default search action
BibTeX records: Elisabeth Oswald
@inproceedings{DBLP:conf/cosade/MarquetO24, author = {Thomas Marquet and Elisabeth Oswald}, editor = {Romain Wacquez and Naofumi Homma}, title = {Exploring Multi-task Learning in the Context of Masked {AES} Implementations}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, {COSADE} 2024, Gardanne, France, April 9-10, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14595}, pages = {93--112}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57543-3\_6}, doi = {10.1007/978-3-031-57543-3\_6}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MarquetO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChowdhuryRBO24, author = {Aakash Chowdhury and Arnab Roy and Carlo Brunetta and Elisabeth Oswald}, editor = {Leonid Reyzin and Douglas Stebila}, title = {Leakage Certification Made Simple}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14925}, pages = {427--460}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68391-6\_13}, doi = {10.1007/978-3-031-68391-6\_13}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChowdhuryRBO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaoO24, author = {Si Gao and Elisabeth Oswald}, editor = {Marc Joye and Gregor Leander}, title = {A Novel Framework for Explainable Leakage Assessment}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {221--250}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_8}, doi = {10.1007/978-3-031-58734-4\_8}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaoO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2024, editor = {Elisabeth Oswald}, title = {Topics in Cryptology - {CT-RSA} 2024 - Cryptographers' Track at the {RSA} Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14643}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58868-6}, doi = {10.1007/978-3-031-58868-6}, isbn = {978-3-031-58867-9}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MarquetO23, author = {Thomas Marquet and Elisabeth Oswald}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {A Comparison of Multi-task Learning and Single-Task Learning Approaches}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {121--138}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_7}, doi = {10.1007/978-3-031-41181-6\_7}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/acns/MarquetO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YanOR23, author = {Yan Yan and Elisabeth Oswald and Arnab Roy}, editor = {Hwajeong Seo and Suhri Kim}, title = {Not Optimal but Efficient: {A} Distinguisher Based on the Kruskal-Wallis Test}, booktitle = {Information Security and Cryptology - {ICISC} 2023 - 26th International Conference on Information Security and Cryptology, {ICISC} 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14561}, pages = {240--258}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1235-9\_13}, doi = {10.1007/978-981-97-1235-9\_13}, timestamp = {Wed, 13 Mar 2024 19:10:54 +0100}, biburl = {https://dblp.org/rec/conf/icisc/YanOR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarquetO23, author = {Thomas Marquet and Elisabeth Oswald}, title = {Exploring multi-task learning in the context of two masked {AES} implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2023}, url = {https://eprint.iacr.org/2023/006}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MarquetO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarquetO23a, author = {Thomas Marquet and Elisabeth Oswald}, title = {A Comparison of Multi-task learning and Single-task learning Approaches}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2023}, url = {https://eprint.iacr.org/2023/611}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarquetO23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00180O23, author = {Yan Yan and Arnab Roy and Elisabeth Oswald}, title = {Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1160}, year = {2023}, url = {https://eprint.iacr.org/2023/1160}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00180O23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/YoungMO22, author = {Rebecca Young and Luke Mather and Elisabeth Oswald}, editor = {Ileana Buhan and Tobias Schneider}, title = {Comparing Key Rank Estimation Methods}, booktitle = {Smart Card Research and Advanced Applications - 21st International Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13820}, pages = {188--204}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25319-5\_10}, doi = {10.1007/978-3-031-25319-5\_10}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/YoungMO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaoO22, author = {Si Gao and Elisabeth Oswald}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {254--283}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_10}, doi = {10.1007/978-3-031-07082-2\_10}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaoO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaoOP22, author = {Si Gao and Elisabeth Oswald and Dan Page}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {284--311}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_11}, doi = {10.1007/978-3-031-07082-2\_11}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaoOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoO22, author = {Si Gao and Elisabeth Oswald}, title = {A Novel Framework for Explainable Leakage Assessment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2022}, url = {https://eprint.iacr.org/2022/182}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GaoO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0005CO22, author = {Arnab Roy and Aakash Chowdhury and Elisabeth Oswald}, title = {Consistent, Efficient and Leakage-Model Free Mutual Information Estimation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1201}, year = {2022}, url = {https://eprint.iacr.org/2022/1201}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/0005CO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoungMO22, author = {Rebecca Young and Luke Mather and Elisabeth Oswald}, title = {Comparing Key Rank Estimation Methods}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1282}, year = {2022}, url = {https://eprint.iacr.org/2022/1282}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoungMO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HoweMOR21, author = {James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni}, title = {Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {4}, pages = {317--327}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00258-7}, doi = {10.1007/S13389-021-00258-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HoweMOR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GaoOY21, author = {Si Gao and Elisabeth Oswald and Yan Yan}, title = {Neyman's Smoothness Test: {A} Trade-Off Between Moment-Based and Distribution-Based Leakage Detections}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4494--4506}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3108570}, doi = {10.1109/TIFS.2021.3108570}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GaoOY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0018O021, author = {Yan Yan and Elisabeth Oswald and Srinivas Vivek}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {An Analytic Attack against {ARX} Addition Exploiting Standard Side-channel Leakage}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {89--97}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010223600890097}, doi = {10.5220/0010223600890097}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/0018O021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoweMOR21, author = {James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni}, title = {Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2021}, url = {https://eprint.iacr.org/2021/155}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HoweMOR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoO21, author = {Si Gao and Elisabeth Oswald}, title = {A Novel Completeness Test and its Application to Side Channel Attacks and Simulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2021}, url = {https://eprint.iacr.org/2021/756}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoOP21, author = {Si Gao and Elisabeth Oswald and Dan Page}, title = {Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2021}, url = {https://eprint.iacr.org/2021/794}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoOP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoOY21, author = {Si Gao and Elisabeth Oswald and Yan Yan}, title = {Neyman's Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1039}, year = {2021}, url = {https://eprint.iacr.org/2021/1039}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoOY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GaoMPO20, author = {Si Gao and Ben Marshall and Dan Page and Elisabeth Oswald}, title = {Share-slicing: Friend or Foe?}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {152--174}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.152-174}, doi = {10.13154/TCHES.V2020.I1.152-174}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/GaoMPO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/AzouaouiBBDD0JK20, author = {Melissa Azouaoui and Davide Bellizia and Ileana Buhan and Nicolas Debande and S{\'{e}}bastien Duval and Christophe Giraud and {\'{E}}liane Jaulmes and Fran{\c{c}}ois Koeune and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert and Carolyn Whitnall}, editor = {Thyla van der Merwe and Chris J. Mitchell and Maryam Mehrnezhad}, title = {A Systematic Appraisal of Side Channel Evaluation Strategies}, booktitle = {Security Standardisation Research - 6th International Conference, {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12529}, pages = {46--66}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64357-7\_3}, doi = {10.1007/978-3-030-64357-7\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/AzouaouiBBDD0JK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2020, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7}, doi = {10.1007/978-3-030-65277-7}, isbn = {978-3-030-65276-0}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzouaouiBBDDGJK20, author = {Melissa Azouaoui and Davide Bellizia and Ileana Buhan and Nicolas Debande and S{\'{e}}bastien Duval and Christophe Giraud and {\'{E}}liane Jaulmes and Fran{\c{c}}ois Koeune and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert and Carolyn Whitnall}, title = {A Systematic Appraisal of Side Channel Evaluation Strategies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1347}, year = {2020}, url = {https://eprint.iacr.org/2020/1347}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AzouaouiBBDDGJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YanOV20, author = {Yan Yan and Elisabeth Oswald and Srinivas Vivek}, title = {An Analytic Attack Against {ARX} Addition Exploiting Standard Side-Channel Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1455}, year = {2020}, url = {https://eprint.iacr.org/2020/1455}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YanOV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WhitnallO19, author = {Carolyn Whitnall and Elisabeth Oswald}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {A Critical Analysis of {ISO} 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules')}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {256--284}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_9}, doi = {10.1007/978-3-030-34618-8\_9}, timestamp = {Fri, 22 Nov 2019 13:53:07 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WhitnallO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/YanO19, author = {Yan Yan and Elisabeth Oswald}, editor = {Francesca Palumbo and Michela Becchi and Martin Schulz and Kento Sato}, title = {Examining the practical side channel resilience of ARX-boxes}, booktitle = {Proceedings of the 16th {ACM} International Conference on Computing Frontiers, {CF} 2019, Alghero, Italy, April 30 - May 2, 2019}, pages = {373--379}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3310273.3323399}, doi = {10.1145/3310273.3323399}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cf/YanO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GaoRO19, author = {Si Gao and Arnab Roy and Elisabeth Oswald}, editor = {Mitsuru Matsui}, title = {Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {433--452}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_22}, doi = {10.1007/978-3-030-12612-4\_22}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/GaoRO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/HoweKMRO19, author = {James Howe and Ayesha Khalid and Marco Martinoli and Francesco Regazzoni and Elisabeth Oswald}, title = {Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2019, Sapporo, Japan, May 26-29, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCAS.2019.8702794}, doi = {10.1109/ISCAS.2019.8702794}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/HoweKMRO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoweKMRO19, author = {James Howe and Ayesha Khalid and Marco Martinoli and Francesco Regazzoni and Elisabeth Oswald}, title = {Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2019}, url = {https://eprint.iacr.org/2019/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoweKMRO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YanO19, author = {Yan Yan and Elisabeth Oswald}, title = {Examining the Practical Side Channel Resilience of ARX-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2019}, url = {https://eprint.iacr.org/2019/335}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YanO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallO19, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2019}, url = {https://eprint.iacr.org/2019/703}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallO19a, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Critical Analysis of {ISO} 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1013}, year = {2019}, url = {https://eprint.iacr.org/2019/1013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallO19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenBO19, author = {Joey Green and Tilo Burghardt and Elisabeth Oswald}, title = {Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1068}, year = {2019}, url = {https://eprint.iacr.org/2019/1068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreenBO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Green0O18, author = {Joey Green and Arnab Roy and Elisabeth Oswald}, editor = {Beg{\"{u}}l Bilgin and Jean{-}Bernard Fischer}, title = {A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on {AES}}, booktitle = {Smart Card Research and Advanced Applications, 17th International Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11389}, pages = {18--34}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15462-2\_2}, doi = {10.1007/978-3-030-15462-2\_2}, timestamp = {Sat, 30 Sep 2023 09:35:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Green0O18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GaoOCX18, author = {Si Gao and Elisabeth Oswald and Hua Chen and Wei Xi}, editor = {Beg{\"{u}}l Bilgin and Jean{-}Bernard Fischer}, title = {Non-profiled Mask Recovery: The Impact of Independent Component Analysis}, booktitle = {Smart Card Research and Advanced Applications, 17th International Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11389}, pages = {51--64}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15462-2\_4}, doi = {10.1007/978-3-030-15462-2\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/GaoOCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/0001MO18, author = {Daniel P. Martin and Luke Mather and Elisabeth Oswald}, editor = {Nigel P. Smart}, title = {Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {394--412}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_21}, doi = {10.1007/978-3-319-76953-0\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/0001MO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/YanOT18, author = {Yan Yan and Elisabeth Oswald and Theo Tryfonas}, editor = {Domenico Giustiniano and Dimitrios Koutsonikolas and Albert Banchs and Enzo Mingozzi and Kaushik Roy Chowdhury}, title = {Exploring Potential 6LoWPAN Traffic Side Channels}, booktitle = {Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, {EWSN} 2018. Madrid, Spain, February 14-16, 2018}, pages = {270--275}, publisher = {Junction Publishing, Canada/ {ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3234911}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ewsn/YanOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BosFMOS18, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Assessing the Feasibility of Single Trace Power Analysis of Frodo}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {216--234}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_10}, doi = {10.1007/978-3-030-10970-7\_10}, timestamp = {Wed, 25 Sep 2019 18:08:16 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BosFMOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/KalliopiWWTOMVP18, author = {Kalliopi Anastasopoulou and Emma J. Williams and Carolyn Whitnall and Theo Tryfonas and Elisabeth Oswald and Phillip L. Morgan and Alexandra Voinescu and Robert J. Piechocki and Andrea Tassi}, editor = {Giampaolo Bella and Gabriele Lenzini and Theo Tryfonas and Debi Ashenden}, title = {Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use}, booktitle = {{STAST} 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018}, pages = {5:1--5:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3361331.3361336}, doi = {10.1145/3361331.3361336}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/KalliopiWWTOMVP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001MO18, author = {Daniel P. Martin and Luke Mather and Elisabeth Oswald}, title = {Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2018}, url = {http://eprint.iacr.org/2018/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001MO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenRO18, author = {Joey Green and Arnab Roy and Elisabeth Oswald}, title = {A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2018}, url = {https://eprint.iacr.org/2018/671}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreenRO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosFMOS18, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, title = {Assessing the Feasibility of Single Trace Power Analysis of Frodo}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2018}, url = {https://eprint.iacr.org/2018/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosFMOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoOCX18, author = {Si Gao and Elisabeth Oswald and Hua Chen and Wei Xi}, title = {Non-profiled Mask Recovery: the impact of Independent Component Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2018}, url = {https://eprint.iacr.org/2018/871}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoOCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoRO18, author = {Si Gao and Arnab Roy and Elisabeth Oswald}, title = {Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {949}, year = {2018}, url = {https://eprint.iacr.org/2018/949}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoRO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosFMOS18a, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, title = {Fly, you fool! Faster Frodo for the {ARM} Cortex-M4}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1116}, year = {2018}, url = {https://eprint.iacr.org/2018/1116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosFMOS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Barwell0OS17, author = {Guy Barwell and Daniel P. Martin and Elisabeth Oswald and Martijn Stam}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Authenticated Encryption in the Face of Protocol and Side Channel Leakage}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {693--723}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_24}, doi = {10.1007/978-3-319-70694-8\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Barwell0OS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/ZhouWOSW17, author = {Xinping Zhou and Carolyn Whitnall and Elisabeth Oswald and Degang Sun and Zhu Wang}, editor = {Thomas Eisenbarth and Yannick Teglia}, title = {A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher}, booktitle = {Smart Card Research and Advanced Applications - 16th International Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10728}, pages = {70--87}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75208-2\_5}, doi = {10.1007/978-3-319-75208-2\_5}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/ZhouWOSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/McCannO17, author = {David McCann and Elisabeth Oswald}, title = {Practical evaluation of masking software countermeasures on an IoT processor}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031536}, doi = {10.1109/IVSW.2017.8031536}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/McCannO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/0001MOS17, author = {Daniel P. Martin and Ashley Montanaro and Elisabeth Oswald and Daniel James Shepherd}, editor = {Carlisle Adams and Jan Camenisch}, title = {Quantum Key Search with Side Channel Advice}, booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10719}, pages = {407--422}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72565-9\_21}, doi = {10.1007/978-3-319-72565-9\_21}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/0001MOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ZhouWOSW17, author = {Xinping Zhou and Carolyn Whitnall and Elisabeth Oswald and Degang Sun and Zhu Wang}, editor = {Carlisle Adams and Jan Camenisch}, title = {Categorising and Comparing Cluster-Based {DPA} Distinguishers}, booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10719}, pages = {442--458}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72565-9\_23}, doi = {10.1007/978-3-319-72565-9\_23}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/ZhouWOSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/McCannOW17, author = {David McCann and Elisabeth Oswald and Carolyn Whitnall}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {199--216}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/mccann}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/McCannOW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarwellMOS17, author = {Guy Barwell and Daniel P. Martin and Elisabeth Oswald and Martijn Stam}, title = {Authenticated Encryption in the Face of Protocol and Side Channel Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2017}, url = {http://eprint.iacr.org/2017/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarwellMOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinMOS17, author = {Daniel P. Martin and Ashley Montanaro and Elisabeth Oswald and Dan J. Shepherd}, title = {Quantum Key Search with Side Channel Advice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2017}, url = {http://eprint.iacr.org/2017/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinMOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YanOT17, author = {Yan Yan and Elisabeth Oswald and Theo Tryfonas}, title = {Exploring Potential 6LoWPAN Traffic Side Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2017}, url = {http://eprint.iacr.org/2017/316}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YanOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCannO17, author = {David McCann and Elisabeth Oswald}, title = {Practical Evaluation of Masking Software Countermeasures on an IoT processor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2017}, url = {http://eprint.iacr.org/2017/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCannO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouWOSW17, author = {Xinping Zhou and Carolyn Whitnall and Elisabeth Oswald and Degang Sun and Zhu Wang}, title = {Categorising and Comparing Cluster-Based {DPA} Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {764}, year = {2017}, url = {http://eprint.iacr.org/2017/764}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhouWOSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouWOSW17a, author = {Xinping Zhou and Carolyn Whitnall and Elisabeth Oswald and Degang Sun and Zhu Wang}, title = {A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1051}, year = {2017}, url = {http://eprint.iacr.org/2017/1051}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhouWOSW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0001MOS16, author = {Daniel P. Martin and Luke Mather and Elisabeth Oswald and Martijn Stam}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {548--572}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_20}, doi = {10.1007/978-3-662-53887-6\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/0001MOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/YanOT16, author = {Yan Yan and Elisabeth Oswald and Theo Tryfonas}, title = {Cryptographic randomness on a {CC2538:} {A} case study}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WIFS.2016.7823912}, doi = {10.1109/WIFS.2016.7823912}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/YanOT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2016, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0}, doi = {10.1007/978-3-319-43283-0}, isbn = {978-3-319-43282-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001MOS16, author = {Daniel P. Martin and Luke Mather and Elisabeth Oswald and Martijn Stam}, title = {Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2016}, url = {http://eprint.iacr.org/2016/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001MOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCannWO16, author = {David McCann and Carolyn Whitnall and Elisabeth Oswald}, title = {{ELMO:} Emulating Leaks for the {ARM} Cortex-M0 without Access to a Side Channel Lab}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2016}, url = {http://eprint.iacr.org/2016/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCannWO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Longo0MOSS16, author = {Jake Longo and Daniel P. Martin and Luke Mather and Elisabeth Oswald and Benjamin Sach and Martijn Stam}, title = {How low can you go? Using side-channel data to enhance brute-force key recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2016}, url = {http://eprint.iacr.org/2016/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Longo0MOSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YanOT16, author = {Yan Yan and Elisabeth Oswald and Theo Tryfonas}, title = {Cryptographic Randomness on a {CC2538:} a Case Study}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2016}, url = {http://eprint.iacr.org/2016/1021}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YanOT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MartinOOS15, author = {Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Counting Keys in Parallel After a Side Channel Attack}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {313--337}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_13}, doi = {10.1007/978-3-662-48800-3\_13}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MartinOOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WhitnallO15, author = {Carolyn Whitnall and Elisabeth Oswald}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Robust Profiling for DPA-Style Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {3--21}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_1}, doi = {10.1007/978-3-662-48324-4\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/WhitnallO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BanciuOW15, author = {Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall}, editor = {Stefan Mangard and Axel Y. Poschmann}, title = {Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9064}, pages = {51--63}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21476-4\_4}, doi = {10.1007/978-3-319-21476-4\_4}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BanciuOW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BanciuOW15, author = {Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall}, editor = {Wolfgang Nebel and David Atienza}, title = {Reliable information extraction for single trace attacks}, booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March 9-13, 2015}, pages = {133--138}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2755783}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/BanciuOW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/MartinOSW15, author = {Daniel P. Martin and Elisabeth Oswald and Martijn Stam and Marcin W{\'{o}}jcik}, editor = {Jens Groth}, title = {A Leakage Resilient {MAC}}, booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC} 2015, Oxford, UK, December 15-17, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9496}, pages = {295--310}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27239-9\_18}, doi = {10.1007/978-3-319-27239-9\_18}, timestamp = {Wed, 18 Mar 2020 16:00:58 +0100}, biburl = {https://dblp.org/rec/conf/ima/MartinOSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siot/McCannEO15, author = {David McCann and Kerstin Eder and Elisabeth Oswald}, editor = {Gabriel Ghinita and Pedro Peris{-}Lopez}, title = {Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices}, booktitle = {2015 International Workshop on Secure Internet of Things, SIoT 2015, Vienna, Austria, September 21-25, 2015}, pages = {65--71}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SIOT.2015.11}, doi = {10.1109/SIOT.2015.11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/siot/McCannEO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2015-1, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5}, doi = {10.1007/978-3-662-46800-5}, isbn = {978-3-662-46799-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2015-2, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6}, doi = {10.1007/978-3-662-46803-6}, isbn = {978-3-662-46802-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2015-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanciuOW15, author = {Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall}, title = {Reliable Information Extraction for Single Trace Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2015}, url = {http://eprint.iacr.org/2015/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanciuOW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanciuOW15a, author = {Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall}, title = {Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2015}, url = {http://eprint.iacr.org/2015/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanciuOW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallO15, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {Robust Profiling for DPA-Style Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2015}, url = {http://eprint.iacr.org/2015/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinOOS15, author = {Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam}, title = {How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2015}, url = {http://eprint.iacr.org/2015/689}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinOOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCannEO15, author = {David McCann and Kerstin Eder and Elisabeth Oswald}, title = {Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {832}, year = {2015}, url = {http://eprint.iacr.org/2015/832}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCannEO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GaleaMOPST14, author = {Jake Longo and Daniel P. Martin and Elisabeth Oswald and Daniel Page and Martijn Stam and Michael Tunstall}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Simulatable Leakage: Analysis, Pitfalls, and New Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {223--242}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_12}, doi = {10.1007/978-3-662-45611-8\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GaleaMOPST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MatherOW14, author = {Luke Mather and Elisabeth Oswald and Carolyn Whitnall}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Multi-target {DPA} Attacks: Pushing {DPA} Beyond the Limits of a Desktop Computer}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {243--261}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_13}, doi = {10.1007/978-3-662-45611-8\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MatherOW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BanciuO14, author = {Valentina Banciu and Elisabeth Oswald}, editor = {Emmanuel Prouff}, title = {Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on {AES}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {29--40}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_3}, doi = {10.1007/978-3-319-10175-0\_3}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BanciuO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WhitnallOS14, author = {Carolyn Whitnall and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Josh Benaloh}, title = {The Myth of Generic DPA...and the Magic of Learning}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {183--205}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_10}, doi = {10.1007/978-3-319-04852-9\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/WhitnallOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2014, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5}, doi = {10.1007/978-3-642-55220-5}, isbn = {978-3-642-55219-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanciuO14, author = {Valentina Banciu and Elisabeth Oswald}, title = {Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2014}, url = {http://eprint.iacr.org/2014/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanciuO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaleaMOPS14, author = {Jake Longo Galea and Daniel P. Martin and Elisabeth Oswald and Daniel Page and Martijn Stam}, title = {Making and Breaking Leakage Simulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2014}, url = {http://eprint.iacr.org/2014/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaleaMOPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatherOW14, author = {Luke Mather and Elisabeth Oswald and Carolyn Whitnall}, title = {Multi-target {DPA} attacks: Pushing {DPA} beyond the limits of a desktop computer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2014}, url = {http://eprint.iacr.org/2014/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatherOW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MatherOBW13, author = {Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin W{\'{o}}jcik}, editor = {Kazue Sako and Palash Sarkar}, title = {Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {486--505}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_25}, doi = {10.1007/978-3-642-42033-7\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MatherOBW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WhitnallO13, author = {Carolyn Whitnall and Elisabeth Oswald}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Profiling {DPA:} Efficacy and Efficiency Trade-Offs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {37--54}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_3}, doi = {10.1007/978-3-642-40349-1\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/WhitnallO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/TunstallWO13, author = {Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald}, editor = {Shiho Moriai}, title = {Masking Tables - An Underestimated Security Risk}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {425--444}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_22}, doi = {10.1007/978-3-662-43933-3\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/TunstallWO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinOS13, author = {Daniel P. Martin and Elisabeth Oswald and Martijn Stam}, title = {A Leakage Resilient {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2013}, url = {http://eprint.iacr.org/2013/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatherOBW13, author = {Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin W{\'{o}}jcik}, title = {A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2013}, url = {http://eprint.iacr.org/2013/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatherOBW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallO13, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {Profiling {DPA:} Efficacy and efficiency trade-offs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2013}, url = {http://eprint.iacr.org/2013/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TunstallWO13, author = {Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald}, title = {Masking Tables - An Underestimated Security Risk}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {735}, year = {2013}, url = {http://eprint.iacr.org/2013/735}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TunstallWO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MatherO12, author = {Luke Mather and Elisabeth Oswald}, title = {Pinpointing side-channel information leaks in web applications}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {3}, pages = {161--177}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0036-0}, doi = {10.1007/S13389-012-0036-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MatherO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MossOPT12, author = {Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Compiler Assisted Masking}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {58--75}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_4}, doi = {10.1007/978-3-642-33027-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MossOPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/OswaldS12, author = {Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Joye and Michael Tunstall}, title = {Side-Channel Analysis and Its Relevance to Fault Attacks}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {3--15}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_1}, doi = {10.1007/978-3-642-29656-7\_1}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/OswaldS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallOS12, author = {Carolyn Whitnall and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The myth of generic DPA...and the magic of learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2012}, url = {http://eprint.iacr.org/2012/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatherO12, author = {Luke Mather and Elisabeth Oswald}, title = {Quantifying Side-Channel Information Leakage from Web Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2012}, url = {http://eprint.iacr.org/2012/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatherO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MangardOS11, author = {Stefan Mangard and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {One for all - all for one: unifying standard differential power analysis attacks}, journal = {{IET} Inf. Secur.}, volume = {5}, number = {2}, pages = {100--110}, year = {2011}, url = {https://doi.org/10.1049/iet-ifs.2010.0096}, doi = {10.1049/IET-IFS.2010.0096}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MangardOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WhitnallO11, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A fair evaluation framework for comparing side-channel distinguishers}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {145--160}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0011-1}, doi = {10.1007/S13389-011-0011-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WhitnallO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/WhitnallOM11, author = {Carolyn Whitnall and Elisabeth Oswald and Luke Mather}, editor = {Emmanuel Prouff}, title = {An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis}, booktitle = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7079}, pages = {234--251}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27257-8\_15}, doi = {10.1007/978-3-642-27257-8\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/WhitnallOM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WhitnallO11, author = {Carolyn Whitnall and Elisabeth Oswald}, editor = {Phillip Rogaway}, title = {A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {316--334}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_18}, doi = {10.1007/978-3-642-22792-9\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WhitnallO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallO11, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2011}, url = {http://eprint.iacr.org/2011/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallOM11, author = {Carolyn Whitnall and Elisabeth Oswald and Luke Mather}, title = {An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2011}, url = {http://eprint.iacr.org/2011/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallOM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallO11a, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Fair Evaluation Framework for Comparing Side-Channel Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2011}, url = {http://eprint.iacr.org/2011/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallO11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MossOPT11, author = {Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall}, title = {Automatic Insertion of {DPA} Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2011}, url = {http://eprint.iacr.org/2011/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MossOPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/StandaertVOGMKM10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, editor = {Masayuki Abe}, title = {The World Is Not Enough: Another Look on Second-Order {DPA}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {112--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_7}, doi = {10.1007/978-3-642-17373-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/StandaertVOGMKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/OswaldM10, author = {Elisabeth Oswald and Stefan Mangard}, editor = {Ingrid M. R. Verbauwhede}, title = {Counteracting Power Analysis Attacks by Masking}, booktitle = {Secure Integrated Circuits and Systems}, series = {Integrated Circuits and Systems}, pages = {159--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-71829-3\_9}, doi = {10.1007/978-0-387-71829-3\_9}, timestamp = {Wed, 26 Jun 2019 18:00:01 +0200}, biburl = {https://dblp.org/rec/books/sp/10/OswaldM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/StandaertPYQYO10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu and Jean{-}Jacques Quisquater and Moti Yung and Elisabeth Oswald}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Leakage Resilient Cryptography in Practice}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {99--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_5}, doi = {10.1007/978-3-642-14452-3\_5}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertVOGMKM10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, title = {The World is Not Enough: Another Look on Second-Order {DPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2010}, url = {http://eprint.iacr.org/2010/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GrossschadlOPT09, author = {Johann Gro{\ss}sch{\"{a}}dl and Elisabeth Oswald and Dan Page and Michael Tunstall}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {176--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_13}, doi = {10.1007/978-3-642-14423-3\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GrossschadlOPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2009, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5412677/proceeding}, isbn = {978-0-7695-3824-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertPYQYO09, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu and Jean{-}Jacques Quisquater and Moti Yung and Elisabeth Oswald}, title = {Leakage Resilient Cryptography in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2009}, url = {http://eprint.iacr.org/2009/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertPYQYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MangardOS09, author = {Stefan Mangard and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {One for All - All for One: Unifying Standard {DPA} Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2009}, url = {http://eprint.iacr.org/2009/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MangardOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossschadlOPT09, author = {Johann Gro{\ss}sch{\"{a}}dl and Elisabeth Oswald and Dan Page and Michael Tunstall}, title = {Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2009}, url = {http://eprint.iacr.org/2009/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossschadlOPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SmartOP08, author = {Nigel P. Smart and Elisabeth Oswald and Daniel Page}, title = {Randomised representations}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {2}, pages = {19--27}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070017}, doi = {10.1049/IET-IFS:20070017}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SmartOP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MedwedO08, author = {Marcel Medwed and Elisabeth Oswald}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Template Attacks on {ECDSA}}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {14--27}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_2}, doi = {10.1007/978-3-642-00306-6\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MedwedO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2008, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3}, doi = {10.1007/978-3-540-85053-3}, isbn = {978-3-540-85052-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MedwedO08, author = {Marcel Medwed and Elisabeth Oswald}, title = {Template Attacks on {ECDSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2008}, url = {http://eprint.iacr.org/2008/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MedwedO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0017272, author = {Stefan Mangard and Elisabeth Oswald and Thomas Popp}, title = {Power analysis attacks - revealing the secrets of smart cards}, publisher = {Springer}, year = {2007}, isbn = {978-0-387-30857-9}, timestamp = {Mon, 21 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0017272.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/PoppMO07, author = {Thomas Popp and Stefan Mangard and Elisabeth Oswald}, title = {Power Analysis Attacks and Countermeasures}, journal = {{IEEE} Des. Test Comput.}, volume = {24}, number = {6}, pages = {535--543}, year = {2007}, url = {https://doi.org/10.1109/MDT.2007.200}, doi = {10.1109/MDT.2007.200}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/PoppMO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/OswaldM07, author = {Elisabeth Oswald and Stefan Mangard}, editor = {Masayuki Abe}, title = {Template Attacks on Masking - Resistance Is Futile}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {243--256}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_16}, doi = {10.1007/11967668\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/OswaldM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HerbstOM06, author = {Christoph Herbst and Elisabeth Oswald and Stefan Mangard}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {An {AES} Smart Card Implementation Resistant to Power Analysis Attacks}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {239--252}, year = {2006}, url = {https://doi.org/10.1007/11767480\_16}, doi = {10.1007/11767480\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HerbstOM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/OswaldMHT06, author = {Elisabeth Oswald and Stefan Mangard and Christoph Herbst and Stefan Tillich}, editor = {David Pointcheval}, title = {Practical Second-Order {DPA} Attacks for Masked Smart Card Implementations of Block Ciphers}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {192--207}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_13}, doi = {10.1007/11605805\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/OswaldMHT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SchlafferO06, author = {Martin Schl{\"{a}}ffer and Elisabeth Oswald}, editor = {Matthew J. B. Robshaw}, title = {Searching for Differential Paths in {MD4}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {242--261}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_16}, doi = {10.1007/11799313\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SchlafferO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YooHMOM06, author = {HyungSo Yoo and Christoph Herbst and Stefan Mangard and Elisabeth Oswald and Sang{-}Jae Moon}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Investigations of Power Analysis Attacks and Countermeasures for {ARIA}}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {160--172}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_13}, doi = {10.1007/978-3-540-71093-6\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YooHMOM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MangardPO05, author = {Stefan Mangard and Norbert Pramstaller and Elisabeth Oswald}, editor = {Josyula R. Rao and Berk Sunar}, title = {Successfully Attacking Masked {AES} Hardware Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {157--171}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_12}, doi = {10.1007/11545262\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MangardPO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/RijmenO05, author = {Vincent Rijmen and Elisabeth Oswald}, editor = {Alfred Menezes}, title = {Update on {SHA-1}}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {58--71}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_6}, doi = {10.1007/978-3-540-30574-3\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/RijmenO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OswaldMPR05, author = {Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller and Vincent Rijmen}, editor = {Henri Gilbert and Helena Handschuh}, title = {A Side-Channel Analysis Resistant Description of the {AES} S-Box}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {413--423}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_28}, doi = {10.1007/11502760\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/OswaldMPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OswaldS05, author = {Elisabeth Oswald and Kai Schramm}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {An Efficient Masking Scheme for {AES} Software Implementations}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {292--305}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_23}, doi = {10.1007/11604938\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OswaldS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RijmenO05, author = {Vincent Rijmen and Elisabeth Oswald}, title = {Update on {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2005}, url = {http://eprint.iacr.org/2005/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RijmenO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/RijmenO04, author = {Vincent Rijmen and Elisabeth Oswald}, editor = {Hans Dobbertin and Vincent Rijmen and Aleksandra Sowa}, title = {Representations and Rijndael Descriptions}, booktitle = {Advanced Encryption Standard - AES, 4th International Conference, {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3373}, pages = {148--158}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11506447\_13}, doi = {10.1007/11506447\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aes/RijmenO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/OrsGOP04, author = {Siddika Berna {\"{O}}rs and Frank K. G{\"{u}}rkaynak and Elisabeth Oswald and Bart Preneel}, title = {Power-Analysis Attack on an {ASIC} {AES} implementation}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {546--552}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286711}, doi = {10.1109/ITCC.2004.1286711}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/OrsGOP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RechbergerO04, author = {Christian Rechberger and Elisabeth Oswald}, editor = {Chae Hoon Lim and Moti Yung}, title = {Practical Template Attacks}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {440--456}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_35}, doi = {10.1007/978-3-540-31815-6\_35}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/RechbergerO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OswaldMP04, author = {Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller}, title = {Secure and Efficient Masking of {AES} - {A} Mission Impossible?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2004}, url = {http://eprint.iacr.org/2004/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OswaldMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrsOP03, author = {Siddika Berna {\"{O}}rs and Elisabeth Oswald and Bart Preneel}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Power-Analysis Attacks on an {FPGA} - First Experimental Results}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {35--50}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_4}, doi = {10.1007/978-3-540-45238-6\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrsOP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Oswald02, author = {Elisabeth Oswald}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {82--97}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_8}, doi = {10.1007/3-540-36400-5\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Oswald02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WolkerstorferOL02, author = {Johannes Wolkerstorfer and Elisabeth Oswald and Mario Lamberger}, editor = {Bart Preneel}, title = {An {ASIC} Implementation of the {AES} SBoxes}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {67--78}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_6}, doi = {10.1007/3-540-45760-7\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/WolkerstorferOL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OswaldA01, author = {Elisabeth Oswald and Manfred Josef Aigner}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {39--50}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_5}, doi = {10.1007/3-540-44709-1\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OswaldA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.