


Остановите войну!
for scientists:


default search action
Thomas Eisenbarth 0001
Person information

- affiliation: University of Lübeck, Germany
- affiliation (former): Worcester Polytechnic Institute, MA, USA
- affiliation (former): Florida Atlantic University, FL, USA
- affiliation (Ph.D.): Ruhr University Bochum, Germany
Other persons with the same name
- Thomas Eisenbarth 0002 — University of Augsburg, Germany
- Thomas Eisenbarth 0003 — University of Stuttgart, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c74]Claudius Pott
, Berk Gülmezoglu
, Thomas Eisenbarth
:
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs. CODASPY 2023: 177-188 - [i60]Jonas Sander, Sebastian Berndt, Ida Bruhns, Thomas Eisenbarth:
DASH: Accelerating Distributed Private Machine Learning Inference with Arithmetic Garbled Circuits. CoRR abs/2302.06361 (2023) - [i59]Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, Thomas Eisenbarth:
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V. CoRR abs/2305.00584 (2023) - [i58]Nils Loose, Felix Mächtle, Claudius Pott, Volodymyr Bezsmertnyi, Thomas Eisenbarth:
Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection. CoRR abs/2305.02559 (2023) - 2022
- [c73]Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth
:
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. AsiaCCS 2022: 712-726 - [c72]Jan Wichelmann, Florian Sieck, Anna Pätschke, Thomas Eisenbarth:
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. CCS 2022: 2915-2929 - [c71]Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, Yinqian Zhang:
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP. IEEE Symposium on Security and Privacy 2022: 337-351 - [i57]Thore Tiemann, Zane Weissman, Thomas Eisenbarth, Berk Sunar:
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems. CoRR abs/2202.11623 (2022) - [i56]Jan Wichelmann, Florian Sieck, Anna Pätschke, Thomas Eisenbarth:
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. CoRR abs/2208.14942 (2022) - [i55]Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth:
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software. CoRR abs/2210.13124 (2022) - 2021
- [j21]Claudius Pott
, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, Marco Siebert:
Firmware Security Module. J. Hardw. Syst. Secur. 5(2): 103-113 (2021) - [j20]Okan Seker, Thomas Eisenbarth
, Maciej Liskiewicz:
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2): 61-105 (2021) - [j19]Diego F. Aranha
, Sebastian Berndt, Thomas Eisenbarth
, Okan Seker, Akira Takahashi
, Luca Wilke, Greg Zaverucha:
Side-Channel Protections for Picnic Signatures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 239-282 (2021) - [c70]Florian Sieck
, Sebastian Berndt, Jan Wichelmann
, Thomas Eisenbarth
:
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries. CCS 2021: 2456-2473 - [c69]Johannes Müller, Mohammad Rahmani Fadiheh, Anna Lena Duque Antón, Thomas Eisenbarth
, Dominik Stoffel, Wolfgang Kunz:
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level. DAC 2021: 991-996 - [c68]Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du
, Thomas Eisenbarth
, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, Jens Trommer:
Nano Security: From Nano-Electronics to Secure Systems. DATE 2021: 1334-1339 - [c67]Jan Wichelmann
, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth
:
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device. DIMVA 2021: 88-105 - [c66]Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth
, José Manuel Moya
:
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks. EuroS&P 2021: 683-700 - [c65]Tim Gellersen, Okan Seker, Thomas Eisenbarth
:
Differential Power Analysis of the Picnic Signature Scheme. PQCrypto 2021: 177-194 - [c64]Luca Wilke, Jan Wichelmann
, Florian Sieck
, Thomas Eisenbarth
:
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation. SP Workshops 2021: 456-466 - [i54]Luca Wilke, Jan Wichelmann, Florian Sieck, Thomas Eisenbarth:
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation. CoRR abs/2106.15387 (2021) - [i53]Florian Sieck, Sebastian Berndt, Jan Wichelmann, Thomas Eisenbarth:
Util: : Lookup: Exploiting key decoding in cryptographic libraries. CoRR abs/2108.04600 (2021) - [i52]Jan Wichelmann, Sebastian Berndt, Claudius Pott, Thomas Eisenbarth:
Help, my Signal has bad Device! Breaking the Signal Messenger's Post-CompromiseSecurity through a Malicious Device. IACR Cryptol. ePrint Arch. 2021: 626 (2021) - [i51]Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha:
Side-Channel Protections for Picnic Signatures. IACR Cryptol. ePrint Arch. 2021: 735 (2021) - [i50]Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz:
"Act natural!": Having a Private Chat on a Public Blockchain. IACR Cryptol. ePrint Arch. 2021: 1073 (2021) - 2020
- [j18]Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth
, Berk Sunar:
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 169-195 (2020) - [c63]Okan Seker, Sebastian Berndt, Luca Wilke, Thomas Eisenbarth
:
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis. CCS 2020: 1033-1049 - [c62]Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth
:
Microarchitectural Isolation Guarantees Through Execution Based Signatures. DCIS 2020: 1-6 - [c61]Luca Wilke, Jan Wichelmann
, Mathias Morbitzer
, Thomas Eisenbarth
:
SEVurity: No Security Without Integrity : Breaking Integrity-Free Memory Encryption with Minimal Assumptions. IEEE Symposium on Security and Privacy 2020: 1483-1496 - [c60]Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. USENIX Security Symposium 2020: 1967-1984 - [c59]Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger:
TPM-FAIL: TPM meets Timing and Lattice Attacks. USENIX Security Symposium 2020: 2057-2073 - [i49]Luca Wilke, Jan Wichelmann, Mathias Morbitzer
, Thomas Eisenbarth:
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions. CoRR abs/2004.11071 (2020) - [i48]Samira Briongos, Ida Bruhns, Pedro Malagón, Thomas Eisenbarth, José Manuel Moya:
CACHE SNIPER : Accurate timing control of cache evictions. CoRR abs/2008.12188 (2020) - [i47]Tim Gellersen, Okan Seker, Thomas Eisenbarth:
Differential Power Analysis of the Picnic Signature Scheme. IACR Cryptol. ePrint Arch. 2020: 267 (2020) - [i46]Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz:
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. IACR Cryptol. ePrint Arch. 2020: 443 (2020) - [i45]Okan Seker, Sebastian Berndt, Thomas Eisenbarth:
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis. IACR Cryptol. ePrint Arch. 2020: 544 (2020) - [i44]Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth:
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2020: 1452 (2020)
2010 – 2019
- 2019
- [j17]Ahmad Moghimi
, Jan Wichelmann
, Thomas Eisenbarth
, Berk Sunar:
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations. Int. J. Parallel Program. 47(4): 538-570 (2019) - [c58]Berk Gülmezoglu
, Andreas Zankl, M. Caner Tol
, Saad Islam, Thomas Eisenbarth
, Berk Sunar:
Undermining User Privacy on Mobile Devices Using AI. AsiaCCS 2019: 214-227 - [c57]Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. USENIX Security Symposium 2019: 621-637 - [i43]Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. CoRR abs/1903.00446 (2019) - [i42]Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. CoRR abs/1904.06278 (2019) - [i41]Berk Gülmezoglu
, Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar:
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning. CoRR abs/1907.03651 (2019) - [i40]Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, Nadia Heninger:
TPM-FAIL: TPM meets Timing and Lattice Attacks. CoRR abs/1911.05673 (2019) - [i39]Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, Berk Sunar:
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms. CoRR abs/1912.11523 (2019) - 2018
- [j16]Elke De Mulder, Thomas Eisenbarth
, Patrick Schaumont
:
Identifying and Eliminating Side-Channel Leaks in Programmable Systems. IEEE Des. Test 35(1): 74-89 (2018) - [j15]Fergus Dall, Gabrielle De Micheli
, Thomas Eisenbarth
, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, Yuval Yarom:
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 171-191 (2018) - [j14]Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth
, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 394-430 (2018) - [c56]Jan Wichelmann
, Ahmad Moghimi, Thomas Eisenbarth
, Berk Sunar:
MicroWalk: A Framework for Finding Side Channels in Binaries. ACSAC 2018: 161-173 - [c55]Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth
:
CacheShield: Detecting Cache Attacks through Self-Observation. CODASPY 2018: 224-235 - [c54]Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
MASCAT: Preventing Microarchitectural Attacks Before Distribution. CODASPY 2018: 377-388 - [c53]Ahmad Moghimi
, Thomas Eisenbarth
, Berk Sunar:
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX. CT-RSA 2018: 21-44 - [c52]Marc Stelzner, Thomas Eisenbarth
:
IT Security in Lübeck - The design of a modern and future-proof security curriculum. EWME 2018: 79-82 - [e3]Thomas Eisenbarth, Yannick Teglia:
Smart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10728, Springer 2018, ISBN 978-3-319-75207-5 [contents] - [i38]Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar:
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes. CoRR abs/1808.01352 (2018) - [i37]Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar:
MicroWalk: A Framework for Finding Side Channels in Binaries. CoRR abs/1808.05575 (2018) - [i36]Berk Gülmezoglu, Andreas Zankl, Caner Tol
, Saad Islam, Thomas Eisenbarth, Berk Sunar:
Undermining User Privacy on Mobile Devices Using AI. CoRR abs/1811.11218 (2018) - 2017
- [j13]Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth
:
Lightweight Side Channel Resistance: Threshold Implementations of Simon. IEEE Trans. Computers 66(4): 661-671 (2017) - [c51]Berk Gülmezoglu
, Thomas Eisenbarth
, Berk Sunar:
Cache-Based Application Detection in the Cloud Using Machine Learning. AsiaCCS 2017: 288-300 - [c50]Mehmet Sinan Inci, Thomas Eisenbarth
, Berk Sunar:
Hit by the Bus: QoS Degradation Attack on Android. AsiaCCS 2017: 716-727 - [c49]Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
:
CacheZoom: How SGX Amplifies the Power of Cache Attacks. CHES 2017: 69-90 - [c48]Berk Gülmezoglu
, Andreas Zankl, Thomas Eisenbarth
, Berk Sunar:
PerfWeb: How to Violate Web Privacy with Hardware Performance Events. ESORICS (2) 2017: 80-97 - [c47]Michael Moukarzel, Thomas Eisenbarth
, Berk Sunar:
μLeech: A side-channel evaluation platform for IoT. MWSCAS 2017: 25-28 - [c46]Marc Green, Leandro Rodrigues Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth:
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. USENIX Security Symposium 2017: 1075-1091 - [e2]Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth:
Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings. Lecture Notes in Computer Science 10662, Springer 2017, ISBN 978-3-319-71500-1 [contents] - [i35]Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth:
CacheZoom: How SGX Amplifies The Power of Cache Attacks. CoRR abs/1703.06986 (2017) - [i34]Marc Green, Leandro Rodrigues Lima, Andreas Zankl, Gorka Irazoqui, Johann Heyszl, Thomas Eisenbarth:
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. CoRR abs/1703.09763 (2017) - [i33]Berk Gülmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar:
PerfWeb: How to Violate Web Privacy with Hardware Performance Events. CoRR abs/1705.04437 (2017) - [i32]Gorka Irazoqui, Kai Cong, Xiaofei Guo, Hareesh Khattri, Arun K. Kanuparthi, Thomas Eisenbarth, Berk Sunar:
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries. CoRR abs/1709.01552 (2017) - [i31]Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth:
CacheShield: Protecting Legacy Processes Against Cache Attacks. CoRR abs/1709.01795 (2017) - [i30]Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar:
MemJam: A False Dependency Attack against Constant-Time Crypto Implementations. CoRR abs/1711.08002 (2017) - [i29]Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Cache-Base Application Detection in the Cloud Using Machine Learning. IACR Cryptol. ePrint Arch. 2017: 245 (2017) - [i28]Okan Seker, Thomas Eisenbarth, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2017: 269 (2017) - [i27]Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth:
CacheZoom: How SGX Amplifies The Power of Cache Attacks. IACR Cryptol. ePrint Arch. 2017: 618 (2017) - 2016
- [j12]Cong Chen, Thomas Eisenbarth
, Ingo von Maurich, Rainer Steinwandt:
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem. IEEE Trans. Inf. Forensics Secur. 11(6): 1093-1105 (2016) - [j11]Berk Gülmezoglu
, Mehmet Sinan Inci
, Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
Cross-VM Cache Attacks on AES. IEEE Trans. Multi Scale Comput. Syst. 2(3): 211-222 (2016) - [c45]Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure. ACSAC 2016: 436-447 - [c44]Cong Chen, Mohammad Farmani, Thomas Eisenbarth
:
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is Not. ASIACRYPT (1) 2016: 819-843 - [c43]Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth
:
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs. CARDIS 2016: 73-88 - [c42]Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
Cross Processor Cache Attacks. AsiaCCS 2016: 353-364 - [c41]Mehmet Sinan Inci, Berk Gülmezoglu
, Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
Cache Attacks Enable Bulk Key Recovery on the Cloud. CHES 2016: 368-388 - [c40]Mehmet Sinan Inci, Berk Gülmezoglu
, Thomas Eisenbarth
, Berk Sunar:
Co-location Detection on the Cloud. COSADE 2016: 19-34 - [c39]A. Adam Ding
, Cong Chen, Thomas Eisenbarth
:
Simpler, Faster, and More Robust T-Test Based Leakage Detection. COSADE 2016: 163-183 - [c38]A. M. Leonard, Hang Cai, Krishna K. Venkatasubramanian, M. Ali, Thomas Eisenbarth
:
A honeypot system for wearable networks. Sarnoff Symposium 2016: 199-201 - [i26]Mehmet Sinan Inci, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Co-location detection on the Cloud. IACR Cryptol. ePrint Arch. 2016: 284 (2016) - [i25]Cong Chen, Mohammad Farmani, Thomas Eisenbarth:
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not. IACR Cryptol. ePrint Arch. 2016: 434 (2016) - [i24]Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cache Attacks Enable Bulk Key Recovery on the Cloud. IACR Cryptol. ePrint Arch. 2016: 596 (2016) - [i23]Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
MASCAT: Stopping Microarchitectural Attacks Before Execution. IACR Cryptol. ePrint Arch. 2016: 1196 (2016) - 2015
- [j10]Yunsi Fei
, Thomas Eisenbarth
, Dimitrios Serpanos
:
Guest Editorial: Special Section on Embedded System Security. IEEE Embed. Syst. Lett. 7(1): 1-2 (2015) - [j9]Thomas Eisenbarth
, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. Inf. Process. Lett. 115(11): 899-902 (2015) - [j8]Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar:
Know Thy Neighbor: Crypto Library Detection in Cloud. Proc. Priv. Enhancing Technol. 2015(1): 25-40 (2015) - [c37]Cong Chen, Thomas Eisenbarth
, Ingo von Maurich, Rainer Steinwandt:
Differential Power Analysis of a McEliece Cryptosystem. ACNS 2015: 538-556 - [c36]Xin Ye, Mostafa Taha, Cong Chen, Thomas Eisenbarth
:
Faster Leakage Detection and Exploitation. TrustED@CCS 2015: 21-29 - [c35]Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth
, Berk Sunar:
Lucky 13 Strikes Back. AsiaCCS 2015: 85-96 - [c34]Berk Gülmezoglu, Mehmet Sinan Inci, Gorka Irazoqui Apecechea, Thomas Eisenbarth
, Berk Sunar:
A Faster and More Realistic Flush+Reload Attack on AES. COSADE 2015: 111-126 - [c33]Gorka Irazoqui, Thomas Eisenbarth
, Berk Sunar:
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. DSD 2015: 629-636 - [c32]Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth
:
Silent Simon: A threshold implementation under 100 slices. HOST 2015: 1-6 - [c31]Zachary N. Goddard, Nicholas LaJeunesse, Thomas Eisenbarth
:
Power analysis of the t-private logic style for FPGAs. HOST 2015: 68-71 - [c30]Baris Ege, Thomas Eisenbarth
, Lejla Batina:
Near Collision Side Channel Attacks. SAC 2015: 277-292 - [c29]Cong Chen, Thomas Eisenbarth
, Ingo von Maurich, Rainer Steinwandt:
Masking Large Keys in Hardware: A Masked Implementation of McEliece. SAC 2015: 293-309 - [c28]Gorka Irazoqui Apecechea, Thomas Eisenbarth
, Berk Sunar:
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES. IEEE Symposium on Security and Privacy 2015: 591-604 - [e1]Thomas Eisenbarth
, Erdinç Öztürk:
Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8898, Springer 2015, ISBN 978-3-319-16362-8 [contents] - [i22]Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. IACR Cryptol. ePrint Arch. 2015: 89 (2015) - [i21]Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth:
Silent Simon: A Threshold Implementation under 100 Slices. IACR Cryptol. ePrint Arch. 2015: 172 (2015) - [i20]Baris Ege, Thomas Eisenbarth, Lejla Batina:
Near Collision Side Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 511 (2015) - [i19]Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. IACR Cryptol. ePrint Arch. 2015: 690 (2015) - [i18]Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth:
SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs. IACR Cryptol. ePrint Arch. 2015: 691 (2015) - [i17]Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. IACR Cryptol. ePrint Arch. 2015: 898 (2015) - [i16]Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Masking Large Keys in Hardware: A Masked Implementation of McEliece. IACR Cryptol. ePrint Arch. 2015: 924 (2015) - [i15]Mostafa Taha, Thomas Eisenbarth:
Implementation Attacks on Post-Quantum Cryptographic Schemes. IACR Cryptol. ePrint Arch. 2015: 1083 (2015) - [i14]Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cross Processor Cache Attacks. IACR Cryptol. ePrint Arch. 2015: 1155 (2015) - [i13]Marc Green, Thomas Eisenbarth:
Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud. IACR Cryptol. ePrint Arch. 2015: 1169 (2015) - [i12]A. Adam Ding, Cong Chen, Thomas Eisenbarth:
Simpler, Faster, and More Robust T-test Based Leakage Detection. IACR Cryptol. ePrint Arch. 2015: 1215 (2015) - 2014
- [c27]Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth
, Berk Sunar:
Fine Grain Cross-VM Attacks on Xen and VMware. BDCloud 2014: 737-744 - [c26]Cong Chen, Thomas Eisenbarth
, Aria Shahverdi, Xin Ye:
Balanced Encoding to Mitigate Power Analysis: A Case Study. CARDIS 2014: 49-63 - [c25]Xin Ye, Thomas Eisenbarth
, William Martin:
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery. CARDIS 2014: 215-232 - [c24]Yarkin Doröz, Aria Shahverdi, Thomas Eisenbarth
, Berk Sunar:
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince. Financial Cryptography Workshops 2014: 208-220 - [c23]Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth
, Berk Sunar:
Wait a Minute! A fast, Cross-VM Attack on AES. RAID 2014: 299-319 - [c22]