Mario Werner

According to our database1, Mario Werner authored at least 24 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
MEAS: memory encryption and authentication secure against side-channel attacks.
J. Cryptographic Engineering, 2019

ScatterCache: Thwarting Cache Attacks via Cache Set Randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Protecting RISC-V Processors against Physical Attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
Pointing in the Right Direction - Securing Memory Accesses in a Faulty World.
CoRR, 2018

Securing Conditional Branches in the Presence of Fault Attacks.
CoRR, 2018

Sponge-Based Control-Flow Protection for IoT Devices.
CoRR, 2018

Sponge-Based Control-Flow Protection for IoT Devices.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Securing conditional branches in the presence of fault attacks.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

Pointing in the Right Direction - Securing Memory Accesses in a Faulty World.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Transparent Memory Encryption and Authentication.
IACR Cryptology ePrint Archive, 2017

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives.
IACR Cryptology ePrint Archive, 2017

SGXIO: Generic Trusted I/O Path for Intel SGX.
CoRR, 2017

Transparent memory encryption and authentication.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

Side-channel plaintext-recovery attacks on leakage-resilient encryption.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

SGXIO: Generic Trusted I/O Path for Intel SGX.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption.
IACR Cryptology ePrint Archive, 2016

Concealing Secrets in Embedded Processors Designs.
IACR Cryptology ePrint Archive, 2016

Concealing Secrets in Embedded Processors Designs.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
Protecting the Control Flow of Embedded Processors against Fault Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2013
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

2011
Evaluating 16-Bit Processors for Elliptic Curve Cryptography.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
Intelligentes Backup/Recovery für virtuelle Umgebungen.
Proceedings of the Informatik 2010: Service Science - Neue Perspektiven für die Informatik, Beiträge der 40. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Band 2, 27.09., 2010


  Loading...