Jean-Pierre Seifert
Jean-Pierre Seifert
Professor for Computer & Communication Security, TU Berlin & T-Labs
Bestätigte E-Mail-Adresse bei
TitelZitiert vonJahr
Fault based cryptanalysis of the advanced encryption standard (AES)
J Blömer, JP Seifert
International Conference on Financial Cryptography, 162-181, 2003
Fault attacks on RSA with CRT: Concrete results and practical countermeasures
C Aumüller, P Bier, W Fischer, P Hofreiter, JP Seifert
International Workshop on Cryptographic Hardware and Embedded Systems, 260-275, 2002
Predicting secret keys via branch prediction
O Acıiçmez, ÇK Koç, JP Seifert
Cryptographers’ Track at the RSA Conference, 225-242, 2007
On the power of simple branch prediction analysis
O Aciiçmez, ÇK Koç, JP Seifert
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Detecting unauthorized use of computing devices based on behavioral patterns
L Xie, X Zhang, JP Seifert, O Aciicmez, A Latifi
US Patent 8,595,834, 2013
Cloning physically unclonable functions
C Helfmeier, C Boit, D Nedospasov, JP Seifert
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
Advances on access-driven cache attacks on AES
M Neve, JP Seifert
International Workshop on Selected Areas in Cryptography, 147-162, 2006
A new CRT-RSA algorithm secure against bellcore attacks
J Blömer, M Otto, JP Seifert
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Approximating shortest lattice vectors is not harder than approximating closest lattice vectors
O Goldreich, D Micciancio, S Safra, JP Seifert
Information Processing Letters 71 (2), 55-61, 1999
pBMDS: a behavior-based malware detection system for cellphone devices
L Xie, X Zhang, JP Seifert, S Zhu
Proceedings of the third ACM conference on Wireless network security, 37-48, 2010
Practical attacks against privacy and availability in 4G/LTE mobile communication systems
A Shaik, R Borgaonkar, N Asokan, V Niemi, JP Seifert
NDSS 2016, 2015
Sign change fault attacks on elliptic curve cryptosystems
J Blömer, M Otto, JP Seifert
International Workshop on Fault Diagnosis and Tolerance in Cryptography, 36-52, 2006
Software mitigations to hedge AES against cache-based software side channel vulnerabilities.
E Brickell, G Graunke, M Neve, JP Seifert
IACR Cryptology ePrint Archive 2006 (52), 2006
Rise of the iBots: Owning a telco network
C Mulliner, JP Seifert
2010 5th International Conference on Malicious and Unwanted Software, 71-80, 2010
Invasive PUF analysis
D Nedospasov, JP Seifert, C Helfmeier, C Boit
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 30-38, 2013
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks.
W Fischer, C Giraud, EW Knudsen, JP Seifert
IACR Cryptology ePrint Archive 2002, 7, 2002
Hardware-software integrated approaches to defend against software cache-based side channel attacks
J Kong, O Aciiçmez, JP Seifert, H Zhou
2009 IEEE 15th International Symposium on High Performance Computer …, 2009
Breaking and entering through the silicon
C Helfmeier, D Nedospasov, C Tarnovsky, JS Krissler, C Boit, JP Seifert
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures
O Acıiçmez, S Gueron, JP Seifert
IMA International Conference on Cryptography and Coding, 185-203, 2007
Simple photonic emission analysis of AES
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Journal of Cryptographic Engineering 3 (1), 3-15, 2013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20