Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Building 64, 1. OG, Room 043

Email:thomas.eisenbarth(at)uni-luebeck.de
Phone:+49 451 3101 6600
Fax:+49 451 3101 6604

About Me

I am Professor for IT Security at University of Lübeck.  I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I  spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.

My research interests are in:

  • Applied Cryptology
  • Systems security and secure computer architecture
  • Side channel analysis, physical attacks and their prevention
  • Cloud and virtualization security

Publications

2015

  • Xin Ye, Mostafa Taha, Cong Chen and Thomas Eisenbarth,
    Faster Leakage Detection and Exploitation in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 , 2015. pp. 21--29.
    DOI:10.1145/2808414.2808419
    File: https://www.researchgate.net/publication/301419853_Faster_Leakage_Detection_and_Exploitation

  • Cong Chen, Thomas Eisenbarth, Ingo Maurich and Rainer Steinwandt,
    Differential Power Analysis of a McEliece Cryptosystem in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers , 2015. pp. 538--556.
    DOI:10.1007/978-3-319-28166-7_26
    File: http://eprint.iacr.org/2014/534

  • Berk Gulmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth and Berk Sunar,
    A Faster and More Realistic Flush+Reload Attack on AES in Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers , 2015. pp. 111--126.
    File: https://doi.org/10.1007/978-3-319-21476-4_8

  • 2014

  • Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Wait a minute! A fast, Cross-VM attack on AES , IACR Cryptology ePrint Archive , vol. 2014, pp. 435, 2014.
    File: http://eprint.iacr.org/2014/435

  • Yarkin Doröz, Aria Shahverdi, Thomas Eisenbarth and Berk Sunar,
    Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers , 2014. pp. 208--220.
    File: https://doi.org/10.1007/978-3-662-44774-1_17

  • Xin Ye, Cong Chen and Thomas Eisenbarth,
    Non-Linear Collision Analysis in Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers , 2014. pp. 198--214.
    File: https://doi.org/10.1007/978-3-319-13066-8_13

  • Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth and Berk Sunar,
    Fine Grain Cross-VM Attacks on Xen and VMware in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014 , 2014. pp. 737--744.
    DOI:10.1109/BDCloud.2014.102
    File: http://eprint.iacr.org/2014/248

  • Xin Ye, Thomas Eisenbarth and William Martin,
    Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery in Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers , 2014. pp. 215--232.
    File: https://doi.org/10.1007/978-3-319-16763-3_13

  • Cong Cong Chen, Thomas Eisenbarth, Aria Shahverdi and Xin Ye,
    Balanced Encoding to Mitigate Power Analysis: A Case Study , IACR Cryptology ePrint Archive , vol. 2014, pp. 952, 2014.
    File: http://eprint.iacr.org/2014/952

  • 2013

  • Thomas Eisenbarth, Ingo Maurich, Christof Paar and Xin Ye,
    A Performance Boost for Hash-Based Signatures in Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday , 2013. pp. 166--182.
    File: https://doi.org/10.1007/978-3-642-42001-6_13

  • Xin Ye and Thomas Eisenbarth,
    On the Vulnerability of Low Entropy Masking Schemes in Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers , 2013. pp. 44--60.
    File: https://doi.org/10.1007/978-3-319-08302-5_4

  • 2012

  • Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, François-Xavier Standaert and Loic Oldenzeel,
    Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices in Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings , 2012. pp. 172--187.
    File: https://doi.org/10.1007/978-3-642-31410-0_11

  • Amir Moradi, Mario Kirschbaum, Thomas Eisenbarth and Christof Paar,
    Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods , IEEE Trans. VLSI Syst. , vol. 20, no. 9, pp. 1578--1589, 2012.
    File: https://doi.org/10.1109/TVLSI.2011.2160375

  • Xin Ye and Thomas Eisenbarth,
    Wide Collisions in Practice in Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings , 2012. pp. 329--343.
    File: https://doi.org/10.1007/978-3-642-31284-7_20

  • 2011

  • Andy Rupp, Thomas Eisenbarth, Andrey Bogdanov and Oliver Grieb,
    Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications , Integration , vol. 44, no. 4, pp. 290--304, 2011.
    File: https://doi.org/10.1016/j.vlsi.2010.09.001

  • 2010

  • Andrey Bogdanov, Thomas Eisenbarth, Christof Paar and Malte Wienecke,
    Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs in Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings , 2010. pp. 235--251.
    File: https://doi.org/10.1007/978-3-642-11925-5_17

  • Amir Moradi, Oliver Mischke and Thomas Eisenbarth,
    Correlation-Enhanced Power Analysis Collision Attack in Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010. pp. 125--139.
    File: https://doi.org/10.1007/978-3-642-15031-9_9

  • Thomas Eisenbarth, Christof Paar and Björn Weghenkel,
    Building a Side Channel Based Disassembler , Trans. Computational Science , vol. 10, pp. 78--99, 2010.
    File: https://doi.org/10.1007/978-3-642-17499-5_4

  • 2009

  • Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann, Johann Großschädl, Frank Gurkaynak, Marco Macchetti, Zeynep Toprak, Laura Pozzi, Christof Paar, Yusuf Leblebici and Paolo Ienne,
    Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology , Trans. Computational Science , vol. 4, pp. 230--243, 2009.
    File: https://doi.org/10.1007/978-3-642-01004-0_13

  • Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper and Amir Moradi,
    KeeLoq and Side-Channel Analysis-Evolution of an Attack in Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009 , 2009. pp. 65--69.
    File: https://doi.org/10.1109/FDTC.2009.44

  • Thomas Eisenbarth, Tim Güneysu, Stefan Heyse and Christof Paar,
    MicroEliece: McEliece for Embedded Devices in Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009. pp. 49--64.
    File: https://doi.org/10.1007/978-3-642-04138-9_4

  • Amir Moradi, Thomas Eisenbarth, Axel Poschmann and Christof Paar,
    Power Analysis of Single-Rail Storage Elements as Used in MDPL in Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers , 2009. pp. 146--160.
    File: https://doi.org/10.1007/978-3-642-14423-3_11

  • Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani and Thomas Eisenbarth,
    Vulnerability modeling of cryptographic hardware to power analysis attacks , Integration , vol. 42, no. 4, pp. 468--478, 2009.
    File: https://doi.org/10.1016/j.vlsi.2009.01.001

  • 2008

  • Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp and Christopher Wolf,
    Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? , IACR Cryptology ePrint Archive , vol. 2008, pp. 349, 2008.
    File: http://eprint.iacr.org/2008/349

  • Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi and Elisabeth Oswald,
    Susceptibility of eSTREAM Candidates towards Side Channel Analysis , 2008.