Jörn-Marc Schmidt
Jörn-Marc Schmidt
Institute for Applied Information Processing and Communications, Graz University of Technology
Verified email at iaik.tugraz.at
Title
Cited by
Cited by
Year
The temperature side channel and heating fault attacks
M Hutter, JM Schmidt
International Conference on Smart Card Research and Advanced Applications …, 2013
1482013
Hardware designer's guide to fault attacks
D Karaklajić, JM Schmidt, I Verbauwhede
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 21 (12 …, 2013
1442013
Improved glucose tolerance in rats treated with the dipeptidyl peptidase IV (CD26) inhibitor Ile-thiazolidide
RP Pauly, HU Demuth, F Rosche, J Schmidt, HA White, F Lynn, ...
Metabolism 48 (3), 385-389, 1999
1341999
Optical and em fault-attacks on crt-based rsa: Concrete results
JM Schmidt, M Hutter
na, 2007
1242007
A practical fault attack on square and multiply
JM Schmidt, C Herbst
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 53-58, 2008
1212008
FPGA implementations of the round two SHA-3 candidates
B Baldwin, A Byrne, L Lu, M Hamilton, N Hanley, M O'Neill, WP Marnane
2010 International Conference on Field Programmable Logic and Applications …, 2010
1092010
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein.
S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely
IACR Cryptol. ePrint Arch. 2009, 510, 2009
942009
The fault attack jungle-a classification model to guide you
I Verbauwhede, D Karaklajic, JM Schmidt
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 3-8, 2011
872011
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output
B Gierlichs, JM Schmidt, M Tunstall
International conference on cryptology and information security in Latin …, 2012
722012
RFID and its vulnerability to faults
M Hutter, JM Schmidt, T Plos
International Workshop on Cryptographic Hardware and Embedded Systems, 363-379, 2008
632008
Optical fault attacks on AES: A threat in violet
JM Schmidt, M Hutter, T Plos
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 13-22, 2009
562009
A fault attack on ECDSA
JM Schmidt, M Medwed
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 93-99, 2009
542009
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
S Belaïd, F De Santis, J Heyszl, S Mangard, M Medwed, JM Schmidt, ...
Journal of Cryptographic Engineering 4 (3), 157-171, 2014
372014
Uniform evaluation of hardware implementations of the round-two SHA-3 candidates
S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely
The Second SHA-3 Candidate Conference, 2010
342010
Contact-based fault injections and power analysis on RFID tags
M Hutter, JM Schmidt, T Plos
2009 European Conference on Circuit Theory and Design, 409-412, 2009
282009
Combined implementation attack resistant exponentiation
JM Schmidt, M Tunstall, R Avanzi, I Kizhvatov, T Kasper, D Oswald
International Conference on Cryptology and Information Security in Latin …, 2010
262010
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
International Conference on Trusted Systems, 253-270, 2010
212010
A continuous fault countermeasure for AES providing a constant error detection rate
M Medwed, JM Schmidt
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 66-71, 2010
212010
Connecting passive RFID tags to the Internet of Things
S Dominikus, JM Schmidt
Interconnecting Smart Objects with the Internet Workshop, Prague, 2011
202011
A generic fault countermeasure providing data and program flow integrity
M Medwed, JM Schmidt
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 68-73, 2008
202008
The system can't perform the operation now. Try again later.
Articles 1–20