Jörn-Marc Schmidt
  According to our database1,
  Jörn-Marc Schmidt
  authored at least 29 papers
  between 2008 and 2017.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2017
    RFC, April, 2017
    
  
  2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
    
  
    J. Cryptogr. Eng., 2014
    
  
    Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014
    
  
  2013
    IEEE Trans. Very Large Scale Integr. Syst., 2013
    
  
    Proceedings of the Smart Card Research and Advanced Applications, 2013
    
  
    Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
    
  
  2012
    Proceedings of the Fault Analysis in Cryptography, 2012
    
  
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.
    
  
    Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
    
  
    Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
    
  
  2011
    Proceedings of the Security Aspects in Information Technology, 2011
    
  
    Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011
    
  
    Proceedings of the Design, Automation and Test in Europe, 2011
    
  
  2010
    Proceedings of the Progress in Cryptology, 2010
    
  
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software.
    
  
    Proceedings of the Trusted Systems - Second International Conference, 2010
    
  
    Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
    
  
    Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
    
  
    Proceedings of the Smart Card Research and Advanced Application, 2010
    
  
  2009
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein.
    
  
    IACR Cryptol. ePrint Arch., 2009
    
  
    Proceedings of the Information Security Applications, 10th International Workshop, 2009
    
  
    Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
    
  
    Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
    
  
    Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
    
  
    Proceedings of the The Forth International Conference on Availability, 2009
    
  
  2008
    Proceedings of the Information Security Applications, 9th International Workshop, 2008
    
  
    Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008
    
  
    Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008
    
  
    Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
    
  
    Proceedings of the Smart Card Research and Advanced Applications, 2008