Jörn-Marc Schmidt

According to our database1, Jörn-Marc Schmidt authored at least 29 papers between 2008 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Requirements for Password-Authenticated Key Agreement (PAKE) Schemes.
RFC, April, 2017

2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptogr. Eng., 2014

Requirements for Standard Elliptic Curves.
IACR Cryptol. ePrint Arch., 2014

The Temperature Side Channel and Heating Fault Attacks.
IACR Cryptol. ePrint Arch., 2014

Group-signature schemes on constrained devices: the gap between theory and practice.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

2013
Hardware Designer's Guide to Fault Attacks.
IEEE Trans. Very Large Scale Integr. Syst., 2013

On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Countermeasures for Symmetric Key Ciphers.
Proceedings of the Fault Analysis in Cryptography, 2012

Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.
IACR Cryptol. ePrint Arch., 2012

Exploiting the Difference of Side-Channel Leakages.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2011
Secure Implementations for the Internet of Things.
Proceedings of the Security Aspects in Information Technology, 2011

The Fault Attack Jungle - A Classification Model to Guide You.
Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011

Low-cost fault detection method for ECC using Montgomery powering ladder.
Proceedings of the Design, Automation and Test in Europe, 2011

2010
Combined Implementation Attack Resistant Exponentiation.
Proceedings of the Progress in Cryptology, 2010

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software.
Proceedings of the Trusted Systems - Second International Conference, 2010

Fault Attacks on the Montgomery Powering Ladder.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010

Side-Channel Leakage across Borders.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein.
IACR Cryptol. ePrint Arch., 2009

Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A Fault Attack on ECDSA.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

Optical Fault Attacks on AES: A Threat in Violet.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

Contact-based fault injections and power analysis on RFID tags.
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009

On the Security of Untrusted Memory.
Proceedings of the The Forth International Conference on Availability, 2009

2008
A Probing Attack on AES.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

A Practical Fault Attack on Square and Multiply.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

A Generic Fault Countermeasure Providing Data and Program Flow Integrity.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

RFID and Its Vulnerability to Faults.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

A Chemical Memory Snapshot.
Proceedings of the Smart Card Research and Advanced Applications, 2008


  Loading...