Peter Pessl

According to our database1, Peter Pessl authored at least 16 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
More Practical Single-Trace Attacks on the Number Theoretic Transform.
IACR Cryptology ePrint Archive, 2019

More Practical Single-Trace Attacks on the Number Theoretic Transform.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

2018
Differential Fault Attacks on Deterministic Lattice Signatures.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Differential Fault Attacks on Deterministic Lattice Signatures.
IACR Cryptology ePrint Archive, 2018

2017
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption.
IACR Cryptology ePrint Archive, 2017

To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures.
IACR Cryptology ePrint Archive, 2017

Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures.
IACR Cryptology ePrint Archive, 2017

Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Reverse Engineering Intel DRAM Addressing and Exploitation.
CoRR, 2015

2014
Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

2013
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID.
IACR Cryptology ePrint Archive, 2013

Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013


  Loading...