Остановите войну!
for scientists:
default search action
Dominik Klein 0001
Person information
- affiliation: Federal Office for Information Security (BSI), Bonn, Germany
- affiliation: Japan Advanced Institute of Science and Technology (JAIST), School of Information Science, Tokyo, Japan
- affiliation: RWTH Aachen, Department of Computer Science, Germany
Other persons with the same name
- Dominik Klein — disambiguation page
- Dominik Klein 0002 (aka: Dominik Werner Klein) — Julius Maximilians University Würzburg, Department of Computer Science
- Dominik Klein 0003 — University of Siegen, Business and Information Systems Institute
- Dominik Klein 0004 — University of Bamberg, Political Theory Group, Germany (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein:
Unlock the Door to my Secrets, but don't Forget to Glitch A comprehensive analysis of flash erase suppression attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 88-129 (2024) - 2022
- [j4]Sven Bauer, Hermann Drexler, Max Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann:
Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 25-55 (2022) - [i5]Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann:
Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021. IACR Cryptol. ePrint Arch. 2022: 448 (2022) - 2020
- [j3]Aron Gohr, Dominik Klein, Werner Schindler:
Verräterischer Stromverbrauch. Datenschutz und Datensicherheit 44(7): 431-435 (2020) - [j2]Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler:
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 22-72 (2020)
2010 – 2019
- 2019
- [i4]Tobias Damm, Sven Freud, Dominik Klein:
Dissecting the CHES 2018 AES Challenge. IACR Cryptol. ePrint Arch. 2019: 783 (2019) - [i3]Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler:
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule. IACR Cryptol. ePrint Arch. 2019: 1448 (2019) - 2018
- [c7]Andreas Wiemers, Dominik Klein:
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack. IWSEC 2018: 51-67 - [i2]Dominik Klein:
Key-Secrecy of PACE with OTS/CafeOBJ. IACR Cryptol. ePrint Arch. 2018: 510 (2018) - 2017
- [i1]Andreas Wiemers, Dominik Klein:
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack. IACR Cryptol. ePrint Arch. 2017: 1079 (2017) - 2015
- [c6]Dominik Klein, Jan Kruse:
A Comparative Study on Image Hashing for Document Authentication. BIOSIG 2015: 231-238 - 2014
- [c5]Dominik Klein:
Key-Secrecy of PACE with OTS/CafeOBJ. FTSCS 2014: 159-173 - 2012
- [j1]Dominik Klein, Frank G. Radmacher, Wolfgang Thomas:
Moving in a network under random failures: A complexity analysis. Sci. Comput. Program. 77(7-8): 940-954 (2012) - [c4]Dominik Klein, Nao Hirokawa:
Confluence of Non-Left-Linear TRSs via Relative Termination. LPAR 2012: 258-273 - 2011
- [c3]Dominik Klein, Nao Hirokawa:
Maximal Completion. RTA 2011: 71-80
2000 – 2009
- 2009
- [c2]Dominik Klein, Frank G. Radmacher, Wolfgang Thomas:
The Complexity of Reachability in Randomized Sabotage Games. FSEN 2009: 162-177 - 2008
- [c1]Dominik Klein:
Solving Randomised Sabotage Games for Navigation in Networks. Informatiktage 2008: 15-18
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-27 20:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint