default search action
Elisabeth Oswald
Person information
- affiliation: University of Klagenfurt, Austria
- affiliation: University of Bristol, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j10]Rebecca Hay, Elisabeth Oswald:
Key Rank Estimation Methods: Comparisons and Practical Considerations. IACR Commun. Cryptol. 1(3): 34 (2024) - [j9]Nima Mahdion, Elisabeth Oswald:
Efficiently Detecting Masking Flaws in Software Implementations. IACR Commun. Cryptol. 1(3): 35 (2024) - [c63]Thomas Marquet, Elisabeth Oswald:
Exploring Multi-task Learning in the Context of Masked AES Implementations. COSADE 2024: 93-112 - [c62]Aakash Chowdhury, Arnab Roy, Carlo Brunetta, Elisabeth Oswald:
Leakage Certification Made Simple. CRYPTO (6) 2024: 427-460 - [c61]Si Gao, Elisabeth Oswald:
A Novel Framework for Explainable Leakage Assessment. EUROCRYPT (3) 2024: 221-250 - [e8]Elisabeth Oswald:
Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings. Lecture Notes in Computer Science 14643, Springer 2024, ISBN 978-3-031-58867-9 [contents] - 2023
- [c60]Thomas Marquet, Elisabeth Oswald:
A Comparison of Multi-task Learning and Single-Task Learning Approaches. ACNS Workshops 2023: 121-138 - [c59]Yan Yan, Elisabeth Oswald, Arnab Roy:
Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis Test. ICISC (1) 2023: 240-258 - [i58]Thomas Marquet, Elisabeth Oswald:
Exploring multi-task learning in the context of two masked AES implementations. IACR Cryptol. ePrint Arch. 2023: 6 (2023) - [i57]Thomas Marquet, Elisabeth Oswald:
A Comparison of Multi-task learning and Single-task learning Approaches. IACR Cryptol. ePrint Arch. 2023: 611 (2023) - [i56]Yan Yan, Arnab Roy, Elisabeth Oswald:
Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test. IACR Cryptol. ePrint Arch. 2023: 1160 (2023) - 2022
- [c58]Rebecca Young, Luke Mather, Elisabeth Oswald:
Comparing Key Rank Estimation Methods. CARDIS 2022: 188-204 - [c57]Si Gao, Elisabeth Oswald:
A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators. EUROCRYPT (3) 2022: 254-283 - [c56]Si Gao, Elisabeth Oswald, Dan Page:
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical. EUROCRYPT (3) 2022: 284-311 - [i55]Si Gao, Elisabeth Oswald:
A Novel Framework for Explainable Leakage Assessment. IACR Cryptol. ePrint Arch. 2022: 182 (2022) - [i54]Arnab Roy, Aakash Chowdhury, Elisabeth Oswald:
Consistent, Efficient and Leakage-Model Free Mutual Information Estimation. IACR Cryptol. ePrint Arch. 2022: 1201 (2022) - [i53]Rebecca Young, Luke Mather, Elisabeth Oswald:
Comparing Key Rank Estimation Methods. IACR Cryptol. ePrint Arch. 2022: 1282 (2022) - 2021
- [j8]James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni:
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware. J. Cryptogr. Eng. 11(4): 317-327 (2021) - [j7]Si Gao, Elisabeth Oswald, Yan Yan:
Neyman's Smoothness Test: A Trade-Off Between Moment-Based and Distribution-Based Leakage Detections. IEEE Trans. Inf. Forensics Secur. 16: 4494-4506 (2021) - [c55]Yan Yan, Elisabeth Oswald, Srinivas Vivek:
An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage. ICISSP 2021: 89-97 - [i52]James Howe, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni:
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware. IACR Cryptol. ePrint Arch. 2021: 155 (2021) - [i51]Si Gao, Elisabeth Oswald:
A Novel Completeness Test and its Application to Side Channel Attacks and Simulators. IACR Cryptol. ePrint Arch. 2021: 756 (2021) - [i50]Si Gao, Elisabeth Oswald, Dan Page:
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor. IACR Cryptol. ePrint Arch. 2021: 794 (2021) - [i49]Si Gao, Elisabeth Oswald, Yan Yan:
Neyman's Smoothness Test: a Trade-off between Moment-based and Distribution-based Leakage Detections. IACR Cryptol. ePrint Arch. 2021: 1039 (2021) - 2020
- [j6]Si Gao, Ben Marshall, Dan Page, Elisabeth Oswald:
Share-slicing: Friend or Foe? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 152-174 (2020) - [c54]Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sébastien Duval, Christophe Giraud, Éliane Jaulmes, François Koeune, Elisabeth Oswald, François-Xavier Standaert, Carolyn Whitnall:
A Systematic Appraisal of Side Channel Evaluation Strategies. SSR 2020: 46-66 - [e7]Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran:
Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings. Lecture Notes in Computer Science 12578, Springer 2020, ISBN 978-3-030-65276-0 [contents] - [i48]Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sébastien Duval, Christophe Giraud, Éliane Jaulmes, François Koeune, Elisabeth Oswald, François-Xavier Standaert, Carolyn Whitnall:
A Systematic Appraisal of Side Channel Evaluation Strategies. IACR Cryptol. ePrint Arch. 2020: 1347 (2020) - [i47]Yan Yan, Elisabeth Oswald, Srinivas Vivek:
An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage. IACR Cryptol. ePrint Arch. 2020: 1455 (2020)
2010 – 2019
- 2019
- [c53]Carolyn Whitnall, Elisabeth Oswald:
A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules'). ASIACRYPT (3) 2019: 256-284 - [c52]Yan Yan, Elisabeth Oswald:
Examining the practical side channel resilience of ARX-boxes. CF 2019: 373-379 - [c51]Si Gao, Arnab Roy, Elisabeth Oswald:
Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations. CT-RSA 2019: 433-452 - [c50]James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald:
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography. ISCAS 2019: 1-5 - [i46]James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald:
Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography. IACR Cryptol. ePrint Arch. 2019: 206 (2019) - [i45]Yan Yan, Elisabeth Oswald:
Examining the Practical Side Channel Resilience of ARX-boxes. IACR Cryptol. ePrint Arch. 2019: 335 (2019) - [i44]Carolyn Whitnall, Elisabeth Oswald:
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation. IACR Cryptol. ePrint Arch. 2019: 703 (2019) - [i43]Carolyn Whitnall, Elisabeth Oswald:
A Critical Analysis of ISO 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules'). IACR Cryptol. ePrint Arch. 2019: 1013 (2019) - [i42]Joey Green, Tilo Burghardt, Elisabeth Oswald:
Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets. IACR Cryptol. ePrint Arch. 2019: 1068 (2019) - 2018
- [c49]Joey Green, Arnab Roy, Elisabeth Oswald:
A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AES. CARDIS 2018: 18-34 - [c48]Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi:
Non-profiled Mask Recovery: The Impact of Independent Component Analysis. CARDIS 2018: 51-64 - [c47]Daniel P. Martin, Luke Mather, Elisabeth Oswald:
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. CT-RSA 2018: 394-412 - [c46]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Exploring Potential 6LoWPAN Traffic Side Channels. EWSN 2018: 270-275 - [c45]Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam:
Assessing the Feasibility of Single Trace Power Analysis of Frodo. SAC 2018: 216-234 - [c44]Kalliopi Anastasopoulou, Emma J. Williams, Carolyn Whitnall, Theo Tryfonas, Elisabeth Oswald, Phillip L. Morgan, Alexandra Voinescu, Robert J. Piechocki, Andrea Tassi:
Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use. STAST 2018: 5:1-5:6 - [i41]Daniel P. Martin, Luke Mather, Elisabeth Oswald:
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. IACR Cryptol. ePrint Arch. 2018: 19 (2018) - [i40]Joey Green, Arnab Roy, Elisabeth Oswald:
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES. IACR Cryptol. ePrint Arch. 2018: 671 (2018) - [i39]Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam:
Assessing the Feasibility of Single Trace Power Analysis of Frodo. IACR Cryptol. ePrint Arch. 2018: 687 (2018) - [i38]Si Gao, Elisabeth Oswald, Hua Chen, Wei Xi:
Non-profiled Mask Recovery: the impact of Independent Component Analysis. IACR Cryptol. ePrint Arch. 2018: 871 (2018) - [i37]Si Gao, Arnab Roy, Elisabeth Oswald:
Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations. IACR Cryptol. ePrint Arch. 2018: 949 (2018) - [i36]Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam:
Fly, you fool! Faster Frodo for the ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2018: 1116 (2018) - 2017
- [c43]Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
Authenticated Encryption in the Face of Protocol and Side Channel Leakage. ASIACRYPT (1) 2017: 693-723 - [c42]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. CARDIS 2017: 70-87 - [c41]David McCann, Elisabeth Oswald:
Practical evaluation of masking software countermeasures on an IoT processor. IVSW 2017: 1-6 - [c40]Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Daniel James Shepherd:
Quantum Key Search with Side Channel Advice. SAC 2017: 407-422 - [c39]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. SAC 2017: 442-458 - [c38]David McCann, Elisabeth Oswald, Carolyn Whitnall:
Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages. USENIX Security Symposium 2017: 199-216 - [i35]Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
Authenticated Encryption in the Face of Protocol and Side Channel Leakage. IACR Cryptol. ePrint Arch. 2017: 68 (2017) - [i34]Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan J. Shepherd:
Quantum Key Search with Side Channel Advice. IACR Cryptol. ePrint Arch. 2017: 171 (2017) - [i33]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Exploring Potential 6LoWPAN Traffic Side Channels. IACR Cryptol. ePrint Arch. 2017: 316 (2017) - [i32]David McCann, Elisabeth Oswald:
Practical Evaluation of Masking Software Countermeasures on an IoT processor. IACR Cryptol. ePrint Arch. 2017: 399 (2017) - [i31]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. IACR Cryptol. ePrint Arch. 2017: 764 (2017) - [i30]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. IACR Cryptol. ePrint Arch. 2017: 1051 (2017) - 2016
- [c37]Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam:
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations. ASIACRYPT (1) 2016: 548-572 - [c36]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Cryptographic randomness on a CC2538: A case study. WIFS 2016: 1-6 - [e6]François-Xavier Standaert, Elisabeth Oswald:
Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9689, Springer 2016, ISBN 978-3-319-43282-3 [contents] - [i29]Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam:
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations. IACR Cryptol. ePrint Arch. 2016: 491 (2016) - [i28]David McCann, Carolyn Whitnall, Elisabeth Oswald:
ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab. IACR Cryptol. ePrint Arch. 2016: 517 (2016) - [i27]Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam:
How low can you go? Using side-channel data to enhance brute-force key recovery. IACR Cryptol. ePrint Arch. 2016: 609 (2016) - [i26]Yan Yan, Elisabeth Oswald, Theo Tryfonas:
Cryptographic Randomness on a CC2538: a Case Study. IACR Cryptol. ePrint Arch. 2016: 1021 (2016) - 2015
- [c35]Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam:
Counting Keys in Parallel After a Side Channel Attack. ASIACRYPT (2) 2015: 313-337 - [c34]Carolyn Whitnall, Elisabeth Oswald:
Robust Profiling for DPA-Style Attacks. CHES 2015: 3-21 - [c33]Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks. COSADE 2015: 51-63 - [c32]Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Reliable information extraction for single trace attacks. DATE 2015: 133-138 - [c31]Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik:
A Leakage Resilient MAC. IMACC 2015: 295-310 - [c30]David McCann, Kerstin Eder, Elisabeth Oswald:
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices. SIoT 2015: 65-71 - [e5]Elisabeth Oswald, Marc Fischlin:
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9056, Springer 2015, ISBN 978-3-662-46799-2 [contents] - [e4]Elisabeth Oswald, Marc Fischlin:
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9057, Springer 2015, ISBN 978-3-662-46802-9 [contents] - [i25]Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Reliable Information Extraction for Single Trace Attacks. IACR Cryptol. ePrint Arch. 2015: 45 (2015) - [i24]Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:
Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks. IACR Cryptol. ePrint Arch. 2015: 161 (2015) - [i23]Carolyn Whitnall, Elisabeth Oswald:
Robust Profiling for DPA-Style Attacks. IACR Cryptol. ePrint Arch. 2015: 527 (2015) - [i22]Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam:
How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack. IACR Cryptol. ePrint Arch. 2015: 689 (2015) - [i21]David McCann, Kerstin Eder, Elisabeth Oswald:
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices. IACR Cryptol. ePrint Arch. 2015: 832 (2015) - 2014
- [c29]Jake Longo, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijn Stam, Michael Tunstall:
Simulatable Leakage: Analysis, Pitfalls, and New Constructions. ASIACRYPT (1) 2014: 223-242 - [c28]Luke Mather, Elisabeth Oswald, Carolyn Whitnall:
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer. ASIACRYPT (1) 2014: 243-261 - [c27]Valentina Banciu, Elisabeth Oswald:
Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES. COSADE 2014: 29-40 - [c26]Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert:
The Myth of Generic DPA...and the Magic of Learning. CT-RSA 2014: 183-205 - [e3]Phong Q. Nguyen, Elisabeth Oswald:
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings. Lecture Notes in Computer Science 8441, Springer 2014, ISBN 978-3-642-55219-9 [contents] - [i20]Valentina Banciu, Elisabeth Oswald:
Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES. IACR Cryptol. ePrint Arch. 2014: 177 (2014) - [i19]Jake Longo Galea, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijn Stam:
Making and Breaking Leakage Simulators. IACR Cryptol. ePrint Arch. 2014: 357 (2014) - [i18]Luke Mather, Elisabeth Oswald, Carolyn Whitnall:
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer. IACR Cryptol. ePrint Arch. 2014: 365 (2014) - 2013
- [c25]Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wójcik:
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests. ASIACRYPT (1) 2013: 486-505 - [c24]Carolyn Whitnall, Elisabeth Oswald:
Profiling DPA: Efficacy and Efficiency Trade-Offs. CHES 2013: 37-54 - [c23]Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald:
Masking Tables - An Underestimated Security Risk. FSE 2013: 425-444 - [i17]Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
A Leakage Resilient MAC. IACR Cryptol. ePrint Arch. 2013: 292 (2013) - [i16]Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wójcik:
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices. IACR Cryptol. ePrint Arch. 2013: 298 (2013) - [i15]Carolyn Whitnall, Elisabeth Oswald:
Profiling DPA: Efficacy and efficiency trade-offs. IACR Cryptol. ePrint Arch. 2013: 353 (2013) - [i14]Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald:
Masking Tables - An Underestimated Security Risk. IACR Cryptol. ePrint Arch. 2013: 735 (2013) - 2012
- [j5]Luke Mather, Elisabeth Oswald:
Pinpointing side-channel information leaks in web applications. J. Cryptogr. Eng. 2(3): 161-177 (2012) - [c22]Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Compiler Assisted Masking. CHES 2012: 58-75 - [p3]Elisabeth Oswald, François-Xavier Standaert:
Side-Channel Analysis and Its Relevance to Fault Attacks. Fault Analysis in Cryptography 2012: 3-15 - [i13]Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert:
The myth of generic DPA...and the magic of learning. IACR Cryptol. ePrint Arch. 2012: 256 (2012) - [i12]Luke Mather, Elisabeth Oswald:
Quantifying Side-Channel Information Leakage from Web Applications. IACR Cryptol. ePrint Arch. 2012: 269 (2012) - 2011
- [j4]Stefan Mangard, Elisabeth Oswald, François-Xavier Standaert:
One for all - all for one: unifying standard differential power analysis attacks. IET Inf. Secur. 5(2): 100-110 (2011) - [j3]Carolyn Whitnall, Elisabeth Oswald:
A fair evaluation framework for comparing side-channel distinguishers. J. Cryptogr. Eng. 1(2): 145-160 (2011) - [c21]Carolyn Whitnall, Elisabeth Oswald, Luke Mather:
An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis. CARDIS 2011: 234-251 - [c20]Carolyn Whitnall, Elisabeth Oswald:
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework. CRYPTO 2011: 316-334 - [i11]Carolyn Whitnall, Elisabeth Oswald:
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework. IACR Cryptol. ePrint Arch. 2011: 322 (2011) - [i10]Carolyn Whitnall, Elisabeth Oswald, Luke Mather:
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis. IACR Cryptol. ePrint Arch. 2011: 380 (2011) - [i9]Carolyn Whitnall, Elisabeth Oswald:
A Fair Evaluation Framework for Comparing Side-Channel Distinguishers. IACR Cryptol. ePrint Arch. 2011: 403 (2011) - [i8]Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Automatic Insertion of DPA Countermeasures. IACR Cryptol. ePrint Arch. 2011: 412 (2011) - 2010
- [c19]François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard:
The World Is Not Enough: Another Look on Second-Order DPA. ASIACRYPT 2010: 112-129 - [p2]Elisabeth Oswald, Stefan Mangard:
Counteracting Power Analysis Attacks by Masking. Secure Integrated Circuits and Systems 2010: 159-178 - [p1]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. Towards Hardware-Intrinsic Security 2010: 99-134 - [i7]François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard:
The World is Not Enough: Another Look on Second-Order DPA. IACR Cryptol. ePrint Arch. 2010: 180 (2010)
2000 – 2009
- 2009
- [c18]Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. ICISC 2009: 176-192 - [e2]Luca Breveglieri, Israel Koren, David Naccache, Elisabeth Oswald, Jean-Pierre Seifert:
Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3824-2 [contents] - [i6]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. IACR Cryptol. ePrint Arch. 2009: 341 (2009) - [i5]Stefan Mangard, Elisabeth Oswald, François-Xavier Standaert:
One for All - All for One: Unifying Standard DPA Attacks. IACR Cryptol. ePrint Arch. 2009: 449 (2009) - [i4]Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. IACR Cryptol. ePrint Arch. 2009: 538 (2009) - 2008
- [j2]Nigel P. Smart, Elisabeth Oswald, Daniel Page:
Randomised representations. IET Inf. Secur. 2(2): 19-27 (2008) - [c17]Marcel Medwed, Elisabeth Oswald:
Template Attacks on ECDSA. WISA 2008: 14-27 - [e1]Elisabeth Oswald, Pankaj Rohatgi:
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Lecture Notes in Computer Science 5154, Springer 2008, ISBN 978-3-540-85052-6 [contents] - [i3]Marcel Medwed, Elisabeth Oswald:
Template Attacks on ECDSA. IACR Cryptol. ePrint Arch. 2008: 81 (2008) - 2007
- [b1]