Folgen
Elisabeth Oswald
Elisabeth Oswald
Professor in Cybersecurity at Alpen-Adria Universität Klagenfurt
Bestätigte E-Mail-Adresse bei aau.at
Titel
Zitiert von
Zitiert von
Jahr
Power analysis attacks: Revealing the secrets of smart cards
S Mangard, E Oswald, T Popp
Springer-Verlag New York Inc, 2007
26872007
An ASIC implementation of the AES SBoxes
J Wolkerstorfer, E Oswald, M Lamberger
Topics in Cryptology—CT-RSA 2002: The Cryptographers’ Track at the RSA …, 2002
4792002
Successfully attacking masked AES hardware implementations
S Mangard, N Pramstaller, E Oswald
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
4552005
A side-channel analysis resistant description of the AES S-box
E Oswald, S Mangard, N Pramstaller, V Rijmen
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005
4312005
An AES smart card implementation resistant to power analysis attacks
C Herbst, E Oswald, S Mangard
Applied Cryptography and Network Security: 4th International Conference …, 2006
3602006
Power-analysis attack on an ASIC AES implementation
SB Ors, F Gurkaynak, E Oswald, B Preneel
International Conference on Information Technology: Coding and Computing …, 2004
3282004
Practical template attacks
C Rechberger, E Oswald
Information Security Applications: 5th International Workshop, WISA 2004 …, 2005
2692005
One for all–all for one: unifying standard differential power analysis attacks
S Mangard, E Oswald, FX Standaert
IET Information Security 5 (2), 100-110, 2011
2572011
Practical second-order DPA attacks for masked smart card implementations of block ciphers
E Oswald, S Mangard, C Herbst, S Tillich
Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006
2412006
Power-analysis attacks on an FPGA–first experimental results
SB Örs, E Oswald, B Preneel
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2202003
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
2092010
Randomized addition-subtraction chains as a countermeasure against power attacks
E Oswald, M Aigner
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
1832001
Template attacks on masking—resistance is futile
E Oswald, S Mangard
Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006
1752006
Update on SHA-1
V Rijmen, E Oswald
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
1662005
An efficient masking scheme for AES software implementations
E Oswald, K Schramm
Information Security Applications: 6th International Workshop, WISA 2005 …, 2006
1292006
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010
1282010
Power analysis attacks and countermeasures
T Popp, S Mangard, E Oswald
IEEE Design & test of Computers 24 (6), 535-543, 2007
1192007
Template attacks on ECDSA
M Medwed, E Oswald
Information Security Applications: 9th International Workshop, WISA 2008 …, 2009
1112009
The Myth of Generic DPA... and the Magic of Learning.
C Whitnall, E Oswald, FX Standaert
CT-RSA 8366, 183-205, 2014
1002014
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
L Mather, E Oswald, J Bandenburg, M Wójcik
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1002013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20