Clemens Hlauschek

According to our database1, Clemens Hlauschek authored at least 5 papers between 2009 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits.
Proceedings of the 43rd IEEE Security and Privacy, 2022

2021
On the Timing Leakage of the Deterministic Re-encryption in HQC KEM.
IACR Cryptol. ePrint Arch., 2021

2015
Prying Open Pandora's Box: KCI Attacks against TLS.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

2009
Scalable, Behavior-Based Malware Clustering.
Proceedings of the Network and Distributed System Security Symposium, 2009


  Loading...