Prof. Dr.-Ing. Thomas Eisenbarth

Photo of Thomas  Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 043

Email: thomas.eisenbarth(at)uni-luebeck.de
Phone: +49 451 3101 6600
Fax: +49 451 3101 6604

About Me

I am a Professor of IT Security at the University of Lübeck.  I received my Ph.D. in ECE from Ruhr-Universität Bochum, Germany, where I was a member of the Horst Goertz Institute for IT Security (HGI). Starting in 2010, I spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012, I joined the Department of Electrical and Computer Engineering at WPI. Since August 2017 I am the Director of the Institute of IT Security at the University of Lübeck.
Since October 2024, I am the head of the STEM sections (the non-medical departments) of University of Lübeck.

 

My research interests are in:

  • Systems security, software security and code analysis
  • Applied Cryptology
  • Secure virtualization, computer architecture and trusted execution environments
  • Side channel analysis, physical attacks and their prevention

Publications

2010

Thomas Eisenbarth, Christof Paar, and Björn Weghenkel,
Building a Side Channel Based Disassembler, Trans. Computational Science , vol. 10, pp. 78--99, 2010.
File: 978-3-642-17499-5_4
Amir Moradi, Oliver Mischke, and Thomas Eisenbarth,
Correlation-Enhanced Power Analysis Collision Attack, in Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010. pp. 125--139.
File: 978-3-642-15031-9_9
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, and Malte Wienecke,
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs, in Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings , 2010. pp. 235--251.
File: 978-3-642-11925-5_17

2009

Amir Moradi, Thomas Eisenbarth, Axel Poschmann, and Christof Paar,
Power Analysis of Single-Rail Storage Elements as Used in MDPL, in Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers , 2009. pp. 146--160.
File: 978-3-642-14423-3_11
Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani, and Thomas Eisenbarth,
Vulnerability modeling of cryptographic hardware to power analysis attacks, Integration , vol. 42, no. 4, pp. 468--478, 2009.
File: j.vlsi.2009.01.001
Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, and Christof Paar,
MicroEliece: McEliece for Embedded Devices, in Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009. pp. 49--64.
File: 978-3-642-04138-9_4
Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann, Johann Großschädl, Frank Gurkaynak, Marco Macchetti, Zeynep Toprak, Laura Pozzi, Christof Paar, Yusuf Leblebici, and Paolo Ienne,
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology, Trans. Computational Science , vol. 4, pp. 230--243, 2009.
File: 978-3-642-01004-0_13
Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, and Amir Moradi,
KeeLoq and Side-Channel Analysis-Evolution of an Attack, in Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009 , 2009. pp. 65--69.
File: FDTC.2009.44

2008

Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and Mohammad T. Manzuri Shalmani,
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme, in Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings , 2008. pp. 203--220.
File: 978-3-540-85174-5_12
Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi, and Elisabeth Oswald,
Susceptibility of eSTREAM Candidates towards Side Channel Analysis, 2008.
File: 228371563_Susceptibility_of_eSTREAM_candidates_towards_side_channel_analysis
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, and Christopher Wolf,
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?, IACR Cryptology ePrint Archive , vol. 2008, pp. 349, 2008.
File: 349
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes A. Buchmann, and Christof Paar,
Fast Hash-Based Signatures on Constrained Devices, in Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings , 2008. pp. 104--117.
File: 978-3-540-85893-5_8
Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, and Christof Paar,
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers, in IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008 , 2008. pp. 58--66.
File: SIES.2008.4577681
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, and Christof Paar,
Efficient Hash-Based Signatures on Embedded Devices, 01 2008.
File: 229001128_Efficient_Hash-Based_Signatures_on_Embedded_Devices
Francesco Regazzoni, Thomas Eisenbarth, Luca Breveglieri, Paolo Ienne, and Israel Koren,
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?, in 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA, USA , 2008. pp. 202--210.
File: DFT.2008.53

2007

Andrey Bogdanov, Thomas Eisenbarth, and Andy Rupp,
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations, in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007. pp. 394--412.
File: 978-3-540-74735-2_27
Francesco Regazzoni, Stephane Badel, Thomas Eisenbarth, Johann Großschädl, Axel Poschmann, Zeynep Toprak Deniz, Marco Macchetti, Laura Pozzi, Christof Paar, Yusuf Leblebici, and Paolo Ienne,
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies, in Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, July 16-19, 2007 , 2007. pp. 209--214.
File: ICSAMOS.2007.4285753
Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, and Leif Uhsadel,
A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers , vol. 24, no. 6, pp. 522--533, 2007.
File: MDT.2007.178
Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, and Russell Tessier,
Establishing Chain of Trust in Reconfigurable Hardware, in IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA , 2007. pp. 289--290.
File: FCCM.2007.23
Soren Rinne, Thomas Eisenbarth, and Christof Paar,
Performance Analysis of Contemporary LightWeight Block Ciphers on 8-bit Microcontrollers, 012007.
File: a5f0b7c6e442406c0c97854eb97f8a21157c3b08
Francesco Regazzoni, Thomas Eisenbarth, Johann Großschädl, Luca Breveglieri, Paolo Ienne, Israel Koren, and Christof Paar,
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits, in 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 26-28 September 2007, Rome, Italy. , 2007. pp. 508--516.
File: DFT.2007.61
Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, and Marko Wolf,
Reconfigurable trusted computing in hardware, in Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 , 2007. pp. 15--20.
File: 1314354.1314360
Andrey Bogdanov, Thomas Eisenbarth, M. Wolf, and Thomas Wollinger,
Trusted computing for automotive systems: New approaches to enforce security for electronic systems in vehicles, pp. 227-237, 01 2007.
File: 291856499_Trusted_computing_for_automotive_systems_New_approaches_to_enforce_security_for_electronic_systems_in_vehicles