Följ
Jörn-Marc Schmidt
Jörn-Marc Schmidt
Institute for Applied Information Processing and Communications, Graz University of Technology
Verifierad e-postadress på iaik.tugraz.at
Titel
Citeras av
Citeras av
År
The temperature side channel and heating fault attacks
M Hutter, JM Schmidt
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
2682014
Hardware designer's guide to fault attacks
D Karaklajić, JM Schmidt, I Verbauwhede
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 21 (12 …, 2013
2222013
Optical and em fault-attacks on crt-based rsa: Concrete results
JM Schmidt, M Hutter
na, 2007
1772007
A practical fault attack on square and multiply
JM Schmidt, C Herbst
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 53-58, 2008
1492008
Improved glucose tolerance in rats treated with the dipeptidyl peptidase IV (CD26) inhibitor Ile-thiazolidide
RP Pauly, HU Demuth, F Rosche, J Schmidt, HA White, F Lynn, ...
Metabolism 48 (3), 385-389, 1999
1481999
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output
B Gierlichs, JM Schmidt, M Tunstall
Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012
1072012
The fault attack jungle-a classification model to guide you
I Verbauwhede, D Karaklajic, JM Schmidt
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 3-8, 2011
1042011
High-speed hardware implementations of blake, blue midnight wish, cubehash, echo, fugue, grøstl, hamsi, jh, keccak, luffa, shabal, shavite-3, simd, and skein
S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely
Cryptology EPrint Archive, 2009
972009
Optical fault attacks on AES: A threat in violet
JM Schmidt, M Hutter, T Plos
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 13-22, 2009
862009
A fault attack on ECDSA
JM Schmidt, M Medwed
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 93-99, 2009
752009
RFID and its vulnerability to faults
M Hutter, JM Schmidt, T Plos
Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008
712008
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
S Belaïd, F De Santis, J Heyszl, S Mangard, M Medwed, JM Schmidt, ...
Journal of Cryptographic Engineering 4, 157-171, 2014
462014
Contact-based fault injections and power analysis on RFID tags
M Hutter, JM Schmidt, T Plos
2009 European Conference on Circuit Theory and Design, 409-412, 2009
402009
Combined implementation attack resistant exponentiation
JM Schmidt, M Tunstall, R Avanzi, I Kizhvatov, T Kasper, D Oswald
Progress in Cryptology–LATINCRYPT 2010: First International Conference on …, 2010
342010
Uniform evaluation of hardware implementations of the round-two SHA-3 candidates
S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely
The Second SHA-3 Candidate Conference, 2010
322010
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
Trusted Systems: Second International Conference, INTRUST 2010, Beijing …, 2011
252011
Side-channel leakage across borders
JM Schmidt, T Plos, M Kirschbaum, M Hutter, M Medwed, C Herbst
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
242010
A probing attack on AES
JM Schmidt, CH Kim
Information Security Applications: 9th International Workshop, WISA 2008 …, 2009
232009
A generic fault countermeasure providing data and program flow integrity
M Medwed, JM Schmidt
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 68-73, 2008
232008
Connecting passive RFID tags to the Internet of Things
S Dominikus, JM Schmidt
Interconnecting Smart Objects with the Internet Workshop, Prague, 2011
222011
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20