Michael Tunstall

Affiliations:
  • Rambus Cryptography Research Division, San Francisco, CA, USA


According to our database1, Michael Tunstall authored at least 57 papers between 2000 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Augmenting Leakage Detection using Bootstrapping.
IACR Cryptol. ePrint Arch., 2020

On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software.
IACR Cryptol. ePrint Arch., 2020

2019
Constant-time higher-order Boolean-to-arithmetic masking.
J. Cryptogr. Eng., 2019

Online template attacks.
J. Cryptogr. Eng., 2019

2018
Boolean Exponent Splitting.
IACR Cryptol. ePrint Arch., 2018

2017
Smart Card Security.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

2016
Applying TVLA to Public Key Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2016

Key extraction from the primary side of a switched-mode power supply.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

2015
Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply.
IACR Cryptol. ePrint Arch., 2015

Randomizing the Montgomery Powering Ladder.
IACR Cryptol. ePrint Arch., 2015

SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip.
IACR Cryptol. ePrint Arch., 2015

The distributions of individual bits in the output of multiplicative operations.
Cryptogr. Commun., 2015

Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace.
Proceedings of the Topics in Cryptology, 2015

2014
All-or-Nothing Transforms as a countermeasure to differential side-channel analysis.
Int. J. Inf. Sec., 2014

Empirical evaluation of multi-device profiling side-channel attacks.
Proceedings of the 2014 IEEE Workshop on Signal Processing Systems, 2014

Simulatable Leakage: Analysis, Pitfalls, and New Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Smart Card Security.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Differential fault analysis of AES: towards reaching its limits.
J. Cryptogr. Eng., 2013

Masking Tables - An Underestimated Security Risk.
IACR Cryptol. ePrint Arch., 2013

2012
Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems.
J. Cryptogr. Eng., 2012

Improved "Partial Sums"-based Square Attack on AES.
IACR Cryptol. ePrint Arch., 2012

Exploiting Collisions in Addition Chain-based Exponentiation Algorithms.
IACR Cryptol. ePrint Arch., 2012

Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.
IACR Cryptol. ePrint Arch., 2012

Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

Compiler Assisted Masking.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Practical complexity differential cryptanalysis and fault analysis of AES.
J. Cryptogr. Eng., 2011

Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems.
J. Cryptogr. Eng., 2011

Using templates to distinguish multiplications from squaring operations.
Int. J. Inf. Sec., 2011

Automatic Insertion of DPA Countermeasures.
IACR Cryptol. ePrint Arch., 2011

Can Code Polymorphism Limit Information Leakage?
IACR Cryptol. ePrint Arch., 2011

Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

2010
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations.
IACR Cryptol. ePrint Arch., 2010

Differential Fault Analysis of AES using a Single Multiple-Byte Fault.
IACR Cryptol. ePrint Arch., 2010

Combined Implementation Attack Resistant Exponentiation.
Proceedings of the Progress in Cryptology, 2010

Coordinate Blinding over Large Prime Fields.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Improved Fault Analysis of Signature Schemes.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs.
ACM Trans. Reconfigurable Technol. Syst., 2009

Attacking smart card systems: Theory and practice.
Inf. Secur. Tech. Rep., 2009

Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault.
IACR Cryptol. ePrint Arch., 2009

Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications.
IACR Cryptol. ePrint Arch., 2009

Unknown Plaintext Template Attacks.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Exponent Recoding and Regular Exponentiation Algorithms.
Proceedings of the Progress in Cryptology, 2009

Random Order m-ary Exponentiation.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Distinguishing Multiplications from Squaring Operations.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

2007
Smart Card Security.
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007

Efficient Use of Random Delays in Embedded Software.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Securing OpenSSL against Micro-Architectural Attacks.
Proceedings of the SECRYPT 2007, 2007

Montgomery Multiplication with Redundancy Check.
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007

2006
Efficient Use of Random Delays.
IACR Cryptol. ePrint Arch., 2006

Inhibiting Card Sharing Attacks.
Proceedings of the Advances in Information and Computer Security, 2006

Fault Analysis of DPA-Resistant Algorithms.
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006

Cache Based Power Analysis Attacks on AES.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2004
Experimenting with Faults, Lattices and the DSA.
IACR Cryptol. ePrint Arch., 2004

The Sorcerer's Apprentice Guide to Fault Attacks.
IACR Cryptol. ePrint Arch., 2004

2000
Asymmetric Currency Rounding.
Proceedings of the Financial Cryptography, 2000

How to Explain Side-Channel Leakage to Your Kids.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000


  Loading...