Elisabeth Oswald

Affiliations:
  • University of Bristol, UK


According to our database1, Elisabeth Oswald authored at least 84 papers between 2001 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Neyman's Smoothness Test: A Trade-Off Between Moment-Based and Distribution-Based Leakage Detections.
IEEE Trans. Inf. Forensics Secur., 2021

Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware.
J. Cryptogr. Eng., 2021

Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor.
IACR Cryptol. ePrint Arch., 2021

A Novel Completeness Test and its Application to Side Channel Attacks and Simulators.
IACR Cryptol. ePrint Arch., 2021

2020
Share-slicing: Friend or Foe?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage.
IACR Cryptol. ePrint Arch., 2020

A Systematic Appraisal of Side Channel Evaluation Strategies.
IACR Cryptol. ePrint Arch., 2020

2019
Examining the Practical Side Channel Resilience of ARX-boxes.
IACR Cryptol. ePrint Arch., 2019

A Critical Analysis of ISO 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules').
IACR Cryptol. ePrint Arch., 2019

A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation.
IACR Cryptol. ePrint Arch., 2019

Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography.
IACR Cryptol. ePrint Arch., 2019

Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets.
IACR Cryptol. ePrint Arch., 2019

2018
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.
IACR Cryptol. ePrint Arch., 2018

Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations.
IACR Cryptol. ePrint Arch., 2018

Non-profiled Mask Recovery: the impact of Independent Component Analysis.
IACR Cryptol. ePrint Arch., 2018

Fly, you fool! Faster Frodo for the ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2018

Assessing the Feasibility of Single Trace Power Analysis of Frodo.
IACR Cryptol. ePrint Arch., 2018

Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
IACR Cryptol. ePrint Arch., 2018

Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

2017
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.
IACR Cryptol. ePrint Arch., 2017

Categorising and Comparing Cluster-Based DPA Distinguishers.
IACR Cryptol. ePrint Arch., 2017

Exploring Potential 6LoWPAN Traffic Side Channels.
IACR Cryptol. ePrint Arch., 2017

Practical Evaluation of Masking Software Countermeasures on an IoT processor.
IACR Cryptol. ePrint Arch., 2017

Quantum Key Search with Side Channel Advice.
IACR Cryptol. ePrint Arch., 2017

Authenticated Encryption in the Face of Protocol and Side Channel Leakage.
IACR Cryptol. ePrint Arch., 2017

Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Cryptographic Randomness on a CC2538: a Case Study.
IACR Cryptol. ePrint Arch., 2016

ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab.
IACR Cryptol. ePrint Arch., 2016

How low can you go? Using side-channel data to enhance brute-force key recovery.
IACR Cryptol. ePrint Arch., 2016

Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations.
IACR Cryptol. ePrint Arch., 2016

2015
Robust Profiling for DPA-Style Attacks.
IACR Cryptol. ePrint Arch., 2015

Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices.
IACR Cryptol. ePrint Arch., 2015

How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack.
IACR Cryptol. ePrint Arch., 2015

Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks.
IACR Cryptol. ePrint Arch., 2015

Reliable Information Extraction for Single Trace Attacks.
IACR Cryptol. ePrint Arch., 2015

A Leakage Resilient MAC.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Counting Keys in Parallel After a Side Channel Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer.
IACR Cryptol. ePrint Arch., 2014

Making and Breaking Leakage Simulators.
IACR Cryptol. ePrint Arch., 2014

Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES.
IACR Cryptol. ePrint Arch., 2014

Simulatable Leakage: Analysis, Pitfalls, and New Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Profiling DPA: Efficacy and efficiency trade-offs.
IACR Cryptol. ePrint Arch., 2013

Masking Tables - An Underestimated Security Risk.
IACR Cryptol. ePrint Arch., 2013

A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices.
IACR Cryptol. ePrint Arch., 2013

A Leakage Resilient MAC.
IACR Cryptol. ePrint Arch., 2013

Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Side-Channel Analysis and Its Relevance to Fault Attacks.
Proceedings of the Fault Analysis in Cryptography, 2012

Pinpointing side-channel information leaks in web applications.
J. Cryptogr. Eng., 2012

The myth of generic DPA...and the magic of learning.
IACR Cryptol. ePrint Arch., 2012

Quantifying Side-Channel Information Leakage from Web Applications.
IACR Cryptol. ePrint Arch., 2012

Compiler Assisted Masking.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
A fair evaluation framework for comparing side-channel distinguishers.
J. Cryptogr. Eng., 2011

One for all - all for one: unifying standard differential power analysis attacks.
IET Inf. Secur., 2011

An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis.
IACR Cryptol. ePrint Arch., 2011

A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.
IACR Cryptol. ePrint Arch., 2011

Automatic Insertion of DPA Countermeasures.
IACR Cryptol. ePrint Arch., 2011

2010
Leakage Resilient Cryptography in Practice.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

The World is Not Enough: Another Look on Second-Order DPA.
IACR Cryptol. ePrint Arch., 2010

Counteracting Power Analysis Attacks by Masking.
Proceedings of the Secure Integrated Circuits and Systems, 2010

2009
Leakage Resilient Cryptography in Practice.
IACR Cryptol. ePrint Arch., 2009

One for All - All for One: Unifying Standard DPA Attacks.
IACR Cryptol. ePrint Arch., 2009

Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications.
IACR Cryptol. ePrint Arch., 2009

2008
Randomised representations.
IET Inf. Secur., 2008

Template Attacks on ECDSA.
IACR Cryptol. ePrint Arch., 2008

2007
Power Analysis Attacks and Countermeasures.
IEEE Des. Test Comput., 2007

Template Attacks on Masking - Resistance Is Futile.
Proceedings of the Topics in Cryptology, 2007

Power analysis attacks - revealing the secrets of smart cards.
Springer, ISBN: 978-0-387-30857-9, 2007

2006
Investigations of Power Analysis Attacks and Countermeasures for ARIA.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Searching for Differential Paths in MD4.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.
Proceedings of the Topics in Cryptology, 2006

An AES Smart Card Implementation Resistant to Power Analysis Attacks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Update on SHA-1.
IACR Cryptol. ePrint Arch., 2005

An Efficient Masking Scheme for AES Software Implementations.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

A Side-Channel Analysis Resistant Description of the AES S-Box.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Successfully Attacking Masked AES Hardware Implementations.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Secure and Efficient Masking of AES - A Mission Impossible?
IACR Cryptol. ePrint Arch., 2004

Practical Template Attacks.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Power-Analysis Attack on an ASIC AES implementation.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Representations and Rijndael Descriptions.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Power-Analysis Attacks on an FPGA - First Experimental Results.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
An ASIC Implementation of the AES SBoxes.
Proceedings of the Topics in Cryptology, 2002

Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001


  Loading...