default search action
Kerstin Lemke-Rust
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c28]Marco Hünseler, Kerstin Lemke-Rust:
Simulating an Ethereum 2.0 Beacon Chain Network. SDS 2021: 1-8 - 2020
- [c27]Till Schlüter, Kerstin Lemke-Rust:
Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers. CARDIS 2020: 151-165
2010 – 2019
- 2019
- [j1]Peter Samarin, Kerstin Lemke-Rust:
Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage. IEEE Trans. Inf. Forensics Secur. 14(3): 803-813 (2019) - [c26]Carl-Daniel Hailfinger, Kerstin Lemke-Rust, Christof Paar:
CCCiCC: A Cross-Core Cache-Independent Covert Channel on AMD Family 15h CPUs. CARDIS 2019: 159-175 - 2018
- [c25]Kerstin Lemke-Rust, Peter Samarin:
Exploring Embedded Software with Side Channels and Fault Analysis. EWME 2018: 67-70 - 2017
- [c24]Peter Samarin, Kerstin Lemke-Rust:
Detection of counterfeit ICs using public identification sequences. HOST 2017: 163 - [c23]Peter Samarin, Kerstin Lemke-Rust:
Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers. ICISC 2017: 155-174 - [e1]Kerstin Lemke-Rust, Michael Tunstall:
Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10146, Springer 2017, ISBN 978-3-319-54668-1 [contents] - 2016
- [c22]Jacek Samotyja, Kerstin Lemke-Rust:
Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor. TIS@CCS 2016: 27-35 - [c21]Peter Samarin, Kerstin Lemke-Rust, Christof Paar:
IP core protection using voltage-controlled side-channel receivers. HOST 2016: 217-222 - [c20]Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust:
Fault-Channel Watermarks. WISTP 2016: 204-219 - 2015
- [i1]Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann:
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node. IACR Cryptol. ePrint Arch. 2015: 354 (2015) - 2014
- [c19]Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar:
Remote IP Protection Using Timing Channels. ICISC 2014: 222-237 - 2013
- [c18]Jochen Vandorpe, Jo Vliegen, Ruben Smeets, Nele Mentens, Milos Drutarovský, Michal Varchola, Kerstin Lemke-Rust, Paul Plöger, Peter Samarin, Dirk Koch, Yngve Hafting, Jim Tørresen:
Remote FPGA design through eDiViDe - European Digital Virtual Design Lab. FPL 2013: 1 - 2012
- [c17]Timo Bartkewitz, Kerstin Lemke-Rust:
Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines. CARDIS 2012: 263-276 - 2011
- [c16]Timo Bartkewitz, Kerstin Lemke-Rust:
A High-Performance Implementation of Differential Power Analysis on Graphics Cards. CARDIS 2011: 252-265 - 2010
- [c15]Veselina Hensel, Kerstin Lemke-Rust:
On an Integration of an Information Security Management System into an Enterprise Architecture. DEXA Workshops 2010: 354-358
2000 – 2009
- 2009
- [c14]Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Differential Cluster Analysis. CHES 2009: 112-127 - 2008
- [c13]Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. ISC 2008: 341-354 - [c12]Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Christof Paar:
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. SIES 2008: 58-66 - 2007
- [b1]Kerstin Lemke-Rust:
Models and algorithms for physical cryptanalysis. Ruhr University Bochum, 2007, ISBN 978-3-89966-272-6, pp. 1-232 - [c11]Kerstin Lemke-Rust, Christof Paar:
Gaussian Mixture Models for Higher-Order Side Channel Analysis. CHES 2007: 14-27 - [c10]Kerstin Lemke-Rust, Christof Paar:
Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. ESORICS 2007: 454-468 - [c9]Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar:
E-Passport: Cracking Basic Access Control Keys. OTM Conferences (2) 2007: 1531-1547 - 2006
- [c8]Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi:
Physical Security Bounds Against Tampering. ACNS 2006: 253-267 - [c7]Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar:
Templates vs. Stochastic Methods. CHES 2006: 15-29 - [c6]Kerstin Lemke-Rust, Christof Paar:
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices. FDTC 2006: 131-143 - [c5]Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi:
E-Passport: The Global Traceability Or How to Feel Like a UPS Package. WISA 2006: 391-404 - 2005
- [c4]Werner Schindler, Kerstin Lemke, Christof Paar:
A Stochastic Model for Differential Side Channel Cryptanalysis. CHES 2005: 30-46 - [c3]Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble:
An Open Approach for Designing Secure Electronic Immobilizers. ISPEC 2005: 230-242 - [r1]Kerstin Lemke, Christof Paar:
Physical Attacks. Encyclopedia of Cryptography and Security 2005 - 2004
- [c2]Kerstin Lemke, Kai Schramm, Christof Paar:
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. CHES 2004: 205-219 - 2002
- [c1]Bert den Boer, Kerstin Lemke, Guntram Wicke:
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. CHES 2002: 228-243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint