Krämer, Juliane
163  results:
Search for persons X
?
1

HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementa..:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
 
?
2

Disorientation Faults in CSIDH:

, In: Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science,
Banegas, Gustavo ; Krämer, Juliane ; Lange, Tanja... - p. 310-342 , 2023
 
?
3

A Lightweight Identification Protocol Based on Lattices:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023,
 
?
4

On the Feasibility of Single-Trace Attacks on the Gaussian ..:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
 
?
5

Separating Oil and Vinegar with a Single Trace: Side-Channe..:

Aulbach, Thomas ; Campos, Fabio ; Krämer, Juliane..
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2023
 
?
7

Machine-Learning Side-Channel Attacks on the GALACTICS Cons..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
8

Application of automorphic forms to lattice problems:

Düzlü, Samed ; Krämer, Juliane
Journal of Mathematical Cryptology.  16 (2022)  1 - p. 156-197 , 2022
 
?
9

Safe-Error Attacks on SIKE and CSIDH:

, In: Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science,
 
?
10

On Quantum Ciphertext Indistinguishability, Recoverability,..:

, In: Post-Quantum Cryptography; Lecture Notes in Computer Science,
Krämer, Juliane ; Struck, Patrick - p. 286-306 , 2022
 
?
11

User Perceptions of Security and Privacy for Group Chat:

Oesch, Sean ; Abu-Salma, Ruba ; Diallo, Oumar...
Digital Threats: Research and Practice.  3 (2022)  2 - p. 1-29 , 2022
 
?
12

On the Related-Key Attack Security of Authenticated Encrypt..:

, In: Lecture Notes in Computer Science; Security and Cryptography for Networks,
 
?
13

Recovering Rainbow's Secret Key with a First-Order Fault At..:

, In: Progress in Cryptology - AFRICACRYPT 2022; Lecture Notes in Computer Science,
 
?
14

Verifying Post-Quantum Signatures in 8 kB of RAM:

, In: Post-Quantum Cryptography; Lecture Notes in Computer Science,
 
?
15

Correction to: Security of Public Key Encryption Against Re..:

, In: Progress in Cryptology – INDOCRYPT 2020; Lecture Notes in Computer Science,
Krämer, Juliane ; Struck, Patrick - p. C1-C1 , 2021
 
1-15