Folgen
Thomas Eisenbarth
Thomas Eisenbarth
Bestätigte E-Mail-Adresse bei uni-luebeck.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A survey of lightweight-cryptography implementations
T Eisenbarth, S Kumar, C Paar, A Poschmann, L Uhsadel
IEEE Design & Test of Computers 24 (6), 522-533, 2007
6562007
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
T Eisenbarth, T Kasper, A Moradi, C Paar, M Salmasizadeh, ...
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
3932008
S $ A: A shared cache attack that works across cores and defies VM sandboxing--and its application to AES
G Irazoqui, T Eisenbarth, B Sunar
2015 IEEE Symposium on Security and Privacy, 591-604, 2015
3902015
Wait a minute! A fast, Cross-VM attack on AES
G Irazoqui, MS Inci, T Eisenbarth, B Sunar
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
3242014
Cachezoom: How SGX amplifies the power of cache attacks
A Moghimi, G Irazoqui, T Eisenbarth
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
3032017
Correlation-enhanced power analysis collision attack
A Moradi, O Mischke, T Eisenbarth
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
2572010
Cache attacks enable bulk key recovery on the cloud
MS Inci, B Gulmezoglu, G Irazoqui, T Eisenbarth, B Sunar
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
1672016
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud
MS Inci, B Gulmezoglu, G Irazoqui, T Eisenbarth, B Sunar
Cryptology ePrint Archive, 2015
1522015
Security of autonomous systems employing embedded computing and sensors
AM Wyglinski, X Huang, T Padir, L Lai, TR Eisenbarth, ...
IEEE micro 33 (1), 80-86, 2013
1522013
Cross processor cache attacks
G Irazoqui, T Eisenbarth, B Sunar
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
1402016
Compact implementation and performance evaluation of block ciphers in ATtiny devices
T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ...
Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012
1392012
Building a Side Channel Based Disassembler.
T Eisenbarth, C Paar, B Weghenkel
Trans. Comput. Sci. 10, 78-99, 2010
1332010
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
A Moghimi, J Wichelmann, T Eisenbarth, B Sunar
International Journal of Parallel Programming 47, 538-570, 2019
1162019
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?
A Bogdanov, T Eisenbarth, A Rupp, C Wolf
Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008
1082008
A Faster and More Realistic Flush+Reload Attack on AES
B Gülmezoğlu, MS Inci, G Irazoqui, T Eisenbarth, B Sunar
Constructive Side-Channel Analysis and Secure Design: 6th International …, 2015
1072015
Systematic reverse engineering of cache slice selection in Intel processors
G Irazoqui, T Eisenbarth, B Sunar
2015 Euromicro Conference on Digital System Design, 629-636, 2015
1042015
MicroEliece: McEliece for embedded devices
T Eisenbarth, T Güneysu, S Heyse, C Paar
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
1032009
Reconfigurable trusted computing in hardware
T Eisenbarth, T Güneysu, C Paar, AR Sadeghi, D Schellekens, M Wolf
Proceedings of the 2007 ACM workshop on Scalable trusted computing, 15-20, 2007
962007
Fine grain cross-vm attacks on xen and vmware
G Irazoqui, MS Inci, T Eisenbarth, B Sunar
2014 IEEE Fourth International Conference on Big Data and Cloud Computing …, 2014
90*2014
Cachequote: Efficiently recovering long-term secrets of SGX EPID via cache attacks
F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
862018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20