FWF - Unters. Seitenkanal Att - Investigation of Side-Channel Attacks (ISCA)

  • Dominikus, Sandra (Co-Investigator (CoI))
  • Hutter, Michael (Co-Investigator (CoI))
  • Popp, Thomas (Co-Investigator (CoI))
  • Mangard, Stefan (Co-Investigator (CoI))
  • Oswald, Maria Elisabeth (Co-Investigator (CoI))
  • Rijmen, Vincent (Co-Investigator (CoI))
  • Plos, Thomas (Co-Investigator (CoI))
  • Posch, Reinhard (Principal Investigator (PI))
  • Herbst, Christoph (Principal Investigator (PI))

Project: Research project

Filter
Conference paper

Search results

  • 2010

    Randomizing the Montgomery Multiplication to Repel Template Attacks on Multiplicative Masking

    Medwed, M. & Herbst, C., 2010, Workshop Proceedings COSADE 201: 1st International Workshop on Constructive Side-Channel Analysis and Secure Design. p. 56-71

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • 2009

    Attacking ECDSA-Enabled RFID Devices

    Hutter, M., Medwed, M., Hein, D. & Wolkerstorfer, J., 2009, Applied Cryptography and Network Security - ACNS 2009, 7th International Conference, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings. Berlin / Heidelberg: Springer, Vol. 5536. p. 519-534 (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Contact-Based Fault Injections and Power Analysis on RFID Tags

    Hutter, M., Schmidt, J-M. & Plos, T., 2009, ECCTD 2009 - European Conference on Circuit Theory and Design Conference Program. Institute of Electrical and Electronics Engineers, p. 409-412

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags

    Plos, T., 2009, Topics in Cryptology - CT-RSA 2009, San Francisco, USA, April 20-24, 2009, Proceedings. Fischlin, M. (ed.). Berlin / Heidelberg: Springer, Vol. 5473. p. 444-458 (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Template Attacks on ECDSA

    Medwed, M. & Oswald, M. E., 2009, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers. Heidelberg: Springer, p. 14-27 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation

    Herbst, C. & Medwed, M., 2009, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers. Heidelberg: Springer, Vol. 5379. p. 1-13 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2008

    A Practical Fault Attack on Square and Multiply

    Schmidt, J-M. & Herbst, C., 2008, 5th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2008. Breveglieri, L. (ed.). IEEE-CS Press, p. 53-58

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Attacking State-of-the-Art Software Countermeasures—A Case Study for AES

    Tillich, S. & Herbst, C., 2008, Cryptographic Hardware and Embedded Systems - CHES 2008: 10th International Workshop, Washington DC, USA, August 10-13, 2008, Proceedings. Berlin; Heidelberg: Springer, p. 228-243 (Lecture Notes in Computer Science; vol. 5154).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Boosting AES Performance on a Tiny Processor Core

    Tillich, S. & Herbst, C., 2008, Topics in Cryptology - CT-RSA 2008: he Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings. Malkin, T. (ed.). Berlin; Heidelberg: Springer, p. 170-186 (Lecture Notes in Computer Science; vol. 4964).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • Enhancing Side-Channel Analysis with Low-Cost Shielding Techniques

    Plos, T., Hutter, M. & Herbst, C., 2008, Tagungsband, Austrochip 2008, Linz, Austria, October 8, 2008, Proceedings. Linz: Johannes Kepler Universität Linz, p. 90-95

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • RFID and Its Vulnerability to Faults

    Hutter, M., Schmidt, J-M. & Plos, T., 2008, Cryptographic Hardware and Embedded Systems – CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008, Proceedings. Berlin / Heidelberg: Springer, Vol. 5154. p. 363-379 (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Susceptibility of UHF RFID Tags to Electromagnetic Analysis

    Plos, T., 2008, Topics in Cryptology – CT-RSA 2008, San Francisco, USA, April 7-11, 2008, Proceedings. Malkin, T. (ed.). Berlin / Heidelberg: Springer, Vol. 4964. p. 288-300 (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • 2007

    Evaluation of the Masked Logic Style MDPL on a Prototype Chip

    Popp, T., Kirschbaum, M., Zefferer, T. & Mangard, S., 2007, Cryptographic Hardware and Embedded Systems - CHES 2007. Paillier, P. & Verbauwhede, I. (eds.). Berlin: Springer, Vol. 4727. p. 81-94 (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Power and EM Attacks on Passive 13.56 MHz RFID Devices

    Hutter, M., Mangard, S. & Feldhofer, M., 2007, Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings. Paillier, P. & Verbauwhede, I. (eds.). Berlin / Heidelberg: Springer, Vol. 4727. p. 320-330 (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

  • Protecting AES Software Implementations on 32-bit Processors against Power Analysis

    Tillich, S., Herbst, C. & Mangard, S., 2007, Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings. Berlin; Heidelberg: Springer Verlag, p. 141-157 (Lecture Notes in Computer Science; vol. 4521).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

    Open Access
    File
  • 2006

    An AES Smart Card Implementation resitant to Power Analysis Attacks

    Herbst, C., Oswald, M. E. & Mangard, S., 2006, Applied cryptography and Network security. Berlin Heidelberg: Springer, Vol. 3989. p. 239-252 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review