://hdl.handle.net/2078.1/87833

119. Avoine, Gildas; Lauradoux, Cédric; Martin, Benjamin. How secret-sharing can defeat terrorist fraud. In: Proceedings of the fourth ACM conference on Wireless network security, ACM, 2011, 978-1-4503-0692-8, p. 145-156. doi:10.1145/1998412.1998437. http://hdl.handle.net/2078.1/81730

120. Renauld, Mathieu; Standaert, François-Xavier; Veyrat-Charvillon, Nicolas; Kamel, Dina; Flandre, Denis. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. In: Lecture Notes in Computer Science. Vol. 6632, p. 109-128 (2011). Springer: (Germany) Heidelberg, 2011. doi:10.1007/978-3-642-20465-4_8. http://hdl.handle.net/2078.1/86611

121. Palmieri, Paolo; Pereira, Olivier. Secure Two-Party Computation Over a Z-Channel. In: Provable Security - 5th International Conference, ProvSec 2011, 2011, 978-3-642-24315-8, p. 3-15. doi:10.1007/978-3-642-24316-5_3. http://hdl.handle.net/2078.1/92131

122. Barenghi, Alessandro; Hocquet, Cédric; Bol, David; Standaert, François-Xavier; Regazzoni, Francesco; Koren, Israel. Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation. doi:10.1007/978-3-642-25286-0_4. http://hdl.handle.net/2078.1/87572

123. de Meulenaer, Giacomo; Standaert, François-Xavier. Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks. http://hdl.handle.net/2078.1/81803

124. Yu, Yu; Standaert, François-Xavier; Pereira, Olivier; Yung, M.. Practical Leakage-Resilient Pseudorandom Generators. In: Proceedings of the 17th ACM conference on Computer and communications security, ACM: New York, 2010, 978-1-4503-0245-6, 141-151. http://hdl.handle.net/2078.1/81810

125. Avoine, Gildas; Coisel, Iwen; Martin, Tania. Time Measurement threatens privacy-friendly RFID authentication protocols. In: RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, 2010, 3-642-16821-3. http://hdl.handle.net/2078.1/82049

126. Standaert, François-Xavier; Veyrat-Charvillon, Nicolas; Oswald, E.; Gierlichs, B.; Medwed, M.; Kasper, M.; Mangard, S.. The World is Not Enough: Another Look on Second-Order DPA. http://hdl.handle.net/2078.1/81811

127. Petit, Christophe. Hash functions and Cayley graphs: The end of the story ?. 2010, 33 pages. http://hdl.handle.net/2078.1/120081

128. Kim, Chong Hee. Differential fault analysis against AES-192 and AES-256 with minimal faults. In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010, 978-0-7695-4169-3. http://hdl.handle.net/2078.1/81968

129. Rasua, Rolando Trujillo; Martin, Benjamin; Avoine, Gildas. The Poulidor distance-bounding protocol. In: Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, 2010, 3-642-16821-3. http://hdl.handle.net/2078.1/82589

130. Medwed, M.; Standaert, François-Xavier; Groszschaedl, J.; Regazzoni, F.. Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. http://hdl.handle.net/2078.1/81805

131. Avoine, Gildas; Martin, Benjamin; Martin, Tania. Tree-Based RFID authentication protocols are definitively not privacy-friendly. In: Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, 2010, 3-642-16821-3. http://hdl.handle.net/2078.1/82063

132. Renauld, Mathieu; Standaert, François-Xavier. Representation-, Leakage- and Cipher-Dependencies in Algebric Sidde-Channel Attacks. http://hdl.handle.net/2078.1/81806

133. Kara, Orhun; Kardas, Süleyman; Bingöl, Muhammed Ali; Avoine, Gildas. Optimal Security Limits of RFID Distance Bounding Protocols. In: Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, I O S Press: (Netherlands) Amsterdam, 2010, 3-642-16821-3. http://hdl.handle.net/2078.1/82497

134. Avoine, Gildas; Carpent, Xavier; Martin, Benjamin. Strong authentication and strong integrity (SASI) is not that strong. In: Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues, ACM, 2010, 3-642-16821-3, p. 50-64. http://hdl.handle.net/2078.1/82466

135. Shariati, Saloomeh; Jacques, Laurent; Standaert, François-Xavier; Macq, Benoît; Salhi, Mohamed Amine; Antoine, Philippe. Randomly Driven Fuzzy Key Extraction of Unclonable Images. In: Image Processing (ICIP), 2010 17th IEEE International Conference on, IEEE, 2010, 4329-4332. doi:10.1109/ICIP.2010.5652420; 10.1109/ICIP.2010.5652420. http://hdl.handle.net/2078.1/81809

136. Shariati, Saloomeh; Standaert, François-Xavier; Jacques, Laurent; Macq, Benoît; Salhi, M.; Antoine, Philippe. Random Profiles of Laser Marks. In: PROCEEDINGS OF THE SYMPOSIUM ON INFORMATION THEORY IN THE BENELUX, 2010, 9789071048234, 27-34. http://hdl.handle.net/2078.1/81802


Book Chapters


1. Pereira, Olivier. Internet Voting with Helios. In: Real-World Electronic Voting , CRC Press: Floride (USA), 2016, p. 277-308. 978-1-4987-1471-3. doi:10.1201/9781315371290-12. http://hdl.handle.net/2078.1/181803

2. Bell, Susan; Benaloh, Josh; Byme, Michael D.; DeBeauvoir, Dana; Eakin, Bryce; Fisher, Gail; Kortum, Philip; Montoya, Julian; Parker, Michelle; Pereira, Olivier; Stark, Philip B.; Wallach, Dan S.; Winn, Michael. STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System. In: Real-World Electronic Voting, Design, analysis and deployment , Taylor & Francis Group, 2016, p. 375-404. 978-1-4987-1469-3. http://hdl.handle.net/2078.1/183150

3. Durvaux, François; Kerckhof, Stéphanie; Regazzoni, Francesco; Standaert, François-Xavier. A Survey of Recent Results in FPGA Security and Intellectual Property protection. In: Secure Smart Embedded Devices, Platforms and Applications (Security and Cryptology; xxx), Springer, 2014, p. 201-224. 978-1-4614-7914-7. doi:10.1007/978-1-4614-7914_1. http://hdl.handle.net/2078.1/155683

4. Avoine, Gildas; Junod, Pascal; Oechslin, Philippe. Sécurité informatique - Cours et exercices corrigés. In: Sécurité informatique - Cours et exercices corrigés , Vuibert: Paris, 2010, XII, 286 p.. 978-2-7117-4860-0. http://hdl.handle.net/2078.1/92427

5. Standaert, François-Xavier; Pereira, Olivier; Yu, Yu; Quisquater, Jean-Jacques; Yung, Moti; Oswald, Elisabeth. Leakage Resilient Cryptography in Practice. In: Towards Hardware-Intrisic Security (Information Security and Cryptography; xxx), Springer: Berlin Heidelberg, 2010, p. 99-134. 978-3-642-14452-3. http://hdl.handle.net/2078.1/87809


Books


1. Krimmer, Robert; Volkamer, Melanie; Braun Binder, Nadja; Kersting, Norbert; Pereira, Olivier; Schürmann, Carsten. Electronic Voting -- Second International Joint Conference, E-Vote-ID 2017. 2017. 978-3-319-68686-8.pages. http://hdl.handle.net/2078.1/189581

2. Halderman, J. Alex; Pereira, Olivier. 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. USENIX, 2012. Online publication.pages. http://hdl.handle.net/2078.1/124924

3. Standaert, François-Xavier. Proceedings of the ECRYPT Workshop on Tools for Cryptanalysis 2010. 2010. 159 pages. http://hdl.handle.net/2078.1/87868

4. Mangard, Stefan; Standaert, François-Xavier. Cryptographic Hardware and Embedded Systems -- CHES 2010. Springer: Berlin Heidelberg, 2010. 978-3-642-15030-2. 458 pages. http://hdl.handle.net/2078.1/87865


Reports


1. Petit, Christophe; Lauter, kristin; Quisquater, Jean-Jacques. Cayley Hashes: A Class of Efficient Graph-based Hash Functions, 2012. 14 p. http://hdl.handle.net/2078.1/119980