Juliane Krämer

Orcid: 0000-0002-3599-4215

According to our database1, Juliane Krämer authored at least 64 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Note on the Binding Properties of KEM Combiners.
IACR Cryptol. ePrint Arch., 2025

Fault Attacks on MPCitH Signature Schemes.
IACR Cryptol. ePrint Arch., 2025

Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC.
IACR Commun. Cryptol., 2025

SoK: On the Physical Security of UOV-Based Signature Schemes.
Proceedings of the Post-Quantum Cryptography - 16th International Workshop, 2025

Public Key Linting for ML-KEM and ML-DSA.
Proceedings of the Applied Cryptography and Network Security Workshops, 2025

Field-Tested Authentication for Quantum Key Distribution and DoS Attacks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2025

2024
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024

2023
Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

HaMAYO: A Reconfigurable Hardware Implementation of the Post-Quantum Signature Scheme MAYO.
IACR Cryptol. ePrint Arch., 2023

On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT.
IACR Cryptol. ePrint Arch., 2023

Committing AE from Sponges: Security Analysis of the NIST LWC Finalists.
IACR Cryptol. ePrint Arch., 2023

Separating Oil and Vinegar with a Single Trace.
IACR Cryptol. ePrint Arch., 2023

A Lightweight Identification Protocol Based on Lattices.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Disorientation Faults in CSIDH.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2022
Application of Automorphic Forms to Lattice Problems.
IACR Cryptol. ePrint Arch., 2022

User Perceptions of Security and Privacy for Group Chat.
DTRAP, 2022

Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?
CoRR, 2022

On the Related-Key Attack Security of Authenticated Encryption Schemes.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Recovering Rainbow's Secret Key with a First-Order Fault Attack.
Proceedings of the Progress in Cryptology, 2022

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
qTESLA: Practical Implementations of a Quantum Attack Resistant Signature Scheme.
IACR Cryptol. ePrint Arch., 2021

Safe-Error Attacks on SIKE and CSIDH.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

Verifying Post-Quantum Signatures in 8 kB of RAM.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Quantum Indistinguishability for Public Key Encryption.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

2020
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Security of Public Key Encryption Against Resetting Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020

Deterministic Wallets in a Quantum World.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Classic McEliece Implementation with Low Memory Footprint.
Proceedings of the Smart Card Research and Advanced Applications, 2020

Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Secure Two-Party Computation in a Quantum World.
Proceedings of the Applied Cryptography and Network Security, 2020

The Lattice-Based Digital Signature Scheme qTESLA.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Post-Quantum Cryptography and its Application to the IoT - (Extended Abstract).
Inform. Spektrum, 2019

A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019

p3Enum: A New Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
Proceedings of the Computational Science - ICCS 2019, 2019

Sicherheit, Zuverlässigkeit, Korrektheit.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

Fault Attacks on UOV and Rainbow.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

Post-Quantum Cryptography in Embedded Systems.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Differential Power Analysis of XMSS and SPHINCS.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2017
Quantum security analysis of a lattice-based oblivious transfer protocol.
Frontiers Inf. Technol. Electron. Eng., 2017

Why cryptography should not rely on physical attack complexity.
it Inf. Technol., 2017

A Framework to Select Parameters for Lattice-Based Cryptography.
IACR Cryptol. ePrint Arch., 2017

Revisiting TESLA in the Quantum Random Oracle Model.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Hampering fault attacks against lattice-based signature schemes: countermeasures and their efficiency (special session).
Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion, 2017

2016
Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016

An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Why cryptography should not rely on physical attack complexity.
PhD thesis, 2015

On the Optimality of Differential Fault Analyses on CLEFIA.
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2015

Warum wir uns in der Kryptographie nicht auf die Komplexität physikalischer Angriffe verlassen sollten.
Proceedings of the Ausgezeichnete Informatikdissertationen 2015, 2015

Lattice Basis Reduction Attack against Physically Unclonable Functions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

The role of photons in cryptanalysis.
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014

2013
Simple photonic emission analysis of AES.
J. Cryptogr. Eng., 2013

Differential Photonic Emission Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Structure-Based RSA Fault Attacks.
Proceedings of the Information Security Practice and Experience, 2012

Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Weaknesses in Current RSA Signature Schemes.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
"My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones.
Proceedings of the SECRYPT 2010, 2010


  Loading...