default search action
Raphael Spreitzer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2018
- [j2]Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard:
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices. IEEE Commun. Surv. Tutorials 20(1): 465-488 (2018) - 2016
- [j1]Lukas Zoscher, Raphael Spreitzer, Hannes Groß, Jasmin Grosinger, Ulrich Muehlmann, Dominik Amschl, Hubert Watzinger, Wolfgang Bösch:
HF/UHF dual band RFID transponders for an information-driven public transportation system. Elektrotech. Informationstechnik 133(3): 163-175 (2016)
Conference and Workshop Papers
- 2020
- [c21]Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer:
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. USENIX Security Symposium 2020: 1767-1784 - 2018
- [c20]Samuel Weiser, Raphael Spreitzer, Lukas Bodner:
Single Trace Attack Against RSA Key Generation in Intel SGX SSL. AsiaCCS 2018: 575-586 - [c19]Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, Stefan Mangard:
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android. AsiaCCS 2018: 749-763 - [c18]Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl:
DATA - Differential Address Trace Analysis. Krypto-Tag 2018 - [c17]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. NDSS 2018 - [c16]Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, Georg Sigl:
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries. USENIX Security Symposium 2018: 603-620 - [c15]Raphael Spreitzer, Gerald Palfinger, Stefan Mangard:
SCAnDroid: Automated Side-Channel Analysis of Android APIs. WISEC 2018: 224-235 - [c14]Johannes Feichtner, David Missmann, Raphael Spreitzer:
Automated Binary Analysis on iOS: A Case Study on Cryptographic Misuse in iOS Applications. WISEC 2018: 236-247 - 2016
- [c13]Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer:
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. CT-RSA 2016: 127-143 - [c12]Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer:
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks. Mycrypt 2016: 364-388 - [c11]Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard:
ARMageddon: Cache Attacks on Mobile Devices. USENIX Security Symposium 2016: 549-564 - [c10]Raphael Spreitzer, Simone Griesmayr, Thomas Korak, Stefan Mangard:
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android. WISEC 2016: 49-60 - 2015
- [c9]Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer:
Privacy-Aware Authentication in the Internet of Things. CANS 2015: 32-39 - [c8]Lukas Zoscher, Jasmin Grosinger, Raphael Spreitzer, Ulrich Muehlmann, Hannes Groß, Wolfgang Bösch:
Concept for a security aware automatic fare collection system using HF/UHF dual band RFID transponders. ESSDERC 2015: 194-197 - [c7]Daniel Gruss, Raphael Spreitzer, Stefan Mangard:
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. USENIX Security Symposium 2015: 897-912 - 2014
- [c6]Raphael Spreitzer:
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. SPSM@CCS 2014: 51-62 - [c5]Raphael Spreitzer, Jörn-Marc Schmidt:
Group-signature schemes on constrained devices: the gap between theory and practice. CS2@HiPEAC 2014: 31-36 - [c4]Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer:
Adding Controllable Linkability to Pairing-Based Group Signatures for Free. ISC 2014: 388-400 - [c3]Raphael Spreitzer, Benoît Gérard:
Towards More Practical Time-Driven Cache Attacks. WISTP 2014: 24-39 - 2013
- [c2]Raphael Spreitzer, Thomas Plos:
Cache-Access Pattern Attack on Disaligned AES T-Tables. COSADE 2013: 200-214 - [c1]Raphael Spreitzer, Thomas Plos:
On the Applicability of Time-Driven Cache Attacks on Mobile Devices. NSS 2013: 656-662
Informal and Other Publications
- 2017
- [i9]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks. CoRR abs/1706.06381 (2017) - 2016
- [i8]Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard:
SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices. CoRR abs/1611.03748 (2016) - [i7]Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer:
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. IACR Cryptol. ePrint Arch. 2016: 82 (2016) - [i6]Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer:
Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks. IACR Cryptol. ePrint Arch. 2016: 1073 (2016) - 2015
- [i5]Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Stefan Mangard:
ARMageddon: Last-Level Cache Attacks on Mobile Devices. CoRR abs/1511.04897 (2015) - [i4]Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer:
Privacy-Aware Authentication in the Internet of Things. IACR Cryptol. ePrint Arch. 2015: 1110 (2015) - 2014
- [i3]Raphael Spreitzer:
PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. CoRR abs/1405.3760 (2014) - [i2]Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer:
Adding Controllable Linkability to Pairing-Based Group Signatures For Free. IACR Cryptol. ePrint Arch. 2014: 607 (2014) - 2013
- [i1]Raphael Spreitzer, Thomas Plos:
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version). IACR Cryptol. ePrint Arch. 2013: 172 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint