Juliane Krämer
Juliane Krämer
Post Doc, TU Darmstadt, CDC
Bestätigte E-Mail-Adresse bei cdc.informatik.tu-darmstadt.de - Startseite
TitelZitiert vonJahr
Simple photonic emission analysis of AES
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
International Workshop on Cryptographic Hardware and Embedded Systems, 41-57, 2012
552012
Revisiting TESLA in the quantum random oracle model
E Alkim, N Bindel, J Buchmann, Ö Dagdelen, E Eaton, G Gutoski, ...
International Workshop on Post-Quantum Cryptography, 143-162, 2017
52*2017
An efficient lattice-based signature scheme with provably secure instantiation
S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson
International Conference on Cryptology in Africa, 44-60, 2016
492016
Differential photonic emission analysis
J Krämer, D Nedospasov, A Schlösser, JP Seifert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2013
272013
Lattice-based signature schemes and their sensitivity to fault attacks
N Bindel, J Buchmann, J Krämer
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016 Workshop on, 63-77, 2016
262016
A practical second-order fault attack against a real-world pairing implementation
J Blömer, RG Da Silva, P Günther, J Krämer, JP Seifert
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2014 Workshop on, 123-136, 2014
262014
Simple photonic emission analysis of AES
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Journal of Cryptographic Engineering 3 (1), 3-15, 2013
232013
“My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones
T Dorflinger, A Voth, J Kramer, R Fromm
2010 international conference on security and cryptography (SECRYPT), 2010
222010
Lattice basis reduction attack against physically unclonable functions
F Ganji, J Krämer, JP Seifert, S Tajik
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
202015
Creating cryptographic challenges using multi-party computation: the LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
152016
Why cryptography should not rely on physical attack complexity
J Krämer
it-Information Technology 59 (1), 53-56, 2017
82017
Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT
Á Kiss, J Krämer, P Rauzy, JP Seifert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2016
82016
qTesla
N Bindel, S Akleylek, E Alkim, P Barreto, J Buchmann, E Eaton, G Gutoski, ...
January, 2018
72018
The Role of Photons in Cryptanalysis
J Krämer, M Kasper, JP Seifert
ASP-DAC 2014, 2014
72014
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
N Bindel, J Buchmann, J Krämer, H Mantel, J Schickel, A Weber
International Symposium on Foundations and Practice of Security, 225-241, 2017
62017
On the Optimality of Differential Fault Analyses on CLEFIA.
J Krämer, A Stüber, Á Kiss
IACR Cryptology ePrint Archive 2014, 572, 2014
52014
Weaknesses in current RSA signature schemes
J Krämer, D Nedospasov, JP Seifert
International Conference on Information Security and Cryptology, 155-168, 2011
52011
Differential Power Analysis of XMSS and SPHINCS
MJ Kannwischer, A Genêt, D Butin, J Krämer, J Buchmann
International Workshop on Constructive Side-Channel Analysis and Secure …, 2018
42018
A framework to select parameters for lattice-based cryptography
NA Alkadri, J Buchmann, RE Bansarkhani, J Krämer
Cryptology ePrint Archive, Report 2017/615, 2017
42017
Structure-based RSA fault attacks
B Michéle, J Krämer, JP Seifert
International Conference on Information Security Practice and Experience …, 2012
32012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20