BibTeX records: Elisabeth Oswald

download as .bib file

@inproceedings{DBLP:conf/cosade/MarquetO24,
  author       = {Thomas Marquet and
                  Elisabeth Oswald},
  editor       = {Romain Wacquez and
                  Naofumi Homma},
  title        = {Exploring Multi-task Learning in the Context of Masked {AES} Implementations},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 15th International
                  Workshop, {COSADE} 2024, Gardanne, France, April 9-10, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14595},
  pages        = {93--112},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57543-3\_6},
  doi          = {10.1007/978-3-031-57543-3\_6},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MarquetO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChowdhuryRBO24,
  author       = {Aakash Chowdhury and
                  Arnab Roy and
                  Carlo Brunetta and
                  Elisabeth Oswald},
  editor       = {Leonid Reyzin and
                  Douglas Stebila},
  title        = {Leakage Certification Made Simple},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024,
                  Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14925},
  pages        = {427--460},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-68391-6\_13},
  doi          = {10.1007/978-3-031-68391-6\_13},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChowdhuryRBO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GaoO24,
  author       = {Si Gao and
                  Elisabeth Oswald},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {A Novel Framework for Explainable Leakage Assessment},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14653},
  pages        = {221--250},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58734-4\_8},
  doi          = {10.1007/978-3-031-58734-4\_8},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GaoO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2024,
  editor       = {Elisabeth Oswald},
  title        = {Topics in Cryptology - {CT-RSA} 2024 - Cryptographers' Track at the
                  {RSA} Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14643},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58868-6},
  doi          = {10.1007/978-3-031-58868-6},
  isbn         = {978-3-031-58867-9},
  timestamp    = {Thu, 09 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MarquetO23,
  author       = {Thomas Marquet and
                  Elisabeth Oswald},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {A Comparison of Multi-task Learning and Single-Task Learning Approaches},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {121--138},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_7},
  doi          = {10.1007/978-3-031-41181-6\_7},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MarquetO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YanOR23,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Arnab Roy},
  editor       = {Hwajeong Seo and
                  Suhri Kim},
  title        = {Not Optimal but Efficient: {A} Distinguisher Based on the Kruskal-Wallis
                  Test},
  booktitle    = {Information Security and Cryptology - {ICISC} 2023 - 26th International
                  Conference on Information Security and Cryptology, {ICISC} 2023, Seoul,
                  South Korea, November 29 - December 1, 2023, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14561},
  pages        = {240--258},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1235-9\_13},
  doi          = {10.1007/978-981-97-1235-9\_13},
  timestamp    = {Wed, 13 Mar 2024 19:10:54 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/YanOR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarquetO23,
  author       = {Thomas Marquet and
                  Elisabeth Oswald},
  title        = {Exploring multi-task learning in the context of two masked {AES} implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/006},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MarquetO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarquetO23a,
  author       = {Thomas Marquet and
                  Elisabeth Oswald},
  title        = {A Comparison of Multi-task learning and Single-task learning Approaches},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/611},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarquetO23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/00180O23,
  author       = {Yan Yan and
                  Arnab Roy and
                  Elisabeth Oswald},
  title        = {Not optimal but efficient: a distinguisher based on the Kruskal-Wallis
                  test},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1160},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1160},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/00180O23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/YoungMO22,
  author       = {Rebecca Young and
                  Luke Mather and
                  Elisabeth Oswald},
  editor       = {Ileana Buhan and
                  Tobias Schneider},
  title        = {Comparing Key Rank Estimation Methods},
  booktitle    = {Smart Card Research and Advanced Applications - 21st International
                  Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13820},
  pages        = {188--204},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25319-5\_10},
  doi          = {10.1007/978-3-031-25319-5\_10},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/YoungMO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GaoO22,
  author       = {Si Gao and
                  Elisabeth Oswald},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {A Novel Completeness Test for Leakage Models and Its Application to
                  Side Channel Attacks and Responsibly Engineered Simulators},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {254--283},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_10},
  doi          = {10.1007/978-3-031-07082-2\_10},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GaoO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GaoOP22,
  author       = {Si Gao and
                  Elisabeth Oswald and
                  Dan Page},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Towards Micro-architectural Leakage Simulators: Reverse Engineering
                  Micro-architectural Leakage Features Is Practical},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {284--311},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_11},
  doi          = {10.1007/978-3-031-07082-2\_11},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GaoOP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoO22,
  author       = {Si Gao and
                  Elisabeth Oswald},
  title        = {A Novel Framework for Explainable Leakage Assessment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/182},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0005CO22,
  author       = {Arnab Roy and
                  Aakash Chowdhury and
                  Elisabeth Oswald},
  title        = {Consistent, Efficient and Leakage-Model Free Mutual Information Estimation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1201},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1201},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/0005CO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoungMO22,
  author       = {Rebecca Young and
                  Luke Mather and
                  Elisabeth Oswald},
  title        = {Comparing Key Rank Estimation Methods},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1282},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1282},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoungMO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HoweMOR21,
  author       = {James Howe and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Francesco Regazzoni},
  title        = {Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {4},
  pages        = {317--327},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00258-7},
  doi          = {10.1007/S13389-021-00258-7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HoweMOR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GaoOY21,
  author       = {Si Gao and
                  Elisabeth Oswald and
                  Yan Yan},
  title        = {Neyman's Smoothness Test: {A} Trade-Off Between Moment-Based and Distribution-Based
                  Leakage Detections},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4494--4506},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3108570},
  doi          = {10.1109/TIFS.2021.3108570},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GaoOY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0018O021,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Srinivas Vivek},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {An Analytic Attack against {ARX} Addition Exploiting Standard Side-channel
                  Leakage},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {89--97},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010223600890097},
  doi          = {10.5220/0010223600890097},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/0018O021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoweMOR21,
  author       = {James Howe and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Francesco Regazzoni},
  title        = {Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/155},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HoweMOR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoO21,
  author       = {Si Gao and
                  Elisabeth Oswald},
  title        = {A Novel Completeness Test and its Application to Side Channel Attacks
                  and Simulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {756},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/756},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoOP21,
  author       = {Si Gao and
                  Elisabeth Oswald and
                  Dan Page},
  title        = {Reverse Engineering the Micro-Architectural Leakage Features of a
                  Commercial Processor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/794},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoOP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoOY21,
  author       = {Si Gao and
                  Elisabeth Oswald and
                  Yan Yan},
  title        = {Neyman's Smoothness Test: a Trade-off between Moment-based and Distribution-based
                  Leakage Detections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1039},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1039},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoOY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GaoMPO20,
  author       = {Si Gao and
                  Ben Marshall and
                  Dan Page and
                  Elisabeth Oswald},
  title        = {Share-slicing: Friend or Foe?},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {152--174},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.152-174},
  doi          = {10.13154/TCHES.V2020.I1.152-174},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/GaoMPO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/AzouaouiBBDD0JK20,
  author       = {Melissa Azouaoui and
                  Davide Bellizia and
                  Ileana Buhan and
                  Nicolas Debande and
                  S{\'{e}}bastien Duval and
                  Christophe Giraud and
                  {\'{E}}liane Jaulmes and
                  Fran{\c{c}}ois Koeune and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Carolyn Whitnall},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {A Systematic Appraisal of Side Channel Evaluation Strategies},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {46--66},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_3},
  doi          = {10.1007/978-3-030-64357-7\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/AzouaouiBBDD0JK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2020,
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7},
  doi          = {10.1007/978-3-030-65277-7},
  isbn         = {978-3-030-65276-0},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzouaouiBBDDGJK20,
  author       = {Melissa Azouaoui and
                  Davide Bellizia and
                  Ileana Buhan and
                  Nicolas Debande and
                  S{\'{e}}bastien Duval and
                  Christophe Giraud and
                  {\'{E}}liane Jaulmes and
                  Fran{\c{c}}ois Koeune and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Carolyn Whitnall},
  title        = {A Systematic Appraisal of Side Channel Evaluation Strategies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1347},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1347},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AzouaouiBBDDGJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YanOV20,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Srinivas Vivek},
  title        = {An Analytic Attack Against {ARX} Addition Exploiting Standard Side-Channel
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1455},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1455},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YanOV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WhitnallO19,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {A Critical Analysis of {ISO} 17825 ('Testing Methods for the Mitigation
                  of Non-invasive Attack Classes Against Cryptographic Modules')},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {256--284},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_9},
  doi          = {10.1007/978-3-030-34618-8\_9},
  timestamp    = {Fri, 22 Nov 2019 13:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WhitnallO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/YanO19,
  author       = {Yan Yan and
                  Elisabeth Oswald},
  editor       = {Francesca Palumbo and
                  Michela Becchi and
                  Martin Schulz and
                  Kento Sato},
  title        = {Examining the practical side channel resilience of ARX-boxes},
  booktitle    = {Proceedings of the 16th {ACM} International Conference on Computing
                  Frontiers, {CF} 2019, Alghero, Italy, April 30 - May 2, 2019},
  pages        = {373--379},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3310273.3323399},
  doi          = {10.1145/3310273.3323399},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/YanO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GaoRO19,
  author       = {Si Gao and
                  Arnab Roy and
                  Elisabeth Oswald},
  editor       = {Mitsuru Matsui},
  title        = {Constructing TI-Friendly Substitution Boxes Using Shift-Invariant
                  Permutations},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {433--452},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_22},
  doi          = {10.1007/978-3-030-12612-4\_22},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GaoRO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/HoweKMRO19,
  author       = {James Howe and
                  Ayesha Khalid and
                  Marco Martinoli and
                  Francesco Regazzoni and
                  Elisabeth Oswald},
  title        = {Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2019,
                  Sapporo, Japan, May 26-29, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISCAS.2019.8702794},
  doi          = {10.1109/ISCAS.2019.8702794},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/HoweKMRO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoweKMRO19,
  author       = {James Howe and
                  Ayesha Khalid and
                  Marco Martinoli and
                  Francesco Regazzoni and
                  Elisabeth Oswald},
  title        = {Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoweKMRO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YanO19,
  author       = {Yan Yan and
                  Elisabeth Oswald},
  title        = {Examining the Practical Side Channel Resilience of ARX-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/335},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YanO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallO19,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {A Cautionary Note Regarding the Usage of Leakage Detection Tests in
                  Security Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/703},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallO19a,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {A Critical Analysis of {ISO} 17825 ('Testing methods for the mitigation
                  of non-invasive attack classes against cryptographic modules')},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1013},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallO19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenBO19,
  author       = {Joey Green and
                  Tilo Burghardt and
                  Elisabeth Oswald},
  title        = {Not a Free Lunch but a Cheap Lunch: Experimental Results for Training
                  Many Neural Nets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1068},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenBO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Green0O18,
  author       = {Joey Green and
                  Arnab Roy and
                  Elisabeth Oswald},
  editor       = {Beg{\"{u}}l Bilgin and
                  Jean{-}Bernard Fischer},
  title        = {A Systematic Study of the Impact of Graphical Models on Inference-Based
                  Attacks on {AES}},
  booktitle    = {Smart Card Research and Advanced Applications, 17th International
                  Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11389},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15462-2\_2},
  doi          = {10.1007/978-3-030-15462-2\_2},
  timestamp    = {Sat, 30 Sep 2023 09:35:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Green0O18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GaoOCX18,
  author       = {Si Gao and
                  Elisabeth Oswald and
                  Hua Chen and
                  Wei Xi},
  editor       = {Beg{\"{u}}l Bilgin and
                  Jean{-}Bernard Fischer},
  title        = {Non-profiled Mask Recovery: The Impact of Independent Component Analysis},
  booktitle    = {Smart Card Research and Advanced Applications, 17th International
                  Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11389},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15462-2\_4},
  doi          = {10.1007/978-3-030-15462-2\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/GaoOCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/0001MO18,
  author       = {Daniel P. Martin and
                  Luke Mather and
                  Elisabeth Oswald},
  editor       = {Nigel P. Smart},
  title        = {Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel
                  Attacks Revisited},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {394--412},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_21},
  doi          = {10.1007/978-3-319-76953-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/0001MO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/YanOT18,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Theo Tryfonas},
  editor       = {Domenico Giustiniano and
                  Dimitrios Koutsonikolas and
                  Albert Banchs and
                  Enzo Mingozzi and
                  Kaushik Roy Chowdhury},
  title        = {Exploring Potential 6LoWPAN Traffic Side Channels},
  booktitle    = {Proceedings of the 2018 International Conference on Embedded Wireless
                  Systems and Networks, {EWSN} 2018. Madrid, Spain, February 14-16,
                  2018},
  pages        = {270--275},
  publisher    = {Junction Publishing, Canada/ {ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3234911},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/YanOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BosFMOS18,
  author       = {Joppe W. Bos and
                  Simon Friedberger and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Martijn Stam},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Assessing the Feasibility of Single Trace Power Analysis of Frodo},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {216--234},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_10},
  doi          = {10.1007/978-3-030-10970-7\_10},
  timestamp    = {Wed, 25 Sep 2019 18:08:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BosFMOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/KalliopiWWTOMVP18,
  author       = {Kalliopi Anastasopoulou and
                  Emma J. Williams and
                  Carolyn Whitnall and
                  Theo Tryfonas and
                  Elisabeth Oswald and
                  Phillip L. Morgan and
                  Alexandra Voinescu and
                  Robert J. Piechocki and
                  Andrea Tassi},
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini and
                  Theo Tryfonas and
                  Debi Ashenden},
  title        = {Effects of privacy risk perception and cultural bias on intention
                  of connected autonomous vehicle use},
  booktitle    = {{STAST} 2018: 8th International Workshop on Socio-Technical Aspects
                  in Security and Trust, San Juan, Puerto Rico, USA, December, 2018},
  pages        = {5:1--5:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3361331.3361336},
  doi          = {10.1145/3361331.3361336},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/KalliopiWWTOMVP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001MO18,
  author       = {Daniel P. Martin and
                  Luke Mather and
                  Elisabeth Oswald},
  title        = {Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel
                  Attacks Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001MO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenRO18,
  author       = {Joey Green and
                  Arnab Roy and
                  Elisabeth Oswald},
  title        = {A Systematic Study of the Impact of Graphical Models on Inference-based
                  Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/671},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenRO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosFMOS18,
  author       = {Joppe W. Bos and
                  Simon Friedberger and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Assessing the Feasibility of Single Trace Power Analysis of Frodo},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosFMOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoOCX18,
  author       = {Si Gao and
                  Elisabeth Oswald and
                  Hua Chen and
                  Wei Xi},
  title        = {Non-profiled Mask Recovery: the impact of Independent Component Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {871},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/871},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoOCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoRO18,
  author       = {Si Gao and
                  Arnab Roy and
                  Elisabeth Oswald},
  title        = {Constructing TI-friendly Substitution Boxes using Shift-Invariant
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {949},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/949},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoRO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosFMOS18a,
  author       = {Joppe W. Bos and
                  Simon Friedberger and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Fly, you fool! Faster Frodo for the {ARM} Cortex-M4},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1116},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosFMOS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Barwell0OS17,
  author       = {Guy Barwell and
                  Daniel P. Martin and
                  Elisabeth Oswald and
                  Martijn Stam},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Authenticated Encryption in the Face of Protocol and Side Channel
                  Leakage},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {693--723},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_24},
  doi          = {10.1007/978-3-319-70694-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Barwell0OS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ZhouWOSW17,
  author       = {Xinping Zhou and
                  Carolyn Whitnall and
                  Elisabeth Oswald and
                  Degang Sun and
                  Zhu Wang},
  editor       = {Thomas Eisenbarth and
                  Yannick Teglia},
  title        = {A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel
                  Distinguisher},
  booktitle    = {Smart Card Research and Advanced Applications - 16th International
                  Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10728},
  pages        = {70--87},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75208-2\_5},
  doi          = {10.1007/978-3-319-75208-2\_5},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/ZhouWOSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/McCannO17,
  author       = {David McCann and
                  Elisabeth Oswald},
  title        = {Practical evaluation of masking software countermeasures on an IoT
                  processor},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031536},
  doi          = {10.1109/IVSW.2017.8031536},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/McCannO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/0001MOS17,
  author       = {Daniel P. Martin and
                  Ashley Montanaro and
                  Elisabeth Oswald and
                  Daniel James Shepherd},
  editor       = {Carlisle Adams and
                  Jan Camenisch},
  title        = {Quantum Key Search with Side Channel Advice},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
                  Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10719},
  pages        = {407--422},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72565-9\_21},
  doi          = {10.1007/978-3-319-72565-9\_21},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/0001MOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ZhouWOSW17,
  author       = {Xinping Zhou and
                  Carolyn Whitnall and
                  Elisabeth Oswald and
                  Degang Sun and
                  Zhu Wang},
  editor       = {Carlisle Adams and
                  Jan Camenisch},
  title        = {Categorising and Comparing Cluster-Based {DPA} Distinguishers},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
                  Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10719},
  pages        = {442--458},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72565-9\_23},
  doi          = {10.1007/978-3-319-72565-9\_23},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ZhouWOSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McCannOW17,
  author       = {David McCann and
                  Elisabeth Oswald and
                  Carolyn Whitnall},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Towards Practical Tools for Side Channel Aware Software Engineering:
                  'Grey Box' Modelling for Instruction Leakages},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {199--216},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/mccann},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/McCannOW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarwellMOS17,
  author       = {Guy Barwell and
                  Daniel P. Martin and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Authenticated Encryption in the Face of Protocol and Side Channel
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarwellMOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinMOS17,
  author       = {Daniel P. Martin and
                  Ashley Montanaro and
                  Elisabeth Oswald and
                  Dan J. Shepherd},
  title        = {Quantum Key Search with Side Channel Advice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinMOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YanOT17,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Theo Tryfonas},
  title        = {Exploring Potential 6LoWPAN Traffic Side Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/316},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YanOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCannO17,
  author       = {David McCann and
                  Elisabeth Oswald},
  title        = {Practical Evaluation of Masking Software Countermeasures on an IoT
                  processor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCannO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouWOSW17,
  author       = {Xinping Zhou and
                  Carolyn Whitnall and
                  Elisabeth Oswald and
                  Degang Sun and
                  Zhu Wang},
  title        = {Categorising and Comparing Cluster-Based {DPA} Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {764},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/764},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouWOSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouWOSW17a,
  author       = {Xinping Zhou and
                  Carolyn Whitnall and
                  Elisabeth Oswald and
                  Degang Sun and
                  Zhu Wang},
  title        = {A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel
                  Distinguisher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1051},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1051},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouWOSW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001MOS16,
  author       = {Daniel P. Martin and
                  Luke Mather and
                  Elisabeth Oswald and
                  Martijn Stam},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Characterisation and Estimation of the Key Rank Distribution in the
                  Context of Side Channel Evaluations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {548--572},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_20},
  doi          = {10.1007/978-3-662-53887-6\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0001MOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/YanOT16,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Theo Tryfonas},
  title        = {Cryptographic randomness on a {CC2538:} {A} case study},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823912},
  doi          = {10.1109/WIFS.2016.7823912},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/YanOT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2016,
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0},
  doi          = {10.1007/978-3-319-43283-0},
  isbn         = {978-3-319-43282-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001MOS16,
  author       = {Daniel P. Martin and
                  Luke Mather and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Characterisation and Estimation of the Key Rank Distribution in the
                  Context of Side Channel Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001MOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCannWO16,
  author       = {David McCann and
                  Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {{ELMO:} Emulating Leaks for the {ARM} Cortex-M0 without Access to
                  a Side Channel Lab},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCannWO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Longo0MOSS16,
  author       = {Jake Longo and
                  Daniel P. Martin and
                  Luke Mather and
                  Elisabeth Oswald and
                  Benjamin Sach and
                  Martijn Stam},
  title        = {How low can you go? Using side-channel data to enhance brute-force
                  key recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Longo0MOSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YanOT16,
  author       = {Yan Yan and
                  Elisabeth Oswald and
                  Theo Tryfonas},
  title        = {Cryptographic Randomness on a {CC2538:} a Case Study},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1021},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YanOT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MartinOOS15,
  author       = {Daniel P. Martin and
                  Jonathan F. O'Connell and
                  Elisabeth Oswald and
                  Martijn Stam},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Counting Keys in Parallel After a Side Channel Attack},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {313--337},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_13},
  doi          = {10.1007/978-3-662-48800-3\_13},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MartinOOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WhitnallO15,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Robust Profiling for DPA-Style Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_1},
  doi          = {10.1007/978-3-662-48324-4\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/WhitnallO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BanciuOW15,
  author       = {Valentina Banciu and
                  Elisabeth Oswald and
                  Carolyn Whitnall},
  editor       = {Stefan Mangard and
                  Axel Y. Poschmann},
  title        = {Exploring the Resilience of Some Lightweight Ciphers Against Profiled
                  Single Trace Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 6th International
                  Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9064},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21476-4\_4},
  doi          = {10.1007/978-3-319-21476-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BanciuOW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BanciuOW15,
  author       = {Valentina Banciu and
                  Elisabeth Oswald and
                  Carolyn Whitnall},
  editor       = {Wolfgang Nebel and
                  David Atienza},
  title        = {Reliable information extraction for single trace attacks},
  booktitle    = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
                  Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
                  9-13, 2015},
  pages        = {133--138},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2755783},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/BanciuOW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MartinOSW15,
  author       = {Daniel P. Martin and
                  Elisabeth Oswald and
                  Martijn Stam and
                  Marcin W{\'{o}}jcik},
  editor       = {Jens Groth},
  title        = {A Leakage Resilient {MAC}},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {295--310},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_18},
  doi          = {10.1007/978-3-319-27239-9\_18},
  timestamp    = {Wed, 18 Mar 2020 16:00:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MartinOSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siot/McCannEO15,
  author       = {David McCann and
                  Kerstin Eder and
                  Elisabeth Oswald},
  editor       = {Gabriel Ghinita and
                  Pedro Peris{-}Lopez},
  title        = {Characterising and Comparing the Energy Consumption of Side Channel
                  Attack Countermeasures and Lightweight Cryptography on Embedded Devices},
  booktitle    = {2015 International Workshop on Secure Internet of Things, SIoT 2015,
                  Vienna, Austria, September 21-25, 2015},
  pages        = {65--71},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SIOT.2015.11},
  doi          = {10.1109/SIOT.2015.11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/siot/McCannEO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-1,
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5},
  doi          = {10.1007/978-3-662-46800-5},
  isbn         = {978-3-662-46799-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2015-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-2,
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6},
  doi          = {10.1007/978-3-662-46803-6},
  isbn         = {978-3-662-46802-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2015-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanciuOW15,
  author       = {Valentina Banciu and
                  Elisabeth Oswald and
                  Carolyn Whitnall},
  title        = {Reliable Information Extraction for Single Trace Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanciuOW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanciuOW15a,
  author       = {Valentina Banciu and
                  Elisabeth Oswald and
                  Carolyn Whitnall},
  title        = {Exploring the Resilience of Some Lightweight Ciphers Against Pro led
                  Single Trace Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanciuOW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallO15,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {Robust Profiling for DPA-Style Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinOOS15,
  author       = {Daniel P. Martin and
                  Jonathan F. O'Connell and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {How to Enumerate Your Keys Accurately and Efficiently After a Side
                  Channel Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {689},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/689},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinOOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCannEO15,
  author       = {David McCann and
                  Kerstin Eder and
                  Elisabeth Oswald},
  title        = {Characterising and Comparing the Energy Consumption of Side Channel
                  Attack Countermeasures and Lightweight Cryptography on Embedded Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {832},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/832},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCannEO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GaleaMOPST14,
  author       = {Jake Longo and
                  Daniel P. Martin and
                  Elisabeth Oswald and
                  Daniel Page and
                  Martijn Stam and
                  Michael Tunstall},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Simulatable Leakage: Analysis, Pitfalls, and New Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {223--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_12},
  doi          = {10.1007/978-3-662-45611-8\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GaleaMOPST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MatherOW14,
  author       = {Luke Mather and
                  Elisabeth Oswald and
                  Carolyn Whitnall},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Multi-target {DPA} Attacks: Pushing {DPA} Beyond the Limits of a Desktop
                  Computer},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {243--261},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_13},
  doi          = {10.1007/978-3-662-45611-8\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MatherOW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BanciuO14,
  author       = {Valentina Banciu and
                  Elisabeth Oswald},
  editor       = {Emmanuel Prouff},
  title        = {Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power
                  Attacks on {AES}},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {29--40},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_3},
  doi          = {10.1007/978-3-319-10175-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BanciuO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WhitnallOS14,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Josh Benaloh},
  title        = {The Myth of Generic DPA...and the Magic of Learning},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {183--205},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_10},
  doi          = {10.1007/978-3-319-04852-9\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WhitnallOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2014,
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5},
  doi          = {10.1007/978-3-642-55220-5},
  isbn         = {978-3-642-55219-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanciuO14,
  author       = {Valentina Banciu and
                  Elisabeth Oswald},
  title        = {Pragmatism vs. Elegance: comparing two approaches to Simple Power
                  Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanciuO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaleaMOPS14,
  author       = {Jake Longo Galea and
                  Daniel P. Martin and
                  Elisabeth Oswald and
                  Daniel Page and
                  Martijn Stam},
  title        = {Making and Breaking Leakage Simulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaleaMOPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatherOW14,
  author       = {Luke Mather and
                  Elisabeth Oswald and
                  Carolyn Whitnall},
  title        = {Multi-target {DPA} attacks: Pushing {DPA} beyond the limits of a desktop
                  computer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatherOW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MatherOBW13,
  author       = {Luke Mather and
                  Elisabeth Oswald and
                  Joe Bandenburg and
                  Marcin W{\'{o}}jcik},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Does My Device Leak Information? An a priori Statistical Power Analysis
                  of Leakage Detection Tests},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {486--505},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_25},
  doi          = {10.1007/978-3-642-42033-7\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MatherOBW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WhitnallO13,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Profiling {DPA:} Efficacy and Efficiency Trade-Offs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_3},
  doi          = {10.1007/978-3-642-40349-1\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/WhitnallO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/TunstallWO13,
  author       = {Michael Tunstall and
                  Carolyn Whitnall and
                  Elisabeth Oswald},
  editor       = {Shiho Moriai},
  title        = {Masking Tables - An Underestimated Security Risk},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {425--444},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_22},
  doi          = {10.1007/978-3-662-43933-3\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/TunstallWO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinOS13,
  author       = {Daniel P. Martin and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {A Leakage Resilient {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatherOBW13,
  author       = {Luke Mather and
                  Elisabeth Oswald and
                  Joe Bandenburg and
                  Marcin W{\'{o}}jcik},
  title        = {A Comparison of Statistical Techniques for Detecting Side-Channel
                  Information Leakage in Cryptographic Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatherOBW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallO13,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {Profiling {DPA:} Efficacy and efficiency trade-offs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TunstallWO13,
  author       = {Michael Tunstall and
                  Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {Masking Tables - An Underestimated Security Risk},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {735},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/735},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TunstallWO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MatherO12,
  author       = {Luke Mather and
                  Elisabeth Oswald},
  title        = {Pinpointing side-channel information leaks in web applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {161--177},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0036-0},
  doi          = {10.1007/S13389-012-0036-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MatherO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MossOPT12,
  author       = {Andrew Moss and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Compiler Assisted Masking},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {58--75},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_4},
  doi          = {10.1007/978-3-642-33027-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MossOPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/OswaldS12,
  author       = {Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Side-Channel Analysis and Its Relevance to Fault Attacks},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_1},
  doi          = {10.1007/978-3-642-29656-7\_1},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/OswaldS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallOS12,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {The myth of generic DPA...and the magic of learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatherO12,
  author       = {Luke Mather and
                  Elisabeth Oswald},
  title        = {Quantifying Side-Channel Information Leakage from Web Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatherO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MangardOS11,
  author       = {Stefan Mangard and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {One for all - all for one: unifying standard differential power analysis
                  attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {100--110},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0096},
  doi          = {10.1049/IET-IFS.2010.0096},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/MangardOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WhitnallO11,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {A fair evaluation framework for comparing side-channel distinguishers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {145--160},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0011-1},
  doi          = {10.1007/S13389-011-0011-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WhitnallO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/WhitnallOM11,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald and
                  Luke Mather},
  editor       = {Emmanuel Prouff},
  title        = {An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual
                  Information Analysis},
  booktitle    = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2011, Leuven, Belgium, September
                  14-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7079},
  pages        = {234--251},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27257-8\_15},
  doi          = {10.1007/978-3-642-27257-8\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/WhitnallOM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WhitnallO11,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  editor       = {Phillip Rogaway},
  title        = {A Comprehensive Evaluation of Mutual Information Analysis Using a
                  Fair Evaluation Framework},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {316--334},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_18},
  doi          = {10.1007/978-3-642-22792-9\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WhitnallO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallO11,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {A Comprehensive Evaluation of Mutual Information Analysis Using a
                  Fair Evaluation Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallOM11,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald and
                  Luke Mather},
  title        = {An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual
                  Information Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallOM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallO11a,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {A Fair Evaluation Framework for Comparing Side-Channel Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallO11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MossOPT11,
  author       = {Andrew Moss and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  title        = {Automatic Insertion of {DPA} Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MossOPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  editor       = {Masayuki Abe},
  title        = {The World Is Not Enough: Another Look on Second-Order {DPA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_7},
  doi          = {10.1007/978-3-642-17373-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/OswaldM10,
  author       = {Elisabeth Oswald and
                  Stefan Mangard},
  editor       = {Ingrid M. R. Verbauwhede},
  title        = {Counteracting Power Analysis Attacks by Masking},
  booktitle    = {Secure Integrated Circuits and Systems},
  series       = {Integrated Circuits and Systems},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-71829-3\_9},
  doi          = {10.1007/978-0-387-71829-3\_9},
  timestamp    = {Wed, 26 Jun 2019 18:00:01 +0200},
  biburl       = {https://dblp.org/rec/books/sp/10/OswaldM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/StandaertPYQYO10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu and
                  Jean{-}Jacques Quisquater and
                  Moti Yung and
                  Elisabeth Oswald},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Leakage Resilient Cryptography in Practice},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {99--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_5},
  doi          = {10.1007/978-3-642-14452-3\_5},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  title        = {The World is Not Enough: Another Look on Second-Order {DPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GrossschadlOPT09,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Side-Channel Analysis of Cryptographic Software via Early-Terminating
                  Multiplications},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {176--192},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_13},
  doi          = {10.1007/978-3-642-14423-3\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GrossschadlOPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2009,
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5412677/proceeding},
  isbn         = {978-0-7695-3824-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertPYQYO09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu and
                  Jean{-}Jacques Quisquater and
                  Moti Yung and
                  Elisabeth Oswald},
  title        = {Leakage Resilient Cryptography in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertPYQYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MangardOS09,
  author       = {Stefan Mangard and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {One for All - All for One: Unifying Standard {DPA} Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MangardOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossschadlOPT09,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  title        = {Side-Channel Analysis of Cryptographic Software via Early-Terminating
                  Multiplications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossschadlOPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SmartOP08,
  author       = {Nigel P. Smart and
                  Elisabeth Oswald and
                  Daniel Page},
  title        = {Randomised representations},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {19--27},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070017},
  doi          = {10.1049/IET-IFS:20070017},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SmartOP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MedwedO08,
  author       = {Marcel Medwed and
                  Elisabeth Oswald},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Template Attacks on {ECDSA}},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_2},
  doi          = {10.1007/978-3-642-00306-6\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MedwedO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2008,
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3},
  doi          = {10.1007/978-3-540-85053-3},
  isbn         = {978-3-540-85052-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MedwedO08,
  author       = {Marcel Medwed and
                  Elisabeth Oswald},
  title        = {Template Attacks on {ECDSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MedwedO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0017272,
  author       = {Stefan Mangard and
                  Elisabeth Oswald and
                  Thomas Popp},
  title        = {Power analysis attacks - revealing the secrets of smart cards},
  publisher    = {Springer},
  year         = {2007},
  isbn         = {978-0-387-30857-9},
  timestamp    = {Mon, 21 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0017272.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/PoppMO07,
  author       = {Thomas Popp and
                  Stefan Mangard and
                  Elisabeth Oswald},
  title        = {Power Analysis Attacks and Countermeasures},
  journal      = {{IEEE} Des. Test Comput.},
  volume       = {24},
  number       = {6},
  pages        = {535--543},
  year         = {2007},
  url          = {https://doi.org/10.1109/MDT.2007.200},
  doi          = {10.1109/MDT.2007.200},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/PoppMO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/OswaldM07,
  author       = {Elisabeth Oswald and
                  Stefan Mangard},
  editor       = {Masayuki Abe},
  title        = {Template Attacks on Masking - Resistance Is Futile},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {243--256},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_16},
  doi          = {10.1007/11967668\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/OswaldM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HerbstOM06,
  author       = {Christoph Herbst and
                  Elisabeth Oswald and
                  Stefan Mangard},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {An {AES} Smart Card Implementation Resistant to Power Analysis Attacks},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {239--252},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_16},
  doi          = {10.1007/11767480\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HerbstOM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/OswaldMHT06,
  author       = {Elisabeth Oswald and
                  Stefan Mangard and
                  Christoph Herbst and
                  Stefan Tillich},
  editor       = {David Pointcheval},
  title        = {Practical Second-Order {DPA} Attacks for Masked Smart Card Implementations
                  of Block Ciphers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {192--207},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_13},
  doi          = {10.1007/11605805\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/OswaldMHT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SchlafferO06,
  author       = {Martin Schl{\"{a}}ffer and
                  Elisabeth Oswald},
  editor       = {Matthew J. B. Robshaw},
  title        = {Searching for Differential Paths in {MD4}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {242--261},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_16},
  doi          = {10.1007/11799313\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SchlafferO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YooHMOM06,
  author       = {HyungSo Yoo and
                  Christoph Herbst and
                  Stefan Mangard and
                  Elisabeth Oswald and
                  Sang{-}Jae Moon},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Investigations of Power Analysis Attacks and Countermeasures for {ARIA}},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {160--172},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_13},
  doi          = {10.1007/978-3-540-71093-6\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YooHMOM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MangardPO05,
  author       = {Stefan Mangard and
                  Norbert Pramstaller and
                  Elisabeth Oswald},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Successfully Attacking Masked {AES} Hardware Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {157--171},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_12},
  doi          = {10.1007/11545262\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MangardPO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/RijmenO05,
  author       = {Vincent Rijmen and
                  Elisabeth Oswald},
  editor       = {Alfred Menezes},
  title        = {Update on {SHA-1}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {58--71},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_6},
  doi          = {10.1007/978-3-540-30574-3\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/RijmenO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OswaldMPR05,
  author       = {Elisabeth Oswald and
                  Stefan Mangard and
                  Norbert Pramstaller and
                  Vincent Rijmen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A Side-Channel Analysis Resistant Description of the {AES} S-Box},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {413--423},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_28},
  doi          = {10.1007/11502760\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OswaldMPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OswaldS05,
  author       = {Elisabeth Oswald and
                  Kai Schramm},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {An Efficient Masking Scheme for {AES} Software Implementations},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {292--305},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_23},
  doi          = {10.1007/11604938\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OswaldS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RijmenO05,
  author       = {Vincent Rijmen and
                  Elisabeth Oswald},
  title        = {Update on {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RijmenO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/RijmenO04,
  author       = {Vincent Rijmen and
                  Elisabeth Oswald},
  editor       = {Hans Dobbertin and
                  Vincent Rijmen and
                  Aleksandra Sowa},
  title        = {Representations and Rijndael Descriptions},
  booktitle    = {Advanced Encryption Standard - AES, 4th International Conference,
                  {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3373},
  pages        = {148--158},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11506447\_13},
  doi          = {10.1007/11506447\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/RijmenO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/OrsGOP04,
  author       = {Siddika Berna {\"{O}}rs and
                  Frank K. G{\"{u}}rkaynak and
                  Elisabeth Oswald and
                  Bart Preneel},
  title        = {Power-Analysis Attack on an {ASIC} {AES} implementation},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {546--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286711},
  doi          = {10.1109/ITCC.2004.1286711},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/OrsGOP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RechbergerO04,
  author       = {Christian Rechberger and
                  Elisabeth Oswald},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Practical Template Attacks},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {440--456},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_35},
  doi          = {10.1007/978-3-540-31815-6\_35},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/RechbergerO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OswaldMP04,
  author       = {Elisabeth Oswald and
                  Stefan Mangard and
                  Norbert Pramstaller},
  title        = {Secure and Efficient Masking of {AES} - {A} Mission Impossible?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OswaldMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrsOP03,
  author       = {Siddika Berna {\"{O}}rs and
                  Elisabeth Oswald and
                  Bart Preneel},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Power-Analysis Attacks on an {FPGA} - First Experimental Results},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_4},
  doi          = {10.1007/978-3-540-45238-6\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrsOP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Oswald02,
  author       = {Elisabeth Oswald},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_8},
  doi          = {10.1007/3-540-36400-5\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Oswald02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WolkerstorferOL02,
  author       = {Johannes Wolkerstorfer and
                  Elisabeth Oswald and
                  Mario Lamberger},
  editor       = {Bart Preneel},
  title        = {An {ASIC} Implementation of the {AES} SBoxes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {67--78},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_6},
  doi          = {10.1007/3-540-45760-7\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WolkerstorferOL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OswaldA01,
  author       = {Elisabeth Oswald and
                  Manfred Josef Aigner},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Randomized Addition-Subtraction Chains as a Countermeasure against
                  Power Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_5},
  doi          = {10.1007/3-540-44709-1\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OswaldA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}