Follow
Elisabeth Oswald
Elisabeth Oswald
Professor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of Birmingham
Verified email at aau.at
Title
Cited by
Cited by
Year
Power analysis attacks: Revealing the secrets of smart cards
S Mangard, E Oswald, T Popp
Springer-Verlag New York Inc, 2007
29972007
Successfully attacking masked AES hardware implementations
S Mangard, N Pramstaller, E Oswald
International workshop on cryptographic hardware and embedded systems, 157-171, 2005
4962005
An ASIC implementation of the AES SBoxes
J Wolkerstorfer, E Oswald, M Lamberger
Topics in Cryptology—CT-RSA 2002: The Cryptographers’ Track at the RSA …, 2002
4872002
A side-channel analysis resistant description of the AES S-box
E Oswald, S Mangard, N Pramstaller, V Rijmen
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005
4412005
An AES smart card implementation resistant to power analysis attacks
C Herbst, E Oswald, S Mangard
International conference on applied cryptography and network security, 239-252, 2006
3942006
Power-analysis attack on an ASIC AES implementation
SB Ors, F Gurkaynak, E Oswald, B Preneel
International Conference on Information Technology: Coding and Computing …, 2004
3412004
Practical template attacks
C Rechberger, E Oswald
International Workshop on Information Security Applications, 440-456, 2004
2912004
One for all–all for one: unifying standard differential power analysis attacks
S Mangard, E Oswald, FX Standaert
IET Information Security 5 (2), 100-110, 2011
2722011
Practical second-order DPA attacks for masked smart card implementations of block ciphers
E Oswald, S Mangard, C Herbst, S Tillich
Cryptographers’ Track at the RSA Conference, 192-207, 2006
2532006
Power-analysis attacks on an FPGA–first experimental results
SB Örs, E Oswald, B Preneel
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2362003
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
2152010
Template attacks on masking—resistance is futile
E Oswald, S Mangard
Cryptographers’ Track at the RSA Conference, 243-256, 2007
1892007
Randomized addition-subtraction chains as a countermeasure against power attacks
E Oswald, M Aigner
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
1892001
Update on SHA-1
V Rijmen, E Oswald
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
1772005
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010
1442010
Power analysis attacks and countermeasures
T Popp, S Mangard, E Oswald
IEEE Design & test of Computers 24 (6), 535-543, 2007
1322007
An efficient masking scheme for AES software implementations
E Oswald, K Schramm
International Workshop on Information Security Applications, 292-305, 2005
1302005
Template attacks on ECDSA
M Medwed, E Oswald
International Workshop on Information Security Applications, 14-27, 2008
1132008
Towards Practical Tools for Side Channel Aware Software Engineering:'Grey Box'Modelling for Instruction Leakages
D McCann, E Oswald, C Whitnall
26th USENIX security symposium (USENIX Security 17), 199-216, 2017
112*2017
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
L Mather, E Oswald, J Bandenburg, M Wójcik
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1082013
The system can't perform the operation now. Try again later.
Articles 1–20