Marc Schink

According to our database1, Marc Schink authored at least 11 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unlock the Door to my Secrets, but don't Forget to Glitch A comprehensive analysis of flash erase suppression attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
Faulting Winternitz One-Time Signatures to forge LMS, XMSS, or SPHINCS+ signatures.
IACR Cryptol. ePrint Arch., 2023

Faulting Winternitz One-Time Signatures to Forge LMS, XMSS, or SPHINCS<sup>+</sup> Signatures.
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023

2022
To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures.
IACR Cryptol. ePrint Arch., 2022

2021
Security and Trust in Open Source Security Tokens.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

2020
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Investigating Profiled Side-Channel Attacks Against the DES Key Schedule.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

2019
Taking a Look into Execute-Only Memory.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

2017
T-ROME: A simple and energy efficient tree routing protocol for low-power wake-up receivers.
Ad Hoc Networks, 2017

2015
Indoor localization system for emergency responders with ultra low-power radio landmarks.
Proceedings of the 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2015


  Loading...