Juliane Krämer
Juliane Krämer
Post Doc, TU Darmstadt, CDC
Bestätigte E-Mail-Adresse bei cdc.informatik.tu-darmstadt.de - Startseite
TitelZitiert vonJahr
Simple photonic emission analysis of AES
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
International Workshop on Cryptographic Hardware and Embedded Systems, 41-57, 2012
612012
Revisiting TESLA in the quantum random oracle model
E Alkim, N Bindel, J Buchmann, Ö Dagdelen, E Eaton, G Gutoski, ...
International Workshop on Post-Quantum Cryptography, 143-162, 2017
58*2017
An efficient lattice-based signature scheme with provably secure instantiation
S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson
International Conference on Cryptology in Africa, 44-60, 2016
572016
Lattice-based signature schemes and their sensitivity to fault attacks
N Bindel, J Buchmann, J Krämer
2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 63-77, 2016
312016
A practical second-order fault attack against a real-world pairing implementation
J Blömer, RG Da Silva, P Günther, J Krämer, JP Seifert
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 123-136, 2014
292014
“My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones
T Dörflinger, A Voth, J Krämer, R Fromm
2010 international conference on security and cryptography (SECRYPT), 1-10, 2010
29*2010
Differential photonic emission analysis
J Krämer, D Nedospasov, A Schlösser, JP Seifert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2013
262013
Lattice basis reduction attack against physically unclonable functions
F Ganji, J Krämer, JP Seifert, S Tajik
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
202015
Simple photonic emission analysis of AES
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Journal of Cryptographic Engineering 3 (1), 3-15, 2013
202013
Creating cryptographic challenges using multi-party computation: The LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
152016
qTESLA
N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ...
Technical Report. National Institute of Standards and Technology, 2017
92017
Why cryptography should not rely on physical attack complexity
J Krämer
it-Information Technology 59 (1), 53-56, 2017
82017
Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT
Á Kiss, J Krämer, P Rauzy, JP Seifert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2016
82016
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
N Bindel, J Buchmann, J Krämer, H Mantel, J Schickel, A Weber
International Symposium on Foundations and Practice of Security, 225-241, 2017
62017
The Role of Photons in Cryptanalysis
J Krämer, M Kasper, JP Seifert
ASP-DAC 2014, 2014
62014
Submission to NIST’s post-quantum project: lattice-based digital signature scheme qTESLA
N Bindel, S Akleylek, E Alkim, P Barreto, J Buchmann, E Eaton, G Gutoski, ...
accessed, 2018
52018
A Framework to Select Parameters for Lattice-Based Cryptography.
NA Alkadri, JA Buchmann, R El Bansarkhani, J Krämer
IACR Cryptology ePrint Archive 2017, 615, 2017
52017
Differential power analysis of XMSS and SPHINCS
MJ Kannwischer, A Genêt, D Butin, J Krämer, J Buchmann
International Workshop on Constructive Side-Channel Analysis and Secure …, 2018
42018
On the Optimality of Differential Fault Analyses on CLEFIA.
J Krämer, A Stüber, Á Kiss
IACR Cryptology ePrint Archive 2014, 572, 2014
42014
Weaknesses in current RSA signature schemes
J Krämer, D Nedospasov, JP Seifert
International Conference on Information Security and Cryptology, 155-168, 2011
42011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20