# Peter Pessl

According to our database

Collaborative distances:

^{1}, Peter Pessl authored at least 16 papers between 2013 and 2019.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2019

More Practical Single-Trace Attacks on the Number Theoretic Transform.

IACR Cryptology ePrint Archive, 2019

More Practical Single-Trace Attacks on the Number Theoretic Transform.

Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

2018

Differential Fault Attacks on Deterministic Lattice Signatures.

IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Differential Fault Attacks on Deterministic Lattice Signatures.

IACR Cryptology ePrint Archive, 2018

2017

Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption.

IACR Cryptology ePrint Archive, 2017

To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures.

IACR Cryptology ePrint Archive, 2017

Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures.

IACR Cryptology ePrint Archive, 2017

Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption.

Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures.

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.

Proceedings of the 25th USENIX Security Symposium, 2016

Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures.

Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability.

Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015

Reverse Engineering Intel DRAM Addressing and Exploitation.

CoRR, 2015

2014

Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID.

Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

2013

Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID.

IACR Cryptology ePrint Archive, 2013

Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID.

Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013