The temperature side channel and heating fault attacks M Hutter, JM Schmidt International Conference on Smart Card Research and Advanced Applications …, 2013 | 148 | 2013 |
Hardware designer's guide to fault attacks D Karaklajić, JM Schmidt, I Verbauwhede IEEE Transactions on Very Large Scale Integration (VLSI) Systems 21 (12 …, 2013 | 144 | 2013 |
Improved glucose tolerance in rats treated with the dipeptidyl peptidase IV (CD26) inhibitor Ile-thiazolidide RP Pauly, HU Demuth, F Rosche, J Schmidt, HA White, F Lynn, ... Metabolism 48 (3), 385-389, 1999 | 134 | 1999 |
Optical and em fault-attacks on crt-based rsa: Concrete results JM Schmidt, M Hutter na, 2007 | 124 | 2007 |
A practical fault attack on square and multiply JM Schmidt, C Herbst 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 53-58, 2008 | 121 | 2008 |
FPGA implementations of the round two SHA-3 candidates B Baldwin, A Byrne, L Lu, M Hamilton, N Hanley, M O'Neill, WP Marnane 2010 International Conference on Field Programmable Logic and Applications …, 2010 | 109 | 2010 |
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein. S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely IACR Cryptol. ePrint Arch. 2009, 510, 2009 | 94 | 2009 |
The fault attack jungle-a classification model to guide you I Verbauwhede, D Karaklajic, JM Schmidt 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 3-8, 2011 | 87 | 2011 |
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output B Gierlichs, JM Schmidt, M Tunstall International conference on cryptology and information security in Latin …, 2012 | 72 | 2012 |
RFID and its vulnerability to faults M Hutter, JM Schmidt, T Plos International Workshop on Cryptographic Hardware and Embedded Systems, 363-379, 2008 | 63 | 2008 |
Optical fault attacks on AES: A threat in violet JM Schmidt, M Hutter, T Plos 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 13-22, 2009 | 56 | 2009 |
A fault attack on ECDSA JM Schmidt, M Medwed 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 93-99, 2009 | 54 | 2009 |
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis S Belaïd, F De Santis, J Heyszl, S Mangard, M Medwed, JM Schmidt, ... Journal of Cryptographic Engineering 4 (3), 157-171, 2014 | 37 | 2014 |
Uniform evaluation of hardware implementations of the round-two SHA-3 candidates S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely The Second SHA-3 Candidate Conference, 2010 | 34 | 2010 |
Contact-based fault injections and power analysis on RFID tags M Hutter, JM Schmidt, T Plos 2009 European Conference on Circuit Theory and Design, 409-412, 2009 | 28 | 2009 |
Combined implementation attack resistant exponentiation JM Schmidt, M Tunstall, R Avanzi, I Kizhvatov, T Kasper, D Oswald International Conference on Cryptology and Information Security in Latin …, 2010 | 26 | 2010 |
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ... International Conference on Trusted Systems, 253-270, 2010 | 21 | 2010 |
A continuous fault countermeasure for AES providing a constant error detection rate M Medwed, JM Schmidt 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 66-71, 2010 | 21 | 2010 |
Connecting passive RFID tags to the Internet of Things S Dominikus, JM Schmidt Interconnecting Smart Objects with the Internet Workshop, Prague, 2011 | 20 | 2011 |
A generic fault countermeasure providing data and program flow integrity M Medwed, JM Schmidt 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 68-73, 2008 | 20 | 2008 |