Folgen
Tobias Schneider
Tobias Schneider
NXP Semiconductors, Gratkorn, Austria
Bestätigte E-Mail-Adresse bei rub.de
Titel
Zitiert von
Zitiert von
Jahr
Leakage assessment methodology
T Schneider, A Moradi
International Workshop on Cryptographic Hardware and Embedded Systems, 495-513, 2015
3372015
Practical CCA2-secure and masked Ring-LWE implementation
T Oder, T Schneider, T Pöppelmann, T Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 142-174, 2018
1122018
ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks
T Schneider, A Moradi, T Güneysu
Annual International Cryptology Conference, 302-332, 2016
1032016
Gimli: a cross-platform permutation
DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ...
International Conference on Cryptographic Hardware and Embedded Systems, 299-320, 2017
1002017
Improved side-channel analysis attacks on xilinx bitstream encryption of 5, 6, and 7 series
A Moradi, T Schneider
International Workshop on Constructive Side-Channel Analysis and Secure …, 2016
812016
Leakage detection with the x2-test
A Moradi, B Richter, T Schneider, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 209-237, 2018
692018
Glitch-Resistant Masking Revisited
T Moos, A Moradi, T Schneider, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 256-292, 2019
56*2019
Arithmetic addition over boolean masking
T Schneider, A Moradi, T Güneysu
International Conference on Applied Cryptography and Network Security, 559-578, 2015
502015
Side-Channel Analysis Protection and Low-Latency in Action
A Moradi, T Schneider
International Conference on the Theory and Application of Cryptology and …, 2016
462016
Impeccable circuits
A Aghaie, A Moradi, S Rasoolzadeh, AR Shahmirzadi, F Schellenberg, ...
IEEE Transactions on Computers 69 (3), 361-376, 2019
432019
Strong 8-bit Sboxes with efficient masking in hardware
E Boss, V Grosso, T Güneysu, G Leander, A Moradi, T Schneider
International Conference on Cryptographic Hardware and Embedded Systems, 171-193, 2016
38*2016
Masking kyber: First-and higher-order implementations
JW Bos, M Gourjon, J Renes, T Schneider, C van Vredendaal
IACR Transactions on Cryptographic Hardware and Embedded Systems, 173-214, 2021
282021
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
T Schneider, C Paglialonga, T Oder, T Güneysu
IACR International Workshop on Public Key Cryptography, 534-564, 2019
262019
High-Speed Masking for Polynomial Comparison in Lattice-based KEMs
F Bache, C Paglialonga, T Oder, T Schneider, T Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 483-507, 2020
202020
Amortizing Randomness Complexity in Private Circuits
S Faust, C Paglialonga, T Schneider
International Conference on the Theory and Application of Cryptology and …, 2017
182017
Multi-Tuple Leakage Detection and the Dependent Signal Issue
O Bronchain, T Schneider, FX Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, 318-345, 2019
152019
Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms
T Schneider, A Moradi, FX Standaert, T Güneysu
International Conference on Selected Areas in Cryptography, 58-78, 2016
152016
Gimli
DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ...
Submission to the NIST Lightweight Cryptography project. Available online …, 2019
142019
Robust and one-pass parallel computation of correlation-based attacks at arbitrary order
T Schneider, A Moradi, T Güneysu
International Workshop on Constructive Side-Channel Analysis and Secure …, 2016
112016
SPARX—A side-channel protected processor for ARX-based cryptography
F Bache, T Schneider, A Moradi, T Giineysu
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017
102017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20