default search action
BibTeX records: Werner Schindler
@article{DBLP:journals/tifs/ChenCSZSDP23, author = {Li{-}Wei Chen and Ziang Chen and Werner Schindler and Xianyue Zhao and Heidemarie Schmidt and Nan Du and Ilia Polian}, title = {On Side-Channel Analysis of Memristive Cryptographic Circuits}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {463--476}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3223232}, doi = {10.1109/TIFS.2022.3223232}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenCSZSDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/newcas/PolianDS23, author = {Ilia Polian and Nan Du and Werner Schindler}, title = {Overview of Memristive Cryptography}, booktitle = {21st {IEEE} Interregional {NEWCAS} Conference, {NEWCAS} 2023, Edinburgh, United Kingdom, June 26-28, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/NEWCAS57931.2023.10198201}, doi = {10.1109/NEWCAS57931.2023.10198201}, timestamp = {Tue, 15 Aug 2023 11:43:59 +0200}, biburl = {https://dblp.org/rec/conf/newcas/PolianDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GohrLS22, author = {Aron Gohr and Friederike Laus and Werner Schindler}, title = {Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis {A} Report on the {CHES} Challenge Side-Channel Contest 2020}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {397--437}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.397-437}, doi = {10.46586/TCHES.V2022.I4.397-437}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GohrLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GohrLS22, author = {Aron Gohr and Friederike Laus and Werner Schindler}, title = {Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - {A} Report on the {CHES} Challenge Side-Channel Contest 2020}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2022}, url = {https://eprint.iacr.org/2022/471}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GohrLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MittmannS21, author = {Johannes Mittmann and Werner Schindler}, title = {Timing attacks and local timing attacks against Barrett's modular multiplication algorithm}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {4}, pages = {369--397}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00254-3}, doi = {10.1007/S13389-020-00254-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MittmannS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DugardinSG21, author = {Margaux Dugardin and Werner Schindler and Sylvain Guilley}, title = {Stochastic methods defeat regular {RSA} exponentiation algorithms with combined blinding methods}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {408--433}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0010}, doi = {10.1515/JMC-2020-0010}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DugardinSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GohrKS20, author = {Aron Gohr and Dominik Klein and Werner Schindler}, title = {Verr{\"{a}}terischer Stromverbrauch}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {431--435}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1300-6}, doi = {10.1007/S11623-020-1300-6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GohrKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GohrJS20, author = {Aron Gohr and Sven Jacob and Werner Schindler}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {567--592}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_22}, doi = {10.1007/978-3-030-81652-0\_22}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GohrJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GohrJS20, author = {Aron Gohr and Sven Jacob and Werner Schindler}, title = {Efficient Solutions of the {CHES} 2018 {AES} Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2020}, url = {https://eprint.iacr.org/2020/165}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GohrJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MittmannS20, author = {Johannes Mittmann and Werner Schindler}, title = {Timing attacks and local timing attacks against Barrett's modular multiplication algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {946}, year = {2020}, url = {https://eprint.iacr.org/2020/946}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MittmannS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RohdeS19, author = {Martina Rohde and Werner Schindler}, title = {K{\"{u}}nstliche Intelligenz in Evaluierung und Zulassung}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {10}, pages = {627--630}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1177-4}, doi = {10.1007/S11623-019-1177-4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RohdeS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GohrJS19, author = {Aron Gohr and Sven Jacob and Werner Schindler}, title = {{CHES} 2018 Side Channel Contest {CTF} - Solution of the {AES} Challenges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2019}, url = {https://eprint.iacr.org/2019/094}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GohrJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuZFLZGJSBT19, author = {Yongbo Hu and Yeyang Zheng and Pengwei Feng and Lirui Liu and Chen Zhang and Aron Gohr and Sven Jacob and Werner Schindler and Ileana Buhan and Karim Tobich}, title = {Machine learning and side channel analysis in a {CTF} competition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {860}, year = {2019}, url = {https://eprint.iacr.org/2019/860}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuZFLZGJSBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SchindlerW17, author = {Werner Schindler and Andreas Wiemers}, title = {Generic power attacks on {RSA} with {CRT} and exponent blinding: new results}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {255--272}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0146-1}, doi = {10.1007/S13389-016-0146-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SchindlerW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Schindler16, author = {Werner Schindler}, title = {Exclusive exponent blinding is not enough to prevent any timing attack on {RSA}}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {2}, pages = {101--119}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0124-7}, doi = {10.1007/S13389-016-0124-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Schindler16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Schindler15, author = {Werner Schindler}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on {RSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {229--247}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_12}, doi = {10.1007/978-3-662-48324-4\_12}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Schindler15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SchindlerW14, author = {Werner Schindler and Andreas Wiemers}, title = {Power attacks in the presence of exponent blinding}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {213--236}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0081-y}, doi = {10.1007/S13389-014-0081-Y}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SchindlerW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14, author = {Christophe Clavier and Jean{-}Luc Danger and Guillaume Duc and M. Abdelaziz Elaabid and Beno{\^{\i}}t G{\'{e}}rard and Sylvain Guilley and Annelie Heuser and Michael Kasper and Yang Li and Victor Lomn{\'{e}} and Daisuke Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent Sauvage and Werner Schindler and Marc St{\"{o}}ttinger and Nicolas Veyrat{-}Charvillon and Matthieu Walle and Antoine Wurcker}, title = {Practical improvements of side-channel attacks on {AES:} feedback from the 2nd {DPA} contest}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {259--274}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0075-9}, doi = {10.1007/S13389-014-0075-9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schindler14, author = {Werner Schindler}, title = {Exponent Blinding May Not Prevent Timing Attacks on {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2014}, url = {http://eprint.iacr.org/2014/869}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Schindler14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Schindler13, author = {Werner Schindler}, editor = {Marc Fischlin and Stefan Katzenbeisser}, title = {When Should an Implementation Attack Be Viewed as Successful?}, booktitle = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {8260}, pages = {139--150}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42001-6\_11}, doi = {10.1007/978-3-642-42001-6\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Schindler13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HeuserKSS12, author = {Annelie Heuser and Michael Kasper and Werner Schindler and Marc St{\"{o}}ttinger}, editor = {Orr Dunkelman}, title = {A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {365--382}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_23}, doi = {10.1007/978-3-642-27954-6\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HeuserKSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/HeuserSS12, author = {Annelie Heuser and Werner Schindler and Marc St{\"{o}}ttinger}, editor = {Wolfgang Rosenstiel and Lothar Thiele}, title = {Revealing side-channel issues of complex circuits by enhanced leakage models}, booktitle = {2012 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012}, pages = {1179--1184}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/DATE.2012.6176672}, doi = {10.1109/DATE.2012.6176672}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/HeuserSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2012, editor = {Werner Schindler and Sorin A. Huss}, title = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4}, doi = {10.1007/978-3-642-29912-4}, isbn = {978-3-642-29911-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchindlerI11, author = {Werner Schindler and Kouichi Itoh}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {73--90}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_5}, doi = {10.1007/978-3-642-21554-4\_5}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchindlerI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/HeuserKSS11, author = {Annelie Heuser and Michael Kasper and Werner Schindler and Marc St{\"{o}}ttinger}, title = {How a Symmetry Metric Assists Side-Channel Evaluation - {A} Novel Model Verification Method for Power Analysis}, booktitle = {14th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu, Finland}, pages = {674--681}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DSD.2011.91}, doi = {10.1109/DSD.2011.91}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/HeuserKSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/KasperSS10, author = {Michael Kasper and Werner Schindler and Marc St{\"{o}}ttinger}, editor = {Jinian Bian and Qiang Zhou and Peter Athanas and Yajun Ha and Kang Zhao}, title = {A stochastic method for security evaluation of cryptographic {FPGA} implementations}, booktitle = {Proceedings of the International Conference on Field-Programmable Technology, {FPT} 2010, 8-10 December 2010, Tsinghua University, Beijing, China}, pages = {146--153}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/FPT.2010.5681772}, doi = {10.1109/FPT.2010.5681772}, timestamp = {Thu, 01 Feb 2018 14:20:39 +0100}, biburl = {https://dblp.org/rec/conf/fpt/KasperSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/StandaertKS09, author = {Fran{\c{c}}ois{-}Xavier Standaert and Fran{\c{c}}ois Koeune and Werner Schindler}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {How to Compare Profiled Side-Channel Attacks?}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {485--498}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_30}, doi = {10.1007/978-3-642-01957-9\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/StandaertKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FinkeGS09, author = {Thomas Finke and Max Gebhardt and Werner Schindler}, editor = {Christophe Clavier and Kris Gaj}, title = {A New Side-Channel Attack on {RSA} Prime Generation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {141--155}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_11}, doi = {10.1007/978-3-642-04138-9\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/FinkeGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchindlerW09, author = {Werner Schindler and Colin D. Walter}, editor = {Matthew Geoffrey Parker}, title = {Optimal Recovery of Secret Keys from Weak Side Channel Traces}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {446--468}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_27}, doi = {10.1007/978-3-642-10868-6\_27}, timestamp = {Wed, 01 Sep 2021 10:36:08 +0200}, biburl = {https://dblp.org/rec/conf/ima/SchindlerW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Schindler09, author = {Werner Schindler}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Random Number Generators for Cryptographic Applications}, booktitle = {Cryptographic Engineering}, pages = {5--23}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_2}, doi = {10.1007/978-0-387-71817-0\_2}, timestamp = {Tue, 26 Jun 2018 16:12:55 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Schindler09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/koc09/Schindler09a, author = {Werner Schindler}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Evaluation Criteria for Physical Random Number Generators}, booktitle = {Cryptographic Engineering}, pages = {25--54}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-71817-0\_3}, doi = {10.1007/978-0-387-71817-0\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/koc09/Schindler09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Schindler08, author = {Werner Schindler}, title = {Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking}, journal = {J. Math. Cryptol.}, volume = {2}, number = {3}, pages = {291--310}, year = {2008}, url = {https://doi.org/10.1515/JMC.2008.013}, doi = {10.1515/JMC.2008.013}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/Schindler08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KillmannS08, author = {Wolfgang Killmann and Werner Schindler}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {A Design for a Physical {RNG} with Robust Entropy Estimators}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {146--163}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_10}, doi = {10.1007/978-3-540-85053-3\_10}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/KillmannS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AciicmezS08, author = {Onur Acii{\c{c}}mez and Werner Schindler}, editor = {Tal Malkin}, title = {A Vulnerability in {RSA} Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {256--273}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_16}, doi = {10.1007/978-3-540-79263-5\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AciicmezS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GebhardtIS08, author = {Max Gebhardt and Georg Illies and Werner Schindler}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {On an Approach to Compute (at least Almost) Exact Probabilities for Differentia Hash Collision Paths}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {111--125}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21521}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GebhardtIS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GebhardtIS08, author = {Max Gebhardt and Georg Illies and Werner Schindler}, title = {Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2008}, url = {http://eprint.iacr.org/2008/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GebhardtIS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AciicmezSK07, author = {Onur Acii{\c{c}}mez and Werner Schindler and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Masayuki Abe}, title = {Cache Based Remote Timing Attack on the {AES}}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {271--286}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_18}, doi = {10.1007/11967668\_18}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AciicmezSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/GebhardtIS07, author = {Max Gebhardt and Georg Illies and Werner Schindler}, editor = {Rainer Koschke and Otthein Herzog and Karl{-}Heinz R{\"{o}}diger and Marc Ronthaler}, title = {Hashkollisionen und Qualifizierte Zertifikate}, booktitle = {37. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik trifft Logistik, {INFORMATIK} 2007, Bremen, Germany, September 24-27, 2007, Band 2}, series = {{LNI}}, volume = {{P-110}}, pages = {174--178}, publisher = {{GI}}, year = {2007}, url = {https://dl.gi.de/handle/20.500.12116/22475}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/GebhardtIS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AciicmezS07, author = {Onur Acii{\c{c}}mez and Werner Schindler}, title = {A Major Vulnerability in {RSA} Implementations due to MicroArchitectural Analysis Threat}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2007}, url = {http://eprint.iacr.org/2007/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AciicmezS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GebhardtIS06, author = {Max Gebhardt and Georg Illies and Werner Schindler}, editor = {Jana Dittmann}, title = {A Note on the Practical Value of Single Hash Collisions for Special File Formats}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {333--344}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24792}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GebhardtIS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AciicmezSK05, author = {Onur Acii{\c{c}}mez and Werner Schindler and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Improving Brumley and Boneh timing attack on unprotected {SSL} implementations}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {139--146}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102140}, doi = {10.1145/1102120.1102140}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AciicmezSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchindlerLP05, author = {Werner Schindler and Kerstin Lemke and Christof Paar}, editor = {Josyula R. Rao and Berk Sunar}, title = {A Stochastic Model for Differential Side Channel Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {30--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_3}, doi = {10.1007/11545262\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/SchindlerLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Schindler05, author = {Werner Schindler}, editor = {Serge Vaudenay}, title = {On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {85--103}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_7}, doi = {10.1007/978-3-540-30580-4\_7}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Schindler05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LyS04, author = {Van{-}Ly Le and Werner Schindler}, editor = {Carlo Blundo and Stelvio Cimato}, title = {How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {367--380}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_26}, doi = {10.1007/978-3-540-30598-9\_26}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/LyS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0008349, author = {Werner Schindler}, title = {Measures with symmetry properties}, series = {Lecture notes in mathematics}, volume = {1808}, publisher = {Springer}, year = {2003}, isbn = {978-3-540-00235-2}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0008349.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/KillmannS03, author = {Wolfgang Killmann and Werner Schindler}, editor = {R{\"{u}}diger Grimm and Hubert B. Keller and Kai Rannenberg}, title = {{\"{U}}ber die Pr{\"{u}}ftiefe und Aussagekraft von IT-Sicherheitsgutachten}, booktitle = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit", {INFORMATIK} 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29 - October 2, 2003}, series = {{LNI}}, volume = {{P-36}}, pages = {203--214}, publisher = {{GI}}, year = {2003}, url = {https://dl.gi.de/handle/20.500.12116/29575}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/KillmannS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchindlerW03, author = {Werner Schindler and Colin D. Walter}, editor = {Kenneth G. Paterson}, title = {More Detail for a Combined Timing and Power Attack against Implementations of {RSA}}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {245--263}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_20}, doi = {10.1007/978-3-540-40974-8\_20}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/SchindlerW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Schindler03, author = {Werner Schindler}, editor = {Kenneth G. Paterson}, title = {A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At {CHES} 2002}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {276--289}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_22}, doi = {10.1007/978-3-540-40974-8\_22}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Schindler03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchindlerK02, author = {Werner Schindler and Wolfgang Killmann}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {431--449}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_31}, doi = {10.1007/3-540-36400-5\_31}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/SchindlerK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Schindler02, author = {Werner Schindler}, editor = {David Naccache and Pascal Paillier}, title = {A Combined Timing and Power Attack}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {263--279}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_19}, doi = {10.1007/3-540-45664-3\_19}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Schindler02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NiedermeyerS02, author = {Frank Niedermeyer and Werner Schindler}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {133--145}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_10}, doi = {10.1007/3-540-36413-7\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/NiedermeyerS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Schindler01, author = {Werner Schindler}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Efficient Online Tests for True Random Number Generators}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {103--117}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_10}, doi = {10.1007/3-540-44709-1\_10}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Schindler01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchindlerKQ01, author = {Werner Schindler and Fran{\c{c}}ois Koeune and Jean{-}Jacques Quisquater}, editor = {Bahram Honary}, title = {Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {245--267}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_22}, doi = {10.1007/3-540-45325-3\_22}, timestamp = {Wed, 18 Mar 2020 16:01:01 +0100}, biburl = {https://dblp.org/rec/conf/ima/SchindlerKQ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Schindler00, author = {Werner Schindler}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Timing Attack against {RSA} with the Chinese Remainder Theorem}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {109--124}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_8}, doi = {10.1007/3-540-44499-8\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Schindler00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comgeo/Schindler94, author = {Werner Schindler}, title = {Equivariant Mappings: a New Approach in Stochastic Simulations}, journal = {Comput. Geom.}, volume = {4}, pages = {327--343}, year = {1994}, url = {https://doi.org/10.1016/0925-7721(94)00012-3}, doi = {10.1016/0925-7721(94)00012-3}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comgeo/Schindler94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mor/Schindler94, author = {Werner Schindler}, title = {A Generalization of Weyl's Integration Theorem and Its Meaning for Stochastic Simulations}, journal = {Math. Oper. Res.}, volume = {19}, number = {3}, pages = {523--538}, year = {1994}, url = {https://doi.org/10.1287/moor.19.3.523}, doi = {10.1287/MOOR.19.3.523}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mor/Schindler94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comgeo/BokowskiRS91, author = {J{\"{u}}rgen Bokowski and J{\"{u}}rgen Richter{-}Gebert and Werner Schindler}, title = {On the Distribution of Order Types}, journal = {Comput. Geom.}, volume = {1}, pages = {127--142}, year = {1991}, url = {https://doi.org/10.1016/0925-7721(92)90012-H}, doi = {10.1016/0925-7721(92)90012-H}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comgeo/BokowskiRS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.