DBLP, Recent works, To appear, Proceedings, Published papers, Tech. reports.

Warning! Material on this web site is presented to ensure timely dissemination of technical work. Copyright and all rights therein are retained by authors or by other copyright holders, notwithstanding that they have offered their works here electronically. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder. Copyright holders claiming that the material available above is not in accordance with copyright terms and constraints are invited to contact the author by e-mail and ask him to remove the links to specific manuscripts. The information in these documents reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user therefore uses the information at its sole risk and liability.

Recent (unpublished) works

- F.-X. Standaert, How (not) to Use Welch's T-test in Side-Channel Security Evaluations, cryptology e-Print archive, report 2017/138.

- V. Grosso, F.-X. Standaert, Masking Proofs are Tight (and How to Exploit it in Security Evaluations), cryptology e-Print archive, report 2017/116.

- F. Berti, F. Koeune, O. Pereira, T. Peters, F.-X. Standaert, Leakage-Resilient and Misuse-Resistant Authenticated Encryption, cryptology e-Print archive, report 2016/996.

Papers to appear

191. G. Barthe, F. Dupressoir, S. Faust, B. Gregoire, F.-X. Standaert, P.-Y. Strub, Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, to appear in the proceedings of EUROCRYPT 2017, Lecture Notes in Computer Science, vol xxxxx, pp yyy-zzz, Paris, France, May 2017, Springer, (pdf file).

190. J. Lange, C. Massart, A. Mouraux, F.-X. Standaert, Side-Channel Attacks Against the Human Brain: the PIN Code Case Study, to appear in the proceedings of COSADE 2017, Lecture Notes in Computer Science, vol xxxxx, pp yyy-zzz, Paris, France, April 2017, Springer.

189. S. Merino Del Pozo, F.-X. Standaert, Getting the Most Out of Leakage Detection - Statistical tools and Measurement Setups Hand in Hand, to appear in the proceedings of COSADE 2017, Lecture Notes in Computer Science, vol xxxxx, pp yyy-zzz, Paris, France, April 2017, Springer, (pdf file).

188. K. Nawaz, D. Kamel, F.-X. Standaert, D. Flandre, Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: a Case-Study, to appear in the proceedings of COSADE 2017, Lecture Notes in Computer Science, vol xxxxx, pp yyy-zzz, Paris, France, April 2017, Springer, (pdf file).

187. Weijia Wang, Yu Yu, F.-X. Standaert, Dawu Gu, Sen Xu, Chi Zhang, Ridge-based Profiled Differential Power Analysis, to appear in the proceedings of CT-RSA 2017, Lecture Notes in Computer Science, vol xxxxx, pp yyy-zzz, San Francisco, USA, February 2017, Springer, (pdf file).

182. F. Berti, F.-X. Standaert, An Analysis of the Learning Parity with Noise Assumption Against Fault Attacks, to appear in the proceedings of CARDIS 2016, Lecture Notes in Computer Science, vol xxxx, pp yyy-zzz, Cannes, France, November 2016, Springer, (pdf file).

181. Weijia Wang, F.-X. Standaert, Yu Yu, Sihang Pu, Liuj Junrong, Zheng Guo, Dawu Gu Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages, to appear in the proceedings of CARDIS 2016, Lecture Notes in Computer Science, vol xxxx, pp yyy-zzz, Cannes, France, November 2016, Springer, (pdf file).

175. T. Schneider, A. Moradi, F.-X. Standaert, T. Guneysu, Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms , to appear in the proceedings of SAC 2016, Lecture Notes in Computer Science, vol xxxx, pp yyy-zzz, St. John's, Canada, August 2016, Springer, (pdf file).

Proceedings

E. Oswald, F.-X. Standaert, Constructive Side-Channel Analysis and Secure Design, 7th International Workshop - COSADE 2016, Lecture Notes in Computer Science, vol 9689, Graz, Austria, April 2016, Springer.

G. Leander, F.-X. Standaert, ECRYPT Workshop on Lightweight Cryptography, Universite catholique de Louvain, Louvain-la-Neuve, Belgium, November 2011.

S. Mangard, F.-X. Standaert, Cryptographic Hardware and Embedded Systems, 12th International Workshop - CHES 2010, Lecture Notes in Computer Science, vol 6225, Santa Barbara, California, USA, August 2010, Springer.

F.-X. Standaert, ECRYPT Workshop on Tools for Cryptanalysis, Royal Holloway, University of London, UK, June 2010.

G. Grimaud, F.-X. Standaert, Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, Lecture Notes in Computer Science, vol 5189, London, UK, September 2008, Springer.

Published papers

186. F.-X. Standaert, High (Physical) Security & Lightweight (Symmetric) Cryptography, invited talk, HighLight: High-Security Lightweight Cryptography, Leiden, The Netherlands, November 2016, and LightCrypto Workshop, Cannes, France, November 2016, (pdf file).

185. M.O. Choudary, R. Poussier, F.-X. Standaert, Score-based vs. Probability-based Enumeration -- a Cautionary Note --, in the proceedings of INDOCRYPT 2016, Lecture Notes in Computer Science, vol 10095, pp 137-152, Kolkata, India, December 2016, Springer, (pdf file).

184. F.-X. Standaert, Leakage-Resilient Symmetric Cryptography (Overview of the ERC Project CRASH, Part II), invited talk, in the proceedings of INDOCRYPT 2016, Lecture Notes in Computer Science, vol 10095, pp XI, Kolkata, India, December 2016, Springer, (pdf file, slides).

183. F.-X. Standaert, Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices (Overview of the ERC Project CRASH, Part I), invited talk, in the proceedings of SPACE 2016, Lecture Notes in Computer Science, vol 10076, pp 353-362, Hyderabad, India, December 2016, Springer, (pdf file, slides).

180. A. Moradi, F.-X. Standaert, Moments-Correlating DPA, in the procceedings of Theory of Implementations, TI 2016, pp 5-15, Vienna, Austria, October 2016, (pdf file).

179. M. Medwed, F.-X. Standaert, V. Nikov, M. Feldhofer, Unknown-Input Attacks in the Parallel Setting: Improving the Security and Performances of the CHES 2012 Leakage-Resilient PRF, in the proceedings of ASIACRYPT 2016, Lecture Notes in Computer Science, vol 10031, pp 602-623, Hanoi, Vietnam, December 2016, Springer, (pdf file).

178. N. Bruneau, S. Guilley, A. Heuser, O. Rioul, F.-X. Standaert, Y. Teglia, Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations, in the proceedings of ASIACRYPT 2016, Lecture Notes in Computer Science, vol 10031, pp 573-601, Hanoi, Vietnam, December 2016, Springer, (pdf file).

177. S. Dziembowski, S. Faust, F.-X. Standaert, Private Circuits III: Hardware Trojan-Resilience via Testing Amplification, in the proceedings of ACM CCS 2016, pp 142-153, Vienna, Austria, October 2016, (pdf file).

176. D. Kamel, G. de Streel, S. Merino Del Pozo, K. Nawaz, F.-X. Standaert, D. Flandre, D. Bol, Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers, in the proceedings of SPACE 2016, Lecture Notes in Computer Science, vol 10076, pp 233-248, Hyderabad, India, December 2016, Springer, (pdf file).

174. F.-X. Standaert, Leakage-Resilient (Symmetric) Cryptography, Summer School on Real-World Crypto and Privacy, Sibenik, Croatia, June 2016 (slides).

173. F.-X. Standaert, Introduction to Side-Channel Analysis, Summer School on Real-World Crypto and Privacy, Sibenik, Croatia, June 2016 (slides).

172. R. Poussier, F.-X. Standaert, V. Grosso, Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach, in the proceedings of CHES 2016, Lecture Notes in Computer Science, vol 9813, pp 61-81, Santa Barbara, California, USA, August 2016, Springer, (pdf file, source code).

171. F. Durvaux, F.-X. Standaert, S. Merino Del Pozo, Towards Easy Leakage Certification, in the proceedings of CHES 2016, Lecture Notes in Computer Science, vol 9813, pp 40-60, Santa Barbara, California, USA, August 2016, Springer, (pdf file, source code).
- Extended version in the Journal of Cryptographic Engineering, vol ww, num xx, pp yyy-zzz, Month 2017, Springer, (pdf file).

170. S. Dziembowski, S. Faust, G. Herold, A. Journault, D. Masny, F.-X. Standaert, Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems, in the proceedings of CRYPTO 2016, Lecture Notes in Computer Science, vol 9815, pp 272-301, Santa Barbara, California, USA, August 2016, Springer, (pdf file).

169. F. Durvaux, F.-X. Standaert, From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, in the proceedings of EUROCRYPT 2016, Lecture Notes in Computer Science, vol 9665, pp 240-262, Vienna, Austria, May 2016, Springer, (pdf file).

168. P. Meaux, A. Journault, F.-X. Standaert, C. Carlet, Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts, in the proceedings of EUROCRYPT 2016, Lecture Notes in Computer Science, vol 9665, pp 311-343, Vienna, Austria, May 2016, Springer, (pdf file).

167. Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian Yang, F.-X. Standaert, Dawu Gu, A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers, in IEEE Transactions on Information Forensics and Security, vol 11, num 5, pp 1039-2054, January 2016, (pdf file).

166. V. Grosso, F.-X. Standaert, ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?, in the proceedings of ASIACRYPT 2015, Lecture Notes in Computer Science, vol 9453, pp 291-312, Auckland, New Zealand, December 2015, (pdf file).

165. C. Dobraunig, F. Koeune, S. Mangard, F. Mendel, F.-X. Standaert, Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security, in the proceedings of CARDIS 2015, Lecture Notes in Computer Science, vol 9514, pp 225-241, Bochum, Germany, November 2015, (pdf file).

164. R. Poussier, V. Grosso and F.-X. Standaert, Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations, in the proceedings of CARDIS 2015, Lecture Notes in Computer Science, vol 9514, pp 125-142, Bochum, Germany, November 2015, (pdf file).

163. O. Pereira, F.-X. Standaert, S. Vivek, Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives, in the proceedings of ACM CCS 2015, pp 96-108, Denver, Colorado, USA, October 2015, (pdf file).

162. S. Guilley, A. Heuser, O. Rioul, F.-X. Standaert, Template Attacks, Optimal Distinguishers and the Perceived Information Metric, in the proceedings of CryptArchi 2015, Leuven, Belgium, July 2015, (slides).

161. Junrong Liu, Yu Yu, F.-X. Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Rong Fu, Xinjun Xie, Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards, in the proceedings of ESORICS 2015, Lecture Notes in Computer Science, vol 9326, pp 468-480, Vienna, Austria, September 2015, Springer, (pdf file).

160. S. Merino Del Pozo, F.-X. Standaert, Blind Source Separation from Single Measurements using Singular Spectrum Analysis, in the proceedings of CHES 2015, Lecture Notes in Computer Science, vol 9293, pp 42-59, Saint Malo, France, September 2015, Springer, (pdf file).

159. Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, F.-X. Standaert, Dawu Gu, Sen Xu, Evaluation and Improvement of Generic-Emulating DPA Attacks, in the proceedings of CHES 2015, Lecture Notes in Computer Science, vol 9293, pp 416-432, Saint Malo, France, September 2015, Springer, (pdf file).

157. A. Journault, F.-X. Standaert, K. Varici, Improving the Security and Efficiency of Block Ciphers based on LS-Designs (Extended Abstract), in the proceedings of the 9th International Workshop on Coding and Cryptography, WCC 2015, Paris, France, April 2015, (pdf file).
- Extended version in Designs, Codes and Cryptography, vol 82, num 1-2, pp 459-509, January 2017, Springer, (pdf file)

156. L. Lerman, R. Poussier, G. Bontempi, O. Markowitch, F.-X. Standaert, Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis), in the proceedings of COSADE 2015, Lecture Notes in Computer Science, vol 9064, pp 20-33, Berlin, Germany, April 2015, Springer, (pdf file).

155. F. Durvaux, F.-X. Standaert, N. Veyrat-Charvillon, J.-B. Mairy, Y. Deville, Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits, in the proceedings of COSADE 2015, Lecture Notes in Computer Science, vol 9064, pp 34-50, Berlin, Germany, April 2015, Springer, (pdf file, long version).

154. A. Duc, S. Faust, F.-X. Standaert, Making Masking Security Proofs Concrete (or How to Evaluate the Security of any Leaking Device), in the proceedings of Eurocrypt 2015, Lecture Notes in Computer Science, vol 9056, pp 401-429, Sofia, Bulgaria, April 2015, Springer, (pdf file, source code).

153. C. Glowacz, V. Grosso, R. Poussier, J. Schueth, F.-X. Standaert, Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment, in the proceedings of FSE 2015, Lecture Notes in Computer Science, vol 9054, pp 117-129, Istanbul, Turkey, March 2015, Springer, (pdf file).

152. S. Merino Del Pozo, F.-X. Standaert, D. Kamel, A. Moradi, Side-Channel Attacks from Static Power: When Should we Care?, in the proceedings of DATE 2015, pp 145-150, Grenoble, France, March 2015, (pdf file).

151. S. Belaid, V. Grosso, F.-X. Standaert, Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?, in Cryptography and Communications, vol 7, num 1, pp 163-184, January 2015, (pdf file).

150. N. Veyrat-Charvillon, B. Gerard, F.-X. Standaert, Soft Analytical Side-Channel Attacks, in the proceedings of ASIACRYPT 2014, Lecture Notes in Computer Science, vol 8873, pp 282-296, Kaohsiung, Taiwan (R.O.C.), December 2014, Springer, (pdf file).

149. J. Balasch, B. Gierlichs, V. Grosso, O. Reparaz, F.-X. Standaert, On the Cost of Lazy Engineering for Masked Software Implementations, in the proceedings of CARDIS 2014, Lecture Notes in Computer Science, vol 8968, pp 64-81, Paris, France, November 2014, Springer, (pdf file).

148. V. Grosso, R. Poussier, F.-X. Standaert, L. Gaspar, Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices), in the proceedings of CARDIS 2014, Lecture Notes in Computer Science, vol 8968, pp 122-136, Paris, France, November 2014, Springer, (pdf file).

147. H. Brenner, L. Gaspar, G. Leurent, A. Rosen, F.-X. Standaert, FPGA implementations of SPRING and their Countermeasures against Side-Channel Attacks, in the proceedings of CHES 2014, Lecture Notes in Computer Science, vol 8731, pp 414-432, Busang, Korea, September 2014, Springer, (pdf file).

146. V. Grosso, E. Prouff, F.-X. Standaert, Efficient Masked S-boxes Processing, a Step Forward, in the proceedings of AFRICACRYPT 2014, Lecture Notes in Computer Science, vol 8469, pp 251-266, Marrakech, Morocco, May 2014, Springer, (pdf file).

145. Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Zhijie Shi, F.-X. Standaert, Chujiao Ma, Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations, in IEEE Transactions on Information Forensics and Security, vol 9, num 6, pp 999-1014, June 2014, (pdf file).

144. L. Gustin, F. Durvaux, S. Kerckhof, F.-X. Standaert, M. Verleysen, Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions, in the proceedings of COSADE 2014, Lecture Notes in Computer Science, vol 8622, pp 112-128, Paris, France, April 2014, Springer, (pdf file).

143. F. Durvaux, F.-X. Standaert, N. Veyrat-Charvillon, How to Certify the Leakage of a Chip?, in the proceedings of Eurocrypt 2014, Lecture Notes in Computer Science, vol 8441, pp 459-476, Copenhagen, Denmark, May 2014, Springer, (pdf file, long version).

142. V. Grosso, G. Leurent, F.-X. Standaert, K. Varici, LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations, in the proceedings of FSE 2014, Lecture Notes in Computer Science, vol 8540, pp 18-37, London, UK, March 2014, Springer, (pdf file).

141. C. Petit, M. Renauld, F.-X. Standaert, On a Particular Case of the Bisymmetric Equation for Quasigroup, in Acta Mathematica Hungarica, vol 143, num 2, August 2014, (pdf file).

140. A. Barenghi, C. Hocquet, D. Bol, F.-X. Standaert, F. Regazzoni, I. Koren, A Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to Low Voltage Fault Attacks, in IEEE Transactions on Emerging Topics in Computing, vol 2, num 2, pp 107-118, June 2014, (pdf file).

139. A.G. Bayrak, F. Regazzoni, D. Novo Bruna, D. P. Brisk, F-X. Standaert, P. Ienne, Automatic Application of Power Analysis Countermeasures, in IEEE Transactions on Computers, vol 64, num 2, pp 329-341, January 2015, (pdf file).

138. C. Whitnall, E. Oswald, F.-X. Standaert, The Myth of Generic DPA... and the Magic of Learning, in the proceedings of CT-RSA 2014, Lecture Notes in Computer Science, vol 8366, pp 183-205, San Fransisco, USA, February 2014, Springer, (pdf file).

137. L. Gaspar, G. Leurent, F.-X. Standaert, Hardware Implementation and Side-Channel Analysis of Lapin, in the proceedings of CT-RSA 2014, Lecture Notes in Computer Science, vol 8366, pp 206-226, San Fransisco, USA, February 2014, Springer, (pdf file).

136. S. Kerckhof, F.-X. Standaert, E. Peeters, From New Technologies to New Solutions (Exploiting FRAM Memories to Enhance Physical Security), in the proceedings of CARDIS 2013, Lecture Notes in Computer Science, vol 8419, pp 16-29, Berlin, Germany, November 2013, Springer, (pdf file).

135. V. Grosso, F.-X. Standaert, E. Prouff, Low Entropy Masking Schemes, Revisited, in the proceedings of CARDIS 2013, Lecture Notes in Computer Science, vol 8419, pp 33-43, Berlin, Germany, November 2013, Springer, (pdf file).

134. M. Parusinski, S. Shariati, D. Kamel, F.-X. Standaert, Strong PUFs and their (Physical) Unpredictability: A Case Study with Power PUFs, in the proceedings of WESS 2013 (8th Workshop on Embedded Systems Security 2013), pp 5:1-5:10, Montreal, Canada, September 2013, (pdf file).

133. S. Belaid, F. De Santis, J. Heyszl, S. Mangard, M. Medwed, J.-M. Schmidt, F.-X. Standaert, S. Tillich, Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis, in the proceedings of PROOFS 2013 (Security Proofs for Embedded Systems), pp 48-68, Santa-Barbara, California, USA, August 2013, (pdf file).
- Extended version in the Journal of Cryptographic Engineering, vol 4, num 3, pp 157-171, September 2014, Springer, (pdf file).

132. D. Kamel, M. Renauld, D. Flandre, F.-X. Standaert, Understanding the Limitations and Improving the Relevance of SPICE Simulations in Side-Channel Security Evaluations, in the proceedings of PROOFS 2013 (Security Proofs for Embedded Systems), pp 69-82, Santa-Barbara, California, USA, August 2013, (pdf file).
- Extended version in the Journal of Cryptographic Engineering, vol 4, num 3, pp 187-195, September 2014, Springer, (pdf file).

131. F.-X. Standaert, O. Pereira, Yu Yu, Leakage-Resilient Cryptography Under Empirically Verifiable Assumptions, in the proceedings of Crypto 2013, Lecture Notes in Computer Science, vol 8042, pp 335-352, Santa Barbara, California, USA, August 2013, Springer, (pdf file).

130. V. Grosso, F.-X. Standaert, S. Faust, Masking vs. Multiparty Computation: How Large is the Gap for the AES?, in the proceedings of CHES 2013, Lecture Notes in Computer Science, vol 8086, pp 400-416, Santa Barbara, California, USA, August 2013 (pdf file).
- Extended version in the Journal of Cryptographic Engineering, vol 4, num 1, pp 47-57, April 2014, Springer, (pdf file) + updated Section 4.2, with additional performance evaluations for more expensive randomness generation.

129. B. Gerard, V. Grosso, M. Naya-Plasencia, F.-X. Standaert, Block Ciphers that are Easier to Mask: How Far Can we Go?, in the proceedings of CHES 2013, Lecture Notes in Computer Science, vol 8086, pp 383-399, Santa Barbara, California, USA, August 2013, Springer, (pdf file, test vectors, cryptanalysis).

128. S. Kerckhof, F. Durvaux, F.-X. Standaert, B. Gerard, Intellectual Property Protection for FPGA Designs with Soft Physical Hash Functions: First Experimental Results, in the proceedings of HOST 2013, pp 7-12, Austin, Texas, June 2013, (pdf file).

127. Hui Zhao, Yongbin Zhou, F.-X. Standaert, Hailong Zhang, Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers, in the proceedings of ISPEC 2013, Lecture Notes in Computer Science, vol 7863, pp 336-352, Lanzhou, China, May 2013, Springer, (pdf file).

126. N. Veyrat-Charvillon, B. Gerard, F.-X. Standaert, Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?, in the proceedings of Eurocrypt 2013, Lecture Notes in Computer Science, vol 7881, pp 126-141, Athens, Greece, May 2013, Springer, (pdf file, source code).

125. Yuanyuan Zhou, Yu Yu, F.-X. Standaert, J.-J. Quisquater, On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards, in the proceedings of Financial Crypto and Data Security 2013, Lecture Notes in Computer Science, vol 7859, pp 230-238, Okinawa, Japan, April 2013, Springer, (pdf file, long version).

124. Yu Yu, F.-X. Standaert, Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness, in the proceedings of CT-RSA 2013, Lecture Notes in Computer Science, vol 7779, pp 223-238, San Francisco, USA, February 2013, Springer, (pdf file).

123. F. Durvaux, M. Renauld, F.-X. Standaert, L. van Oldeneel tot Oldenzeel, N. Veyrat-Charvillon, Efficient Removal of Random Delays from Embedded Software Implementations using Hidden Markov Models, in the proceedings of CARDIS 2012, Lecture Notes in Computer Science, vol 7771, pp 123-140, Graz, Austria, November 2012, Springer, (pdf file).

122. J. Balasch, B. Ege, T. Eisenbarth, B. Gerard, Z. Gong, T. Guneysu, S. Heyse, S. Kerckhof, F. Koeune, T. Plos, T. Poppelmann, F. Regazzoni, F.-X. Standaert, G. Van Assche, R. Van Keer, L. van Oldeneel tot Oldenzeel, I. von Maurich, Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, in the proceedings of CARDIS 2012, Lecture Notes in Computer Science, vol 7771, pp 158-172, Graz, Austria, November 2012, Springer, (pdf file, source codes).

121. N. Veyrat-Charvillon, M. Medwed, S. Kerckhof, F.-X. Standaert, Shuffling Against Side-Channel Attacks: a Comprehensive Study with Cautionary Note, in the proceedings of Asiacrypt 2012, Lecture Notes in Computer Science, vol 7658, pp 740-757, Bejing, China, December 2012, Springer, (pdf file).

120. S. Shariati, F.-X. Standaert, L. Jacques, B. Macq, Analysis and Experimental Evaluation of Image-based PUFs, in the Journal of Cryptographic Engineering, vol 2, num 3, pp 189-206, October 2012, Springer, (pdf file).

119. N. Veyrat-Charvillon, B. Gerard, M. Renauld, F.-X. Standaert, An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks, in the proceedings of SAC 2012, Lecture Notes in Computer Science, vol 7707, pp 391-407, Windsor, Ontario, Canada, August 2012, Springer, (pdf file, source code).
- Key enumeration algorithm used in the best attack of the DPA Contest V2 (see hall of fame).

118. F. Durvaux, B. Gerard, S. Kerckhof, F. Koeune, F.-X. Standaert, Intellectual Property Protection for Integrated Systems using Soft Physical Hash Functions, in the proceedings of WISA 2012, Lecture Notes in Computer Science, vol 7690, pp 208-225, Jeju Island, Korea, August 2012, Springer, (pdf file).

117. M. Medwed, F.-X. Standaert, A. Joux, Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs, in the proceedings of CHES 2012, Lecture Notes in Computer Science, vol 7428, pp 193-212, Leuven, Belgium, September 2012, Springer, (pdf file).

116. B. Gerard, F.-X. Standaert, Unified and Optimized Linear Collision Attacks and Their Application in a Non-Profiled Setting, in the proceedings of CHES 2012, Lecture Notes in Computer Science, vol 7428, pp 175-192, Leuven, Belgium, September 2012, Springer, (pdf file).
- Extended version in the Journal of Cryptographic Engineering, vol 3, num 1, pp 45-58, April 2013, Springer, (pdf file).

115. S. Kerckhof, F. Durvaux, C. Hocquet, D. Bol, F.-X. Standaert, Towards Green Cryptography: a Comparison of Lightweight Ciphers from the Energy Viewpoint, in the proceedings of CHES 2012, Lecture Notes in Computer Science, vol 7428, pp 390-407, Leuven, Belgium, September 2012, Springer, (pdf file, long version).

114. Y. Oren, M. Renauld, F.-X. Standaert, A. Wool, Algebraic Side-Channel Analysis Beyond the Hamming Weight Leakage Model, in the proceedings of CHES 2012, Lecture Notes in Computer Science, vol 7428, pp 140-154, Leuven, Belgium, September 2012, Springer, (pdf file).

113. (Best student paper award & best presentation award!) S. Shariati, F. Koeune, F.-X. Standaert, Security Analysis of Image-based PUFs for Anti-Counterfeiting, in the proceedings of CMS 2012, Lecture Notes in Computer Science, vol 7394, pp 26-38, Canterbury, UK, September 2012, Springer, (pdf file).

112. V. Grosso, C. Boura, B. Gerard, F.-X. Standaert, A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks (with Application to Low Cost Ciphers LED and Piccolo), in the procededings of proceedings of the 33rd WIC Symposium on Information Theory in the Benelux, pp 52-59, Boekelo, The Netherlands, May 2012, (pdf file, long version).

111. D. Kamel, M. Renauld, D. Bol, F.-X. Standaert, D. Flandre, Analysis of Dynamic Differential Swing Limited Logic for Low-Power Secure Applications, in the Journal of Low Power Electronics and Applications, vol 2, num 1, pp 98-126, MDPI, 2012, (pdf file).

110. F. Durvaux, S. Kerckhof, F. Regazzoni, F.-X. Standaert, A Survey of Recent Results in FPGA Security and Intellectual Property Protection, in Secure Smart Embedded Devices: Platforms and Applications (book chapter), pp 201-224, Springer, 2013, (pdf file).

109. A. Bogdanov, L.R. Knudsen, G. Leander, F.-X. Standaert, J. Steinberger, E. Tischhauser, Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations, in the proceedings of Eurocrypt 2012, Lecture Notes in Computer Science, vol 7237, pp 45-62, Cambridge, UK, April 2012, Springer, (pdf file).

108. T. Eisenbarth, Zheng Gong, T. Guneysu, S. Heyse, S Indesteege, S. Kerckhof, F. Koeune, T. Nad, T. Plos, F. Regazzoni, F.-X. Standaert, L. van Oldeneel tot Oldenzeel, Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices, in the proceedings of the ECRYPT Workshop on Lightweight Cryptography, Louvain-la-Neuve, Belgium, November 2011.
- also appeared in the proceedings of Africacrypt 2012, Lecture Notes in Computer Science, vol 7374, pp 172-187, Ifrane, Morocco, July 2012, Springer, (pdf file, source codes).

107. F.-X. Standaert, Some Hints on the Evaluation Metrics and Tools for Side-Channel Attacks, NIST Non-Invasive Attack Testing Workshop, Nara, Japan, September 2011.
- Revised version: The Eurocrypt 2009 Evaluation Framework for SCAs, Revisited, seminar given at LIRMM, Montpellier, France in July 2012 and SKLOIS, Bejing, China in August 2012, (slides).

106. M. Medwed, C. Petit, F. Regazzoni, M. Renauld, F.-X. Standaert, Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks, in the proceedings of CARDIS 2011, Lecture Notes in Computer Science, vol 7079, pp 115-132, Leuven, Belgium, September 2011, Springer, (pdf file).

105. M. Medwed, F.-X. Standaert, Extractors Against Side-Channel Attacks: Weak or Strong?, in the proceedings of CHES 2011, Lecture Notes in Computer Science, vol 6917, pp 256-272, Nara, Japan, September 2011, Springer, (pdf file).
- Extended version in the Journal of Cryptographic Engineering, vol 1, num 3, pp 231-241, Springer, (pdf file).

104. M. Renauld, D. Kamel, F.-X. Standaert, D. Flandre, Information Theoretic and Security Analysis of a 65-nanometer DDSLL AES S-box, in the proceedings of CHES 2011, Lecture Notes in Computer Science, vol 6917, pp 223-239, Nara, Japan, September 2011, Springer, (pdf file).

103. F.-X. Standaert, C. Petit, N. Veyrat-Charvillon, Masking with Randomized Look Up Tables (Towards Preventing Side-Channel Attacks of All Orders), in Festschrift Jean-Jacques Quisquater, Lecture Notes in Computer Science, vol 6805, pp 283-299, Springer, (pdf file).

102. A. Barenghi, C. Hocquet, D. Bol, F.-X. Standaert, F. Regazzoni, I. Koren, Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an Example of a 65nm AES Implementation, in the proceedings of RFIDSec 2011, Lecture Notes in Computer Science, vol 7055, pp 48-60, Amherst, Massachussets, USA, June 2011, Springer, (pdf file).

101. N. Veyrat-Charvillon, F.-X. Standaert, Generic Side-Channel Distinguishers: Improvements and Limitations, in the proceedings of Crypto 2011, Lecture Notes in Computer Science, vol 6841, pp 354-372, Santa Barbara, California, USA, August 2011, Springer, (pdf file).

100. B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K. Pietrzak, F.-X. Standaert, Yu Yu, Leftover Hash Lemma, Revisited, in the proceedings of Crypto 2011, Lecture Notes in Computer Science, vol 6841, pp 1-20, Santa Barbara, California, USA, August 2011, Springer, (pdf file).

99. S. Kerckhof, F. Durvaux, N. Veyrat-Charvillon, F. Regazzoni, G. Meurice de Dormale, F.-X. Standaert, Low Cost FPGA Implementations of the SHA-3 Finalists, in the proceedings of the ECRYPT II Hash Workshop, Tallin, Estonia, May 2011.
- also appeared in the proceedings of CARDIS 2011, Lecture Notes in Computer Science, vol 7079, pp 115-132, Leuven, Belgium, September 2011, Springer, (pdf file).

98. S. Kerckhof, B. Collard, F.-X. Standaert, FPGA Implementation of a Statistical Saturation Attack, in the proceedings of Africacrypt 2011, Lecture Notes in Computer Science, vol 6737, pp 100-116, Dakar, Senegal, July 2011, (pdf file).

97. (HiPEAC Paper Award!) A.G. Bayrak, F. Regazzoni, P. Brisk, F.-X. Standaert, P. Ienne, A First Step Towards Automatic Application of Power Analysis Countermeasures, in the proceedings of DAC 2011, pp 230-235, San Diego, California, USA, June 2011, (pdf file).

96. F.-X. Standaert, Leakage Resilient Cryptography: a Practical Overview, invited talk, ECRYPT Workshop on Symmetric Encryption (SKEW 2011), Copenhagen, Denmark, February 2011, (slides).
- Also presented at COSADE 2011, Darmstadt, Germany, February 2011.

95. F. Armknecht, R. Maes, A.-R. Sadeghi, F.-X. Standaert, C. Wachsmann, A Formalization of the Security Features of Physical Functions, in the proceedings of the IEEE Symposium on Security and Privacy, pp 397-412, Oakland, California, USA, May 2011, (pdf file).

94. M. Renauld, F.-X. Standaert, N. Veyrat-Charvillon, D. Kamel, D. Flandre, A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices, in the proceedings of Eurocrypt 2011, Lecture Notes in Computer Science, vol 6632, pp 109-128, Tallinn, Estonia, May 2011, Springer, (pdf file).

93. C. Hocquet, D. Kamel, F. Regazzoni, J.-D. Legat, D. Flandre, D. Bol, F.-X. Standaert, Harvesting the potential of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags, in the Journal of Cryptographic Engineering, vol 1, num 1, pp 79-86, April 2011, Springer, (pdf file).

92. J. Doget, E. Prouff, M. Rivain, F.-X. Standaert, Univariate Side Channel Attacks and Leakage Modeling, in the proceedings of COSADE 2011, pp 1-15, Darmstadt, Germany, February 2011, (pdf file).
- Extended version in the Journal of Cryptographic Engineering, vol 1, num 2, pp 123-144, Springer, (pdf file).

91. F. Regazzoni, Wang Yi, F.-X. Standaert, FPGA Implementations of the AES Masked Against Power Analysis Attacks, in the proceedings of COSADE 2011, pp 56-66, Darmstadt, Germany, February 2011, (pdf file).

90. B. Collard, F.-X. Standaert, Experimenting Linear Cryptanalysis, in Advanced Linear Cryptanalysis (book chapter), pp 1-28, IOS Press, 2011, (pdf file).

89. (IET Information Security Premium Award 2011-2013!) S. Mangard, E. Oswald, F.-X. Standaert, One for All - All for One: Unifying Standard DPA Attacks, in IET Information Security, vol 5, issue 2, pp 100-110, June 2011, (pdf file).

88. F.-X. Standaert, N. Veyrat-Charvillon, E. Oswald, B. Gierlichs, M. Medwed, M. Kasper, S. Mangard, The World is Not Enough: Another Look on Second-Order DPA, in the proceedings of Asiacrypt 2010, Lecture Notes in Computer Science, vol 6477, pp 112-129, Singapore, December 2010, Springer, (pdf file, long version).

87. Yu Yu, F.-X. Standaert, O. Pereira, M. Yung, Practical Leakage-Resilient Pseudorandom Generators, in the proceedings of ACM CCS 2010, pp 141-151, Chicago, Illinois, USA, October 2010, (pdf file).

86. S. Shariati, L. Jacques, F.-X. Standaert, B. Macq, M.A. Salhi, P. Antoine, Randomly Driven Fuzzy Key Extraction of Unclonable Images, in the proceedings of ICIP 2010, Hong Kong, September 2010, (pdf file).

85. D. Kamel, C. Hocquet, F.-X. Standaert, D. Flandre, D. Bol, Glitch-Induced Within-Die Variations of Dynamic Energy in Voltage-Scaled Nano-CMOS Circuits, in the proceedings of ESSCIRC 2010, Seville, Spain, September 2010, (pdf file).

84. F.-X. Standaert, How Leaky is an Extractor?, in the proceedings of LatinCrypt 2010, Lecture Notes in Computer Science, vol 6212, pp 294-304, Puebla, Mexico, August 2010, Springer, (pdf file).

83. F.-X. Standaert, O. Pereira, Yu Yu, J.-J. Quisquater, M. Yung, E. Oswald, Leakage Resilient Cryptography in Practice, in Towards Hardware Intrinsic Security: Foundation and Practice (book chapter), pp 105-139, Springer, 2010, (pdf file).

82. M. Renauld, F.-X. Standaert, Representation-, Leakage- and Cipher- Dependencies in Algebraic Side-Channel Attacks, in the proceedings of the ACNS 2010 Industrial Track, Beijing, China, June 2010, (pdf file).

81. B. Collard, F.-X. Standaert, Multi-Trail Statistical Saturation Attacks, in the proceedings of ACNS 2010, Lecture Notes in Computer Science, vol 6123, pp 123-138, Beijing, China, June 2010, Springer, (pdf file).

80. N. Veyrat-Charvillon, F.-X. Standaert, Adaptive Chosen-Message Side-Channel Attacks, in the proceedings of ACNS 2010, Lecture Notes in Computer Science, vol 6123, pp 186-199, Beijing, China, June 2010, Springer, (pdf file).

79. L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F.-X. Standaert, N. Veyrat-Charvillon, Mutual Information Analysis: a Comprehensive Study, in the Journal of Cryptology, vol 24, issue 2, pp 269-291, April 2011, Springer, (pdf file).

78. M. Medwed, F.-X. Standaert, J. Groszschaedl, F. Regazzoni, Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices, in the proceedings of Africacrypt 2010, Lecture Notes in Computer Science, vol 6055, pp 279-296, Stellenbosch, South Africa, May 2010, Springer, (pdf file).

77. G. de Meulenaer, F.-X. Standaert, Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks, in the proceedings of Mobilight 2010, pp 229-242, Barcelona, Spain, (pdf file).
- also presented as a poster at ACM Wisec 2010, Hoboken, New Jersey, March 2010.

76. S. Shariati, F.-X. Standaert, B. Macq, M. Salhi, P. Antoine, Random Profiles of Laser Marks, in the proceedings of the 31st WIC Symposium on Information Theory in the Benelux, 8 pages, Rotterdam, The Netherlands, May 2010, (pdf file).

75. M. Renauld, F.-X. Standaert, Algebraic Side-Channel Attacks, in the proceedings of Inscrypt 2009, Lecture Notes in Computer Science, vol 6151, pp 393-410, Bejing, China, December 2009, Springer, (pdf file, source code).

74. F.-X. Standaert, J.-J. Quisquater, Time-Memory Tradeoffs, Encyclopedia of Cryptography and Security, second edition, Springer, 2010, (pdf file).

73. F.-X. Standaert, J.-J. Quisquater, Physical Security, Encyclopedia of Cryptography and Security, second edition, Springer, 2010, (pdf file).

72. P. Bulens, F.-X, Standaert, J.-J Quisquater, How to Strongly Link Data and its Medium: the Paper Case, IET Information Security, vol 4, issue 2, pp 125-136, September 2010, (pdf file).

71. M. Renauld, F.-X. Standaert, N. Veyrat-Charvillon, Algebraic Attacks on the AES: Why Time also Matters in DPA, in the proceedings of CHES 2009, Lecture Notes in Computer Science, vol 5747, pp 97-111, Lausanne, Switzerland, September 2009, Springer, (pdf file, source code).

70. F. Regazzoni, A. Cevrero, F.-X. Standaert, S. Badel, T. Kluter, P. Brisk, Y. Leblebici, P. Ienne, A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions, in the proceedings of CHES 2009, Lecture Notes in Computer Science, vol 5747, pp 205-219, Lausanne, Switzerland, September 2009, Springer, (pdf file).

69. N. Veyrat-Charvillon, F.-X. Standaert, Mutual Information Analysis: How, When and Why?, in the proceedings of CHES 2009, Lecture Notes in Computer Science, vol 5747, pp 429-443, Lausanne, Switzerland, September 2009, Springer, (pdf file).

68. M. Renauld, F.-X. Standaert, Combining Algebraic and Side-Channel Cryptanalysis against Block Ciphers, in the proceedings of the 30th Symposium on Information Theory in the Benelux, pp 97-104, Eindhoven, The Netherlands, May 2009, (pdf file).

67. D. Kamel, D. Bol, F.-X. Standaert, D. Flandre, Comparison of Ultra-Low-Power and Static CMOS Full Adders in 0.15 um FD SOI CMOS, in the proceedings of IEEE International SOI Conference, Foster City, California, USA, October 2009, (pdf file).

66. F.-X. Standaert, F. Koeune, Tickets de Metro Electroniques et Vie Privee, Le Soir, 27 aout 2009, (version longue), (version courte).
- Intervention au Parlement de la Region de Bruxelles Capitale, 22 juin 2011 (slides).

65. F.-X. Standaert, F. Koeune, W. Schindler, How to Compare Profiled Side-Channel Attacks, in the proceedings of ACNS 2009, Lecture Notes in Computer Science, vol 5536, pp 485-498, Paris, France, June 2009, Springer, (pdf file).

64. D. Kamel, F.-X. Standaert, D. Flandre, Scaling Trends of the AES S-box Lower Power Consumption in 130 and 65 nm CMOS Technology Nodes, in the proceedings of ISCAS 2009, Taipei, Taiwan, May 2009, (pdf file).

63. F.-X. Standaert, T.G. Malkin, M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, in the proceedings of Eurocrypt 2009, Lecture Notes in Computer Science, vol 5479, pp 443-461, Cologne, Germany, April 2009, Springer, (pdf file).

62. B. Collard, F.-X. Standaert, A Statistical Saturation Attack against the Block Cipher PRESENT, in the proceedings of CT-RSA 2009, Lecture Notes in Computer Science, vol 5473, pp 195-210, San Francisco, USA, April 2009, Springer, (pdf file), errata + improvement.

61. G. Piret, F.-X. Standaert, Provable Security of Block Ciphers Against Linear Cryptanalysis - a Mission Impossible?, in Designs, Codes and Cryptography, vol 50, num 3, pp 325-338, March 2009, (pdf file).

60. C.H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, O. Pereira, The Swiss-Knife RFID Distance Bounding Protocol, in the proceedings of ICISC 2008, Lecture Notes in Computer Science, vol 5461, pp 98-115, Seoul, Korea, December 2008, Springer, (pdf file).

59. F.-X. Standaert, B. Gierlichs, I. Verbauwhede, Partition vs. Comparison Side-Channel Distinguishers: an Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices, in the proceedings of ICISC 2008, Lecture Notes in Computer Science, vol 5461, pp 253-267, Seoul, Korea, December 2008, Springer, (pdf file).

58. F.-X. Standaert, T.G. Malkin, M. Yung, Does Physical Security of Cryptographic Devices Need a Formal Study?, invited talk, in the proceedings of ICITS 2008, Lecture Notes in Computer Science, vol 5155, pp 70, Calgary, Canada, August 2008, Springer, (pdf file).

57. F.-X. Standaert, Securite des Comminucations en Presence de Fuites Physiques d'Information, la Lettre du FNRS, pp 26, Septembre 2008, (pdf file).

56. F.-X. Standaert, C. Archambeau, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, in the proceedings of CHES 2008, Lecture Notes in Computer Science, vol 5154, pp 411-425, Washington DC, USA, August 2008, Springer (pdf file).

55. G. de Meulenaer, F. Gosset, F.-X. Standaert, L. Vandendorpe, On the Energy Cost of Communications and Cryptography in Wireless Sensor Networks, in the proceedings of the 29th Symposium on Information Theory in the Benelux, pp 239-246, Leuven, Belgium, May 2008, (pdf file).
- Extended version in the proceedings of the IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob'2008), Avignon, France, October 2008 (pdf file).

54. F. Gosset, F.-X. Standaert, J.-J. Quisquater, FPGA Implementation of SQUASH, in the proceedings of the 29th Symposium on Information Theory in the Benelux, pp 231-238, Leuven, Belgium, May 2008, (pdf file).

53. P. Bulens, F.-X. Standaert, J.-J. Quisquater, P. Pellegrin, G. Rouvroy, Implementation of the AES-128 on Virtex-5 FPGAs, in the proceedings of Africacrypt 2008, Lecture Notes in Computer Science, vol 5023, pp 16-26, Casablanca, Morocco, June 2008, Springer, (pdf file).

52. F. Mace, F.-X. Standaert, J.-J. Quisquater, FPGA Implementation(s) of a Scalable Encryption Algorithm, IEEE Transactions on VLSI, vol 16, num 2, pp 212-216, February 2008, (pdf file).

51. C. Petit, F.-X. Standaert, O. Pereira, T.G. Malkin, M. Yung, A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key Recovery, in the proceedings of ASIACCS 2008, pp 56-65, Tokyo, Japan, March 2008, (pdf file, e-Print version).

50. B. Collard, F.-X. Standaert, J.-J. Quisquater, Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent, in the proceedings of FSE 2008, Lecture Notes in Computer Science, vol 5086, pp 382-397, Lausanne, Switzerland, February 2008, Springer, (pdf file, trails).

49. G. Piret, F.-X. Standaert, Security Analysis of Higher-Order Boolean Masking Schemes for Block Ciphers (with Conditions of Perfect Masking), in IET Information Security, vol 2, num 1, pp 1-11, March 2008, (pdf file).

48. B. Collard, F.-X. Standaert, J.-J. Quisquater, Improving the Time Complexity of Matsui's Linear Cryptanalysis, in the proceedings of ICISC 2007, Lecture Notes in Computer Science, vol 4817, pp 77-88, Seoul, Korea, November 2007, Springer, (pdf file).

47. B. Collard, F.X. Standaert, J.J. Quisquater, Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent, in the proceedings of InsCrypt 2007, Lecture Notes in Computer Science, vol 4990, pp 51-65, Xining, China, September 2007, Springer, (pdf file), appendixes, (pdf file).

46. F. Mace, F.-X. Standaert, J.-J. Quisquater, Information Theoretic Evaluation of Logic Styles to Counteract Side-Channel Attacks, in the proceedings of CHES 2007, Lecture Notes in Computer Science, vol 4727, pp 427-442, Vienna, Austria, September 2007, Springer, (pdf file).

45. F.-X. Standaert, Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs, Cryptographic Engineering (book chapter), pp 295-318, Springer, 2009. (pdf file).

44. F. Mace, F.-X. Standaert, J.-J. Quisquater, ASIC Implementations of the Block Cipher SEA for Constrained Applications, in the proceedings of RFID Security Workshop 2007, 12 pages, Malaga, Spain, July 2007, (pdf file).

43. J.-J. Quisquater, F.-X. Standaert, Physically Secure Cryptographic Computations: From Micro to Nano Electronic Devices, in the proceedings of DSN 2007, Workshop on Dependable and Secure Nanocomputing, invited talk, 2 pages, Edinburgh, UK, June 2007, (pdf file).

42. F.-X. Standaert, Introduction to Side-Channel Attacks, in Secure Integrated Circuits and Systems (book chapter), pp 27-44, Springer, July 2009. (pdf file).

41. P. Bulens, K. Kallach, F.-X. Standaert, J.-J. Quisquater, FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile, in the proceedings of SASC 2007, 10 pages, Bochum, Germany, January 2007, (pdf file).

40. F.-X. Standaert, A Didactic Classification of Some Illustrative Leakage Functions, in the proceedings of WISSEC 2006, 16 pages, Antwerp, Belgium, November 2006.

39. F.-X. Standaert, E. Peeters, C. Archambeau, J.-J. Quisquater, Towards Security Limits in Side-Channel Attacks, in the proceedings of CHES 2006, Lecture Notes in Computer Science, vol 4249, pp 30-45, Yokohama, Japan, October 2006, Springer-Verlag, (pdf file).

38. C. Archambeau, E. Peeters, F.-X. Standaert, J.-J. Quisquater, Template Attacks in Principal Subspaces, in the proceedings of CHES 2006, Lecture Notes in Computer Science, vol 4249, pp 1-14, Yokohama, Japan, October 2006, Springer-Verlag, (pdf file).
- Also appeared in the proceedings of WISSEC 2006, Antwerp, Belgium, November 2006. -

37. F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks, in the proceedings of FPL 2006, Madrid, Spain, August 2006, (pdf file).

36. F.-X. Standaert, E. Peeters, F. Mace, J.-J. Quisquater, Updates on the Security of FPGAs Against Power Analysis Attacks, in the proceedings of ARC 2006, Lecture Notes in Computer Science, vol 3985, pp 335-346, Delft, The Netherlands, March 2006, Springer-Verlag, (pdf file).

35. E. Peeters, F.-X. Standaert, J.-J. Quisquater, Power and Electromagnetic Analysis: Improved Models, Consequences and Comparisons, in Integration, the VLSI Journal, vol 40, pp 52-60, Elsevier, Spring 2007, (pdf file).

34. F. Koeune, F.-X. Standaert, A Tutorial on Physical Security and Side-Channel Attacks, in Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures, Lecture Notes in Computer Science, vol 3655, pp 78-108, September 2005, Springer-Verlag, (pdf file).

33. T.G. Malkin, F.-X. Standaert, M. Yung, A Comparative Cost/Security Analysis of Fault Attack Countermeasures, in the proceedings of FDTC 2005, Edinburgh, Scotland, September 2005, (pdf file).
- Also included in the best papers of FDTC 2005/2006 volume, Lecture Notes in Computer Science, vol 4236, pp 159-172, September 2006, Springer-Verlag -

32. F. Mace, F.-X. Standaert, J.-J. Quisquater, J.-D. Legat, A Design Methodology for Secured ICs Using Dynamic Current Mode Logic , in the proceedings of PATMOS 2005, Lecture Notes in Computer Science, vol 3728, pp 550-560, Leuven, Belgium, September 2005, Springer-Verlag, (pdf file).

31. E. Peeters, F.-X. Standaert, N. Donckers, J.-J. Quisquater, Improved Higher-Order Side-Channel Attacks With FPGA Experiments, in the proceedings of CHES 2005, Lecture Notes in Computer Science, vol 3659, pp 309-323, Edinburgh, Scotland, September 2005, Springer-Verlag, (pdf file).

30. F.-X. Standaert, G. Piret, N. Gershenfeld, J.-J. Quisquater, SEA: a Scalable Encryption Algorithm for Small Embedded Applications, in the proceedings of the Workshop on Lightweight Crypto, Graz, Austria, July 2005, (pdf file).
- Also appeared in the proceedings of CARDIS 2006, Lecture Notes in Computer Science, vol 3928 , pp 222-236, Tarragona, Catalonia, Aprils 2006, Springer-Verlag (30b), (pdf file) -

29. P. Leglise, F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, Efficient Implementation of Recent Stream Ciphers on Reconfigurable Hardware Devices, in the proceedings of the 26th Symposium on Information Theory in the Benelux, (pdf file).

28. J.-J. Quisquater, F.-X. Standaert, Exhaustive Key Search of the DES: Updates and Refinements , in the proceedings of SHARCS 2005 (Special-purpose Hardware for Attacking Cryptographic Systems), Paris, France, February 2005, (pdf file).

27. F.-X. Standaert, E. Peeters, G. Rouvroy, J.-J. Quisquater, An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays, in the Proceedings of the IEEE, vol. 94, num. 2, pp 383-394, February 2006, (pdf file).

26. F.-X. Standaert, F. Lefebvre, G. Rouvroy, J.-J. Quisquater, B. Macq, J.-D. Legat, Practical Evaluation of a Radial Soft Hash Algorithm, in the proceedings of ITCC 2005 (vol 2), pp 89-94, Las Vegas, USA, April 2005, (pdf file).

25. F.-X. Standaert, G. Piret, G. rouvroy, J.-J. Quisquater, FPGA Implementations of the ICEBERG Block Cipher, in the proceedings of ITCC 2005 (vol 1), pp 556-561, Las Vegas, USA, April 2005, (pdf file).
- Extended version in Integration, the VLSI Journal, vol 40, pp 20-27, Elsevier, Spring 2007 (25b), (pdf file) -

24. F.-X. Standaert, E. Peeters, J.-J. Quisquater, On the Masking Countermeasure and Higher-Order Power Analysis Attacks, in the proceedings of ITCC 2005 (vol 1), pp 562-567, Las Vegas, USA, April 2005, (pdf file).

23. G. Rouvroy, F.-X. Standaert, F. Lefebvre, J.-J. Quisquater, B. Macq, J.-D. Legat, Reconfigurable Hardware Solutions for the Digital Rights Management of Digital Cinema , in the proceedings of DRM 2004, pp 40-53, Washington DC, USA, October 2004, (pdf file).

22. F. Mace, F.-X. Standaert, I. Hassoune, J.-D. Legat, J.-J. Quisquater, A Dynamic Current Mode Logic to Counteract Power Analysis Attacks, in the proceedings of DCIS 2004, Bordeaux, France, November 2004, (pdf file).

21. F.-X. Standaert, S.B. Ors, J.-J. Quisquater, B. Preneel, Power Analysis Attacks against FPGA Implementations of the DES, in the proceedings of FPL 2004, Lecture Notes in Computer Science, vol 3203, pp 84-94, Antwerp, Belgium, September 2004, Springer-Verlag, (pdf file).

20. F.-X. Standaert, S.B. Ors, B. Preneel, Power Analysis of an FPGA Implementation of Rijndael: Is Pipelining a DPA Countermeasure?, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 30-44, Cambridge, MA, USA, August 2004, Springer-Verlag, (pdf file).

19. G. Rouvroy, F. Lefebvre, F.-X. Standaert, B. Macq, J.-J. Quisquater, J.-D. Legat, Hardware Implementation of a Fingerprinting Algorithm Suited for Digital Cinema, in the proceedings of Eusipco 2004, Vienna, Austria, September 2004, (pdf file).

18. G. Piret, F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, On the Security of the DeKaRT Primitive, in the proceedings of Cardis 2004, pp 241-254, Toulouse, France, August 2004, Kluwer, (pdf file).

17. J.-J. Quisquater, F.-X. Standaert, Time-Memory Tradeoffs, Encyclopedia of Cryptography and Security, Springer-Verlag, 2004, (pdf file).

16. J.-J. Quisquater, M. Neve, E. Peeters, F.-X. Standaert, L'emission rayonnee des cartes a puces : une vue d'ensemble, Revue de l'Electricite et de l'Electronique, num 6/7, June/July 2004, (pdf file).

15. G. Rouvroy, F.-X. Standaert, J.-J. Quisquater, J.-D. Legat, Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications, in the proceedings of ITCC 2004, Las Vegas, USA, April 2004, (pdf file).
- Extended version available in: Embedded Cryptographic Hardware Design and Security (book chapter), Nova Science Publishers, 2004 (15b), (pdf file) -

14. F.-X. Standaert, G. Piret, G. Rouvroy, J.-J. Quisquater, J.-D. Legat, ICEBERG: an Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware, in the proceedings of FSE 2004, Lecture Notes in Computer Science, vol 3017, pp 279-298, Delhi, India, February 2004, Springer-Verlag, (pdf file).

13. G. Rouvroy, F.-X. Standaert, J.-J. Quisquater, J.-D. Legat, Design Strategies and Modifed Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES, in the proceedings of FPL 2003, Lecture Notes in Computer Science, vol 2778, pp 181-193, Lisbon, Portugal, September 2003, Springer-Verlag, (pdf file).
- Also presented as a poster at FPGA 2003, Monterey, California, USA, February 2003 (13b), (pdf file) -

12. F.-X. Standaert, L. van Oldeneel tot Oldenzeel, D. Samyde, J.-J. Quisquater, Differential Power Analysis of FPGAs : How Practical is the Attack?, in the proceedings of FPL 2003, Lecture Notes in Computer Science, vol 2778, pp 701-709, Lisbon, Portugal, September 2003, Springer-Verlag, (pdf file).

11. F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, J.-D. Legat, Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs, in the proceedings of CHES 2003, Lecture Notes in Computer Science, vol 2779, pp 334-350, Cologne, Germany, September 2003, Springer-Verlag, (pdf file).

10. F.-X. Standaert, G. Piret, G. Rouvroy, J.-J. Quisquater, J.-D. Legat, Key-Dependent Approximations in Cryptanalysis, in the proceedings of the 24th Symposium on Information Theory in the Benelux, pp 53-62, Veldhoven, The Netherlands, May 2003, (pdf file).

9. G. Rouvroy, F.-X. Standaert, J.-J. Quisquater, J.-D. Legat, Efficient Uses of FPGAs for Implementations of the DES and its Experimental Linear Cryptanalysis, IEEE Transactions on Computers, Special Edition on Cryptographic Hardware and Embedded Systems, vol 32, num 4, pp 473-482, April 2003, (pdf file).

8. G. Rouvroy, F.-X. Standaert, J.-J. Quisquater, J.-D. Legat, Efficient FPGA implementation of block cipher MISTY1, in the proceedings of RAW 2003, 7 pages, Nice, France, April 2003, (pdf file).

7. F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, J.-D. Legat, A Methodology to Implement Block Ciphers in Reconfigurable Hardware and its Application to Fast and Compact AES Rijndael, in the proceedings of FPGA 2003, pp 216-224, Monterey, California, February 2003, (pdf file).

6. F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, J.-D. Legat, Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1, in the proceedings of the Third NESSIE Workshop, 10 pages, Munich, November 2002, (pdf file).
- Extended version in the NESSIE final report (6b), (ps file) -

5. (Prix Recherche et Developpement de la SRBE!) G. Rouvroy, F.-X. Standaert, Implementation of Cryptographic Standards and Cryptanalysis using FPGA's : Extended Abstract, Revue E Tijdschrift - 118eme annee/118de jaargang - num 3-2002 (Septembre/September 2002), (pdf file).

4. F. Koeune, G. Rouvroy, F.-X. Standaert, J.-J. Quisquater, J.-P. David, J.-D. Legat, A FPGA Implementation of the Linear Cryptanalysis, in the proceedings of FPL 2002, Lecture Notes in Computer Science, vol 2438, pp 845-852, Montpellier, France, September 2002, Springer-Verlag, (pdf file).

3. J.-J. Quisquater, F.-X. Standaert, G. Rouvroy, J.-P. David, J.-D. Legat, A Cryptanalytic Time-Memory Tradeoff : First FPGA Implementation, in the proceedings of FPL 2002, Lecture Notes in Computer Science, vol 2438, pp 780-789, Montpellier, France, September 2002, Springer-Verlag, (pdf file).

2. F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, J.-D. Legat, A Time-Memory Tradeoff using Distinguished Points: New Analysis and FPGA Results, in the proceedings of CHES 2002, Lecture Notes in Computer Science, vol 2523, pp 593-609, Redwood City, California, USA, August 2002, Springer-Verlag, (pdf file).

1. (IEEE Student Paper Contest Finalist!) G. Rouvroy, F.-X. Standaert, FPGA's as Cryptanalytic Tools, in the proceedings of the IEEE Melecon 2002 conference, pp 209-214, Cairo, May 2002, (pdf file).

Technical reports

U40. G. Barthe, F. Dupressoir, S. Faust, B. Gregoire, F.-X. Standaert, P.-Y. Strub, Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model, cryptology e-Print archive, report 2016/912.

U39. A. Moradi, F.-X. Standaert, Moments-Correlating DPA, cryptology e-Print archive, report 2014/409.

U38. V. Grosso, G. Leurent, F.-X. Standaert, K. Varici, Anthony Journault, F. Durvaux, L. Gaspar, S. Kerckhof, SCREAM & iSCREAM: Side-Channel Resistant Authenticated Encryption with Masking, submission to the CAESAR competition, version 3, second round specifications, (pdf file).

U37. F. Durvaux, F.-X. Standaert, Towards Easy Leakage Certification, cryptology e-Print archive, report 2015/537.

U36. F. Durvaux, F.-X. Standaert, From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces, cryptology e-Print archive, report 2015/536.

U35. V. Grosso, F.-X. Standaert, ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?, cryptology e-Print archive, report 2015/535.

U34. P. Pessl, F.-X. Standaert, S. Mangard, F. Durvaux, Towards Leakage Simulators that Withstand the Correlation Distinguisher, ASIACRYPT 2014 rump session talk, (slides).

U33. F. Durvaux, F.-X. Standaert, N. Veyrat-Charvillon, J.-B. Mairy, Y. Deville, Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits, cryptology e-Print archive, report 2014/412.

U32. C. Glowacz, V. Grosso, R. Poussier, J. Schueth, F.-X. Standaert, Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment, cryptology e-Print archive, report 2014/920.

U31. S. Belaid, V. Grosso, F.-X. Standaert, Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?, cryptology e-Print archive, report 2014/053.

U30. J. Balasch, B. Gierlichs, V. Grosso, O. Reparaz, F.-X. Standaert, On the Cost of Lazy Engineering for Masked Software Implementations, cryptology e-Print archive, report 2014/413.

U29. V. Grosso, R. Poussier, F.-X. Standaert, L. Gaspar, Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices), cryptology e-Print archive, report 2014/411.

U28. N. Veyrat-Charvillon, B. Gerard, F.-X. Standaert, Soft Analytical Side-Channel Attacks, cryptology e-Print archive, report 2014/410.

U27. F. Durvaux, F.-X. Standaert, N. Veyrat-Charvillon, How to Certify the Leakage of a Chip?, cryptology e-Print archive, report 2013/706.

U26. C. Whitnall, E. Oswald, F.-X. Standaert, The Myth of Generic DPA... and the Magic of Learning, cryptology e-Print archive, report 2012/256.

U25. S. Belaid, F. De Santis, J. Heyszl, S. Mangard, M. Medwed, J.-M. Schmidt, F.-X. Standaert, S. Tillich, Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis, cryptology e-Print archive, report 2013/305.

U24.Yuanyuan Zhou, Yu Yu, F.-X. Standaert, J.-J. Quisquater, On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards, cryptology e-Print archive, report 2013/224.

U23. Gangjun Fan, Yongbin Zhou, F.-X. Standaert, Dengguo Feng, On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption, cryptology e-Print archive, report 2013/213.

U22. Hui Zhao, Yongbin Zhou, F.-X. Standaert, Hailong Zhang, Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers, cryptology e-Print archive, report 2013/091.

U21. N. Veyrat-Charvillon, B. Gerard, F.-X. Standaert, Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?, cryptology e-Print archive, report 2012/578, (source code).

U20. J. Balasch, B. Ege, T. Eisenbarth, B. Gerard, T. Guneysu, S. Heyse, S. Indesteege, S. Kerckhof, F. Koeune, T. Nad, T. Plos, T. Poppelmann, F. Reggazoni, F.-X. Standaert, G. Van Assche, R. Van Keer, L. van Oldeneel tot Oldenzeel, I. von Maurich, Final Lightweight Cryptography Status Report, ECRYPT NOE Deliverable, D.SYM.12, October 2012, (pdf file).

U19. F. Durvaux, M. Renauld, F.-X. Standaert, L. van Oldeneel tot Oldenzeel, N. Veyrat-Charvillon, Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure, cryptology e-Print archive, report 2012/038.

U18. J. Balasch, B. Ege, T. Eisenbarth, B. Gerard, Z. Gong, T. Guneysu, S. Heyse, S. Kerckhof, F. Koeune, T. Plos, T. Poppelmann, F. Regazzoni, F.-X. Standaert, G. Van Assche, R. Van Keer, L. van Oldeneel tot Oldenzeel, I. von Maurich, Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices, cryptology e-Print archive, report 2012/507 (source codes).

U17. A. Bogdanov, L.R. Knudsen, G. Leander, F.-X. Standaert, J.P. Steinberger, E. Tischhauser, Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations, cryptology e-Print archive, report 2012/35.

U16. N. Veyrat-Charvillon, B. Gerard, M. Renauld, F.-X. Standaert, An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks, cryptology e-Print archive, report 2011/610, (source code).

U15. M. Medwed, F.-X. Standaert, Extractors Against Side-Channel Attacks: Weak or Strong?, cryptology e-Print archive, report 2011/348.

U14. N. Veyrat-Charvillon, F.-X. Standaert, Generic Side-Channel Distinguishers: Improvements and Limitations, cryptology e-Print archive, report 2011/088.

U13. B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K. Pietrzak, F.-X. Standaert, Yu Yu, Leftover Hash Lemma, Revisited, cryptology e-Print archive, report 2011/149.

U12. A. Dehbaoui, S. Tiran, P. Maurine, F.-X. Standaert, N. Veyrat-Charvillon, Spectral Coherence Analysis - First Experimental Results -, cryptology e-Print archive, report 2011/056.

U11. F.-X. Standaert, N. Veyrat-Charvillon, E. Oswald, B. Gierlichs, M. Medwed, M. Kasper, S. Mangard, The World is Not Enough: Another Look on Second-Order DPA, cryptology e-Print archive, report 2010/180.

U10. S. Mangard, E. Oswald, F.-X. Standaert, One for All - All for One: Unifying Standard DPA Attacks, cryptology e-Print archive, report 2009/449.

U9. F.-X. Standaert, O. Pereira, Y. Yu, J.-J. Quisquater, M. Yung, E. Oswald, Leakage Resilient Cryptography in Practice, cryptology e-Print archive, report 2009/341.

U8. M. Renauld, F.-X. Standaert, Algebraic Side-Channel Attacks, cryptology e-Print archive, report 2009/279.

U7. L. Batina, T. Eisenbarth, B. Gierlichs, F. Koeune, E. Oswald, F.-X. Standaert, S. Tillich, Theoretical Models for Side-Channel Attacks, ECRYPT NOE Deliverable, D.VAM.15, June 2008, (pdf file).

U6. F.-X. Standaert, T.G. Malkin, M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, cryptology e-Print archive, report 2006/139.

U5. L. Batina, N. Mentens, E. Oswald, J. Pelzl, C. Priplata, C. Stahlke, F.-X. Standaert, Hardware Crackers, ECRYPT NOE Deliverable, D.VAM.3, August 2005, (pdf file).

U4. E. Oswald, M. Feldhofer, K. Lemke, F.-X. Standaert, T. Wollinger, J. Wolkerstorfer, State of the Art in Hardware Architecture, ECRYPT NOE Deliverable, D.VAM.2, September 2005, (pdf file).

U3. L. Batina, E. De Mulder, K. Lemke, N. Mentens, E. Oswald, E. Peeters, F.-X. Standaert, Report on DPA and EMA Attacks on FPGAs, ECRYPT NOE delvierable, D.VAM.5, July 2005, (pdf file).

U2. L. Batina, E. De Mulder, K. Lemke, S. Mangard, E. Oswald, G. Piret, F.-X. Standaert, Electromagnetic Analysis and Fault Attacks: State of the Art, ECRYPT NOE deliverable, D.VAM.4, May 2005, (pdf file).

U1. F.-X. Standaert, G. Piret, J.-J. Quisquater, Cryptanalysis of Block Ciphers, a Survey, UCL Crypto Group Technical report, CG-2003/2, (pdf file).