Elisabeth Oswald

According to our database1, Elisabeth Oswald authored at least 77 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Share-slicing: Friend or Foe?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

2019
Examining the Practical Side Channel Resilience of ARX-boxes.
IACR Cryptology ePrint Archive, 2019

A Critical Analysis of ISO 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules').
IACR Cryptology ePrint Archive, 2019

A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation.
IACR Cryptology ePrint Archive, 2019

Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography.
IACR Cryptology ePrint Archive, 2019

Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets.
IACR Cryptology ePrint Archive, 2019

2018
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.
IACR Cryptology ePrint Archive, 2018

Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations.
IACR Cryptology ePrint Archive, 2018

Non-profiled Mask Recovery: the impact of Independent Component Analysis.
IACR Cryptology ePrint Archive, 2018

Fly, you fool! Faster Frodo for the ARM Cortex-M4.
IACR Cryptology ePrint Archive, 2018

Assessing the Feasibility of Single Trace Power Analysis of Frodo.
IACR Cryptology ePrint Archive, 2018

Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
IACR Cryptology ePrint Archive, 2018

2017
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.
IACR Cryptology ePrint Archive, 2017

Categorising and Comparing Cluster-Based DPA Distinguishers.
IACR Cryptology ePrint Archive, 2017

Exploring Potential 6LoWPAN Traffic Side Channels.
IACR Cryptology ePrint Archive, 2017

Practical Evaluation of Masking Software Countermeasures on an IoT processor.
IACR Cryptology ePrint Archive, 2017

Quantum Key Search with Side Channel Advice.
IACR Cryptology ePrint Archive, 2017

Authenticated Encryption in the Face of Protocol and Side Channel Leakage.
IACR Cryptology ePrint Archive, 2017

Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Cryptographic Randomness on a CC2538: a Case Study.
IACR Cryptology ePrint Archive, 2016

ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab.
IACR Cryptology ePrint Archive, 2016

How low can you go? Using side-channel data to enhance brute-force key recovery.
IACR Cryptology ePrint Archive, 2016

Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations.
IACR Cryptology ePrint Archive, 2016

2015
Robust Profiling for DPA-Style Attacks.
IACR Cryptology ePrint Archive, 2015

Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices.
IACR Cryptology ePrint Archive, 2015

How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack.
IACR Cryptology ePrint Archive, 2015

Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks.
IACR Cryptology ePrint Archive, 2015

Reliable Information Extraction for Single Trace Attacks.
IACR Cryptology ePrint Archive, 2015

A Leakage Resilient MAC.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Counting Keys in Parallel After a Side Channel Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer.
IACR Cryptology ePrint Archive, 2014

Making and Breaking Leakage Simulators.
IACR Cryptology ePrint Archive, 2014

Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES.
IACR Cryptology ePrint Archive, 2014

Simulatable Leakage: Analysis, Pitfalls, and New Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Profiling DPA: Efficacy and efficiency trade-offs.
IACR Cryptology ePrint Archive, 2013

Masking Tables - An Underestimated Security Risk.
IACR Cryptology ePrint Archive, 2013

A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices.
IACR Cryptology ePrint Archive, 2013

A Leakage Resilient MAC.
IACR Cryptology ePrint Archive, 2013

Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Side-Channel Analysis and Its Relevance to Fault Attacks.
Proceedings of the Fault Analysis in Cryptography, 2012

Pinpointing side-channel information leaks in web applications.
J. Cryptographic Engineering, 2012

The myth of generic DPA...and the magic of learning.
IACR Cryptology ePrint Archive, 2012

Quantifying Side-Channel Information Leakage from Web Applications.
IACR Cryptology ePrint Archive, 2012

Compiler Assisted Masking.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
A fair evaluation framework for comparing side-channel distinguishers.
J. Cryptographic Engineering, 2011

One for all - all for one: unifying standard differential power analysis attacks.
IET Information Security, 2011

An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis.
IACR Cryptology ePrint Archive, 2011

A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.
IACR Cryptology ePrint Archive, 2011

Automatic Insertion of DPA Countermeasures.
IACR Cryptology ePrint Archive, 2011

2010
Leakage Resilient Cryptography in Practice.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

The World is Not Enough: Another Look on Second-Order DPA.
IACR Cryptology ePrint Archive, 2010

Counteracting Power Analysis Attacks by Masking.
Proceedings of the Secure Integrated Circuits and Systems, 2010

2009
Leakage Resilient Cryptography in Practice.
IACR Cryptology ePrint Archive, 2009

One for All - All for One: Unifying Standard DPA Attacks.
IACR Cryptology ePrint Archive, 2009

Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications.
IACR Cryptology ePrint Archive, 2009

2008
Randomised representations.
IET Information Security, 2008

Template Attacks on ECDSA.
IACR Cryptology ePrint Archive, 2008

2007
Power Analysis Attacks and Countermeasures.
IEEE Design & Test of Computers, 2007

Template Attacks on Masking - Resistance Is Futile.
Proceedings of the Topics in Cryptology, 2007

Power analysis attacks - revealing the secrets of smart cards.
Springer, ISBN: 978-0-387-30857-9, 2007

2006
Investigations of Power Analysis Attacks and Countermeasures for ARIA.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Searching for Differential Paths in MD4.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.
Proceedings of the Topics in Cryptology, 2006

An AES Smart Card Implementation Resistant to Power Analysis Attacks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Update on SHA-1.
IACR Cryptology ePrint Archive, 2005

An Efficient Masking Scheme for AES Software Implementations.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

A Side-Channel Analysis Resistant Description of the AES S-Box.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Successfully Attacking Masked AES Hardware Implementations.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Secure and Efficient Masking of AES - A Mission Impossible?
IACR Cryptology ePrint Archive, 2004

Practical Template Attacks.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Power-Analysis Attack on an ASIC AES implementation.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Representations and Rijndael Descriptions.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Power-Analysis Attacks on an FPGA - First Experimental Results.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
An ASIC Implementation of the AES SBoxes.
Proceedings of the Topics in Cryptology, 2002

Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001


  Loading...