Follow
Jan Philipp Thoma
Jan Philipp Thoma
Other namesJan Thoma
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions
JP Thoma, C Niesler, D Funke, G Leander, P Mayr, N Pohl, L Davi, ...
32nd USENIX Security Symposium (USENIX Security 23), 1991-2008, 2023
152023
Write Me and I’ll Tell You Secrets–Write-After-Write Effects On Intel CPUs
JP Thoma, T Güneysu
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
132022
Carry-less to BIKE Faster
MS Chen, T Güneysu, M Krausz, JP Thoma
International Conference on Applied Cryptography and Network Security, 833-852, 2022
122022
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization
F Canale, T Güneysu, G Leander, JP Thoma, Y Todo, R Ueno
32nd USENIX Security Symposium (USENIX Security 23), 1937-1954, 2023
82023
A configurable hardware implementation of XMSS
JP Thoma, T Güneysu
Cryptology ePrint Archive, 2021
82021
BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs Faster
JP Thoma, J Feldtkeller, M Krausz, T Güneysu, DJ Bernstein
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
7*2021
Agile acceleration of stateful hash-based signatures in hardware
JP Thoma, D Hartlief, T Güneysu
ACM Transactions on Embedded Computing Systems (TECS), 2022
52022
Risky translations: Securing tlbs against timing side channels
F Stolz, JP Thoma, P Sasdrich, T Güneysu
Cryptology ePrint Archive, 2022
52022
Three Sidekicks to Support Spectre Countermeasures
M Krausz, JP Thoma, F Stolz, M Fyrbiak, T Güneysu
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2024
12024
On The Effect of Replacement Policies on The Security of Randomized Cache Architectures
M Peters, N Gaudin, JP Thoma, V Lapôtre, P Cotret, G Gogniat, ...
arXiv preprint arXiv:2312.06235, 2023
12023
NVM-Flip: Non-Volatile-Memory BitFlips on the System Level
F Staudigl, JP Thoma, C Niesler, K Sturm, R Pelke, D Germek, JM Joseph, ...
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber …, 2024
2024
Hardware designs for secure microarchitectures
JP Thoma
2024
The system can't perform the operation now. Try again later.
Articles 1–12