According to our database1, Kerstin Lemke-Rust authored at least 29 papers between 2002 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage.
IEEE Trans. Information Forensics and Security, 2019
Exploring Embedded Software with Side Channels and Fault Analysis.
Proceedings of the 12th European Workshop on Microelectronics Education, 2018
Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Detection of counterfeit ICs using public identification sequences.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the Information Security Theory and Practice, 2016
IP core protection using voltage-controlled side-channel receivers.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node.
IACR Cryptology ePrint Archive, 2015
Remote IP Protection Using Timing Channels.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Remote FPGA design through eDiViDe - European Digital Virtual Design Lab.
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013
Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines.
Proceedings of the Smart Card Research and Advanced Applications, 2012
A High-Performance Implementation of Differential Power Analysis on Graphics Cards.
Proceedings of the Smart Card Research and Advanced Applications, 2011
On an Integration of an Information Security Management System into an Enterprise Architecture.
Proceedings of the Database and Expert Systems Applications, 2010
Differential Cluster Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers.
Proceedings of the IEEE Third International Symposium on Industrial Embedded Systems, 2008
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.
Proceedings of the Information Security, 11th International Conference, 2008
Models and algorithms for physical cryptanalysis.
PhD thesis, 2007
E-Passport: Cracking Basic Access Control Keys.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods.
Proceedings of the Computer Security, 2007
Gaussian Mixture Models for Higher-Order Side Channel Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Proceedings of the Information Security Applications, 7th International Workshop, 2006
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices.
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006
Templates vs. Stochastic Methods.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Physical Security Bounds Against Tampering.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
Proceedings of the Encyclopedia of Cryptography and Security, 2005
An Open Approach for Designing Secure Electronic Immobilizers.
Proceedings of the Information Security Practice and Experience, 2005
A Stochastic Model for Differential Side Channel Cryptanalysis.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002