Folgen
Juliane Krämer
Juliane Krämer
Bestätigte E-Mail-Adresse bei ur.de
Titel
Zitiert von
Zitiert von
Jahr
Simple photonic emission analysis of AES: photonic side channel analysis for the rest of us
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
1092012
An efficient lattice-based signature scheme with provably secure instantiation
S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
1022016
Revisiting TESLA in the quantum random oracle model
E Alkim, N Bindel, J Buchmann, Ö Dagdelen, E Eaton, G Gutoski, ...
Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017
772017
The Lattice-Based Digital Signature Scheme qTESLA.
E Alkim, PSLM Barreto, N Bindel, J Krämer, P Longa, JE Ricardini
IACR Cryptology ePrint Archive 2019, 85, 2019
712019
Lattice-based signature schemes and their sensitivity to fault attacks
N Bindel, J Buchmann, J Krämer
2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 63-77, 2016
702016
A practical second-order fault attack against a real-world pairing implementation
J Blömer, RG Da Silva, P Günther, J Krämer, JP Seifert
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 123-136, 2014
482014
Simple photonic emission analysis of AES
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Journal of Cryptographic Engineering 3, 3-15, 2013
442013
Differential photonic emission analysis
J Krämer, D Nedospasov, A Schlösser, JP Seifert
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
402013
qTESLA
N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ...
NIST Post-Quantum Cryptography Standardization: Round 2, 2019
372019
“My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones
T Dörflinger, A Voth, J Krämer, R Fromm
2010 international conference on security and cryptography (SECRYPT), 1-10, 2010
37*2010
Differential power analysis of XMSS and SPHINCS
MJ Kannwischer, A Genêt, D Butin, J Krämer, J Buchmann
International Workshop on Constructive Side-Channel Analysis and Secure …, 2018
332018
Lattice basis reduction attack against physically unclonable functions
F Ganji, J Krämer, JP Seifert, S Tajik
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
292015
Creating cryptographic challenges using multi-party computation: The LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
252016
Fault attacks on UOV and rainbow
J Krämer, M Loiero
Constructive Side-Channel Analysis and Secure Design: 10th International …, 2019
192019
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
N Bindel, J Buchmann, J Krämer, H Mantel, J Schickel, A Weber
Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018
192018
Why cryptography should not rely on physical attack complexity
J Krämer
it-Information Technology 59 (1), 53-56, 2017
162017
Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT
Á Kiss, J Krämer, P Rauzy, JP Seifert
Constructive Side-Channel Analysis and Secure Design: 7th International …, 2016
162016
Quantum indistinguishability for public key encryption
T Gagliardoni, J Krämer, P Struck
International Conference on Post-Quantum Cryptography, 463-482, 2021
14*2021
Classic McEliece implementation with low memory footprint
J Roth, E Karatsiolis, J Krämer
Smart Card Research and Advanced Applications: 19th International Conference …, 2021
132021
Secure two-party computation in a quantum world
N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ...
Applied Cryptography and Network Security: 18th International Conference …, 2020
122020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20