default search action
Elisabeth Oswald
Person information
- affiliation: University of Klagenfurt, Austria
- affiliation: University of Bristol, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Rebecca Hay, Elisabeth Oswald:
Key Rank Estimation Methods: Comparisons and Practical Considerations. IACR Commun. Cryptol. 1(3): 34 (2024) - [j9]Nima Mahdion, Elisabeth Oswald:
Efficiently Detecting Masking Flaws in Software Implementations. IACR Commun. Cryptol. 1(3): 35 (2024) - [c63]Thomas Marquet, Elisabeth Oswald:
Exploring Multi-task Learning in the Context of Masked AES Implementations. COSADE 2024: 93-112 - [c62]Aakash Chowdhury, Arnab Roy, Carlo Brunetta, Elisabeth Oswald:
Leakage Certification Made Simple. CRYPTO (6) 2024: 427-460 - [c61]Si Gao, Elisabeth Oswald:
A Novel Framework for Explainable Leakage Assessment. EUROCRYPT (3) 2024: 221-250 - [e8]Elisabeth Oswald:
Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings. Lecture Notes in Computer Science 14643, Springer 2024, ISBN 978-3-031-58867-9 [contents] - 2023
- [c60]Thomas Marquet, Elisabeth Oswald:
A Comparison of Multi-task Learning and Single-Task Learning Approaches. ACNS Workshops 2023: 121-138 - [c59]Yan Yan, Elisabeth Oswald, Arnab Roy:
Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis Test. ICISC (1) 2023: 240-258 - [i58]Thomas Marquet, Elisabeth Oswald:
Exploring multi-task learning in the context of two masked AES implementations. IACR Cryptol. ePrint Arch. 2023: 6 (2023) - [i57]Thomas Marquet, Elisabeth Oswald:
A Comparison of Multi-task learning and Single-task learning Approaches. IACR Cryptol. ePrint Arch. 2023: 611 (2023) - [i56]Yan Yan, Arnab Roy, Elisabeth Oswald:
Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test. IACR Cryptol. ePrint Arch. 2023: 1160 (2023) - 2022
- [c58]Rebecca Young, Luke Mather, Elisabeth Oswald:
Comparing Key Rank Estimation Methods. CARDIS 2022: 188-204 - [c57]Si Gao, Elisabeth Oswald:
A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators. EUROCRYPT (3) 2022: 254-283 - [c56]Si Gao, Elisabeth Oswald, Dan Page:
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical. EUROCRYPT (3) 2022: 284-311 - [i55]Si Gao, Elisabeth Oswald:
A Novel Framework for Explainable Leakage Assessment. IACR Cryptol. ePrint Arch. 2022: 182 (2022) - [i54]Arnab Roy, Aakash Chowdhury, Elisabeth Oswald:
Consistent, Efficient and Leakage-Model Free Mutual Information Estimation. IACR Cryptol. ePrint Arch. 2022: 1201 (2022) - [i53]Rebecca Young, Luke Mather, Elisabeth Oswald:
Comparing Key Rank Estimation Methods. IACR Cryptol. ePrint Arch. 2022: 1282 (2022) - 2021
- [j8]James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni:
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware. J. Cryptogr. Eng. 11(4): 317-327 (2021) - [j7]Si Gao, Elisabeth Oswald, Yan Yan:
Neyman's Smoothness Test: A Trade-Off Between Moment-Based and Distribution-Based Leakage Detections. IEEE Trans. Inf. Forensics Secur. 16: 4494-4506 (2021) - [c55]Yan Yan, Elisabeth Oswald, Srinivas Vivek:
An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage. ICISSP 2021: 89-97 - [i52]James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni:
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware. IACR Cryptol. ePrint Arch. 2021: 155 (2021) - [i51]Si Gao, Elisabeth Oswald:
A Novel Completeness Test and its Application to Side Channel Attacks and Simulators. IACR Cryptol. ePrint Arch. 2021: 756 (2021) - [i50]Si Gao, Elisabeth Oswald, Dan Page:
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor. IACR Cryptol. ePrint Arch. 2021: 794 (2021) - [i49]Si Gao, Elisabeth Oswald, Yan Yan:
Neyman's Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections. IACR Cryptol. ePrint Arch. 2021: 1039 (2021) - 2020
- [j6]Si Gao, Ben Marshall, Dan Page, Elisabeth Oswald:
Share-slicing: Friend or Foe? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 152-174 (2020) - [c54]Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sébastien Duval, Christophe Giraud, Éliane Jaulmes, François Koeune, Elisabeth Oswald, François-Xavier Standaert, Carolyn Whitnall:
A Systematic Appraisal of Side Channel Evaluation Strategies. SSR 2020: 46-66 - [e7]Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran:
Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings. Lecture Notes in Computer Science 12578, Springer 2020, ISBN 978-3-030-65276-0 [contents] - [i48]Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sébastien Duval, Christophe Giraud, Éliane Jaulmes, François Koeune, Elisabeth Oswald, François-Xavier Standaert, Carolyn Whitnall:
A Systematic Appraisal of Side Channel Evaluation Strategies. IACR Cryptol. ePrint Arch. 2020: 1347 (2020) - [i47]Yan Yan, Elisabeth Oswald, Srinivas Vivek:
An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage. IACR Cryptol. ePrint Arch. 2020: 1455 (2020)
2010 – 2019
- 2019
- [c53]Carolyn Whitnall, Elisabeth Oswald:
A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules'). ASIACRYPT (3) 2019: 256-284 - [c52]Yan Yan, Elisabeth Oswald:
Examining the practical side channel resilience of ARX-boxes. CF 2019: 373-379 - [c51]Si Gao, Arnab Roy, Elisabeth Oswald:
Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations. CT-RSA 2019: 433-452 - [c50]James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald:
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography. ISCAS 2019: 1-5 - [i46]James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald:
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography. IACR Cryptol. ePrint Arch. 2019: 206 (2019) - [i45]Yan Yan, Elisabeth Oswald:
Examining the Practical Side Channel Resilience of ARX-boxes. IACR Cryptol. ePrint Arch. 2019: 335 (2019) - [i44]Carolyn Whitnall, Elisabeth Oswald:
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation. IACR Cryptol. ePrint Arch. 2019: 703 (2019) - [i43]Carolyn Whitnall, Elisabeth Oswald:
A Critical Analysis of ISO 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules'). IACR Cryptol. ePrint Arch. 2019: 1013 (2019) - [i42]Joey Green, Tilo Burghardt, Elisabeth Oswald:
Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets. IACR Cryptol. ePrint Arch. 2019: 1068 (2019) - 2018
- [c49]Joey Green, Arnab Roy, Elisabeth Oswald:
A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AES. CARDIS 2018: 18-34 - [c48]Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi:
Non-profiled Mask Recovery: The Impact of Independent Component Analysis. CARDIS 2018: 51-64 - [c47]Daniel P. Martin, Luke Mather, Elisabeth Oswald:
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. CT-RSA 2018: 394-412 - [c46]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Exploring Potential 6LoWPAN Traffic Side Channels. EWSN 2018: 270-275 - [c45]Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam:
Assessing the Feasibility of Single Trace Power Analysis of Frodo. SAC 2018: 216-234 - [c44]Kalliopi Anastasopoulou, Emma J. Williams, Carolyn Whitnall, Theo Tryfonas, Elisabeth Oswald, Phillip L. Morgan, Alexandra Voinescu, Robert J. Piechocki, Andrea Tassi:
Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use. STAST 2018: 5:1-5:6 - [i41]Daniel P. Martin, Luke Mather, Elisabeth Oswald:
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. IACR Cryptol. ePrint Arch. 2018: 19 (2018) - [i40]Joey Green, Arnab Roy, Elisabeth Oswald:
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES. IACR Cryptol. ePrint Arch. 2018: 671 (2018) - [i39]Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam:
Assessing the Feasibility of Single Trace Power Analysis of Frodo. IACR Cryptol. ePrint Arch. 2018: 687 (2018) - [i38]Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi:
Non-profiled Mask Recovery: the impact of Independent Component Analysis. IACR Cryptol. ePrint Arch. 2018: 871 (2018) - [i37]Si Gao, Arnab Roy, Elisabeth Oswald:
Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations. IACR Cryptol. ePrint Arch. 2018: 949 (2018) - [i36]Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam:
Fly, you fool! Faster Frodo for the ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2018: 1116 (2018) - 2017
- [c43]Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
Authenticated Encryption in the Face of Protocol and Side Channel Leakage. ASIACRYPT (1) 2017: 693-723 - [c42]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. CARDIS 2017: 70-87 - [c41]David McCann, Elisabeth Oswald:
Practical evaluation of masking software countermeasures on an IoT processor. IVSW 2017: 1-6 - [c40]Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Daniel James Shepherd:
Quantum Key Search with Side Channel Advice. SAC 2017: 407-422 - [c39]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. SAC 2017: 442-458 - [c38]David McCann, Elisabeth Oswald, Carolyn Whitnall:
Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages. USENIX Security Symposium 2017: 199-216 - [i35]Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
Authenticated Encryption in the Face of Protocol and Side Channel Leakage. IACR Cryptol. ePrint Arch. 2017: 68 (2017) - [i34]Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan J. Shepherd:
Quantum Key Search with Side Channel Advice. IACR Cryptol. ePrint Arch. 2017: 171 (2017) - [i33]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Exploring Potential 6LoWPAN Traffic Side Channels. IACR Cryptol. ePrint Arch. 2017: 316 (2017) - [i32]David McCann, Elisabeth Oswald:
Practical Evaluation of Masking Software Countermeasures on an IoT processor. IACR Cryptol. ePrint Arch. 2017: 399 (2017) - [i31]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. IACR Cryptol. ePrint Arch. 2017: 764 (2017) - [i30]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. IACR Cryptol. ePrint Arch. 2017: 1051 (2017) - 2016
- [c37]Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam:
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations. ASIACRYPT (1) 2016: 548-572 - [c36]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Cryptographic randomness on a CC2538: A case study. WIFS 2016: 1-6 - [e6]François-Xavier Standaert, Elisabeth Oswald:
Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9689, Springer 2016, ISBN 978-3-319-43282-3 [contents] - [i29]Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam:
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations. IACR Cryptol. ePrint Arch. 2016: 491 (2016) - [i28]David McCann, Carolyn Whitnall, Elisabeth Oswald:
ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab. IACR Cryptol. ePrint Arch. 2016: 517 (2016) - [i27]Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam:
How low can you go? Using side-channel data to enhance brute-force key recovery. IACR Cryptol. ePrint Arch. 2016: 609 (2016) - [i26]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Cryptographic Randomness on a CC2538: a Case Study. IACR Cryptol. ePrint Arch. 2016: 1021 (2016) - 2015
- [c35]Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam:
Counting Keys in Parallel After a Side Channel Attack. ASIACRYPT (2) 2015: 313-337 - [c34]Carolyn Whitnall, Elisabeth Oswald:
Robust Profiling for DPA-Style Attacks. CHES 2015: 3-21 - [c33]Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks. COSADE 2015: 51-63 - [c32]Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Reliable information extraction for single trace attacks. DATE 2015: 133-138 - [c31]Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik:
A Leakage Resilient MAC. IMACC 2015: 295-310 - [c30]David McCann, Kerstin Eder, Elisabeth Oswald:
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices. SIoT 2015: 65-71 - [e5]Elisabeth Oswald, Marc Fischlin:
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9056, Springer 2015, ISBN 978-3-662-46799-2 [contents] - [e4]Elisabeth Oswald, Marc Fischlin:
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9057, Springer 2015, ISBN 978-3-662-46802-9 [contents] - [i25]Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Reliable Information Extraction for Single Trace Attacks. IACR Cryptol. ePrint Arch. 2015: 45 (2015) - [i24]Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks. IACR Cryptol. ePrint Arch. 2015: 161 (2015) - [i23]Carolyn Whitnall, Elisabeth Oswald:
Robust Profiling for DPA-Style Attacks. IACR Cryptol. ePrint Arch. 2015: 527 (2015) - [i22]Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam:
How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack. IACR Cryptol. ePrint Arch. 2015: 689 (2015) - [i21]David McCann, Kerstin Eder, Elisabeth Oswald:
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices. IACR Cryptol. ePrint Arch. 2015: 832 (2015) - 2014
- [c29]Jake Longo, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijn Stam, Michael Tunstall:
Simulatable Leakage: Analysis, Pitfalls, and New Constructions. ASIACRYPT (1) 2014: 223-242 - [c28]Luke Mather, Elisabeth Oswald, Carolyn Whitnall:
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer. ASIACRYPT (1) 2014: 243-261 - [c27]Valentina Banciu, Elisabeth Oswald:
Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES. COSADE 2014: 29-40 - [c26]Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert:
The Myth of Generic DPA...and the Magic of Learning. CT-RSA 2014: 183-205 - [e3]Phong Q. Nguyen, Elisabeth Oswald:
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings. Lecture Notes in Computer Science 8441, Springer 2014, ISBN 978-3-642-55219-9 [contents] - [i20]Valentina Banciu, Elisabeth Oswald:
Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES. IACR Cryptol. ePrint Arch. 2014: 177 (2014) - [i19]Jake Longo Galea, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijn Stam:
Making and Breaking Leakage Simulators. IACR Cryptol. ePrint Arch. 2014: 357 (2014) - [i18]Luke Mather, Elisabeth Oswald, Carolyn Whitnall:
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer. IACR Cryptol. ePrint Arch. 2014: 365 (2014) - 2013
- [c25]Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wójcik:
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests. ASIACRYPT (1) 2013: 486-505 - [c24]Carolyn Whitnall, Elisabeth Oswald:
Profiling DPA: Efficacy and Efficiency Trade-Offs. CHES 2013: 37-54 - [c23]Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald:
Masking Tables - An Underestimated Security Risk. FSE 2013: 425-444 - [i17]Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
A Leakage Resilient MAC. IACR Cryptol. ePrint Arch. 2013: 292 (2013) - [i16]Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wójcik:
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices. IACR Cryptol. ePrint Arch. 2013: 298 (2013) - [i15]Carolyn Whitnall, Elisabeth Oswald:
Profiling DPA: Efficacy and efficiency trade-offs. IACR Cryptol. ePrint Arch. 2013: 353 (2013) - [i14]Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald:
Masking Tables - An Underestimated Security Risk. IACR Cryptol. ePrint Arch. 2013: 735 (2013) - 2012
- [j5]Luke Mather, Elisabeth Oswald:
Pinpointing side-channel information leaks in web applications. J. Cryptogr. Eng. 2(3): 161-177 (2012) - [c22]Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Compiler Assisted Masking. CHES 2012: 58-75 - [p3]Elisabeth Oswald, François-Xavier Standaert:
Side-Channel Analysis and Its Relevance to Fault Attacks. Fault Analysis in Cryptography 2012: 3-15 - [i13]Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert:
The myth of generic DPA...and the magic of learning. IACR Cryptol. ePrint Arch. 2012: 256 (2012) - [i12]Luke Mather, Elisabeth Oswald:
Quantifying Side-Channel Information Leakage from Web Applications. IACR Cryptol. ePrint Arch. 2012: 269 (2012) - 2011
- [j4]Stefan Mangard, Elisabeth Oswald, François-Xavier Standaert:
One for all - all for one: unifying standard differential power analysis attacks. IET Inf. Secur. 5(2): 100-110 (2011) - [j3]Carolyn Whitnall, Elisabeth Oswald:
A fair evaluation framework for comparing side-channel distinguishers. J. Cryptogr. Eng. 1(2): 145-160 (2011) - [c21]Carolyn Whitnall, Elisabeth Oswald, Luke Mather:
An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis. CARDIS 2011: 234-251 - [c20]Carolyn Whitnall, Elisabeth Oswald:
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework. CRYPTO 2011: 316-334 - [i11]Carolyn Whitnall, Elisabeth Oswald:
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework. IACR Cryptol. ePrint Arch. 2011: 322 (2011) - [i10]Carolyn Whitnall, Elisabeth Oswald, Luke Mather:
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis. IACR Cryptol. ePrint Arch. 2011: 380 (2011) - [i9]Carolyn Whitnall, Elisabeth Oswald:
A Fair Evaluation Framework for Comparing Side-Channel Distinguishers. IACR Cryptol. ePrint Arch. 2011: 403 (2011) - [i8]Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Automatic Insertion of DPA Countermeasures. IACR Cryptol. ePrint Arch. 2011: 412 (2011) - 2010
- [c19]François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard:
The World Is Not Enough: Another Look on Second-Order DPA. ASIACRYPT 2010: 112-129 - [p2]Elisabeth Oswald, Stefan Mangard:
Counteracting Power Analysis Attacks by Masking. Secure Integrated Circuits and Systems 2010: 159-178 - [p1]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. Towards Hardware-Intrinsic Security 2010: 99-134 - [i7]François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard:
The World is Not Enough: Another Look on Second-Order DPA. IACR Cryptol. ePrint Arch. 2010: 180 (2010)
2000 – 2009
- 2009
- [c18]Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. ICISC 2009: 176-192 - [e2]Luca Breveglieri, Israel Koren, David Naccache, Elisabeth Oswald, Jean-Pierre Seifert:
Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3824-2 [contents] - [i6]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. IACR Cryptol. ePrint Arch. 2009: 341 (2009) - [i5]Stefan Mangard, Elisabeth Oswald, François-Xavier Standaert:
One for All - All for One: Unifying Standard DPA Attacks. IACR Cryptol. ePrint Arch. 2009: 449 (2009) - [i4]Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. IACR Cryptol. ePrint Arch. 2009: 538 (2009) - 2008
- [j2]Nigel P. Smart, Elisabeth Oswald, Daniel Page:
Randomised representations. IET Inf. Secur. 2(2): 19-27 (2008) - [c17]Marcel Medwed, Elisabeth Oswald:
Template Attacks on ECDSA. WISA 2008: 14-27 - [e1]Elisabeth Oswald, Pankaj Rohatgi:
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Lecture Notes in Computer Science 5154, Springer 2008, ISBN 978-3-540-85052-6 [contents] - [i3]Marcel Medwed, Elisabeth Oswald:
Template Attacks on ECDSA. IACR Cryptol. ePrint Arch. 2008: 81 (2008) - 2007
- [b1]Stefan Mangard, Elisabeth Oswald, Thomas Popp:
Power analysis attacks - revealing the secrets of smart cards. Springer 2007, ISBN 978-0-387-30857-9, pp. I-XXIII, 1-337 - [j1]Thomas Popp, Stefan Mangard, Elisabeth Oswald:
Power Analysis Attacks and Countermeasures. IEEE Des. Test Comput. 24(6): 535-543 (2007) - [c16]Elisabeth Oswald, Stefan Mangard:
Template Attacks on Masking - Resistance Is Futile. CT-RSA 2007: 243-256 - 2006
- [c15]Christoph Herbst, Elisabeth Oswald, Stefan Mangard:
An AES Smart Card Implementation Resistant to Power Analysis Attacks. ACNS 2006: 239-252 - [c14]Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich:
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. CT-RSA 2006: 192-207 - [c13]Martin Schläffer, Elisabeth Oswald:
Searching for Differential Paths in MD4. FSE 2006: 242-261 - [c12]HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon:
Investigations of Power Analysis Attacks and Countermeasures for ARIA. WISA 2006: 160-172 - 2005
- [c11]Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald:
Successfully Attacking Masked AES Hardware Implementations. CHES 2005: 157-171 - [c10]Vincent Rijmen, Elisabeth Oswald:
Update on SHA-1. CT-RSA 2005: 58-71 - [c9]Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen:
A Side-Channel Analysis Resistant Description of the AES S-Box. FSE 2005: 413-423 - [c8]Elisabeth Oswald, Kai Schramm:
An Efficient Masking Scheme for AES Software Implementations. WISA 2005: 292-305 - [i2]Vincent Rijmen, Elisabeth Oswald:
Update on SHA-1. IACR Cryptol. ePrint Arch. 2005: 10 (2005) - 2004
- [c7]Vincent Rijmen, Elisabeth Oswald:
Representations and Rijndael Descriptions. AES Conference 2004: 148-158 - [c6]Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel:
Power-Analysis Attack on an ASIC AES implementation. ITCC (2) 2004: 546-552 - [c5]Christian Rechberger, Elisabeth Oswald:
Practical Template Attacks. WISA 2004: 440-456 - [i1]Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller:
Secure and Efficient Masking of AES - A Mission Impossible? IACR Cryptol. ePrint Arch. 2004: 134 (2004) - 2003
- [c4]Siddika Berna Örs, Elisabeth Oswald, Bart Preneel:
Power-Analysis Attacks on an FPGA - First Experimental Results. CHES 2003: 35-50 - 2002
- [c3]Elisabeth Oswald:
Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems. CHES 2002: 82-97 - [c2]Johannes Wolkerstorfer, Elisabeth Oswald, Mario Lamberger:
An ASIC Implementation of the AES SBoxes. CT-RSA 2002: 67-78 - 2001
- [c1]Elisabeth Oswald, Manfred Josef Aigner:
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. CHES 2001: 39-50
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint