Follow
Frederic Stumpf
Title
Cited by
Cited by
Year
Side-channel analysis of PUFs and fuzzy extractors
D Merli, D Schuster, F Stumpf, G Sigl
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011
1692011
A cache timing attack on AES in virtualization environments
M Weiß, B Heinz, F Stumpf
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
1472012
Semi-invasive EM attack on FPGA RO PUFs and countermeasures
D Merli, D Schuster, F Stumpf, G Sigl
Proceedings of the Workshop on Embedded Systems Security, 1-9, 2011
1402011
A robust integrity reporting protocol for remote attestation
F Stumpf, O Tafreschi, P Röder, C Eckert
Proceedings of the Workshop on Advances in Trusted Computing (WATC), 65, 2006
1352006
Improving the quality of ring oscillator PUFs on FPGAs
D Merli, F Stumpf, C Eckert
Proceedings of the 5th workshop on embedded systems security, 1-9, 2010
1332010
Localized electromagnetic analysis of cryptographic implementations
J Heyszl, S Mangard, B Heinz, F Stumpf, G Sigl
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
1202012
Complementary IBS: Application specific error correction for PUFs
M Hiller, D Merli, F Stumpf, G Sigl
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 1-6, 2012
952012
Localized electromagnetic analysis of RO PUFs
D Merli, J Heyszl, B Heinz, D Schuster, F Stumpf, G Sigl
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
822013
Enhancing trusted platform modules with hardware-based virtualization techniques
F Stumpf, C Eckert
2008 Second International Conference on Emerging Security Information …, 2008
812008
Detecting node compromise in hybrid wireless sensor networks using attestation techniques
C Krauß, F Stumpf, C Eckert
Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop …, 2007
792007
An approach to a trustworthy system architecture using virtualization
F Stumpf, M Benz, M Hermanowski, C Eckert
Autonomic and Trusted Computing: 4th International Conference, ATC 2007 …, 2007
752007
Improving the scalability of platform attestation
F Stumpf, A Fuchs, S Katzenbeisser, C Eckert
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 1-10, 2008
642008
Protecting PUF error correction by codeword masking
D Merli, F Stumpf, G Sigl
Cryptology ePrint Archive, 2013
432013
Improving mobile device security with operating system-level virtualization
S Wessel, M Huber, F Stumpf, C Eckert
Computers & Security 52, 207-220, 2015
382015
A new security architecture for smartcards utilizing PUFs
T Esbach, W Fumy, O Kulikovska, D Merli, D Schuster, F Stumpf
ISSE 2012 Securing Electronic Business Processes: Highlights of the …, 2012
292012
Comprehensive analysis of software countermeasures against fault attacks
N Theissing, D Merli, M Smola, F Stumpf, G Sigl
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 404-409, 2013
282013
Trust, security and privacy in vanets a multilayered security architecture for c2c-communication
F Stumpf, L Fischer, C Eckert
VDI BERICHTE 2016, 55, 2007
202007
PAL-privacy augmented LTE: A privacy-preserving scheme for vehicular LTE communication
D Angermeier, A Kiening, F Stumpf
Proceeding of the tenth ACM international workshop on Vehicular inter …, 2013
182013
A cost-effective FPGA-based fault simulation environment
A Janning, J Heyszl, F Stumpf, G Sigl
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 21-31, 2011
182011
A security architecture for multipurpose ECUs in vehicles
F Stumpf, C Meves, B Weyl, M Wolf
25th Joint VDI/VW Automotive Security Conference. Ingolstadt, Germany, 2009
162009
The system can't perform the operation now. Try again later.
Articles 1–20