Emanuele Strieder
23  Ergebnisse:
Personensuche X
?
1

Unlock the Door to my Secrets, but don't Forget to Glitch: ..:

Schink, Marc ; Wagner, Alexander ; Oberhansl, Felix...
IACR Transactions on Cryptographic Hardware and Embedded Systems.  2024 (2024)  2 - p. 88-129 , 2024
 
?
2

Impeccable Keccak: Towards Fault Resilient SPHINCS+ Impleme..:

Gavrilan, Ivan ; Oberhansl, Felix ; Wagner, Alexander..
IACR Transactions on Cryptographic Hardware and Embedded Systems.  2024 (2024)  2 - p. 154-189 , 2024
 
?
3

Faulting Winternitz One-Time Signatures to Forge LMS, XMSS,..:

, In: Post-Quantum Cryptography; Lecture Notes in Computer Science,
 
?
4

ASCA vs. SASCA: A Closer Look at the AES Key Schedule:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
 
?
5

Adapting Belief Propagation to Counter Shuffling of NTTs:

Hermelink, Julius ; Streit, Silvan ; Strieder, Emanuele.
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2022
 
?
6

Breaking Black Box Crypto-Devices Using Laser Fault Injecti..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
7

On the application of Two-Photon Absorption for Laser Fault..:

Selmke, Bodo ; Pollanka, Maximilian ; Duensing, Andreas...
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2022
 
?
8

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyb..:

Hamburg, Mike ; Hermelink, Julius ; Primas, Robert...
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2021
 
?
 
?
 
?
 
?
12

On the application of Two-Photon Absorption for Laser Fault..:

Bodo Selmke ; Maximilian Pollanka ; Andreas Duensing...
https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9843.  , 2022
 
?
14

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyb..:

Mike Hamburg ; Julius Hermelink ; Robert Primas...
https://tches.iacr.org/index.php/TCHES/article/view/9061.  , 2021
 
1-15