Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Stefan Mangard
@article{DBLP:journals/tches/GigerlKMMP24, author = {Barbara Gigerl and Franz Klug and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Smooth Passage with the Guards: Second-Order Hardware Masking of the {AES} with Low Randomness and Low Latency}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {309--335}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.309-335}, doi = {10.46586/TCHES.V2024.I1.309-335}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/GigerlKMMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HadzicCPMB24, author = {Vedad Hadzic and Ga{\"{e}}tan Cassiers and Robert Primas and Stefan Mangard and Roderick Bloem}, title = {Quantile: Quantifying Information Leakage}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {433--456}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.433-456}, doi = {10.46586/TCHES.V2024.I1.433-456}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HadzicCPMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TollecHNABCHJM24, author = {Simon Tollec and Vedad Hadzic and Pascal Nasahl and Mihail Asavoae and Roderick Bloem and Damien Courouss{\'{e}} and Karine Heydemann and Mathieu Jan and Stefan Mangard}, title = {Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2024}, url = {https://eprint.iacr.org/2024/247}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TollecHNABCHJM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GigerlPM23, author = {Barbara Gigerl and Robert Primas and Stefan Mangard}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Formal Verification of Arithmetic Masking in Hardware and Software}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13905}, pages = {3--32}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33488-7\_1}, doi = {10.1007/978-3-031-33488-7\_1}, timestamp = {Fri, 02 Jun 2023 14:41:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/GigerlPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaarSRGM23, author = {Lukas Maar and Martin Schwarzl and Fabian Rauscher and Daniel Gruss and Stefan Mangard}, title = {{DOPE:} DOmain Protection Enforcement with {PKS}}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {662--676}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627113}, doi = {10.1145/3627106.3627113}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MaarSRGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/Unterguggenberger23, author = {Martin Unterguggenberger and David Schrammel and Pascal Nasahl and Robert Schilling and Lukas Lamster and Stefan Mangard}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Multi-Tag: {A} Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {177--189}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3590331}, doi = {10.1145/3579856.3590331}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/Unterguggenberger23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/SchrammelWLUM23, author = {David Schrammel and Moritz Waser and Lukas Lamster and Martin Unterguggenberger and Stefan Mangard}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {{SPEAR-V:} Secure and Practical Enclave Architecture for {RISC-V}}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {457--468}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3595784}, doi = {10.1145/3579856.3595784}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SchrammelWLUM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/GigerlPM23, author = {Barbara Gigerl and Robert Primas and Stefan Mangard}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Secure Context Switching of Masked Software Implementations}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {980--992}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3595798}, doi = {10.1145/3579856.3595798}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/GigerlPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Unterguggenberger23, author = {Martin Unterguggenberger and David Schrammel and Lukas Lamster and Pascal Nasahl and Stefan Mangard}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Cryptographically Enforced Memory Safety}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {889--903}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623138}, doi = {10.1145/3576915.3623138}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Unterguggenberger23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NasahlUNSSM23, author = {Pascal Nasahl and Martin Unterguggenberger and Rishub Nagpal and Robert Schilling and David Schrammel and Stefan Mangard}, title = {{SCFI:} State Machine Control-Flow Hardening Against Fault Attacks}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2023, Antwerp, Belgium, April 17-19, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/DATE56975.2023.10137038}, doi = {10.23919/DATE56975.2023.10137038}, timestamp = {Wed, 07 Jun 2023 22:08:03 +0200}, biburl = {https://dblp.org/rec/conf/date/NasahlUNSSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/NasahlM23, author = {Pascal Nasahl and Stefan Mangard}, editor = {Himanshu Thapliyal and Ronald F. DeMara and Inna Partin{-}Vaisband and Srinivas Katkoori}, title = {{SCRAMBLE-CFI:} Mitigating Fault-Induced Control-Flow Attacks on OpenTitan}, booktitle = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI} 2023, Knoxville, TN, USA, June 5-7, 2023}, pages = {45--50}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3583781.3590221}, doi = {10.1145/3583781.3590221}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/NasahlM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/NasahlSLGLDSM23, author = {Pascal Nasahl and Salmin Sultana and Hans Liljestrand and Karanvir Grewal and Michael LeMay and David M. Durham and David Schrammel and Stefan Mangard}, title = {{EC-CFI:} Control-Flow Integrity via Code Encryption Counteracting Fault Attacks}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2023, San Jose, CA, USA, May 1-4, 2023}, pages = {24--35}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/HOST55118.2023.10132915}, doi = {10.1109/HOST55118.2023.10132915}, timestamp = {Mon, 11 Sep 2023 17:53:23 +0200}, biburl = {https://dblp.org/rec/conf/host/NasahlSLGLDSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchrammelSGLDUN23, author = {David Schrammel and Salmin Sultana and Karanvir Grewal and Michael LeMay and David M. Durham and Martin Unterguggenberger and Pascal Nasahl and Stefan Mangard}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{MEMES:} Memory Encryption-Based Memory Safety on Commodity Hardware}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {25--36}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012050300003555}, doi = {10.5220/0012050300003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SchrammelSGLDUN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GinerSPEUMG23, author = {Lukas Giner and Stefan Steinegger and Antoon Purnal and Maria Eichlseder and Thomas Unterluggauer and Stefan Mangard and Daniel Gruss}, title = {Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2273--2287}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179440}, doi = {10.1109/SP46215.2023.10179440}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/GinerSPEUMG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LamsterUSM23, author = {Lukas Lamster and Martin Unterguggenberger and David Schrammel and Stefan Mangard}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {HashTag: Hash-based Integrity Protection for Tagged Architectures}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2797--2814}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/lamster}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LamsterUSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KoglerJG0S0GM23, author = {Andreas Kogler and Jonas Juffinger and Lukas Giner and Lukas Gerlach and Martin Schwarzl and Michael Schwarz and Daniel Gruss and Stefan Mangard}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7285--7302}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/kogler}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KoglerJG0S0GM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-02915, author = {Robert Schilling and Pascal Nasahl and Martin Unterguggenberger and Stefan Mangard}, title = {{SFP:} Providing System Call Flow Protection against Software and Fault Attacks}, journal = {CoRR}, volume = {abs/2301.02915}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.02915}, doi = {10.48550/ARXIV.2301.02915}, eprinttype = {arXiv}, eprint = {2301.02915}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-02915.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-13760, author = {Pascal Nasahl and Salmin Sultana and Hans Liljestrand and Karanvir Grewal and Michael LeMay and David M. Durham and David Schrammel and Stefan Mangard}, title = {{EC-CFI:} Control-Flow Integrity via Code Encryption Counteracting Fault Attacks}, journal = {CoRR}, volume = {abs/2301.13760}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.13760}, doi = {10.48550/ARXIV.2301.13760}, eprinttype = {arXiv}, eprint = {2301.13760}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-13760.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-03711, author = {Pascal Nasahl and Stefan Mangard}, title = {{SCRAMBLE-CFI:} Mitigating Fault-Induced Control-Flow Attacks on OpenTitan}, journal = {CoRR}, volume = {abs/2303.03711}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.03711}, doi = {10.48550/ARXIV.2303.03711}, eprinttype = {arXiv}, eprint = {2303.03711}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-03711.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GigerlPM23, author = {Barbara Gigerl and Robert Primas and Stefan Mangard}, title = {Secure Context Switching of Masked Software Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2023}, url = {https://eprint.iacr.org/2023/677}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GigerlPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CassiersGMMN23, author = {Ga{\"{e}}tan Cassiers and Barbara Gigerl and Stefan Mangard and Charles Momin and Rishub Nagpal}, title = {Compress: Reducing Area and Latency of Masked Pipelined Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1600}, year = {2023}, url = {https://eprint.iacr.org/2023/1600}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CassiersGMMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NasahlOVSTRM22, author = {Pascal Nasahl and Miguel Osorio and Pirmin Vogel and Michael Schaffner and Timothy Trippel and Dominic Rizzo and Stefan Mangard}, title = {{SYNFI:} Pre-Silicon Fault Analysis of an Open-Source Secure Element}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {56--87}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.56-87}, doi = {10.46586/TCHES.V2022.I4.56-87}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NasahlOVSTRM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NagpalGPM22, author = {Rishub Nagpal and Barbara Gigerl and Robert Primas and Stefan Mangard}, title = {Riding the Waves Towards Generic Single-Cycle Masking in Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {693--717}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.693-717}, doi = {10.46586/TCHES.V2022.I4.693-717}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NagpalGPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BloemGGHMP22, author = {Roderick Bloem and Barbara Gigerl and Marc Gourjon and Vedad Hadzic and Stefan Mangard and Robert Primas}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Power Contracts: Provably Complete Power Leakage Models for Processors}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {381--395}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560600}, doi = {10.1145/3548606.3560600}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BloemGGHMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/SchillingNM22, author = {Robert Schilling and Pascal Nasahl and Stefan Mangard}, editor = {Josep Balasch and Colin O'Flynn}, title = {{FIPAC:} Thwarting Fault- and Software-Induced Control-Flow Attacks with {ARM} Pointer Authentication}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13211}, pages = {100--124}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99766-3\_5}, doi = {10.1007/978-3-030-99766-3\_5}, timestamp = {Fri, 01 Apr 2022 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/cosade/SchillingNM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hasp/SchillingNUM22, author = {Robert Schilling and Pascal Nasahl and Martin Unterguggenberger and Stefan Mangard}, title = {{SFP:} Providing System Call Flow Protection against Software and Fault Attacks}, booktitle = {Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, {HASP} 2022, Chicago, IL, USA, 1 October 2022}, pages = {18--26}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3569562.3569565}, doi = {10.1145/3569562.3569565}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hasp/SchillingNUM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchrammelWSM22, author = {David Schrammel and Samuel Weiser and Richard Sadek and Stefan Mangard}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Jenny: Securing Syscalls for PKU-based Memory Isolation Systems}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {936--952}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/schrammel}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/SchrammelWSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-04775, author = {Pascal Nasahl and Miguel Osorio and Pirmin Vogel and Michael Schaffner and Timothy Trippel and Dominic Rizzo and Stefan Mangard}, title = {{SYNFI:} Pre-Silicon Fault Analysis of an Open-Source Secure Element}, journal = {CoRR}, volume = {abs/2205.04775}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.04775}, doi = {10.48550/ARXIV.2205.04775}, eprinttype = {arXiv}, eprint = {2205.04775}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-04775.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-01356, author = {Pascal Nasahl and Martin Unterguggenberger and Rishub Nagpal and Robert Schilling and David Schrammel and Stefan Mangard}, title = {{SCFI:} State Machine Control-Flow Hardening Against Fault Attacks}, journal = {CoRR}, volume = {abs/2208.01356}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.01356}, doi = {10.48550/ARXIV.2208.01356}, eprinttype = {arXiv}, eprint = {2208.01356}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-01356.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NagpalGPM22, author = {Rishub Nagpal and Barbara Gigerl and Robert Primas and Stefan Mangard}, title = {Riding the Waves Towards Generic Single-Cycle Masking in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2022}, url = {https://eprint.iacr.org/2022/505}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NagpalGPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BloemGGHMP22, author = {Roderick Bloem and Barbara Gigerl and Marc Gourjon and Vedad Hadzic and Stefan Mangard and Robert Primas}, title = {Power Contracts: Provably Complete Power Leakage Models for Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2022}, url = {https://eprint.iacr.org/2022/565}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BloemGGHMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GigerlPM22, author = {Barbara Gigerl and Robert Primas and Stefan Mangard}, title = {Formal Verification of Arithmetic Masking in Hardware and Software}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {849}, year = {2022}, url = {https://eprint.iacr.org/2022/849}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GigerlPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/NasahlSWM21, author = {Pascal Nasahl and Robert Schilling and Mario Werner and Stefan Mangard}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {{HECTOR-V:} {A} Heterogeneous {CPU} Architecture for a Secure {RISC-V} Execution Environment}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {187--199}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453112}, doi = {10.1145/3433210.3453112}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/NasahlSWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/NasahlSWHMM21, author = {Pascal Nasahl and Robert Schilling and Mario Werner and Jan Hoogerbrugge and Marcel Medwed and Stefan Mangard}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {200--212}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453684}, doi = {10.1145/3433210.3453684}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/NasahlSWHMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GigerlPM21, author = {Barbara Gigerl and Robert Primas and Stefan Mangard}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Secure and Efficient Software Masking on Superscalar Pipelined Processors}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {3--32}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_1}, doi = {10.1007/978-3-030-92075-3\_1}, timestamp = {Fri, 03 Dec 2021 17:36:49 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GigerlPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SteineggerSWNM21, author = {Stefan Steinegger and David Schrammel and Samuel Weiser and Pascal Nasahl and Stefan Mangard}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {SERVAS! Secure Enclaves via {RISC-V} Authenticryption Shield}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12973}, pages = {370--391}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88428-4\_19}, doi = {10.1007/978-3-030-88428-4\_19}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SteineggerSWNM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SchillingNWM21, author = {Robert Schilling and Pascal Nasahl and Stefan Weiglhofer and Stefan Mangard}, title = {SecWalk: Protecting Page Table Walks Against Fault Attacks}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2021, Tysons Corner, VA, USA, December 12-15, 2021}, pages = {56--67}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HOST49136.2021.9702269}, doi = {10.1109/HOST49136.2021.9702269}, timestamp = {Mon, 21 Feb 2022 19:10:15 +0100}, biburl = {https://dblp.org/rec/conf/host/SchillingNWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/NasahlSM21, author = {Pascal Nasahl and Robert Schilling and Stefan Mangard}, title = {Protecting Indirect Branches Against Fault Attacks Using {ARM} Pointer Authentication}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2021, Tysons Corner, VA, USA, December 12-15, 2021}, pages = {68--79}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HOST49136.2021.9702268}, doi = {10.1109/HOST49136.2021.9702268}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/NasahlSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GigerlHPMB21, author = {Barbara Gigerl and Vedad Hadzic and Robert Primas and Stefan Mangard and Roderick Bloem}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1469--1468}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/gigerl}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/GigerlHPMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-14993, author = {Robert Schilling and Pascal Nasahl and Stefan Mangard}, title = {{FIPAC:} Thwarting Fault- and Software-Induced Control-Flow Attacks with {ARM} Pointer Authentication}, journal = {CoRR}, volume = {abs/2104.14993}, year = {2021}, url = {https://arxiv.org/abs/2104.14993}, eprinttype = {arXiv}, eprint = {2104.14993}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-14993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-03395, author = {Stefan Steinegger and David Schrammel and Samuel Weiser and Pascal Nasahl and Stefan Mangard}, title = {SERVAS! Secure Enclaves via {RISC-V} Authenticryption Shield}, journal = {CoRR}, volume = {abs/2105.03395}, year = {2021}, url = {https://arxiv.org/abs/2105.03395}, eprinttype = {arXiv}, eprint = {2105.03395}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-03395.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GigerlPM21, author = {Barbara Gigerl and Robert Primas and Stefan Mangard}, title = {Secure and Efficient Software Masking on Superscalar Pipelined Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2021}, url = {https://eprint.iacr.org/2021/1110}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GigerlPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LippSGPHHMKGYHS20, author = {Moritz Lipp and Michael Schwarz and Daniel Gruss and Thomas Prescher and Werner Haas and Jann Horn and Stefan Mangard and Paul Kocher and Daniel Genkin and Yuval Yarom and Mike Hamburg and Raoul Strackx}, title = {Meltdown: reading kernel memory from user space}, journal = {Commun. {ACM}}, volume = {63}, number = {6}, pages = {46--56}, year = {2020}, url = {https://doi.org/10.1145/3357033}, doi = {10.1145/3357033}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/LippSGPHHMKGYHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/KocherHFGGHHLMP20, author = {Paul Kocher and Jann Horn and Anders Fogh and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, title = {Spectre attacks: exploiting speculative execution}, journal = {Commun. {ACM}}, volume = {63}, number = {7}, pages = {93--101}, year = {2020}, url = {https://doi.org/10.1145/3399742}, doi = {10.1145/3399742}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/KocherHFGGHHLMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/SchwarzWGMM20, author = {Michael Schwarz and Samuel Weiser and Daniel Gruss and Cl{\'{e}}mentine Maurice and Stefan Mangard}, title = {Malware Guard Extension: abusing Intel {SGX} to conceal cache attacks}, journal = {Cybersecur.}, volume = {3}, number = {1}, pages = {2}, year = {2020}, url = {https://doi.org/10.1186/s42400-019-0042-y}, doi = {10.1186/S42400-019-0042-Y}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/SchwarzWGMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEMMMPU20, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Bart Mennink and Robert Primas and Thomas Unterluggauer}, title = {Isap v2.0}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {390--416}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.390-416}, doi = {10.13154/TOSC.V2020.IS1.390-416}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEMMMPU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SchrammelWSS0MG20, author = {David Schrammel and Samuel Weiser and Stefan Steinegger and Martin Schwarzl and Michael Schwarz and Stefan Mangard and Daniel Gruss}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Donky: Domain Keys - Efficient In-Process Isolation for {RISC-V} and x86}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1677--1694}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/schrammel}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/SchrammelWSS0MG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-05262, author = {Pascal Nasahl and Robert Schilling and Mario Werner and Stefan Mangard}, title = {{HECTOR-V:} {A} Heterogeneous {CPU} Architecture for a Secure {RISC-V} Execution Environment}, journal = {CoRR}, volume = {abs/2009.05262}, year = {2020}, url = {https://arxiv.org/abs/2009.05262}, eprinttype = {arXiv}, eprint = {2009.05262}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-05262.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-06761, author = {Pascal Nasahl and Robert Schilling and Mario Werner and Jan Hoogerbrugge and Marcel Medwed and Stefan Mangard}, title = {CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory}, journal = {CoRR}, volume = {abs/2012.06761}, year = {2020}, url = {https://arxiv.org/abs/2012.06761}, eprinttype = {arXiv}, eprint = {2012.06761}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-06761.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GigerlHPMB20, author = {Barbara Gigerl and Vedad Hadzic and Robert Primas and Stefan Mangard and Roderick Bloem}, title = {Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1294}, year = {2020}, url = {https://eprint.iacr.org/2020/1294}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GigerlHPMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/UnterluggauerWM19, author = {Thomas Unterluggauer and Mario Werner and Stefan Mangard}, title = {{MEAS:} memory encryption and authentication secure against side-channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {137--158}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0180-2}, doi = {10.1007/S13389-018-0180-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/UnterluggauerWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrossSMKM19, author = {Hannes Gro{\ss} and Ko Stoffelen and Lauren De Meyer and Martin Krenn and Stefan Mangard}, editor = {Beg{\"{u}}l Bilgin and Svetla Petkova{-}Nikova and Vincent Rijmen}, title = {First-Order Masking with Only Two Random Bits}, booktitle = {Proceedings of {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2019, London, UK, November 11, 2019}, pages = {10--23}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338467.3358950}, doi = {10.1145/3338467.3358950}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GrossSMKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/WernerSUM19, author = {Mario Werner and Robert Schilling and Thomas Unterluggauer and Stefan Mangard}, editor = {J{\"{u}}rgen Teich and Franco Fummi}, title = {Protecting {RISC-V} Processors against Physical Attacks}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2019, Florence, Italy, March 25-29, 2019}, pages = {1136--1141}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/DATE.2019.8714811}, doi = {10.23919/DATE.2019.8714811}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/WernerSUM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WeiserWBMMS19, author = {Samuel Weiser and Mario Werner and Ferdinand Brasser and Maja Malenko and Stefan Mangard and Ahmad{-}Reza Sadeghi}, title = {{TIMBER-V:} Tag-Isolated Memory Bringing Fine-grained Enclaves to {RISC-V}}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/timber-v-tag-isolated-memory-bringing-fine-grained-enclaves-to-risc-v/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WeiserWBMMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KocherHFGGHHLM019, author = {Paul Kocher and Jann Horn and Anders Fogh and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, title = {Spectre Attacks: Exploiting Speculative Execution}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1--19}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00002}, doi = {10.1109/SP.2019.00002}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KocherHFGGHHLM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WernerUG0GM19, author = {Mario Werner and Thomas Unterluggauer and Lukas Giner and Michael Schwarz and Daniel Gruss and Stefan Mangard}, editor = {Nadia Heninger and Patrick Traynor}, title = {ScatterCache: Thwarting Cache Attacks via Cache Set Randomization}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {675--692}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/werner}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/WernerUG0GM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmcai/KarlSBM19, author = {Anja F. Karl and Robert Schilling and Roderick Bloem and Stefan Mangard}, editor = {Constantin Enea and Ruzica Piskac}, title = {Small Faults Grow Up - Verification of Error Masking Robustness in Arithmetically Encoded Programs}, booktitle = {Verification, Model Checking, and Abstract Interpretation - 20th International Conference, {VMCAI} 2019, Cascais, Portugal, January 13-15, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11388}, pages = {183--204}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-11245-5\_9}, doi = {10.1007/978-3-030-11245-5\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vmcai/KarlSBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/SpreitzerMKM18, author = {Raphael Spreitzer and Veelasha Moonsamy and Thomas Korak and Stefan Mangard}, title = {Systematic Classification of Side-Channel Attacks: {A} Case Study for Mobile Devices}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {20}, number = {1}, pages = {465--488}, year = {2018}, url = {https://doi.org/10.1109/COMST.2017.2779824}, doi = {10.1109/COMST.2017.2779824}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/SpreitzerMKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GrossM18, author = {Hannes Gro{\ss} and Stefan Mangard}, title = {A unified masking approach}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {2}, pages = {109--124}, year = {2018}, url = {https://doi.org/10.1007/s13389-018-0184-y}, doi = {10.1007/S13389-018-0184-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GrossM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DobraunigEKMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas}, title = {{SIFA:} Exploiting Ineffective Fault Inductions on Symmetric Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {547--572}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.547-572}, doi = {10.13154/TCHES.V2018.I3.547-572}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DobraunigEKMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchillingWNM18, author = {Robert Schilling and Mario Werner and Pascal Nasahl and Stefan Mangard}, title = {Pointing in the Right Direction - Securing Memory Accesses in a Faulty World}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {595--604}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274728}, doi = {10.1145/3274694.3274728}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchillingWNM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DobraunigEGMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Stefan Mangard and Florian Mendel and Robert Primas}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {315--342}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_11}, doi = {10.1007/978-3-030-03329-3\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DobraunigEGMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001GLMSFM18, author = {Michael Schwarz and Daniel Gruss and Moritz Lipp and Cl{\'{e}}mentine Maurice and Thomas Schuster and Anders Fogh and Stefan Mangard}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern {CPU} Features}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {587--600}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196508}, doi = {10.1145/3196494.3196508}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001GLMSFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SpreitzerKGM18, author = {Raphael Spreitzer and Felix Kirchengast and Daniel Gruss and Stefan Mangard}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {749--763}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196510}, doi = {10.1145/3196494.3196510}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SpreitzerKGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/SchillingUMGMB18, author = {Robert Schilling and Thomas Unterluggauer and Stefan Mangard and Frank K. G{\"{u}}rkaynak and Michael Muehlberghuber and Luca Benini}, editor = {Jan Madsen and Ayse K. Coskun}, title = {High speed {ASIC} implementations of leakage-resilient cryptography}, booktitle = {2018 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2018, Dresden, Germany, March 19-23, 2018}, pages = {1259--1264}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/DATE.2018.8342208}, doi = {10.23919/DATE.2018.8342208}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/SchillingUMGMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/SchillingWM18, author = {Robert Schilling and Mario Werner and Stefan Mangard}, editor = {Jan Madsen and Ayse K. Coskun}, title = {Securing conditional branches in the presence of fault attacks}, booktitle = {2018 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2018, Dresden, Germany, March 19-23, 2018}, pages = {1586--1591}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/DATE.2018.8342268}, doi = {10.23919/DATE.2018.8342268}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/SchillingWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BloemGIKMW18, author = {Roderick Bloem and Hannes Gro{\ss} and Rinat Iusupov and Bettina K{\"{o}}nighofer and Stefan Mangard and Johannes Winter}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Formal Verification of Masked Hardware Implementations in the Presence of Glitches}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {321--353}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_11}, doi = {10.1007/978-3-319-78375-8\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BloemGIKMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/WernerUSM18, author = {Mario Werner and Thomas Unterluggauer and David Schaffenrath and Stefan Mangard}, title = {Sponge-Based Control-Flow Protection for IoT Devices}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {214--226}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00023}, doi = {10.1109/EUROSP.2018.00023}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/WernerUSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kryptotag/WeiserZSMMS18, author = {Samuel Weiser and Andreas Zankl and Raphael Spreitzer and Katja Miller and Stefan Mangard and Georg Sigl}, editor = {Daniel Loebenberger and Michael N{\"{u}}sken}, title = {{DATA} - Differential Address Trace Analysis}, booktitle = {28. Krypto-Tag, Kirchheim bei M{\"{u}}nchen, Germany, June 7-8, 2018}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V. / {FG} {KRYPTO}}, year = {2018}, url = {https://doi.org/10.18420/cdm-2018-28-14}, doi = {10.18420/CDM-2018-28-14}, timestamp = {Fri, 18 Sep 2020 11:50:49 +0200}, biburl = {https://dblp.org/rec/conf/kryptotag/WeiserZSMMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/0001LGWMSM18, author = {Michael Schwarz and Moritz Lipp and Daniel Gruss and Samuel Weiser and Cl{\'{e}}mentine Maurice and Raphael Spreitzer and Stefan Mangard}, title = {KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_04B-1\_Schwarz\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/0001LGWMSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DobraunigMMP18, author = {Christoph Dobraunig and Stefan Mangard and Florian Mendel and Robert Primas}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {257--277}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_12}, doi = {10.1007/978-3-030-10970-7\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DobraunigMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WeiserZSMMS18, author = {Samuel Weiser and Andreas Zankl and Raphael Spreitzer and Katja Miller and Stefan Mangard and Georg Sigl}, editor = {William Enck and Adrienne Porter Felt}, title = {{DATA} - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {603--620}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/weiser}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WeiserZSMMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Lipp0G0HFHMKGYH18, author = {Moritz Lipp and Michael Schwarz and Daniel Gruss and Thomas Prescher and Werner Haas and Anders Fogh and Jann Horn and Stefan Mangard and Paul Kocher and Daniel Genkin and Yuval Yarom and Mike Hamburg}, editor = {William Enck and Adrienne Porter Felt}, title = {Meltdown: Reading Kernel Memory from User Space}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {973--990}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/lipp}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Lipp0G0HFHMKGYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SpreitzerPM18, author = {Raphael Spreitzer and Gerald Palfinger and Stefan Mangard}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {SCAnDroid: Automated Side-Channel Analysis of Android APIs}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {224--235}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212506}, doi = {10.1145/3212480.3212506}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SpreitzerPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-01203, author = {Paul Kocher and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, title = {Spectre Attacks: Exploiting Speculative Execution}, journal = {CoRR}, volume = {abs/1801.01203}, year = {2018}, url = {http://arxiv.org/abs/1801.01203}, eprinttype = {arXiv}, eprint = {1801.01203}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-01203.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-01207, author = {Moritz Lipp and Michael Schwarz and Daniel Gruss and Thomas Prescher and Werner Haas and Stefan Mangard and Paul Kocher and Daniel Genkin and Yuval Yarom and Mike Hamburg}, title = {Meltdown}, journal = {CoRR}, volume = {abs/1801.01207}, year = {2018}, url = {http://arxiv.org/abs/1801.01207}, eprinttype = {arXiv}, eprint = {1801.01207}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-01207.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-06691, author = {Mario Werner and Thomas Unterluggauer and David Schaffenrath and Stefan Mangard}, title = {Sponge-Based Control-Flow Protection for IoT Devices}, journal = {CoRR}, volume = {abs/1802.06691}, year = {2018}, url = {http://arxiv.org/abs/1802.06691}, eprinttype = {arXiv}, eprint = {1802.06691}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-06691.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-08359, author = {Robert Schilling and Mario Werner and Stefan Mangard}, title = {Securing Conditional Branches in the Presence of Fault Attacks}, journal = {CoRR}, volume = {abs/1803.08359}, year = {2018}, url = {http://arxiv.org/abs/1803.08359}, eprinttype = {arXiv}, eprint = {1803.08359}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-08359.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-08811, author = {Robert Schilling and Mario Werner and Pascal Nasahl and Stefan Mangard}, title = {Pointing in the Right Direction - Securing Memory Accesses in a Faulty World}, journal = {CoRR}, volume = {abs/1809.08811}, year = {2018}, url = {http://arxiv.org/abs/1809.08811}, eprinttype = {arXiv}, eprint = {1809.08811}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-08811.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Exploiting Ineffective Fault Inductions on Symmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2018}, url = {http://eprint.iacr.org/2018/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEGMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2018}, url = {https://eprint.iacr.org/2018/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEGMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigMMP18, author = {Christoph Dobraunig and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2018}, url = {https://eprint.iacr.org/2018/852}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossMKM18, author = {Hannes Gro{\ss} and Lauren De Meyer and Martin Krenn and Stefan Mangard}, title = {Masking the {AES} with Only Two Random Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1007}, year = {2018}, url = {https://eprint.iacr.org/2018/1007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossMKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BloemGIKM18, author = {Roderick Bloem and Hannes Gro{\ss} and Rinat Iusupov and Martin Krenn and Stefan Mangard}, title = {Sharing Independence {\&} Relabeling: Efficient Formal Verification of Higher-Order Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1031}, year = {2018}, url = {https://eprint.iacr.org/2018/1031}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BloemGIKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:tr/meltdown/m18, author = {Moritz Lipp and Michael Schwarz and Daniel Gruss and Thomas Prescher and Werner Haas and Stefan Mangard and Paul Kocher and Daniel Genkin and Yuval Yarom and Mike Hamburg}, title = {Meltdown}, journal = {meltdownattack.com}, year = {2018}, url = {https://meltdownattack.com/meltdown.pdf}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/tr/meltdown/m18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:tr/meltdown/s18, author = {Paul Kocher and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, title = {Spectre Attacks: Exploiting Speculative Execution}, journal = {meltdownattack.com}, year = {2018}, url = {https://spectreattack.com/spectre.pdf}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/tr/meltdown/s18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/ContiSSPRGMGLHM17, author = {Francesco Conti and Robert Schilling and Pasquale Davide Schiavone and Antonio Pullini and Davide Rossi and Frank Kagan G{\"{u}}rkaynak and Michael Muehlberghuber and Michael Gautschi and Igor Loi and Germain Haugou and Stefan Mangard and Luca Benini}, title = {An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {64-I}, number = {9}, pages = {2481--2494}, year = {2017}, url = {https://doi.org/10.1109/TCSI.2017.2698019}, doi = {10.1109/TCSI.2017.2698019}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/ContiSSPRGMGLHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEMMU17, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer}, title = {{ISAP} - Towards Side-Channel Secure Authenticated Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {80--105}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.80-105}, doi = {10.13154/TOSC.V2017.I1.80-105}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEMMU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/UnterluggauerKM17, author = {Thomas Unterluggauer and Thomas Korak and Stefan Mangard and Robert Schilling and Luca Benini and Frank K. G{\"{u}}rkaynak and Michael Muehlberghuber}, editor = {Thomas Eisenbarth and Yannick Teglia}, title = {Leakage Bounds for Gaussian Side Channels}, booktitle = {Smart Card Research and Advanced Applications - 16th International Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10728}, pages = {88--104}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75208-2\_6}, doi = {10.1007/978-3-319-75208-2\_6}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/UnterluggauerKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UnterluggauerWM17, author = {Thomas Unterluggauer and Mario Werner and Stefan Mangard}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {690--702}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052985}, doi = {10.1145/3052973.3052985}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/UnterluggauerWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossM17, author = {Hannes Gro{\ss} and Stefan Mangard}, editor = {Wieland Fischer and Naofumi Homma}, title = {Reconciling d+1 Masking in Hardware and Software}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {115--136}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_6}, doi = {10.1007/978-3-319-66787-4\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrossM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PrimasPM17, author = {Robert Primas and Peter Pessl and Stefan Mangard}, editor = {Wieland Fischer and Naofumi Homma}, title = {Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {513--533}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_25}, doi = {10.1007/978-3-319-66787-4\_25}, timestamp = {Mon, 18 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PrimasPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GrossMK17, author = {Hannes Gro{\ss} and Stefan Mangard and Thomas Korak}, editor = {Helena Handschuh}, title = {An Efficient Side-Channel Protected {AES} Implementation with Arbitrary Protection Order}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {95--112}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_6}, doi = {10.1007/978-3-319-52153-4\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GrossMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/UnterluggauerWM17, author = {Thomas Unterluggauer and Mario Werner and Stefan Mangard}, editor = {David Atienza and Giorgio Di Natale}, title = {Side-channel plaintext-recovery attacks on leakage-resilient encryption}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2017, Lausanne, Switzerland, March 27-31, 2017}, pages = {1318--1323}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/DATE.2017.7927197}, doi = {10.23919/DATE.2017.7927197}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/UnterluggauerWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SchwarzWGMM17, author = {Michael Schwarz and Samuel Weiser and Daniel Gruss and Cl{\'{e}}mentine Maurice and Stefan Mangard}, editor = {Michalis Polychronakis and Michael Meier}, title = {Malware Guard Extension: Using {SGX} to Conceal Cache Attacks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {3--24}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_1}, doi = {10.1007/978-3-319-60876-1\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SchwarzWGMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/GrossSM17, author = {Hannes Gro{\ss} and David Schaffenrath and Stefan Mangard}, editor = {Hana Kub{\'{a}}tov{\'{a}} and Martin Novotn{\'{y}} and Amund Skavhaug}, title = {Higher-Order Side-Channel Protected Implementations of {KECCAK}}, booktitle = {Euromicro Conference on Digital System Design, {DSD} 2017, Vienna, Austria, August 30 - Sept. 1, 2017}, pages = {205--212}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSD.2017.21}, doi = {10.1109/DSD.2017.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/GrossSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LippGSBMM17, author = {Moritz Lipp and Daniel Gruss and Michael Schwarz and David Bidner and Cl{\'{e}}mentine Maurice and Stefan Mangard}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Practical Keystroke Timing Attacks in Sandboxed JavaScript}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {191--209}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_11}, doi = {10.1007/978-3-319-66399-9\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LippGSBMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/GrussLSFMM17, author = {Daniel Gruss and Moritz Lipp and Michael Schwarz and Richard Fellner and Cl{\'{e}}mentine Maurice and Stefan Mangard}, editor = {Eric Bodden and Mathias Payer and Elias Athanasopoulos}, title = {{KASLR} is Dead: Long Live {KASLR}}, booktitle = {Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10379}, pages = {161--176}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-62105-0\_11}, doi = {10.1007/978-3-319-62105-0\_11}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/GrussLSFMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SchwarzMGM17, author = {Michael Schwarz and Cl{\'{e}}mentine Maurice and Daniel Gruss and Stefan Mangard}, editor = {Aggelos Kiayias}, title = {Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {247--267}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_13}, doi = {10.1007/978-3-319-70972-7\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/SchwarzMGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/WernerUSSM17, author = {Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard}, editor = {Marco D. Santambrogio and Diana G{\"{o}}hringer and Dirk Stroobandt and Nele Mentens and Jari Nurmi}, title = {Transparent memory encryption and authentication}, booktitle = {27th International Conference on Field Programmable Logic and Applications, {FPL} 2017, Ghent, Belgium, September 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/FPL.2017.8056797}, doi = {10.23919/FPL.2017.8056797}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/WernerUSSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/GurkaynakSM0MB17, author = {Frank K. G{\"{u}}rkaynak and Robert Schilling and Michael Muehlberghuber and Francesco Conti and Stefan Mangard and Luca Benini}, editor = {Mats Brorsson and Zhonghai Lu and Giovanni Agosta and Alessandro Barenghi and Gerardo Pelosi}, title = {Multi-core data analytics SoC with a flexible 1.76 Gbit/s {AES-XTS} cryptographic accelerator in 65 nm {CMOS}}, booktitle = {Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2017, Stockholm, Sweden, January 24, 2017}, pages = {19--24}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3031836.3031840}, doi = {10.1145/3031836.3031840}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipeac/GurkaynakSM0MB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MauriceW0GGBMR17, author = {Cl{\'{e}}mentine Maurice and Manuel Weber and Michael Schwarz and Lukas Giner and Daniel Gruss and Carlo Alberto Boano and Stefan Mangard and Kay R{\"{o}}mer}, title = {Hello from the Other Side: {SSH} over Robust Cache Covert Channels in the Cloud}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/hello-other-side-ssh-over-robust-cache-covert-channels-cloud/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MauriceW0GGBMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchwarzWGMM17, author = {Michael Schwarz and Samuel Weiser and Daniel Gruss and Cl{\'{e}}mentine Maurice and Stefan Mangard}, title = {Malware Guard Extension: Using {SGX} to Conceal Cache Attacks}, journal = {CoRR}, volume = {abs/1702.08719}, year = {2017}, url = {http://arxiv.org/abs/1702.08719}, eprinttype = {arXiv}, eprint = {1702.08719}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchwarzWGMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SchwarzLGWMSM17, author = {Michael Schwarz and Moritz Lipp and Daniel Gruss and Samuel Weiser and Cl{\'{e}}mentine Maurice and Raphael Spreitzer and Stefan Mangard}, title = {KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks}, journal = {CoRR}, volume = {abs/1706.06381}, year = {2017}, url = {http://arxiv.org/abs/1706.06381}, eprinttype = {arXiv}, eprint = {1706.06381}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SchwarzLGWMSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-01254, author = {Michael Schwarz and Daniel Gruss and Moritz Lipp and Cl{\'{e}}mentine Maurice and Thomas Schuster and Anders Fogh and Stefan Mangard}, title = {Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern {CPU} Features}, journal = {CoRR}, volume = {abs/1711.01254}, year = {2017}, url = {http://arxiv.org/abs/1711.01254}, eprinttype = {arXiv}, eprint = {1711.01254}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-01254.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossM17, author = {Hannes Gro{\ss} and Stefan Mangard}, title = {Reconciling d+1Masking in Hardware and Software}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2017}, url = {http://eprint.iacr.org/2017/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossSM17, author = {Hannes Gro{\ss} and David Schaffenrath and Stefan Mangard}, title = {Higher-Order Side-Channel Protected Implementations of Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2017}, url = {http://eprint.iacr.org/2017/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrimasPM17, author = {Robert Primas and Peter Pessl and Stefan Mangard}, title = {Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {594}, year = {2017}, url = {http://eprint.iacr.org/2017/594}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrimasPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/UnterluggauerWM17, author = {Thomas Unterluggauer and Mario Werner and Stefan Mangard}, title = {Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2017}, url = {http://eprint.iacr.org/2017/663}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/UnterluggauerWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WernerUSSM17, author = {Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard}, title = {Transparent Memory Encryption and Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {674}, year = {2017}, url = {http://eprint.iacr.org/2017/674}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WernerUSSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BloemGIKMW17, author = {Roderick Bloem and Hannes Gro{\ss} and Rinat Iusupov and Bettina K{\"{o}}nighofer and Stefan Mangard and Johannes Winter}, title = {Formal Verification of Masked Hardware Implementations in the Presence of Glitches}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {897}, year = {2017}, url = {http://eprint.iacr.org/2017/897}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BloemGIKMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/UnterluggauerKM17, author = {Thomas Unterluggauer and Thomas Korak and Stefan Mangard and Robert Schilling and Luca Benini and Frank K. G{\"{u}}rkaynak and Michael Muehlberghuber}, title = {Leakage Bounds for Gaussian Side Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {992}, year = {2017}, url = {http://eprint.iacr.org/2017/992}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/UnterluggauerKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GrossJMUW16, author = {Hannes Gro{\ss} and Manuel Jelinek and Stefan Mangard and Thomas Unterluggauer and Mario Werner}, editor = {Kerstin Lemke{-}Rust and Michael Tunstall}, title = {Concealing Secrets in Embedded Processors Designs}, booktitle = {Smart Card Research and Advanced Applications - 15th International Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10146}, pages = {89--104}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54669-8\_6}, doi = {10.1007/978-3-319-54669-8\_6}, timestamp = {Fri, 27 Mar 2020 08:58:07 +0100}, biburl = {https://dblp.org/rec/conf/cardis/GrossJMUW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrossMK16, author = {Hannes Gro{\ss} and Stefan Mangard and Thomas Korak}, editor = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, title = {Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order}, booktitle = {Proceedings of the {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016}, pages = {3}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996366.2996426}, doi = {10.1145/2996366.2996426}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GrossMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrussMFLM16, author = {Daniel Gruss and Cl{\'{e}}mentine Maurice and Anders Fogh and Moritz Lipp and Stefan Mangard}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Prefetch Side-Channel Attacks: Bypassing {SMAP} and Kernel {ASLR}}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {368--379}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978356}, doi = {10.1145/2976749.2978356}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GrussMFLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/UnterluggauerM16, author = {Thomas Unterluggauer and Stefan Mangard}, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, pages = {3--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0\_1}, doi = {10.1007/978-3-319-43283-0\_1}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/UnterluggauerM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PesslM16, author = {Peter Pessl and Stefan Mangard}, editor = {Kazue Sako}, title = {Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {255--270}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_15}, doi = {10.1007/978-3-319-29485-8\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PesslM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GrussMWM16, author = {Daniel Gruss and Cl{\'{e}}mentine Maurice and Klaus Wagner and Stefan Mangard}, editor = {Juan Caballero and Urko Zurutuza and Ricardo J. Rodr{\'{\i}}guez}, title = {Flush+Flush: {A} Fast and Stealthy Cache Attack}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n, Spain, July 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9721}, pages = {279--299}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40667-1\_14}, doi = {10.1007/978-3-319-40667-1\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/GrussMWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GrussMM16, author = {Daniel Gruss and Cl{\'{e}}mentine Maurice and Stefan Mangard}, editor = {Juan Caballero and Urko Zurutuza and Ricardo J. Rodr{\'{\i}}guez}, title = {Rowhammer.js: {A} Remote Software-Induced Fault Attack in JavaScript}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n, Spain, July 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9721}, pages = {300--321}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40667-1\_15}, doi = {10.1007/978-3-319-40667-1\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/GrussMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LippGSMM16, author = {Moritz Lipp and Daniel Gruss and Raphael Spreitzer and Cl{\'{e}}mentine Maurice and Stefan Mangard}, editor = {Thorsten Holz and Stefan Savage}, title = {ARMageddon: Cache Attacks on Mobile Devices}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {549--564}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/lipp}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/LippGSMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PesslGMSM16, author = {Peter Pessl and Daniel Gruss and Cl{\'{e}}mentine Maurice and Michael Schwarz and Stefan Mangard}, editor = {Thorsten Holz and Stefan Savage}, title = {{DRAMA:} Exploiting {DRAM} Addressing for Cross-CPU Attacks}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {565--581}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/PesslGMSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SpreitzerGKM16, author = {Raphael Spreitzer and Simone Griesmayr and Thomas Korak and Stefan Mangard}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {49--60}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939922}, doi = {10.1145/2939918.2939922}, timestamp = {Tue, 06 Nov 2018 16:59:31 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SpreitzerGKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016ccsw, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429}, doi = {10.1145/2996429}, isbn = {978-1-4503-4572-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016ccsw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016cpsspc, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Alvaro A. C{\'{a}}rdenas and Rakesh B. Bobba}, title = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994487}, doi = {10.1145/2994487}, isbn = {978-1-4503-4568-2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2016cpsspc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016trusted, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289}, doi = {10.1145/2995289}, isbn = {978-1-4503-4567-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016trusted.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SpreitzerMKM16, author = {Raphael Spreitzer and Veelasha Moonsamy and Thomas Korak and Stefan Mangard}, title = {SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices}, journal = {CoRR}, volume = {abs/1611.03748}, year = {2016}, url = {http://arxiv.org/abs/1611.03748}, eprinttype = {arXiv}, eprint = {1611.03748}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SpreitzerMKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0001SSPRGMGLHMB16, author = {Francesco Conti and Robert Schilling and Pasquale Davide Schiavone and Antonio Pullini and Davide Rossi and Frank Kagan G{\"{u}}rkaynak and Michael Muehlberghuber and Michael Gautschi and Igor Loi and Germain Haugou and Stefan Mangard and Luca Benini}, title = {An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics}, journal = {CoRR}, volume = {abs/1612.05974}, year = {2016}, url = {http://arxiv.org/abs/1612.05974}, eprinttype = {arXiv}, eprint = {1612.05974}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/0001SSPRGMGLHMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/UnterluggauerM16, author = {Thomas Unterluggauer and Stefan Mangard}, title = {Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2016}, url = {http://eprint.iacr.org/2016/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/UnterluggauerM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossMK16, author = {Hannes Gro{\ss} and Stefan Mangard and Thomas Korak}, title = {Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2016}, url = {http://eprint.iacr.org/2016/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossJMUW16, author = {Hannes Gro{\ss} and Manuel Jelinek and Stefan Mangard and Thomas Unterluggauer and Mario Werner}, title = {Concealing Secrets in Embedded Processors Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {935}, year = {2016}, url = {http://eprint.iacr.org/2016/935}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossJMUW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMMU16, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer}, title = {{ISAP} - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2016}, url = {http://eprint.iacr.org/2016/952}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMMU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/UnterluggauerWM16, author = {Thomas Unterluggauer and Mario Werner and Stefan Mangard}, title = {Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1074}, year = {2016}, url = {http://eprint.iacr.org/2016/1074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/UnterluggauerWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/WernerWM15, author = {Mario Werner and Erich Wenger and Stefan Mangard}, editor = {Naofumi Homma and Marcel Medwed}, title = {Protecting the Control Flow of Embedded Processors against Fault Attacks}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {161--176}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_10}, doi = {10.1007/978-3-319-31271-2\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/WernerWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DobraunigKMMS15, author = {Christoph Dobraunig and Fran{\c{c}}ois Koeune and Stefan Mangard and Florian Mendel and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Naofumi Homma and Marcel Medwed}, title = {Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {225--241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_14}, doi = {10.1007/978-3-319-31271-2\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/DobraunigKMMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GrussBM15, author = {Daniel Gruss and David Bidner and Stefan Mangard}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Practical Memory Deduplication Attacks in Sandboxed Javascript}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {108--122}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_6}, doi = {10.1007/978-3-319-24174-6\_6}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GrussBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/Mangard15, author = {Stefan Mangard}, editor = {Naofumi Homma and Victor Lomn{\'{e}}}, title = {Fault Attacks at the System Level - The Challenge of Securing Application Software}, booktitle = {2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2015, Saint Malo, France, September 13, 2015}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FDTC.2015.23}, doi = {10.1109/FDTC.2015.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/Mangard15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GrussSM15, author = {Daniel Gruss and Raphael Spreitzer and Stefan Mangard}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {897--912}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/gruss}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/GrussSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2015, editor = {Stefan Mangard and Axel Y. Poschmann}, title = {Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9064}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21476-4}, doi = {10.1007/978-3-319-21476-4}, isbn = {978-3-319-21475-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rfidsec/2015, editor = {Stefan Mangard and Patrick Schaumont}, title = {Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9440}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24837-0}, doi = {10.1007/978-3-319-24837-0}, isbn = {978-3-319-24836-3}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrussMM15, author = {Daniel Gruss and Cl{\'{e}}mentine Maurice and Stefan Mangard}, title = {Rowhammer.js: {A} Remote Software-Induced Fault Attack in JavaScript}, journal = {CoRR}, volume = {abs/1507.06955}, year = {2015}, url = {http://arxiv.org/abs/1507.06955}, eprinttype = {arXiv}, eprint = {1507.06955}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrussMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LippGSM15, author = {Moritz Lipp and Daniel Gruss and Raphael Spreitzer and Stefan Mangard}, title = {ARMageddon: Last-Level Cache Attacks on Mobile Devices}, journal = {CoRR}, volume = {abs/1511.04897}, year = {2015}, url = {http://arxiv.org/abs/1511.04897}, eprinttype = {arXiv}, eprint = {1511.04897}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LippGSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PesslGMM15, author = {Peter Pessl and Daniel Gruss and Cl{\'{e}}mentine Maurice and Stefan Mangard}, title = {Reverse Engineering Intel {DRAM} Addressing and Exploitation}, journal = {CoRR}, volume = {abs/1511.08756}, year = {2015}, url = {http://arxiv.org/abs/1511.08756}, eprinttype = {arXiv}, eprint = {1511.08756}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PesslGMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMM15, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel}, title = {On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2015}, url = {http://eprint.iacr.org/2015/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BelaidSHMMSST14, author = {Sonia Bela{\"{\i}}d and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and J{\"{o}}rn{-}Marc Schmidt and Fran{\c{c}}ois{-}Xavier Standaert and Stefan Tillich}, title = {Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {3}, pages = {157--171}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0079-5}, doi = {10.1007/S13389-014-0079-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BelaidSHMMSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DobraunigEMM14, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel}, editor = {Marc Joye and Amir Moradi}, title = {On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks}, booktitle = {Smart Card Research and Advanced Applications - 13th International Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8968}, pages = {233--244}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16763-3\_14}, doi = {10.1007/978-3-319-16763-3\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/DobraunigEMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Mangard13, author = {Stefan Mangard}, title = {Keeping Secrets on Low-Cost Chips}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {4}, pages = {75--77}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.88}, doi = {10.1109/MSP.2013.88}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Mangard13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HeyszlIMSS13, author = {Johann Heyszl and Andreas Ibing and Stefan Mangard and Fabrizio De Santis and Georg Sigl}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {79--93}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_6}, doi = {10.1007/978-3-319-08302-5\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HeyszlIMSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SantisKMSSS13, author = {Fabrizio De Santis and Michael Kasper and Stefan Mangard and Georg Sigl and Oliver Stein and Marc St{\"{o}}ttinger}, editor = {Goutam Paul and Serge Vaudenay}, title = {On the Relationship between Correlation Power Analysis and the Stochastic Approach: An {ASIC} Designer Perspective}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8250}, pages = {215--226}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03515-4\_14}, doi = {10.1007/978-3-319-03515-4\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SantisKMSSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2012, editor = {Stefan Mangard}, title = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37288-9}, doi = {10.1007/978-3-642-37288-9}, isbn = {978-3-642-37287-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidSHMMSST13, author = {Sonia Bela{\"{\i}}d and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and J{\"{o}}rn{-}Marc Schmidt and Fran{\c{c}}ois{-}Xavier Standaert and Stefan Tillich}, title = {Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2013}, url = {http://eprint.iacr.org/2013/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidSHMMSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeyszlIMSS13, author = {Johann Heyszl and Andreas Ibing and Stefan Mangard and Fabrizio De Santis and Georg Sigl}, title = {Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2013}, url = {http://eprint.iacr.org/2013/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeyszlIMSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mangard12, author = {Stefan Mangard}, title = {Die physikalische Sicherheit eingebetteter Systeme}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {867--871}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0292-2}, doi = {10.1007/S11623-012-0292-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mangard12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/HutterKPSM12, author = {Michael Hutter and Mario Kirschbaum and Thomas Plos and J{\"{o}}rn{-}Marc Schmidt and Stefan Mangard}, editor = {Werner Schindler and Sorin A. Huss}, title = {Exploiting the Difference of Side-Channel Leakages}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_1}, doi = {10.1007/978-3-642-29912-4\_1}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HutterKPSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HeyszlMHSS12, author = {Johann Heyszl and Stefan Mangard and Benedikt Heinz and Frederic Stumpf and Georg Sigl}, editor = {Orr Dunkelman}, title = {Localized Electromagnetic Analysis of Cryptographic Implementations}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {231--244}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_15}, doi = {10.1007/978-3-642-27954-6\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HeyszlMHSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MangardOS11, author = {Stefan Mangard and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {One for all - all for one: unifying standard differential power analysis attacks}, journal = {{IET} Inf. Secur.}, volume = {5}, number = {2}, pages = {100--110}, year = {2011}, url = {https://doi.org/10.1049/iet-ifs.2010.0096}, doi = {10.1049/IET-IFS.2010.0096}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MangardOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/MedwedM11, author = {Marcel Medwed and Stefan Mangard}, title = {Arithmetic logic units with high error detection rates to counteract fault attacks}, booktitle = {Design, Automation and Test in Europe, {DATE} 2011, Grenoble, France, March 14-18, 2011}, pages = {1644--1649}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/DATE.2011.5763261}, doi = {10.1109/DATE.2011.5763261}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/MedwedM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/GammelM10, author = {Berndt M. Gammel and Stefan Mangard}, title = {On the Duality of Probing and Fault Attacks}, journal = {J. Electron. Test.}, volume = {26}, number = {4}, pages = {483--493}, year = {2010}, url = {https://doi.org/10.1007/s10836-010-5160-0}, doi = {10.1007/S10836-010-5160-0}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/et/GammelM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/StandaertVOGMKM10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, editor = {Masayuki Abe}, title = {The World Is Not Enough: Another Look on Second-Order {DPA}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {112--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_7}, doi = {10.1007/978-3-642-17373-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/StandaertVOGMKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/OswaldM10, author = {Elisabeth Oswald and Stefan Mangard}, editor = {Ingrid M. R. Verbauwhede}, title = {Counteracting Power Analysis Attacks by Masking}, booktitle = {Secure Integrated Circuits and Systems}, series = {Integrated Circuits and Systems}, pages = {159--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-71829-3\_9}, doi = {10.1007/978-0-387-71829-3\_9}, timestamp = {Wed, 26 Jun 2019 18:00:01 +0200}, biburl = {https://dblp.org/rec/books/sp/10/OswaldM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2010, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9}, doi = {10.1007/978-3-642-15031-9}, isbn = {978-3-642-15030-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertVOGMKM10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, title = {The World is Not Enough: Another Look on Second-Order {DPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2010}, url = {http://eprint.iacr.org/2010/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PoppKM09, author = {Thomas Popp and Mario Kirschbaum and Stefan Mangard}, editor = {Marc Fischlin}, title = {Practical Attacks on Masked Hardware}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {211--225}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_14}, doi = {10.1007/978-3-642-00862-7\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PoppKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-4273, author = {Berndt M. Gammel and Stefan Mangard}, title = {On the Duality of Probing and Fault Attacks}, journal = {CoRR}, volume = {abs/0907.4273}, year = {2009}, url = {http://arxiv.org/abs/0907.4273}, eprinttype = {arXiv}, eprint = {0907.4273}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-4273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GammelM09, author = {Berndt M. Gammel and Stefan Mangard}, title = {On the Duality of Probing and Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2009}, url = {http://eprint.iacr.org/2009/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GammelM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MangardOS09, author = {Stefan Mangard and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {One for All - All for One: Unifying Standard {DPA} Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2009}, url = {http://eprint.iacr.org/2009/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MangardOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0017272, author = {Stefan Mangard and Elisabeth Oswald and Thomas Popp}, title = {Power analysis attacks - revealing the secrets of smart cards}, publisher = {Springer}, year = {2007}, isbn = {978-0-387-30857-9}, timestamp = {Mon, 21 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0017272.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/PoppMO07, author = {Thomas Popp and Stefan Mangard and Elisabeth Oswald}, title = {Power Analysis Attacks and Countermeasures}, journal = {{IEEE} Des. Test Comput.}, volume = {24}, number = {6}, pages = {535--543}, year = {2007}, url = {https://doi.org/10.1109/MDT.2007.200}, doi = {10.1109/MDT.2007.200}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/PoppMO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TillichHM07, author = {Stefan Tillich and Christoph Herbst and Stefan Mangard}, editor = {Jonathan Katz and Moti Yung}, title = {Protecting {AES} Software Implementations on 32-Bit Processors Against Power Analysis}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {141--157}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_10}, doi = {10.1007/978-3-540-72738-5\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TillichHM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoppKZM07, author = {Thomas Popp and Mario Kirschbaum and Thomas Zefferer and Stefan Mangard}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Evaluation of the Masked Logic Style {MDPL} on a Prototype Chip}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {81--94}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_6}, doi = {10.1007/978-3-540-74735-2\_6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoppKZM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterMF07, author = {Michael Hutter and Stefan Mangard and Martin Feldhofer}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Power and {EM} Attacks on Passive 13.56 MHz {RFID} Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {320--333}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_22}, doi = {10.1007/978-3-540-74735-2\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HutterMF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/OswaldM07, author = {Elisabeth Oswald and Stefan Mangard}, editor = {Masayuki Abe}, title = {Template Attacks on Masking - Resistance Is Futile}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {243--256}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_16}, doi = {10.1007/11967668\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/OswaldM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/RaviM07, author = {Srivaths Ravi and Stefan Mangard}, title = {Tutorial {T1:} Designing Secure SoCs}, booktitle = {20th International Conference on {VLSI} Design {(VLSI} Design 2007), Sixth International Conference on Embedded Systems {(ICES} 2007), 6-10 January 2007, Bangalore, India}, pages = {3}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/VLSID.2007.165}, doi = {10.1109/VLSID.2007.165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vlsid/RaviM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HerbstOM06, author = {Christoph Herbst and Elisabeth Oswald and Stefan Mangard}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {An {AES} Smart Card Implementation Resistant to Power Analysis Attacks}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {239--252}, year = {2006}, url = {https://doi.org/10.1007/11767480\_16}, doi = {10.1007/11767480\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HerbstOM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MangardS06, author = {Stefan Mangard and Kai Schramm}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Pinpointing the Side-Channel Leakage of Masked {AES} Hardware Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {76--90}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_7}, doi = {10.1007/11894063\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/MangardS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/OswaldMHT06, author = {Elisabeth Oswald and Stefan Mangard and Christoph Herbst and Stefan Tillich}, editor = {David Pointcheval}, title = {Practical Second-Order {DPA} Attacks for Masked Smart Card Implementations of Block Ciphers}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {192--207}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_13}, doi = {10.1007/11605805\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/OswaldMHT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/AignerMMMOPST06, author = {Manfred Josef Aigner and Stefan Mangard and Francesco Menichelli and Renato Menicocci and Mauro Olivieri and Thomas Popp and Giuseppe Scotti and Alessandro Trifiletti}, title = {Side channel analysis resistant design flow}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24 May 2006, Island of Kos, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCAS.2006.1693233}, doi = {10.1109/ISCAS.2006.1693233}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/AignerMMMOPST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/PoppM06, author = {Thomas Popp and Stefan Mangard}, title = {Implementation aspects of the DPA-resistant logic style {MDPL}}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24 May 2006, Island of Kos, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCAS.2006.1693234}, doi = {10.1109/ISCAS.2006.1693234}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/PoppM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YooHMOM06, author = {HyungSo Yoo and Christoph Herbst and Stefan Mangard and Elisabeth Oswald and Sang{-}Jae Moon}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Investigations of Power Analysis Attacks and Countermeasures for {ARIA}}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {160--172}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_13}, doi = {10.1007/978-3-540-71093-6\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YooHMOM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MangardPO05, author = {Stefan Mangard and Norbert Pramstaller and Elisabeth Oswald}, editor = {Josyula R. Rao and Berk Sunar}, title = {Successfully Attacking Masked {AES} Hardware Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {157--171}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_12}, doi = {10.1007/11545262\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MangardPO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoppM05, author = {Thomas Popp and Stefan Mangard}, editor = {Josyula R. Rao and Berk Sunar}, title = {Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {172--186}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_13}, doi = {10.1007/11545262\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoppM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MangardPG05, author = {Stefan Mangard and Thomas Popp and Berndt M. Gammel}, editor = {Alfred Menezes}, title = {Side-Channel Leakage of Masked {CMOS} Gates}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {351--365}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_24}, doi = {10.1007/978-3-540-30574-3\_24}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MangardPG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OswaldMPR05, author = {Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller and Vincent Rijmen}, editor = {Henri Gilbert and Helena Handschuh}, title = {A Side-Channel Analysis Resistant Description of the {AES} S-Box}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {413--423}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_28}, doi = {10.1007/11502760\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/OswaldMPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/AignerMMOST05, author = {Manfred Josef Aigner and Stefan Mangard and Renato Menicocci and Mauro Olivieri and Giuseppe Scotti and Alessandro Trifiletti}, title = {A novel {CMOS} logic style with data independent power consumption}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26 May 2005, Kobe, Japan}, pages = {1066--1069}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISCAS.2005.1464776}, doi = {10.1109/ISCAS.2005.1464776}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/AignerMMOST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/PramstallerMDW04, author = {Norbert Pramstaller and Stefan Mangard and Sandra Dominikus and Johannes Wolkerstorfer}, editor = {Hans Dobbertin and Vincent Rijmen and Aleksandra Sowa}, title = {Efficient {AES} Implementations on ASICs and FPGAs}, booktitle = {Advanced Encryption Standard - AES, 4th International Conference, {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3373}, pages = {98--112}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11506447\_9}, doi = {10.1007/11506447\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/aes/PramstallerMDW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Mangard04, author = {Stefan Mangard}, editor = {Tatsuaki Okamoto}, title = {Hardware Countermeasures against {DPA} ? {A} Statistical Analysis of Their Effectiveness}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {222--235}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_18}, doi = {10.1007/978-3-540-24660-2\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Mangard04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OswaldMP04, author = {Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller}, title = {Secure and Efficient Masking of {AES} - {A} Mission Impossible?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2004}, url = {http://eprint.iacr.org/2004/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OswaldMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MangardAD03, author = {Stefan Mangard and Manfred Josef Aigner and Sandra Dominikus}, title = {A Highly Regular and Scalable {AES} Hardware Architecture}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {4}, pages = {483--491}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1190589}, doi = {10.1109/TC.2003.1190589}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/MangardAD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Mangard02, author = {Stefan Mangard}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Simple Power-Analysis {(SPA)} Attack on Implementations of the {AES} Key Expansion}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {343--358}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_24}, doi = {10.1007/3-540-36552-4\_24}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Mangard02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseM01, author = {Giuseppe Ateniese and Stefan Mangard}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {A new approach to {DNS} security {(DNSSEC)}}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {86--95}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501996}, doi = {10.1145/501983.501996}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.