Markus G. Kuhn

According to our database1, Markus G. Kuhn authored at least 45 papers between 1997 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Efficient, Portable Template Attacks.
IEEE Trans. Information Forensics and Security, 2018

Technical perspective: Backdoor engineering.
Commun. ACM, 2018

2016
Band diagram for low-k/Cu interconnects: The starting point for understanding back-end-of-line (BEOL) electrical reliability.
Microelectronics Reliability, 2016

SMAPs: Short Message Authentication Protocols.
Proceedings of the Security Protocols XXIV, 2016

2014
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits.
IACR Cryptology ePrint Archive, 2014

Template Attacks on Different Devices.
IACR Cryptology ePrint Archive, 2014

Template Attacks on Different Devices.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits.
Proceedings of the Smart Card Research and Advanced Applications, 2014

2013
Efficient Template Attacks.
IACR Cryptology ePrint Archive, 2013

Efficient Template Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2011
Tempest.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Smartcard Tamper Resistance.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Compromising Emanations.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Signal Authentication in Trusted Satellite Navigation Receivers.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Process Support for Collaborative Inquiry Learning.
Research and Practice in Technology Enhanced Learning, 2010

Exact JPEG recompression.
Proceedings of the Visual Information Processing and Communication, 2010

2009
Towards copy-evident JPEG images.
Proceedings of the Informatik 2009: Im Focus das Leben, 2009

A Protocol for Secure Remote Updates of FPGA Configurations.
Proceedings of the Reconfigurable Computing: Architectures, 2009

2008
Program for calculating SU(4) Clebsch-Gordan coefficients.
Computer Physics Communications, 2008

Attacks on time-of-flight distance bounding channels.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2007
Empowering Teachers to Evolve Media Enriched Classroom Scenarios.
Research and Practice in Technology Enhanced Learning, 2007

2006
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

Motivational Effects Within Scientific Experimentation Scenarios.
Proceedings of the Innovative Approaches for Learning and Knowledge Sharing, 2006

2005
Data Remanence.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

An RFID Distance Bounding Protocol.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

A lightweight approach for flexible group management in the classroom.
Proceedings of the Next 10 Years! Proceedings of the 2005 Conference on Computer Support for Collaborative Learning, 2005

Security Limits for Compromising Emanations.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

Help in Modelling with Visual Languages.
Proceedings of the Artificial Intelligence in Education, 2005

2004
Electromagnetic Eavesdropping Risks of Flat-Panel Displays.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

An Asymmetric Security Mechanism for Navigation Signals.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Evaluation of Exploratory Approaches in Learning Probability Based on Computational Modelling andSimulation.
Proceedings of the Cognition and Exploratory Learning in Digital Age (CELDA'04), 2004

2003
Modellierungswerkzeuge für den Schulunterricht - Erfahrungen und Perspektiven.
Proceedings of the Informatische Fachkonzepte im Unterricht, 2003

Enriching Traditional Classroom Scenarios by Seamless Integration of Interactive Media.
Proceedings of the 2003 IEEE International Conference on Advanced Learning Technologies, 2003

2002
Optical Time-Domain Eavesdropping Risks of CRT Displays.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

2001
Real World Patterns of Failure in Anonymity Systems.
Proceedings of the Information Hiding, 4th International Workshop, 2001

2000
Probabilistic Counting of Large Digital Signature Collections.
Proceedings of the 9th USENIX Security Symposium, 2000

1999
Physical security of smartcards.
Inf. Sec. Techn. Report, 1999

Design Principles for Tamper-Resistant Smartcard Processors.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

StegFS: A Steganographic File System for Linux.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP.
IEEE Trans. Computers, 1998

Attacks on Copyright Marking Systems.
Proceedings of the Information Hiding, 1998

Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.
Proceedings of the Information Hiding, 1998

1997
Low Cost Attacks on Tamper Resistant Devices.
Proceedings of the Security Protocols, 1997

Analysis of a Denial of Service Attack on TCP.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Low-threat security patches and tools.
Proceedings of the 1997 International Conference on Software Maintenance (ICSM '97), 1997


  Loading...