Juliane Krämer
Orcid: 0000-0002-3599-4215
According to our database1,
Juliane Krämer
authored at least 64 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Commun. Cryptol., 2025
Proceedings of the Post-Quantum Cryptography - 16th International Workshop, 2025
Proceedings of the Applied Cryptography and Network Security Workshops, 2025
Proceedings of the Applied Cryptography and Network Security Workshops, 2025
2024
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024
2023
Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
HaMAYO: A Reconfigurable Hardware Implementation of the Post-Quantum Signature Scheme MAYO.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?
CoRR, 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Proceedings of the Progress in Cryptology, 2022
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
2020
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Smart Card Research and Advanced Applications, 2020
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Inform. Spektrum, 2019
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019
p3Enum: A New Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
Proceedings of the Computational Science - ICCS 2019, 2019
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018
2017
Frontiers Inf. Technol. Electron. Eng., 2017
it Inf. Technol., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Hampering fault attacks against lattice-based signature schemes: countermeasures and their efficiency (special session).
Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion, 2017
2016
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2015
Warum wir uns in der Kryptographie nicht auf die Komplexität physikalischer Angriffe verlassen sollten.
Proceedings of the Ausgezeichnete Informatikdissertationen 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014
2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
Proceedings of the Information Security Practice and Experience, 2012
Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
"My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones.
Proceedings of the SECRYPT 2010, 2010