default search action
Thomas Schamberger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c12]Thomas Schamberger, Maximilian Egger, Lars Tebelmann:
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs - An Evaluation of the ASCAD Databases. ACNS Workshops 2023: 139-158 - [c11]Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh:
FuLeeca: A Lee-Based Signature Scheme. CBCrypto 2023: 56-83 - [i8]Stefan Ritterhoff, Georg Maringer, Sebastian Bitzer, Violetta Weger, Patrick Karl, Thomas Schamberger, Jonas Schupp, Antonia Wachter-Zeh:
FuLeeca: A Lee-based Signature Scheme. IACR Cryptol. ePrint Arch. 2023: 377 (2023) - 2022
- [j5]Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl:
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 414-460 (2022) - [c10]Maximilian Egger, Thomas Schamberger, Lars Tebelmann, Florian Lippert, Georg Sigl:
A Second Look at the ASCAD Databases. COSADE 2022: 75-99 - [c9]Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl:
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem. PQCrypto 2022: 327-352 - [i7]Thomas Schamberger, Lukas Holzbaur, Julian Renner, Antonia Wachter-Zeh, Georg Sigl:
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem. IACR Cryptol. ePrint Arch. 2022: 724 (2022) - 2021
- [j4]Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 88-113 (2021) - [j3]Alexander Kulow, Thomas Schamberger, Lars Tebelmann, Georg Sigl:
Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA. IEEE Trans. Inf. Forensics Secur. 16: 3254-3268 (2021) - [j2]Michael Gruber, Matthias Probst, Patrick Karl, Thomas Schamberger, Lars Tebelmann, Michael Tempelmeier, Georg Sigl:
DOMREP-An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection. IEEE Trans. Inf. Forensics Secur. 16: 4321-4335 (2021) - [c8]Anna-Lena Horlemann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh:
Information-Set Decoding with Hints. CBCrypto 2021: 60-83 - [c7]Ingo Glaser, Tom Schamberger, Florian Matthes:
Anonymization of german legal court rulings. ICAIL 2021: 205-209 - [i6]Anna-Lena Horlemann-Trautmann, Sven Puchinger, Julian Renner, Thomas Schamberger, Antonia Wachter-Zeh:
Information-Set Decoding with Hints. IACR Cryptol. ePrint Arch. 2021: 279 (2021) - [i5]Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl:
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2021: 479 (2021) - [i4]Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. IACR Cryptol. ePrint Arch. 2021: 956 (2021) - 2020
- [j1]Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl:
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 365-388 (2020) - [c6]Johannes Kunz, Julian Renner, Georg Maringer, Thomas Schamberger, Antonia Wachter-Zeh:
On Software Implementation of Gabidulin Decoders. ACCT 2020: 95-101 - [c5]Thomas Schamberger, Julian Renner, Georg Sigl, Antonia Wachter-Zeh:
A Power Side-Channel Attack on the CCA2-Secure HQC KEM. CARDIS 2020: 119-134 - [i3]Johannes Kunz, Julian Renner, Georg Maringer, Thomas Schamberger, Antonia Wachter-Zeh:
On Software Implementation of Gabidulin Decoders. CoRR abs/2009.09668 (2020) - [i2]Thomas Schamberger, Julian Renner, Georg Sigl, Antonia Wachter-Zeh:
A Power Side-Channel Attack on the CCA2-Secure HQC KEM. IACR Cryptol. ePrint Arch. 2020: 910 (2020) - [i1]Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl:
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers. IACR Cryptol. ePrint Arch. 2020: 960 (2020)
2010 – 2019
- 2019
- [c4]Thomas Schamberger, Oliver Mischke, Johanna Sepúlveda:
Practical Evaluation of Masking for NTRUEncrypt on ARM Cortex-M4. COSADE 2019: 253-269 - 2018
- [c3]Thomas Schamberger:
Post-quantum security: Power Analysis of NTRUEncrypt. Krypto-Tag 2018 - [c2]Konstantin Braun, Tim Fritzmann, Georg Maringer, Thomas Schamberger, Johanna Sepúlveda:
Secure and Compact Full NTRU Hardware Implementation. VLSI-SoC 2018: 89-94 - [c1]Tim Fritzmann, Thomas Schamberger, Christoph Frisch, Konstantin Braun, Georg Maringer, Johanna Sepúlveda:
Efficient Hardware/Software Co-design for NTRU. VLSI-SoC (Selected Papers) 2018: 257-280
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint