Kerstin Lemke-Rust

According to our database1, Kerstin Lemke-Rust authored at least 29 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage.
IEEE Trans. Information Forensics and Security, 2019

2018
Exploring Embedded Software with Side Channels and Fault Analysis.
Proceedings of the 12th European Workshop on Microelectronics Education, 2018

2017
Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Detection of counterfeit ICs using public identification sequences.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

2016
Fault-Channel Watermarks.
Proceedings of the Information Security Theory and Practice, 2016

IP core protection using voltage-controlled side-channel receivers.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016

2015
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node.
IACR Cryptology ePrint Archive, 2015

2014
Remote IP Protection Using Timing Channels.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Remote FPGA design through eDiViDe - European Digital Virtual Design Lab.
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013

2012
Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines.
Proceedings of the Smart Card Research and Advanced Applications, 2012

2011
A High-Performance Implementation of Differential Power Analysis on Graphics Cards.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
On an Integration of an Information Security Management System into an Enterprise Architecture.
Proceedings of the Database and Expert Systems Applications, 2010

2009
Differential Cluster Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers.
Proceedings of the IEEE Third International Symposium on Industrial Embedded Systems, 2008

Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.
Proceedings of the Information Security, 11th International Conference, 2008

2007
Models and algorithms for physical cryptanalysis.
PhD thesis, 2007

E-Passport: Cracking Basic Access Control Keys.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods.
Proceedings of the Computer Security, 2007

Gaussian Mixture Models for Higher-Order Side Channel Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices.
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006

Templates vs. Stochastic Methods.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Physical Security Bounds Against Tampering.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Physical Attacks.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

An Open Approach for Designing Secure Electronic Immobilizers.
Proceedings of the Information Security Practice and Experience, 2005

A Stochastic Model for Differential Side Channel Cryptanalysis.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2002
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002


  Loading...