Prof. Dr. Thomas Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 2. OG, Raum 027

Email:thomas.eisenbarth(at)uni-luebeck.de
Phone:+49 451 3101 6600
Fax:+49 451 3101 6604

Kurzbiographie

Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.

Seine Forschungsinteressen umfassen:

  • Systemsicherheit und Sichere Mikroarchitekturen
  • Angewandte Kryptografie
  • Seitenkanalangriffe, physiche Sicherheit und Gegenmaßnahmen
  • Sicherheit von Cloud und virtualisierten Systemen

Publikationen

2018

  • Wichelmann, Jan and Moghimi, Ahmad and Eisenbarth, Thomas and Sunar, Berk: MicroWalk: A Framework for Finding Side Channels in Binaries. in Proceedings of the 34th Annual Computer Security Applications Conference, pp. 161-173, ACM, New York, NY, USA, 2018
    BibTeX Link
    @inproceedings{Wichelmann2018MicroWalkAF,
     author = {Wichelmann, Jan and Moghimi, Ahmad and Eisenbarth, Thomas and Sunar, Berk},
     title = {MicroWalk: A Framework for Finding Side Channels in Binaries},
     booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference},
     series = {ACSAC '18},
     year = {2018},
     location = {San Juan, PR, USA},
     pages = {161--173},
     url = {http://doi.acm.org/10.1145/3274694.3274741},
     doi = {10.1145/3274694.3274741},
     publisher = {ACM},
     address = {New York, NY, USA}
    } 
    
    
  • Moghimi, Ahmad and Eisenbarth, Thomas and Sunar, Berk: MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX. in Topics in Cryptology - CT-RSA 2018, pp. 21-44, Springer International Publishing, Cham, 2018
    BibTeX Link
    @InProceedings{10.1007/978-3-319-76953-0_2,
       author="Moghimi, Ahmad and Eisenbarth, Thomas and Sunar, Berk"
       editor="Smart, Nigel P."
       title="MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX"
       booktitle="Topics in Cryptology -- CT-RSA 2018"
       year="2018"
       publisher="Springer International Publishing"
       address="Cham"
       pages="21--44"
       isbn="978-3-319-76953-0"
       url="https://link.springer.com/chapter/10.1007/978-3-319-76953-0_2"
    }
    
  • Moghimi, Ahmad and Wichelmann, Jan and Eisenbarth, Thomas and Sunar, Berk: MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations. International Journal of Parallel Programming, Nov, 2018
    BibTeX Link
    @Article{Moghimi2018,
      author="Moghimi, Ahmad and Wichelmann, Jan and Eisenbarth, Thomas and Sunar, Berk",
      title="MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations",
      journal="International Journal of Parallel Programming",
      year="2018",
      month="Nov",
      day="09",
      issn="1573-7640",
      url="https://doi.org/10.1007/s10766-018-0611-9",
    }
  • Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: MASCAT: Preventing Microarchitectural Attacks Before Distribution. in Proceedings of the Eighth ACM Conference on Data and Application and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 377-388, 2018
    BibTeX Link
    @inproceedings{DBLP:conf/codaspy/IrazoquiES18,
      author    = {Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk},
      title     = {{MASCAT:} Preventing Microarchitectural Attacks Before Distribution},
      booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application
                   Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                   2018},
      pages     = {377--388},
      year      = {2018},
      crossref  = {DBLP:conf/codaspy/2018},
      url       = {http://doi.acm.org/10.1145/3176258.3176316},
      doi       = {10.1145/3176258.3176316},
      timestamp = {Thu, 15 Mar 2018 11:27:57 +0100},
    }
  • Seker, Okan and Fernandez-Rubio, Abraham and Eisenbarth, Thomas and Steinwandt, Rainer: Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems, no. 2018, pp. 394-430, Aug., 2018
    BibTeX Link
    @article{Seker_Fernandez-Rubio_Eisenbarth_Steinwandt_2018,
     title={Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks},
     volume={2018},
     url={https://tches.iacr.org/index.php/TCHES/article/view/7281},
     DOI={10.13154/tches.v2018.i3.394-430},
     number={3},
     journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
     author={Seker, Okan and Fernandez-Rubio, Abraham and Eisenbarth, Thomas and Steinwandt, Rainer},
     year={2018},
     month={Aug.},
     pages={394-430}
    }
  • Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk: DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes. 2018
    BibTeX Link
    @misc{inci2018deepcloak,
        title={DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes},
        author={Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk},
        year={2018},
        eprint={1808.01352},
        archivePrefix={arXiv},
        primaryClass={cs.CR}
        url={https://arxiv.org/abs/1808.01352}
    }
  • Briongos, Samira and Irazoqui, Gorka and Malagon, Pedro and Eisenbarth, Thomas: CacheShield: Detecting Cache Attacks through Self-Observation. in Proceedings of the Eighth ACM Conference on Data and Application and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 224-235, 2018
    BibTeX Link
    @inproceedings{DBLP:conf/codaspy/BriongosIME18,
      author    = {Briongos, Samira and Irazoqui, Gorka and Malagon, Pedro and Eisenbarth, Thomas},
      title     = {CacheShield: Detecting Cache Attacks through Self-Observation},
      booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application
                   Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                   2018},
      pages     = {224--235},
      year      = {2018},
      crossref  = {DBLP:conf/codaspy/2018},
      url       = {http://doi.acm.org/10.1145/3176258.3176320},
      doi       = {10.1145/3176258.3176320},
      timestamp = {Thu, 15 Mar 2018 11:27:57 +0100},
    }
    
    
    
  • Dall, Fergus and Gabrielle De Micheli and Eisenbarth, Thomas and Genkin, Daniel and Heninger, Nadia and Moghimi, Ahmad and Yarom, Yuval: CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., no. 2018, pp. 171-191, 2018
    BibTeX Link
    @article{DBLP:journals/tches/DallMEGHMY18,
      author    = {Dall, Fergus and
                   Gabrielle De Micheli and Eisenbarth, Thomas and Genkin, Daniel and Heninger, Nadia and Moghimi, Ahmad and Yarom, Yuval},
      title     = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID}
                   via Cache Attacks},
      journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
      volume    = {2018},
      number    = {2},
      pages     = {171--191},
      year      = {2018},
      url       = {https://doi.org/10.13154/tches.v2018.i2.171-191},
      doi       = {10.13154/tches.v2018.i2.171-191},
      timestamp = {Tue, 05 Jun 2018 15:05:26 +0200},
    
    }

2017

  • Moukarzel, M. and Eisenbarth, T. and Sunar, B.: μLeech: A side-channel evaluation platform for IoT. in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 25-28, Aug, 2017
    BibTeX Link
    @INPROCEEDINGS{8052851,
    author={Moukarzel, M. and Eisenbarth, T. and Sunar, B.},
    booktitle={2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)},
    title={μLeech: A side-channel evaluation platform for IoT},
    year={2017},
    volume={},
    number={},
    pages={25-28},
    keywords={computer network security;cryptography;Internet;Internet of Things;microphones;next generation networks;security of data;smart phones;telecommunication security;wireless channels;side-channel evaluation platform;embedded trusted platform module;security critical applications;physical security analysis;IoT device;smart phone;μLeech;next generation power scavenging devices;square point-of-sale reader;microphone-speaker interface;cryptographic services;power trace acquisition;clock manipulation attack;Capacitors;Cryptography;Resistors;Radiation detectors;Protocols;Resistance;Side-Channel;IoT;Low Power},
     url={https://ieeexplore.ieee.org/abstract/document/8052851},
    doi={10.1109/MWSCAS.2017.8052851},
    ISSN={1558-3899},
    month={Aug},}
  • Gülmezoglu, Berk and Zankl, Andreas and Eisenbarth, Thomas and Sunar, Berk: PerfWeb: How to Violate Web Privacy with Hardware Performance Events. in Computer Security - ESORICS 2017 - 22nd European Symposium on Research Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II, pp. 80-97, 2017
    BibTeX Link
    @inproceedings{DBLP:conf/esorics/GulmezogluZES17,
      author    = {Gülmezoglu, Berk  and Zankl, Andreas and Eisenbarth, Thomas and Sunar, Berk},
      title     = {PerfWeb: How to Violate Web Privacy with Hardware Performance Events},
      booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                   in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                   Part {II}},
      pages     = {80--97},
      year      = {2017},
      crossref  = {DBLP:conf/esorics/2017-2},
      url = {https://doi.org/10.1007/978-3-319-66399-9_5},
      timestamp = {Fri, 01 Sep 2017 14:18:16 +0200},
    }
    
  • A. Shahverdi and M. Taha and T. Eisenbarth: Lightweight Side Channel Resistance: Threshold Implementations of Simon. IEEE Transactions on Computers, no. 66, pp. 661-671, April, 2017
    BibTeX Link
    @ARTICLE{7579637,
    author={A. Shahverdi and M. Taha and T. Eisenbarth},
    journal={IEEE Transactions on Computers},
    title={Lightweight Side Channel Resistance: Threshold Implementations of Simon},
    year={2017},
    volume={66},
    number={4},
    pages={661-671},
    keywords={cryptography;Internet of Things;SIMON;area-optimized implementations;classic cryptanalysis;higher-order attacks;lightweight block cipher;lightweight side channel resistance;networks on chips;practical t-test based leakage detection methods;second-order secure implementation;secret sharing;security level;side channel attacks;threshold implementations;unprotected AES core;Ciphers;Hardware;Resistance;Shift registers;Side-channel attacks;Simon;higher-order attacks;side channel analysis;threshold implementation},
    url={https://doi.org/10.1109/TC.2016.2614504},
    ISSN={0018-9340},
    month={April},
    }
  • De Mulder, Elke and Eisenbarth, Thomas and Schaumont, Patrick: Identifying and Eliminating Side-channel Leaks in Programmable Systems. IEEE Design Test, no. PP, pp. 1-1, 2017
    BibTeX Link
    @ARTICLE{8081798,
    author={E. De Mulder and T. Eisenbarth and P. Schaumont},
    journal={IEEE Design Test},
    title={Identifying and Eliminating Side-Channel Leaks in Programmable
    Systems},
    year={2018},
    volume={35},
    number={1},
    pages={74-89},
    keywords={security of data;side-channel leaks
    identification;side-channel leaks elimination;programmable
    systems;Threshold current;Power system reliability;Power
    distribution;Side-channel attacks;Microprocessors;Side-channel
    Leakage;Side-channel Analysis;Differential Power Analysis;Side-channel
    Countermeasures;Hiding;Masking;Threshold
    Implementation;Re-Keying;Side-channel Leakage Testing},
    doi={10.1109/MDAT.2017.2766166},
    ISSN={2168-2356},
    month={Feb},}
  • Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk: Hit by the Bus: QoS Degradation Attack on Android. in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 716-727, ACM, New York, NY, USA, 2017
    BibTeX Link
    @inproceedings{Inci:2017:HBQ:3052973.3053028,
     author = {Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk},
     title = {Hit by the Bus: QoS Degradation Attack on Android},
     booktitle = {Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security},
     series = {ASIA CCS '17},
     year = {2017},
     isbn = {978-1-4503-4944-4},
     location = {Abu Dhabi, United Arab Emirates},
     pages = {716--727},
     numpages = {12},
     url = {http://doi.acm.org/10.1145/3052973.3053028},
     acmid = {3053028},
     publisher = {ACM},
     address = {New York, NY, USA},
     keywords = {QoS attack, mobile malware, mobile security, performance degradation},
    }
  • Irazoqui, Gorka and Cong, Kai and Guo, Xiaofei and Khattri, Hareesh and Kanuparthi, Arun and Eisenbarth, Thomas and Sunar, Berk: Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries. CoRR, no. abs/1709.01552, 2017
    BibTeX Link
    @article{DBLP:journals/corr/abs-1709-01552,
      author    = {Irazoqui, Gorka and Cong, Kai and Guo, Xiaofei and Khattri, Hareesh and Kanuparthi, Arun and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Did we learn from {LLC} Side Channel Attacks? {A} Cache Leakage Detection
                   Tool for Crypto Libraries},
      journal   = {CoRR},
      volume    = {abs/1709.01552},
      year      = {2017},
      url       = {http://arxiv.org/abs/1709.01552},
      archivePrefix = {arXiv},
      eprint    = {1709.01552},
      timestamp = {Thu, 05 Oct 2017 09:42:48 +0200},
    }
    
    
  • Moghimi, Ahmad and Irazoqui, Gorka and Eisenbarth, Thomas: CacheZoom: How SGX Amplifies the Power of Cache Attacks. in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings, pp. 69-90, 2017
    BibTeX Link
    @inproceedings{DBLP:conf/ches/MoghimiIE17,
      author    = {Moghimi, Ahmad and Irazoqui, Gorka and Eisenbarth, Thomas},
      title     = {CacheZoom: How {SGX} Amplifies the Power of Cache Attacks},
      booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                   Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
      pages     = {69--90},
      year      = {2017},
      crossref  = {DBLP:conf/ches/2017},
      url = {https://doi.org/10.1007/978-3-319-66787-4_4},
      timestamp = {Mon, 18 Sep 2017 13:25:39 +0200},
    }
    
    
    
  • Briongos, Samira and Irazoqui, Gorka and Malagón, Pedro and Eisenbarth, Thomas: CacheShield: Protecting Legacy Processes Against Cache Attacks. 09, 2017
    BibTeX Link
    @article{article,
    author = {Briongos, Samira and Irazoqui, Gorka and Malagón, Pedro and Eisenbarth, Thomas},
    year = {2017},
    month = {09},
    pages = {},
    title = {CacheShield: Protecting Legacy Processes Against Cache Attacks},
     url={https://arxiv.org/abs/1709.01795v1},
    }
  • Gulmezoglu, Berk and Eisenbarth, Thomas and Sunar, Berk: Cache-Based Application Detection in the Cloud Using Machine Learning. in Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 288-300, ACM, New York, NY, USA, 2017
    BibTeX Link
    @inproceedings{Gulmezoglu:2017:CAD:3052973.3053036,
     author = {Gulmezoglu, Berk and Eisenbarth, Thomas and Sunar, Berk},
     title = {Cache-Based Application Detection in the Cloud Using Machine Learning},
     booktitle = {Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security},
     series = {ASIA CCS '17},
     year = {2017},
     isbn = {978-1-4503-4944-4},
     location = {Abu Dhabi, United Arab Emirates},
     pages = {288--300},
     numpages = {13},
     url = {http://doi.acm.org/10.1145/3052973.3053036},
     acmid = {3053036},
     publisher = {ACM},
     address = {New York, NY, USA},
     keywords = {SVM, cross-vm attacks, machine learning, prime\&\#38;probe},
    }
  • Marc Green and Leandro Rodrigues-Lima and Andreas Zankl and Gorka Irazoqui and Johann Heyszl and Thomas Eisenbarth: AutoLock: Why Cache Attacks on ARM Are Harder Than You Think. in 26th USENIX Security Symposium (USENIX Security 17), pp. 1075-1091, USENIX Association, Vancouver, BC, 2017
    BibTeX Link
    @inproceedings {203670,
    author = {Marc Green and Leandro Rodrigues-Lima and Andreas Zankl and Gorka Irazoqui and Johann Heyszl and Thomas Eisenbarth},
    title = {AutoLock: Why Cache Attacks on {ARM} Are Harder Than You Think},
    booktitle = {26th {USENIX} Security Symposium ({USENIX} Security 17)},
    year = {2017},
    isbn = {978-1-931971-40-9},
    address = {Vancouver, BC},
    pages = {1075--1091},
    url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/green},
    publisher = {{USENIX} Association},
    }

2016

  • Chen, Cong and Inci, Mehmet Sinan and Taha, Mostafa and Eisenbarth, Thomas: SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs. in Smart Card Research and Advanced Applications - 15th International CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers, pp. 73-88, 2016
    BibTeX Link
    @inproceedings{DBLP:conf/cardis/ChenITE16,
      author    = {Chen, Cong and Inci, Mehmet Sinan and Taha, Mostafa and Eisenbarth, Thomas},
      title     = {SpecTre: {A} Tiny Side-Channel Resistant Speck Core for FPGAs},
      booktitle = {Smart Card Research and Advanced Applications - 15th International
                   Conference, {CARDIS} 2016, Cannes, France, November 7-9, 2016, Revised
                   Selected Papers},
      pages     = {73--88},
      year      = {2016},
      crossref  = {DBLP:conf/cardis/2016},
      url       = {https://doi.org/10.1007/978-3-319-54669-8_5},
      doi       = {10.1007/978-3-319-54669-8_5},
      timestamp = {Tue, 23 May 2017 01:08:17 +0200},
    }
    
  • Ding, A. Adam and Chen, Cong and Eisenbarth, Thomas: Simpler, Faster, and More Robust T-Test Based Leakage Detection,. in Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers,, pp. 163-183,, Springer International Publishing,, Cham,, 2016
    BibTeX Link
    @Inbook{Ding2016,
    author = {Ding, A. Adam and Chen, Cong and Eisenbarth, Thomas},
    editor="Standaert, Fran{\c{c}}ois-Xavier
    and Oswald, Elisabeth",
    title="Simpler, Faster, and More Robust T-Test Based Leakage Detection",
    bookTitle="Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers",
    year = {2016},
    publisher="Springer International Publishing",
    address="Cham",
    pages="163--183",
    abstract="The TVLA procedure using the t-test has become a popular leakage detection method. To protect against environmental fluctuation in laboratory measurements, we propose a paired t-test to improve the standard procedure. We take advantage of statistical matched-pairs design to remove the environmental noise effect in leakage detection. Higher order leakage detection is further improved with a moving average method. We compare the proposed test with standard t-test on synthetic data and physical measurements. Our results show that the proposed tests are robust to environmental noise.",
    isbn="978-3-319-43283-0",
    url="https://doi.org/10.1007/978-3-319-43283-0_10"
    }
    
    
  • Chen, Cong and Eisenbarth, Thomas and von Maurich, Ingo and Steinwandt, Rainer: Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem. IEEE Trans. Information Forensics and Security, no. 11, pp. 1093-1105, 2016
    BibTeX Link
    @article{DBLP:journals/tifs/ChenEMS16,
      author    = {Chen, Cong and Eisenbarth, Thomas and von Maurich, Ingo and Steinwandt, Rainer},
      title     = {Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem},
      journal   = {{IEEE} Trans. Information Forensics and Security},
      volume    = {11},
      number    = {6},
      pages     = {1093--1105},
      year      = {2016},
      url       = {https://doi.org/10.1109/TIFS.2015.2509944},
      timestamp = {Sun, 28 May 2017 13:17:25 +0200},
    }
  • Inci, Mehmet Sinan and Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure. in Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 436-447, ACM, New York, NY, USA, 2016
    BibTeX Link
    @inproceedings{Inci:2016:EAN:2991079.2991113,
     author = {Inci, Mehmet Sinan and Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk},
     title = {Efficient, Adversarial Neighbor Discovery Using Logical Channels on Microsoft Azure},
     booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications},
     series = {ACSAC '16},
     year = {2016},
     isbn = {978-1-4503-4771-6},
     location = {Los Angeles, California, USA},
     pages = {436--447},
     numpages = {12},
     url = {http://users.wpi.edu/~teisenbarth/pubs/NeighborDiscoveryAzure%20ACSAC2016.pdf},
     doi = {10.1145/2991079.2991113},
     acmid = {2991113},
     publisher = {ACM},
     address = {New York, NY, USA},
     keywords = {Microsoft Azure, co-location in cloud, denial-of-service, logical channels, memory bus locking},
    } 
  • Gulmezoglu, Berk and Inci, Mehmet Sinan and Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: Cross-VM Cache Attacks on AES. IEEE Trans. Multi-Scale Computing Systems, no. 2, pp. 211-222, 2016
    BibTeX Link
    @article{DBLP:journals/tmscs/GulmezogluIIES16,
      author    = {Gulmezoglu, Berk and Inci, Mehmet Sinan and Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Cross-VM Cache Attacks on {AES}},
      journal   = {{IEEE} Trans. Multi-Scale Computing Systems},
      volume    = {2},
      number    = {3},
      pages     = {211--222},
      year      = {2016},
      url       = {https://doi.org/10.1109/TMSCS.2016.2550438},
      timestamp = {Thu, 27 Jul 2017 10:19:22 +0200},
    }
    
    
  • Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: Cross Processor Cache Attacks. in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 353-364, ACM, New York, NY, USA, 2016
    BibTeX Link
    @inproceedings{Irazoqui:2016:CPC:2897845.2897867,
     author = {Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk},
     title = {Cross Processor Cache Attacks},
     booktitle = {Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security},
     series = {ASIA CCS '16},
     year = {2016},
     isbn = {978-1-4503-4233-9},
     location = {Xi'an, China},
     pages = {353--364},
     numpages = {12},
     url = {http://doi.acm.org/10.1145/2897845.2897867},
     doi = {10.1145/2897845.2897867},
     acmid = {2897867},
     publisher = {ACM},
     address = {New York, NY, USA},
     keywords = {cache attacks, cross-cpu attack, hypertransport, invalidate+transfer},
    }
  • Inci, Mehmet Sinan and Gulmezoglu, Berk and Eisenbarth, Thomas and Sunar, Berk: Co-location Detection on the Cloud. in Constructive Side-Channel Analysis and Secure Design - 7th International COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers, pp. 19-34, 2016
    BibTeX Link
    @inproceedings{DBLP:conf/cosade/InciGES16,
      author    = {Inci, Mehmet Sinan and Gulmezoglu, Berk and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Co-location Detection on the Cloud},
      booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International
                   Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                   Selected Papers},
      pages     = {19--34},
      year      = {2016},
      crossref  = {DBLP:conf/cosade/2016},
      url  = {https://doi.org/10.1007/978-3-319-43283-0_2},
      timestamp = {Sun, 21 May 2017 00:20:24 +0200},
    }
  • Inci, Mehmet Sinan and Gulmezoglu, Berk and Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: Cache Attacks Enable Bulk Key Recovery on the Cloud. in Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, pp. 368-388, 2016
    BibTeX Link
    @inproceedings{DBLP:conf/ches/InciGIES16,
      author    = {Inci, Mehmet Sinan and Gulmezoglu, Berk and Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Cache Attacks Enable Bulk Key Recovery on the Cloud},
      booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                   Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
      pages     = {368--388},
      year      = {2016},
      crossref  = {DBLP:conf/ches/2016},
      url       = {https://doi.org/10.1007/978-3-662-53140-2_18},
      doi       = {10.1007/978-3-662-53140-2_18},
      timestamp = {Sun, 21 May 2017 00:18:34 +0200},
    }
    
  • Chen, Cong and Farmani, Mohammad and and Eisenbarth, Thomas: A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile--and Why It Is Not,. in Advances in Cryptology - ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I,, pp. 819-843,, Springer Berlin Heidelberg,, Berlin, Heidelberg,, 2016
    BibTeX Link
    @Inbook{Chen2016,
    author = {Chen, Cong and Farmani, Mohammad and and Eisenbarth, Thomas},
    editor="Cheon, Jung Hee
    and Takagi, Tsuyoshi",
    title="A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not",
    bookTitle="Advances in Cryptology -- ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I",
    year = {2016},
    publisher="Springer Berlin Heidelberg",
    address="Berlin, Heidelberg",
    pages="819--843",
    abstract="This work explores the possibilities for practical Threshold Implementation (TI) with only two shares in order for a smaller design that needs less randomness but is still first-order leakage resistant. We present the first two-share Threshold Implementations of two lightweight block ciphers---Simon and Present. The implementation results show that two-share TI improves the compactness but usually further reduces the throughput when compared with first-order resistant three-share schemes. Our leakage analysis shows that two-share TI can retain perfect first-order resistance. However, the analysis also exposes a strong second-order leakage. All results are backed up by simulation as well as analysis of actual implementations.",
    isbn="978-3-662-53887-6",
    url = {https://link.springer.com/chapter/10.1007%2F978-3-662-53887-6_30},
    }
    
    
    
  • A. M. Leonard and H. Cai and K. K. Venkatasubramanian and M. Ali and T. Eisenbarth: A honeypot system for wearable networks. in 2016 IEEE 37th Sarnoff Symposium, pp. 199-201, Sept, 2016
    BibTeX Link
    @INPROCEEDINGS{7846755,
    author={A. M. Leonard and H. Cai and K. K. Venkatasubramanian and M. Ali and T. Eisenbarth},
    booktitle={2016 IEEE 37th Sarnoff Symposium},
    title={A honeypot system for wearable networks},
    year={2016},
    volume={},
    number={},
    pages={199-201},
    keywords={body area networks;telecommunication security;adversarial tampering;body area network;information security;wearable honeypot system;wearable networks;Accelerometers;Base stations;Biomedical monitoring;Communication channels;Monitoring;Peer-to-peer computing;Security},
    url={https://doi.org/10.1109/SARNOF.2016.7846755},
    ISSN={},
    month={Sept},
    }

2015

  • Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015, pp. 629-636, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/dsd/IrazoquiES15,
      author    = {Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Systematic Reverse Engineering of Cache Slice Selection in Intel Processors},
      booktitle = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira,
                   Portugal, August 26-28, 2015},
      pages     = {629--636},
      year      = {2015},
      crossref  = {DBLP:conf/dsd/2015},
      url = {https://doi.org/10.1109/DSD.2015.56},
      timestamp = {Fri, 19 May 2017 01:26:44 +0200},
    }
    
  • Shahverdi, Aria and Taha, Mostafa and Eisenbarth, Thomas: Silent Simon: A threshold implementation under 100 slices. in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 1-6, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/host/ShahverdiTE15,
      author    = {Shahverdi, Aria and Taha, Mostafa and Eisenbarth, Thomas},
      title     = {Silent Simon: A threshold implementation under 100 slices},
      booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                   {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
      pages     = {1--6},
      year      = {2015},
      crossref  = {DBLP:conf/host/2015},
      url       = {https://doi.org/10.1109/HST.2015.7140227},
      timestamp = {Sun, 21 May 2017 00:20:33 +0200},
    }
    
  • Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES. in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pp. 591-604, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/sp/ApececheaES15,
      author    = {Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk},
      title     = {S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES},
      booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                   CA, USA, May 17-21, 2015},
      pages     = {591--604},
      year      = {2015},
      crossref  = {DBLP:conf/sp/2015},
      url       = {https://doi.org/10.1109/SP.2015.42},
      timestamp = {Fri, 26 May 2017 00:50:06 +0200},
    }
    
  • Goddard, Zachary N. and LaJeunesse, Nicholas and Eisenbarth, Thomas: Power analysis of the t-private logic style for FPGAs. in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 68-71, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/host/GoddardLE15,
      author    = {Goddard, Zachary N. and LaJeunesse, Nicholas and Eisenbarth, Thomas},
      title     = {Power analysis of the t-private logic style for FPGAs},
      booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                   {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
      pages     = {68--71},
      year      = {2015},
      crossref  = {DBLP:conf/host/2015},
      url       = {https://doi.org/10.1109/HST.2015.7140239},
      timestamp = {Sun, 21 May 2017 00:20:33 +0200},
    }
  • Eisenbarth, Thomas and Meyerowitz, Aaron and Steinwandt, Rainer: On the security margin of MAC striping. Inf. Process. Lett., no. 115, pp. 899-902, 2015
    BibTeX Link
    @article{DBLP:journals/ipl/EisenbarthMS15,
      author    = {Eisenbarth, Thomas and Meyerowitz, Aaron and Steinwandt, Rainer},
      title     = {On the security margin of {MAC} striping},
      journal   = {Inf. Process. Lett.},
      volume    = {115},
      number    = {11},
      pages     = {899--902},
      year      = {2015},
      url       = {https://doi.org/10.1016/j.ipl.2015.05.009},
      timestamp = {Fri, 26 May 2017 22:54:41 +0200},
    }
    
    
  • Ege, Baris and Eisenbarth, Thomas and Batina, Lejla: Near Collision Side Channel Attacks. in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp. 277-292, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/sacrypt/EgeEB15,
      author    = {Ege, Baris and Eisenbarth, Thomas and Batina, Lejla},
      title     = {Near Collision Side Channel Attacks},
      booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                   Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
      pages     = {277--292},
      year      = {2015},
      crossref  = {DBLP:conf/sacrypt/2015},
      url = {https://doi.org/10.1007/978-3-319-31301-6_17},
      timestamp = {Sun, 21 May 2017 00:19:13 +0200},
    }
  • Chen, Cong and Eisenbarth, Thomas and von Maurich, Ingo and Steinwandt, Rainer: Masking Large Keys in Hardware: A Masked Implementation of McEliece. in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp. 293-309, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/sacrypt/ChenEMS15,
      author    = {Chen, Cong and Eisenbarth, Thomas and von Maurich, Ingo and Steinwandt, Rainer},
      title     = {Masking Large Keys in Hardware: {A} Masked Implementation of McEliece},
      booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                   Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
      pages     = {293--309},
      year      = {2015},
      crossref  = {DBLP:conf/sacrypt/2015},
      url = {https://doi.org/10.1007/978-3-319-31301-6_18},
      timestamp = {Sun, 21 May 2017 00:19:12 +0200},
    }
    
  • Irazoqui,Gorka and Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk: Lucky 13 Strikes Back. in Proceedings of the 10th ACM Symposium on Information, Computer and Security, ASIA CCS `15, Singapore, April 14-17, 2015, pp. 85-96, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/ccs/ApececheaIES15,
      author    = {Irazoqui,Gorka and Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Lucky 13 Strikes Back},
      booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                   Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                   2015},
      pages     = {85--96},
      year      = {2015},
      crossref  = {DBLP:conf/ccs/2015asia},
      url       = {http://doi.acm.org/10.1145/2714576.2714625},
      timestamp = {Tue, 21 Nov 2017 18:32:24 +0100},
    }
    
  • Irazoqui, Gorka and Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk: Know Thy Neighbor: Crypto Library Detection in Cloud. PoPETs, no. 2015, pp. 25-40, 2015
    BibTeX Link
    @article{DBLP:journals/popets/IrazoquiIES15,
      author    = {Irazoqui, Gorka and Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Know Thy Neighbor: Crypto Library Detection in Cloud},
      journal   = {PoPETs},
      volume    = {2015},
      number    = {1},
      pages     = {25--40},
      year      = {2015},
      url       = {http://www.degruyter.com/view/j/popets.2015.1.issue-1/popets-2015-0003/popets-2015-0003.xml},
      timestamp = {Fri, 30 Oct 2015 09:52:58 +0100},
    }
  • T. Eisenbarth and Y. Fei and D. Serpanos: Guest Editorial: Special Section on Embedded System Security. IEEE Embedded Systems Letters, no. 7, pp. 1-2, March, 2015
    BibTeX Link
    @ARTICLE{7047999,
    author={T. Eisenbarth and Y. Fei and D. Serpanos},
    journal={IEEE Embedded Systems Letters},
    title={Guest Editorial: Special Section on Embedded System Security},
    year={2015},
    volume={7},
    number={1},
    pages={1-2},
    keywords={Computer security;Embedded systems;Internet;Network-on-chip;Security;Special issues and sections},
    url={https://doi.org/10.1109/LES.2015.2404940},
    ISSN={1943-0663},
    month={March},
    }
  • Ye, Xin and Taha, Mostafa and Chen, Cong and Eisenbarth, Thomas: Faster Leakage Detection and Exploitation. in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 21-29, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/ccs/YeTCE15,
      author    = {Ye, Xin and Taha, Mostafa and Chen, Cong and Eisenbarth, Thomas},
      title     = {Faster Leakage Detection and Exploitation},
      booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                   Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
      pages     = {21--29},
      year      = {2015},
      crossref  = {DBLP:conf/ccs/2015trusted},
      url = {https://www.researchgate.net/publication/301419853_Faster_Leakage_Detection_and_Exploitation},
      doi = {10.1145/2808414.2808419},
      timestamp = {Wed, 25 Oct 2017 16:45:47 +0200},
    }
    
  • Chen, Cong and Eisenbarth, Thomas and von Maurich, Ingo and Steinwandt, Rainer: Differential Power Analysis of a McEliece Cryptosystem. in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers, pp. 538-556, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/acns/ChenEMS15,
      author    = {Chen, Cong and Eisenbarth, Thomas and von Maurich, Ingo and Steinwandt, Rainer},
      title     = {Differential Power Analysis of a McEliece Cryptosystem},
      booktitle = {Applied Cryptography and Network Security - 13th International Conference,
                   {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
      pages     = {538--556},
      year      = {2015},
      crossref  = {DBLP:conf/acns/2015},
      url       = {http://eprint.iacr.org/2014/534},
      doi       = {10.1007/978-3-319-28166-7_26},
      timestamp = {Tue, 23 May 2017 01:13:08 +0200},
    }
    
  • Gulmezoglu, Berk and Inci, Mehmet Sinan and Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk: A Faster and More Realistic Flush+Reload Attack on AES. in Constructive Side-Channel Analysis and Secure Design - 6th International COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers, pp. 111-126, 2015
    BibTeX Link
    @inproceedings{DBLP:conf/cosade/GulmezogluIAES15,
      author    = {Gulmezoglu, Berk and Inci, Mehmet Sinan and Irazoqui, Gorka and Eisenbarth, Thomas and Sunar, Berk},
      title     = {A Faster and More Realistic Flush+Reload Attack on {AES}},
      booktitle = {Constructive Side-Channel Analysis and Secure Design - 6th International
                   Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised
                   Selected Papers},
      pages     = {111--126},
      year      = {2015},
      crossref  = {DBLP:conf/cosade/2015},
      url       = {https://doi.org/10.1007/978-3-319-21476-4_8},
      timestamp = {Sun, 21 May 2017 00:20:24 +0200},
    }
    

2014

  • Irazoqui, Gorka and Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk: Wait a minute! A fast, Cross-VM attack on AES. IACR Cryptology ePrint Archive, no. 2014, pp. 435, 2014
    BibTeX Link
    @article{DBLP:journals/iacr/ApececheaIES14a,
      author    = {Irazoqui, Gorka and Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Wait a minute! {A} fast, Cross-VM attack on {AES}},
      journal   = {{IACR} Cryptology ePrint Archive},
      volume    = {2014},
      pages     = {435},
      year      = {2014},
      url       = {http://eprint.iacr.org/2014/435},
      timestamp = {Thu, 08 Jun 2017 14:26:36 +0200},
    }
    
    
  • Doröz, Yarkin and Shahverdi, Aria and Eisenbarth, Thomas and Sunar, Berk: Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince. in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers, pp. 208-220, 2014
    BibTeX Link
    @inproceedings{DBLP:conf/fc/DorozSES14,
      author    = {Doröz, Yarkin and Shahverdi, Aria and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince},
      booktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
                   and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
                   Papers},
      pages     = {208--220},
      year      = {2014},
      crossref  = {DBLP:conf/fc/2014w},
      url       = {https://doi.org/10.1007/978-3-662-44774-1_17},
      timestamp = {Fri, 26 May 2017 00:50:27 +0200},
    }
    
  • Ye, Xin and Chen, Cong and Eisenbarth, Thomas: Non-Linear Collision Analysis. in Radio Frequency Identification: Security and Privacy Issues - 10th Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers, pp. 198-214, 2014
    BibTeX Link
    @inproceedings{DBLP:conf/rfidsec/YeCE14,
      author    = {Ye, Xin and Chen, Cong and Eisenbarth, Thomas},
      title     = {Non-Linear Collision Analysis},
      booktitle = {Radio Frequency Identification: Security and Privacy Issues - 10th
                   International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014,
                   Revised Selected Papers},
      pages     = {198--214},
      year      = {2014},
      crossref  = {DBLP:conf/rfidsec/2014},
      url       = {https://doi.org/10.1007/978-3-319-13066-8_13},
      timestamp = {Wed, 25 Oct 2017 16:45:47 +0200},
    }
    
  • Irazoqui, Gorka and Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk: Fine Grain Cross-VM Attacks on Xen and VMware. in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014, pp. 737-744, 2014
    BibTeX Link
    @inproceedings{DBLP:conf/bdcloud/ApececheaIES14,
      author    = {Irazoqui, Gorka and Inci, Mehmet Sinan and Eisenbarth, Thomas and Sunar, Berk},
      title     = {Fine Grain Cross-VM Attacks on Xen and VMware},
      booktitle = {2014 {IEEE} Fourth International Conference on Big Data and Cloud
                   Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014},
      pages     = {737--744},
      year      = {2014},
      crossref  = {DBLP:conf/bdcloud/2014},
      url       = {http://eprint.iacr.org/2014/248},
      doi       = {10.1109/BDCloud.2014.102},
      timestamp = {Sun, 21 May 2017 00:21:14 +0200},
    }
    
  • Ye, Xin and Eisenbarth, Thomas and Martin, William: Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery. in Smart Card Research and Advanced Applications - 13th International CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers, pp. 215-232, 2014
    BibTeX Link
    @inproceedings{DBLP:conf/cardis/YeEM14,
      author    = {Ye, Xin and Eisenbarth, Thomas and Martin, William},
      title     = {Bounded, yet Sufficient? How to Determine Whether Limited Side Channel
                   Information Enables Key Recovery},
      booktitle = {Smart Card Research and Advanced Applications - 13th International
                   Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
                   Selected Papers},
      pages     = {215--232},
      year      = {2014},
      crossref  = {DBLP:conf/cardis/2014},
      url       = {https://doi.org/10.1007/978-3-319-16763-3_13},
      timestamp = {Wed, 25 Oct 2017 16:45:47 +0200},
    }
    
  • Cong Chen, Cong and Eisenbarth, Thomas and Shahverdi, Aria and Ye, Xin: Balanced Encoding to Mitigate Power Analysis: A Case Study. IACR Cryptology ePrint Archive, no. 2014, pp. 952, 2014
    BibTeX Link
    @article{DBLP:journals/iacr/ChenESY14,
      author    = {Cong Chen, Cong and Eisenbarth, Thomas and Shahverdi, Aria and Ye, Xin},
      title     = {Balanced Encoding to Mitigate Power Analysis: {A} Case Study},
      journal   = {{IACR} Cryptology ePrint Archive},
      volume    = {2014},
      pages     = {952},
      year      = {2014},
      url       = {http://eprint.iacr.org/2014/952},
      timestamp = {Wed, 25 Oct 2017 16:45:48 +0200},
    }
    
    

2013

  • Ye, Xin and Eisenbarth, Thomas: On the Vulnerability of Low Entropy Masking Schemes. in Smart Card Research and Advanced Applications - 12th International CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers, pp. 44-60, 2013
    BibTeX Link
    @inproceedings{DBLP:conf/cardis/YeE13,
      author    = {Ye, Xin and Eisenbarth, Thomas},
      title     = {On the Vulnerability of Low Entropy Masking Schemes},
      booktitle = {Smart Card Research and Advanced Applications - 12th International
                   Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                   Revised Selected Papers},
      pages     = {44--60},
      year      = {2013},
      crossref  = {DBLP:conf/cardis/2013},
      url       = {https://doi.org/10.1007/978-3-319-08302-5_4},
      timestamp = {Wed, 25 Oct 2017 16:45:47 +0200},
    }
    
  • Eisenbarth, Thomas and von Maurich, Ingo and Paar, Christof and Ye, Xin: A Performance Boost for Hash-Based Signatures. in Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, pp. 166-182, 2013
    BibTeX Link
    @inproceedings{DBLP:conf/birthday/EisenbarthMPY13,
      author    = {Eisenbarth, Thomas and von Maurich, Ingo and Paar, Christof and Ye, Xin},
      title     = {A Performance Boost for Hash-Based Signatures},
      booktitle = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann
                   on the Occasion of His 60th Birthday},
      pages     = {166--182},
      year      = {2013},
      crossref  = {DBLP:conf/birthday/2013buchmann},
      url       = {https://doi.org/10.1007/978-3-642-42001-6_13},
      timestamp = {Wed, 25 Oct 2017 16:45:46 +0200},
    }

2012

  • Ye, Xin and Eisenbarth, Thomas: Wide Collisions in Practice. in Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings, pp. 329-343, 2012
    BibTeX Link
    @inproceedings{DBLP:conf/acns/YeE12,
      author    = {Ye, Xin and Eisenbarth, Thomas},
      title     = {Wide Collisions in Practice},
      booktitle = {Applied Cryptography and Network Security - 10th International Conference,
                   {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
      pages     = {329--343},
      year      = {2012},
      crossref  = {DBLP:conf/acns/2012},
      url       = {https://doi.org/10.1007/978-3-642-31284-7_20},
      timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
    }
    
  • Moradi, Amir and Kirschbaum, Mario and Eisenbarth, Thomas and Paar, Christof: Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods. IEEE Trans. VLSI Syst., no. 20, pp. 1578-1589, 2012
    BibTeX Link
    @article{DBLP:journals/tvlsi/MoradiKEP12,
      author    = {Moradi, Amir and Kirschbaum, Mario and Eisenbarth, Thomas and Paar, Christof},
      title     = {Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power
                   Analysis Methods},
      journal   = {{IEEE} Trans. {VLSI} Syst.},
      volume    = {20},
      number    = {9},
      pages     = {1578--1589},
      year      = {2012},
      url       = {https://doi.org/10.1109/TVLSI.2011.2160375},
      timestamp = {Thu, 18 May 2017 09:50:46 +0200},
    }
  • Eisenbarth, Thomas and Gong, Zheng and Güneysu, Tim and Heyse, Stefan and Indesteege, Sebastiaan and Kerckhof, Stéphanie and Koeune, François and Nad, Tomislav and Plos, Thomas and Regazzoni, Francesco and Standaert, François-Xavier and van Oldeneel tot Oldenzeel, Loic: Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. in Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings, pp. 172-187, 2012
    BibTeX Link
    @inproceedings{DBLP:conf/africacrypt/EisenbarthGGHIKKNPRSO12,
      author    = {Eisenbarth, Thomas and Gong, Zheng and Güneysu, Tim and Heyse, Stefan and Indesteege, Sebastiaan and Kerckhof, Stéphanie and Koeune, François and Nad, Tomislav and Plos, Thomas and Regazzoni, Francesco and Standaert, François-Xavier and van Oldeneel tot Oldenzeel, Loic},
      title     = {Compact Implementation and Performance Evaluation of Block Ciphers
                   in ATtiny Devices},
      booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                   on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
      pages     = {172--187},
      year      = {2012},
      crossref  = {DBLP:conf/africacrypt/2012},
      url       = {https://doi.org/10.1007/978-3-642-31410-0_11},
      timestamp = {Thu, 15 Jun 2017 21:37:05 +0200},
    }
    

2011

  • Rupp, Andy and Eisenbarth, Thomas and Bogdanov, Andrey and Grieb, Oliver: Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications. Integration, no. 44, pp. 290-304, 2011
    BibTeX Link
    @article{DBLP:journals/integration/RuppEBG11,
      author    = {Rupp, Andy and Eisenbarth, Thomas and Bogdanov, Andrey and Grieb, Oliver},
      title     = {Hardware {SLE} solvers: Efficient building blocks for cryptographic
                   and cryptanalyticapplications},
      journal   = {Integration},
      volume    = {44},
      number    = {4},
      pages     = {290--304},
      year      = {2011},
      url       = {https://doi.org/10.1016/j.vlsi.2010.09.001},
      timestamp = {Sat, 20 May 2017 00:22:53 +0200},
    }

2010

  • Bogdanov, Andrey and Eisenbarth, Thomas and Paar, Christof and Wienecke, Malte: Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs. in Topics in Cryptology - CT-RSA 2010, The Cryptographers` Track at RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, pp. 235-251, 2010
    BibTeX Link
    @inproceedings{DBLP:conf/ctrsa/BogdanovEPW10,
      author    = {Bogdanov, Andrey and Eisenbarth, Thomas and Paar, Christof and Wienecke, Malte},
      title     = {Differential Cache-Collision Timing Attacks on {AES} with Applications
                   to Embedded CPUs},
      booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                   the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                   Proceedings},
      pages     = {235--251},
      year      = {2010},
      crossref  = {DBLP:conf/ctrsa/2010},
      url       = {https://doi.org/10.1007/978-3-642-11925-5_17},
      timestamp = {Sun, 21 May 2017 00:20:21 +0200},
    }
    
  • Moradi, Amir and Mischke, Oliver and Eisenbarth, Thomas: Correlation-Enhanced Power Analysis Collision Attack. in Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings, pp. 125-139, 2010
    BibTeX Link
    @inproceedings{DBLP:conf/ches/MoradiME10,
      author    = {Moradi, Amir and Mischke, Oliver and Eisenbarth, Thomas},
      title     = {Correlation-Enhanced Power Analysis Collision Attack},
      booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                   Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
      pages     = {125--139},
      year      = {2010},
      crossref  = {DBLP:conf/ches/2010},
      url       = {https://doi.org/10.1007/978-3-642-15031-9_9},
      timestamp = {Sun, 21 May 2017 00:18:34 +0200},
    }
    
  • Eisenbarth, Thomas and Paar, Christof and Weghenkel, Björn: Building a Side Channel Based Disassembler. Trans. Computational Science, no. 10, pp. 78-99, 2010
    BibTeX Link
    @article{DBLP:journals/tcos/EisenbarthPW10,
      author    = {Eisenbarth, Thomas and Paar, Christof and Weghenkel, Björn},
      title     = {Building a Side Channel Based Disassembler},
      journal   = {Trans. Computational Science},
      volume    = {10},
      pages     = {78--99},
      year      = {2010},
      crossref  = {DBLP:journals/tcos/2010-10},
      url       = {https://doi.org/10.1007/978-3-642-17499-5_4},
      timestamp = {Wed, 17 May 2017 14:25:17 +0200},
    }

2009

  • Moradi, Amir and Salmasizadeh, Mahmoud and Manzuri Shalmani, Mohammad Taghi and Eisenbarth, Thomas: Vulnerability modeling of cryptographic hardware to power analysis attacks. Integration, no. 42, pp. 468-478, 2009
    BibTeX Link
    @article{DBLP:journals/integration/MoradiSSE09,
      author    = {Moradi, Amir and Salmasizadeh, Mahmoud and Manzuri Shalmani, Mohammad Taghi and Eisenbarth, Thomas},
      title     = {Vulnerability modeling of cryptographic hardware to power analysis
                   attacks},
      journal   = {Integration},
      volume    = {42},
      number    = {4},
      pages     = {468--478},
      year      = {2009},
      url       = {https://doi.org/10.1016/j.vlsi.2009.01.001},
      timestamp = {Sat, 20 May 2017 00:22:53 +0200},
    }
    
    
  • Moradi, Amir and Eisenbarth, Thomas and Poschmann, Axel and Paar, Christof: Power Analysis of Single-Rail Storage Elements as Used in MDPL. in Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers, pp. 146-160, 2009
    BibTeX Link
    @inproceedings{DBLP:conf/icisc/MoradiEPP09,
      author    = {Moradi, Amir and Eisenbarth, Thomas and Poschmann, Axel and Paar, Christof},
      title     = {Power Analysis of Single-Rail Storage Elements as Used in {MDPL}},
      booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                   Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
      pages     = {146--160},
      year      = {2009},
      crossref  = {DBLP:conf/icisc/2009},
      url       = {https://doi.org/10.1007/978-3-642-14423-3_11},
      timestamp = {Fri, 26 May 2017 00:51:04 +0200},
    }
    
  • Eisenbarth, Thomas and Güneysu, Tim and Heyse, Stefan and Paar, Christof: MicroEliece: McEliece for Embedded Devices. in Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 49-64, 2009
    BibTeX Link
    @inproceedings{DBLP:conf/ches/EisenbarthGHP09,
      author    = {Eisenbarth, Thomas and Güneysu, Tim and Heyse, Stefan and Paar, Christof},
      title     = {MicroEliece: McEliece for Embedded Devices},
      booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                   Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
      pages     = {49--64},
      year      = {2009},
      crossref  = {DBLP:conf/ches/2009},
      url       = {https://doi.org/10.1007/978-3-642-04138-9_4},
      timestamp = {Thu, 15 Jun 2017 21:37:06 +0200},
    }
    
  • Paar, Christof and Eisenbarth, Thomas and Kasper, Markus and Kasper, Timo and Moradi, Amir: KeeLoq and Side-Channel Analysis-Evolution of an Attack. in Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009, pp. 65-69, 2009
    BibTeX Link
    @inproceedings{DBLP:conf/fdtc/PaarEKKM09,
      author    = {Paar, Christof and Eisenbarth, Thomas and Kasper, Markus and Kasper, Timo and Moradi, Amir},
      title     = {KeeLoq and Side-Channel Analysis-Evolution of an Attack},
      booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                   {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
      pages     = {65--69},
      year      = {2009},
      crossref  = {DBLP:conf/fdtc/2009},
      url       = {https://doi.org/10.1109/FDTC.2009.44},
      timestamp = {Wed, 17 May 2017 10:54:58 +0200},
    }
    
  • Regazzoni, Francesco and Eisenbarth, Thomas and Poschmann, Axel and Großschädl, Johann and Gurkaynak, Frank and Macchetti, Marco and Toprak, Zeynep and Pozzi, Laura and Paar, Christof and Leblebici, Yusuf and Ienne, Paolo: Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology. Trans. Computational Science, no. 4, pp. 230-243, 2009
    BibTeX Link
    @article{DBLP:journals/tcos/RegazzoniEPGGMDPPLI09,
      author    = {Regazzoni, Francesco and Eisenbarth, Thomas and Poschmann, Axel and Großschädl, Johann and Gurkaynak, Frank and Macchetti, Marco and Toprak, Zeynep and Pozzi, Laura and Paar, Christof and Leblebici, Yusuf and Ienne, Paolo},
      title     = {Evaluating Resistance of {MCML} Technology to Power Analysis Attacks
                   Using a Simulation-Based Methodology},
      journal   = {Trans. Computational Science},
      volume    = {4},
      pages     = {230--243},
      year      = {2009},
      crossref  = {DBLP:journals/tcos/2009-4},
      url       = {https://doi.org/10.1007/978-3-642-01004-0_13},
      timestamp = {Wed, 17 May 2017 14:25:17 +0200},
    }

2008

  • Bogdanov, Andrey and Eisenbarth, Thomas and Rupp, Andy and Wolf, Christopher: Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?. IACR Cryptology ePrint Archive, no. 2008, pp. 349, 2008
    BibTeX Link
    @article{DBLP:journals/iacr/BogdanovERW08,
      author    = {Bogdanov, Andrey and Eisenbarth, Thomas and Rupp, Andy and Wolf, Christopher},
      title     = {Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement
                   for Elliptic Curves?},
      journal   = {{IACR} Cryptology ePrint Archive},
      volume    = {2008},
      pages     = {349},
      year      = {2008},
      url       = {http://eprint.iacr.org/2008/349},
      timestamp = {Thu, 08 Jun 2017 14:26:44 +0200},
    }
    
    
  • Gierlichs, Benedikt and Batina, Lejla and Clavier, Christophe and Eisenbarth, Thomas and Gouget, Aline and Handschuh, Helena and Kasper, Timo and Lemke-Rust, Kerstin and Mangard, Stefan and Moradi, Amir and Oswald, Elisabeth: Susceptibility of eSTREAM Candidates towards Side Channel Analysis. in SACS 2008, Lausanne, 2008
    BibTeX Link
    @MISC{Gierlichs_susceptibilityof,
    author = {Gierlichs, Benedikt and Batina, Lejla and Clavier, Christophe and Eisenbarth, Thomas and Gouget, Aline and Handschuh, Helena and Kasper, Timo and Lemke-Rust, Kerstin and Mangard, Stefan and Moradi, Amir and Oswald, Elisabeth},
    title = {Susceptibility of eSTREAM Candidates towards Side Channel Analysis},
    booktitle = {SACS 2008, Lausanne},
    year = {2008},
    url = {https://www.researchgate.net/publication/228371563_Susceptibility_of_eSTREAM_candidates_towards_side_channel_analysis},
    }
    
  • Eisenbarth, Thomas and Kasper, Timo and Moradi, Amir and Paar, Christof and Salmasizadeh, Mahmoud and Manzuri Shalmani, Mohammad T.: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. in Advances in Cryptology - CRYPTO 2008, 28th Annual International Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 203-220, 2008
    BibTeX Link
    @inproceedings{DBLP:conf/crypto/EisenbarthKMPSS08,
      author    = {Eisenbarth, Thomas and Kasper, Timo and Moradi, Amir and Paar, Christof and Salmasizadeh, Mahmoud and Manzuri Shalmani, Mohammad T.},
      title     = {On the Power of Power Analysis in the Real World: {A} Complete Break
                   of the KeeLoqCode Hopping Scheme},
      booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                   Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                   Proceedings},
      pages     = {203--220},
      year      = {2008},
      crossref  = {DBLP:conf/crypto/2008},
      url       = {https://doi.org/10.1007/978-3-540-85174-5_12},
      timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
    }
    
  • Rohde, Sebastian and Eisenbarth, Thomas and Dahmen, Erik and Buchmann, Johannes A. and Paar, Christof: Fast Hash-Based Signatures on Constrained Devices. in Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, pp. 104-117, 2008
    BibTeX Link
    @inproceedings{DBLP:conf/cardis/RohdeEDBP08,
      author    = {Rohde, Sebastian and Eisenbarth, Thomas and Dahmen, Erik and Buchmann, Johannes A. and Paar, Christof},
      title     = {Fast Hash-Based Signatures on Constrained Devices},
      booktitle = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
                   International Conference, {CARDIS} 2008, London, UK, September 8-11,
                   2008. Proceedings},
      pages     = {104--117},
      year      = {2008},
      crossref  = {DBLP:conf/cardis/2008},
      url       = {https://doi.org/10.1007/978-3-540-85893-5_8},
      timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
    }
    
  • Meiser, Gordon and Eisenbarth, Thomas and Lemke-Rust, Kerstin and Paar, Christof: Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. in IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008, pp. 58-66, 2008
    BibTeX Link
    @inproceedings{DBLP:conf/sies/MeiserELP08,
      author    = {Meiser, Gordon and Eisenbarth, Thomas and Lemke-Rust, Kerstin and Paar, Christof},
      title     = {Efficient implementation of eSTREAM ciphers on 8-bit {AVR} microcontrollers},
      booktitle = {{IEEE} Third International Symposium on Industrial Embedded Systems,
                   {SIES} 2008, Montpellier / La Grande Motte, France, June 11-13, 2008},
      pages     = {58--66},
      year      = {2008},
      crossref  = {DBLP:conf/sies/2008},
      url       = {https://doi.org/10.1109/SIES.2008.4577681},
      timestamp = {Wed, 17 May 2017 10:54:42 +0200},
    }
    
  • Rohde, Sebastian and Eisenbarth, Thomas and Dahmen, Erik and Buchmann, Johannes and Paar, Christof: Efficient Hash-Based Signatures on Embedded Devices. 01, 2008
    BibTeX Link
    @article{article,
    author = {Rohde, Sebastian and Eisenbarth, Thomas and Dahmen, Erik and Buchmann, Johannes and Paar, Christof},
    year = {2008},
    month = {01},
    pages = {},
    title = {Efficient Hash-Based Signatures on Embedded Devices},
    url = {https://www.researchgate.net/publication/229001128_Efficient_Hash-Based_Signatures_on_Embedded_Devices},
    }
  • Regazzoni, Francesco and Eisenbarth, Thomas and Breveglieri, Luca and Ienne, Paolo and Koren, Israel: Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. in 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA, USA, pp. 202-210, 2008
    BibTeX Link
    @inproceedings{DBLP:conf/dft/RegazzoniEBIK08,
      author    = {Regazzoni, Francesco and Eisenbarth, Thomas and Breveglieri, Luca and Ienne, Paolo and Koren, Israel},
      title     = {Can Knowledge Regarding the Presence of Countermeasures Against Fault
                   Attacks Simplify Power Attacks on Cryptographic Devices?},
      booktitle = {23rd {IEEE} International Symposium on Defect and Fault-Tolerance
                   in {VLSI} Systems {(DFT} 2008), 1-3 October 2008, Boston, MA, {USA}},
      pages     = {202--210},
      year      = {2008},
      crossref  = {DBLP:conf/dft/2008},
      url       = {https://doi.org/10.1109/DFT.2008.53},
      timestamp = {Wed, 17 May 2017 10:54:38 +0200},
    }
    

2007

  • Bogdanov, Andrey and Eisenbarth, Thomas and Wolf, M. and Wollinger, Thomas: Trusted computing for automotive systems: New approaches to enforce security for electronic systems in vehicles. pp. 227-237, 01, 2007
    BibTeX Link
    @article{articleBogdanov07,
    author = {Bogdanov, Andrey and Eisenbarth, Thomas and Wolf, M. and Wollinger, Thomas},
    year = {2007},
    month = {01},
    pages = {227-237},
    title = {Trusted computing for automotive systems: New approaches to enforce security for electronic systems in vehicles},
    url = {https://www.researchgate.net/publication/291856499_Trusted_computing_for_automotive_systems_New_approaches_to_enforce_security_for_electronic_systems_in_vehicles},
    }
  • Eisenbarth, Thomas and Güneysu, Tim and Paar, Christof and Sadeghi, Ahmad-Reza and Schellekens, Dries and Wolf, Marko: Reconfigurable trusted computing in hardware. in Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 15-20, 2007
    BibTeX Link
    @inproceedings{DBLP:conf/ccs/EisenbarthGPSSW07,
      author    = {Eisenbarth, Thomas and Güneysu, Tim and Paar, Christof and Sadeghi, Ahmad-Reza and Schellekens, Dries and Wolf, Marko},
      title     = {Reconfigurable trusted computing in hardware},
      booktitle = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
                   {STC} 2007, Alexandria, VA, USA, November 2, 2007},
      pages     = {15--20},
      year      = {2007},
      crossref  = {DBLP:conf/ccs/2007stc},
      url       = {http://doi.acm.org/10.1145/1314354.1314360},
      timestamp = {Thu, 15 Jun 2017 21:42:47 +0200},
    }
  • Regazzoni, Francesco and Eisenbarth, Thomas and Grossschadl, Johann and Breveglieri, Luca and Ienne, Paolo and Koren, Israel and Paar, Christof: Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits. in 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 26-28 September 2007, Rome, Italy., pp. 508-516, 2007
    BibTeX Link
    @inproceedings{DBLP:conf/dft/RegazzoniEGBIKP07,
      author    = {Regazzoni, Francesco and Eisenbarth, Thomas and Grossschadl, Johann and Breveglieri, Luca and Ienne, Paolo and Koren, Israel and Paar, Christof},
      title     = {Power Attacks Resistance of Cryptographic S-Boxes with Added Error
                   Detection Circuits},
      booktitle = {22nd {IEEE} International Symposium on Defect and Fault-Tolerance
                   in {VLSI} Systems {(DFT} 2007), 26-28 September 2007, Rome, Italy.},
      pages     = {508--516},
      year      = {2007},
      crossref  = {DBLP:conf/dft/2007},
      url       = {https://doi.org/10.1109/DFT.2007.61},
      timestamp = {Wed, 17 May 2017 10:54:38 +0200},
    }
    
  • Rinne, Soren and Eisenbarth, Thomas and Paar, Christof: Performance Analysis of Contemporary LightWeight Block Ciphers on 8-bit Microcontrollers. 01, 2007
    BibTeX Link
    @ inproceedings{Rinne2007PerformanceAO,
    author = {Rinne, Soren and Eisenbarth, Thomas and Paar, Christof},
    year = {2007},
    month = {01},
    pages = {},
    title = {Performance Analysis of Contemporary LightWeight Block Ciphers on 8-bit Microcontrollers},
    url = {https://www.semanticscholar.org/paper/Performance-Analysis-of-Contemporary-Light-Weight-Rinne-Eisenbarth/a5f0b7c6e442406c0c97854eb97f8a21157c3b08},
    }
    
  • Eisenbarth, Thomas and Guneysu, Tim and Paar, Christof and Sadeghi, Ahmad-Reza and Wolf, Marko and Tessier, Russell: Establishing Chain of Trust in Reconfigurable Hardware. in IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA, pp. 289-290, 2007
    BibTeX Link
    @inproceedings{DBLP:conf/fccm/EisenbarthGPSWT07,
      author    = {Eisenbarth, Thomas and Guneysu, Tim and Paar, Christof and Sadeghi, Ahmad-Reza and Wolf, Marko and Tessier, Russell},
      title     = {Establishing Chain of Trust in Reconfigurable Hardware},
      booktitle = {{IEEE} Symposium on Field-Programmable Custom Computing Machines,
                   {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}},
      pages     = {289--290},
      year      = {2007},
      crossref  = {DBLP:conf/fccm/2007},
      url       = {https://doi.org/10.1109/FCCM.2007.23},
      timestamp = {Thu, 15 Jun 2017 21:41:13 +0200},
    }
    
  • Eisenbarth, Thomas and Kumar, Sandeep and Paar, Christof and Poschmann, Axel and Uhsadel, Leif: A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers, no. 24, pp. 522-533, 2007
    BibTeX Link
    @article{DBLP:journals/dt/EisenbarthKPPU07,
      author    = {Eisenbarth, Thomas and Kumar, Sandeep and Paar, Christof and Poschmann, Axel and Uhsadel, Leif},
      title     = {A Survey of Lightweight-Cryptography Implementations},
      journal   = {{IEEE} Design {\&} Test of Computers},
      volume    = {24},
      number    = {6},
      pages     = {522--533},
      year      = {2007},
      url       = {https://doi.org/10.1109/MDT.2007.178},
      timestamp = {Thu, 18 May 2017 09:53:57 +0200},
    }
    
    
  • Regazzoni, Francesco and Badel, Stephane and Thomas Eisenbarth and Grossschadl, Johann and Poschmann, Axel and Deniz, Zeynep Toprak and Macchetti, Marco and Pozzi, Laura and Paar, Christof and Leblebici, Yusuf and Ienne, Paolo: A Simulation-Based Methodology for Evaluating the DPA-Resistance of Functional Units with Application to CMOS and MCML Technologies. in Proceedings of the 2007 International Conference on Embedded Computer Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, July 16-19, 2007, pp. 209-214, 2007
    BibTeX Link
    @inproceedings{DBLP:conf/samos/RegazzoniBEGPDMPPLI07,
      author    = {Regazzoni, Francesco and Badel, Stephane and
                   Thomas Eisenbarth and Grossschadl, Johann and Poschmann, Axel and Deniz, Zeynep Toprak and Macchetti, Marco and Pozzi, Laura and Paar, Christof and Leblebici, Yusuf and Ienne, Paolo},
      title     = {A Simulation-Based Methodology for Evaluating the DPA-Resistance of
                   Cryptographic Functional Units with Application to {CMOS} and {MCML}
                   Technologies},
      booktitle = {Proceedings of the 2007 International Conference on Embedded Computer
                   Systems: Architectures, Modeling and Simulation {(IC-SAMOS} 2007),
                   Samos, Greece, July 16-19, 2007},
      pages     = {209--214},
      year      = {2007},
      crossref  = {DBLP:conf/samos/2007ic},
      url       = {https://doi.org/10.1109/ICSAMOS.2007.4285753},
      timestamp = {Thu, 25 May 2017 00:42:58 +0200},
    }
    
  • Bogdanov, Andrey and Eisenbarth, Thomas and Rupp, Andy: A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 394-412, 2007
    BibTeX Link
    @inproceedings{DBLP:conf/ches/BogdanovER07,
      author    = {Bogdanov, Andrey and Eisenbarth, Thomas and Rupp, Andy},
      title     = {A Hardware-Assisted Realtime Attack on {A5/2} Without Precomputations},
      booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                   Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
      pages     = {394--412},
      year      = {2007},
      crossref  = {DBLP:conf/ches/2007},
      url       = {https://doi.org/10.1007/978-3-540-74735-2_27},
      timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
    }