default search action
Tobias Schneider 0002
Person information
- affiliation: NXP Semiconductors, Austria
- affiliation (former): Université catholique de Louvain, Belgium
- affiliation (former): Ruhr University Bochum, Germany
Other persons with the same name
- Tobias Schneider — disambiguation page
- Tobias Schneider 0001 — Elektrobit Automotive GmbH, Erlangen, Germany (and 1 more)
- Tobias Schneider 0003 — Stuttgart Media University, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider:
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks Application to CRYSTALS-Dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 359-383 (2024) - [j15]Eduardo Alvarenga, Jan R. Brands, Peter Doliwa, Jerry den Hartog, Erik Kraft, Marcel Medwed, Ventzislav Nikov, Joost Renes, Martin Rosso, Tobias Schneider, Nikita Veshchikov:
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications. IEEE Trans. Emerg. Top. Comput. 12(2): 583-600 (2024) - 2023
- [j14]Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Tobias Schneider, Markus Schönauer, François-Xavier Standaert, Christine van Vredendaal:
Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 58-79 (2023) - [j13]Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal:
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 262-286 (2023) - [e1]Ileana Buhan, Tobias Schneider:
Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13820, Springer 2023, ISBN 978-3-031-25318-8 [contents] - [i21]Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal:
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium. IACR Cryptol. ePrint Arch. 2023: 1074 (2023) - [i20]Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider:
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium. IACR Cryptol. ePrint Arch. 2023: 1545 (2023) - 2022
- [j12]Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal:
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 372-396 (2022) - [c17]Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert:
Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber. COSADE 2022: 236-256 - [i19]Melissa Azouaoui, Olivier Bronchain, Clément Hoffmann, Yulia Kuzovkova, Tobias Schneider, François-Xavier Standaert:
Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber. IACR Cryptol. ePrint Arch. 2022: 36 (2022) - [i18]Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal:
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2022: 916 (2022) - [i17]Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Markus Schönauer, Tobias Schneider, François-Xavier Standaert, Christine van Vredendaal:
Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations. IACR Cryptol. ePrint Arch. 2022: 1406 (2022) - 2021
- [j11]Olivier Bronchain, Tobias Schneider, François-Xavier Standaert:
Reducing risks through simplicity: high side-channel security for lazy engineers. J. Cryptogr. Eng. 11(1): 39-55 (2021) - [j10]Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal:
Masking Kyber: First- and Higher-Order Implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 173-214 (2021) - [c16]Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal:
The Matrix Reloaded: Multiplication Strategies in FrodoKEM. CANS 2021: 72-91 - [c15]Marcel Medwed, Ventzislav Nikov, Joost Renes, Tobias Schneider, Nikita Veshchikov:
Cyber Resilience for Self-Monitoring IoT Devices. CSR 2021: 160-167 - [i16]Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal:
Masking Kyber: First- and Higher-Order Implementations. IACR Cryptol. ePrint Arch. 2021: 483 (2021) - [i15]Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider, Christine van Vredendaal:
The Matrix Reloaded: Multiplication Strategies in FrodoKEM. IACR Cryptol. ePrint Arch. 2021: 711 (2021) - 2020
- [j9]Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider:
Impeccable Circuits. IEEE Trans. Computers 69(3): 361-376 (2020) - [j8]Florian Bache, Clara Paglialonga, Tobias Oder, Tobias Schneider, Tim Güneysu:
High-Speed Masking for Polynomial Comparison in Lattice-based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 483-507 (2020)
2010 – 2019
- 2019
- [j7]Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert:
Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 256-292 (2019) - [j6]Olivier Bronchain, Tobias Schneider, François-Xavier Standaert:
Multi-Tuple Leakage Detection and the Dependent Signal Issue. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(2): 318-345 (2019) - [c14]Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu:
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. Public Key Cryptography (2) 2019: 534-564 - [i14]Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu:
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. IACR Cryptol. ePrint Arch. 2019: 910 (2019) - 2018
- [b1]Tobias Schneider:
Hardware-based countermeasures against physical attacks. Ruhr University Bochum, Germany, 2018 - [j5]Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu:
Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 142-174 (2018) - [j4]Amir Moradi, Bastian Richter, Tobias Schneider, François-Xavier Standaert:
Leakage Detection with the x2-Test. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 209-237 (2018) - [i13]Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Falk Schellenberg, Tobias Schneider:
Impeccable Circuits. IACR Cryptol. ePrint Arch. 2018: 203 (2018) - [i12]Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert:
Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed. IACR Cryptol. ePrint Arch. 2018: 490 (2018) - 2017
- [j3]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptogr. Eng. 7(2): 149-165 (2017) - [c13]Sebastian Faust, Clara Paglialonga, Tobias Schneider:
Amortizing Randomness Complexity in Private Circuits. ASIACRYPT (1) 2017: 781-810 - [c12]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli : A Cross-Platform Permutation. CHES 2017: 299-320 - [c11]Florian Bache, Tobias Schneider, Amir Moradi, Tim Güneysu:
SPARX - A side-channel protected processor for ARX-based cryptography. DATE 2017: 990-995 - [i11]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli: a cross-platform permutation. IACR Cryptol. ePrint Arch. 2017: 630 (2017) - [i10]Sebastian Faust, Clara Paglialonga, Tobias Schneider:
Amortizing Randomness Complexity in Private Circuits. IACR Cryptol. ePrint Arch. 2017: 869 (2017) - 2016
- [j2]Tobias Schneider, Amir Moradi:
Leakage assessment methodology - Extended version. J. Cryptogr. Eng. 6(2): 85-99 (2016) - [c10]Amir Moradi, Tobias Schneider:
Side-Channel Analysis Protection and Low-Latency in Action - - Case Study of PRINCE and Midori -. ASIACRYPT (1) 2016: 517-547 - [c9]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI: Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks. TIS@CCS 2016: 39 - [c8]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016: 171-193 - [c7]Amir Moradi, Tobias Schneider:
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series. COSADE 2016: 71-87 - [c6]Tobias Schneider, Amir Moradi, Tim Güneysu:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. COSADE 2016: 199-217 - [c5]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks. CRYPTO (2) 2016: 302-332 - [c4]Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms. SAC 2016: 58-78 - [i9]Amir Moradi, Tobias Schneider:
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series. IACR Cryptol. ePrint Arch. 2016: 249 (2016) - [i8]Amir Moradi, Tobias Schneider:
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori. IACR Cryptol. ePrint Arch. 2016: 481 (2016) - [i7]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptol. ePrint Arch. 2016: 647 (2016) - [i6]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks. IACR Cryptol. ePrint Arch. 2016: 648 (2016) - [i5]Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms. IACR Cryptol. ePrint Arch. 2016: 719 (2016) - [i4]Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu:
Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Cryptol. ePrint Arch. 2016: 1109 (2016) - 2015
- [c3]Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. ACNS 2015: 559-578 - [c2]Tobias Schneider, Amir Moradi:
Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations. CHES 2015: 495-513 - [i3]Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. IACR Cryptol. ePrint Arch. 2015: 66 (2015) - [i2]Tobias Schneider, Amir Moradi:
Leakage Assessment Methodology - a clear roadmap for side-channel evaluations. IACR Cryptol. ePrint Arch. 2015: 207 (2015) - [i1]Tobias Schneider, Amir Moradi, Tim Güneysu:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. IACR Cryptol. ePrint Arch. 2015: 571 (2015) - 2014
- [j1]Tobias Schneider, Ingo von Maurich, Tim Güneysu, David F. Oswald:
Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis. J. Signal Process. Syst. 77(1-2): 151-167 (2014) - 2013
- [c1]Tobias Schneider, Ingo von Maurich, Tim Güneysu:
Efficient implementation of cryptographic primitives on the GA144 multi-core architecture. ASAP 2013: 67-74
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint