Marcel Medwed

According to our database1, Marcel Medwed authored at least 25 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Cyber Resilience for Self-Monitoring IoT Devices.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2016
IoT Security Challenges and Ways Forward.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptogr. Eng., 2014

2012
Countermeasures for Symmetric Key Ciphers.
Proceedings of the Fault Analysis in Cryptography, 2012

Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Extractors against side-channel attacks: weak or strong?
J. Cryptogr. Eng., 2011

Arithmetic logic units with high error detection rates to counteract fault attacks.
Proceedings of the Design, Automation and Test in Europe, 2011

Fresh Re-keying II: Securing Multiple Parties against Side-Channel and Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
The World is Not Enough: Another Look on Second-Order DPA.
IACR Cryptol. ePrint Arch., 2010

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software.
Proceedings of the Trusted Systems - Second International Conference, 2010

Fault Attacks on the Montgomery Powering Ladder.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010

Side-Channel Leakage across Borders.
Proceedings of the Smart Card Research and Advanced Application, 2010

Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.
Proceedings of the Progress in Cryptology, 2010

2009
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate.
IACR Cryptol. ePrint Arch., 2009

Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A Fault Attack on ECDSA.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

Attacking ECDSA-Enabled RFID Devices.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Template Attacks on ECDSA.
IACR Cryptol. ePrint Arch., 2008

Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

A Generic Fault Countermeasure Providing Data and Program Flow Integrity.
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008

2007
Energy evaluation of software implementations of block ciphers under memory constraints.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007


  Loading...