Michael Kasper

According to our database1, Michael Kasper authored at least 24 papers between 1998 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Post-Quantum Secure Boot.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Curse of Dimensionality in Adversarial Examples.
Proceedings of the International Joint Conference on Neural Networks, 2019

2018
Souveränität und die IT-Wertschöpfungskette.
Datenschutz und Datensicherheit, 2018

Open Source Value Chains for Addressing Security Issues Efficiently.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

2017
Drift-correcting self-calibration for visual-inertial SLAM.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017

2016
Inertial aided dense & semi-dense methods for robust direct visual odometry.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014

Abstracting perception and manipulation in end-user robot programming using Sikuli.
Proceedings of the 2014 IEEE International Conference on Technologies for Practical Robot Applications, 2014

The role of photons in cryptanalysis.
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014

2013
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Don't Push It: Breaking iButton Security.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2012
Side channel analysis of the SHA-3 finalists.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Butterfly-Attack on Skein's Modular Addition.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2011
A Formal Approach to Distance-Bounding RFID Protocols.
IACR Cryptol. ePrint Arch., 2011

dcTPM: A Generic Architecture for Dynamic Context Management.
Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs, 2011

How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011

2010
A stochastic method for security evaluation of cryptographic FPGA implementations.
Proceedings of the International Conference on Field-Programmable Technology, 2010

2008
On the Deployment of Mobile Trusted Modules.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
Virtualisation of a SIM-Card using trusted computing.
Proceedings of the Informatiktage 2007, 2007

2001
A behavior-based mobile robot architecture for Learning from Demonstration.
Robotics Auton. Syst., 2001

2000
Flächendeckendes Explorieren und Navigieren in a priori unbekannter Umgebung mit low-cost Robotern.
Proceedings of the Autonome Mobile Systeme 2000, 2000

1998
Ein verhaltensorientierter Ansatz zum flächendeckenden Fahren in a priori unbekannter Umgebung.
Proceedings of the Autonome Mobile Systeme 1998, 14. Fachgespräch, Karlsruhe, 30. November, 1998


  Loading...