Prof. Dr.-Ing. Thomas Eisenbarth

Photo of Thomas  Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 043

Email: thomas.eisenbarth(at)uni-luebeck.de
Phone: +49 451 3101 6600
Fax: +49 451 3101 6604

Kurzbiographie

Thomas Eisenbarth ist Professor für IT-Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr-Universität Bochum und promovierte anschließend bis 2009 am Horst-Görtz-Institut für IT-Sicherheit. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security  (CCIS) der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er Direktor des Instituts für IT-Sicherheit an der Universität zu Lübeck.
Seit Oktober 2024 ist er Vorsitzender der MINT-Sektionen.



Seine Forschungsinteressen umfassen:

  • Sichere Systeme, Softwaresicherheit und Code-Analyse
  • Angewandte Kryptografie & Seitenkanalanalyse
  • Trustworthy AI

Konferenz- und Workshoporganisation

Steering Committees

Publikationen

2014

Xin Ye, Thomas Eisenbarth, and William Martin,
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, in Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers , 2014. pp. 215--232.
Datei: 978-3-319-16763-3_13
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar,
Fine Grain Cross-VM Attacks on Xen and VMware, in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014 , 2014. pp. 737--744.
DOI:10.1109/BDCloud.2014.102
Datei: 248
Xin Ye, Cong Chen, and Thomas Eisenbarth,
Non-Linear Collision Analysis, in Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers , 2014. pp. 198--214.
Datei: 978-3-319-13066-8_13
Yarkin Doröz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar,
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince, in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers , 2014. pp. 208--220.
Datei: 978-3-662-44774-1_17
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar,
Wait a minute! A fast, Cross-VM attack on AES, IACR Cryptology ePrint Archive , vol. 2014, pp. 435, 2014.
Datei: 435

2013

Thomas Eisenbarth, Ingo Maurich, Christof Paar, and Xin Ye,
A Performance Boost for Hash-Based Signatures, in Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday , 2013. pp. 166--182.
Datei: 978-3-642-42001-6_13
Xin Ye, and Thomas Eisenbarth,
On the Vulnerability of Low Entropy Masking Schemes, in Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers , 2013. pp. 44--60.
Datei: 978-3-319-08302-5_4

2012

Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, François-Xavier Standaert, and Loic Oldenzeel,
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices, in Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings , 2012. pp. 172--187.
Datei: 978-3-642-31410-0_11
Amir Moradi, Mario Kirschbaum, Thomas Eisenbarth, and Christof Paar,
Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods, IEEE Trans. VLSI Syst. , vol. 20, no. 9, pp. 1578--1589, 2012.
Datei: TVLSI.2011.2160375
Xin Ye, and Thomas Eisenbarth,
Wide Collisions in Practice, in Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings , 2012. pp. 329--343.
Datei: 978-3-642-31284-7_20

2011

Andy Rupp, Thomas Eisenbarth, Andrey Bogdanov, and Oliver Grieb,
Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications, Integration , vol. 44, no. 4, pp. 290--304, 2011.
Datei: j.vlsi.2010.09.001

2010

Thomas Eisenbarth, Christof Paar, and Björn Weghenkel,
Building a Side Channel Based Disassembler, Trans. Computational Science , vol. 10, pp. 78--99, 2010.
Datei: 978-3-642-17499-5_4
Amir Moradi, Oliver Mischke, and Thomas Eisenbarth,
Correlation-Enhanced Power Analysis Collision Attack, in Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010. pp. 125--139.
Datei: 978-3-642-15031-9_9
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, and Malte Wienecke,
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs, in Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings , 2010. pp. 235--251.
Datei: 978-3-642-11925-5_17

2009

Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann, Johann Großschädl, Frank Gurkaynak, Marco Macchetti, Zeynep Toprak, Laura Pozzi, Christof Paar, Yusuf Leblebici, and Paolo Ienne,
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology, Trans. Computational Science , vol. 4, pp. 230--243, 2009.
Datei: 978-3-642-01004-0_13
Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, and Amir Moradi,
KeeLoq and Side-Channel Analysis-Evolution of an Attack, in Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009 , 2009. pp. 65--69.
Datei: FDTC.2009.44
Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, and Christof Paar,
MicroEliece: McEliece for Embedded Devices, in Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009. pp. 49--64.
Datei: 978-3-642-04138-9_4
Amir Moradi, Thomas Eisenbarth, Axel Poschmann, and Christof Paar,
Power Analysis of Single-Rail Storage Elements as Used in MDPL, in Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers , 2009. pp. 146--160.
Datei: 978-3-642-14423-3_11
Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani, and Thomas Eisenbarth,
Vulnerability modeling of cryptographic hardware to power analysis attacks, Integration , vol. 42, no. 4, pp. 468--478, 2009.
Datei: j.vlsi.2009.01.001

2008

Francesco Regazzoni, Thomas Eisenbarth, Luca Breveglieri, Paolo Ienne, and Israel Koren,
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?, in 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA, USA , 2008. pp. 202--210.
Datei: DFT.2008.53
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, and Christof Paar,
Efficient Hash-Based Signatures on Embedded Devices, Jan. 2008.
Datei: 229001128_Efficient_Hash-Based_Signatures_on_Embedded_Devices
Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, and Christof Paar,
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers, in IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008 , 2008. pp. 58--66.
Datei: SIES.2008.4577681
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes A. Buchmann, and Christof Paar,
Fast Hash-Based Signatures on Constrained Devices, in Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings , 2008. pp. 104--117.
Datei: 978-3-540-85893-5_8
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and Mohammad T. Manzuri Shalmani,
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme, in Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings , 2008. pp. 203--220.
Datei: 978-3-540-85174-5_12
Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi, and Elisabeth Oswald,
Susceptibility of eSTREAM Candidates towards Side Channel Analysis, 2008.
Datei: 228371563_Susceptibility_of_eSTREAM_candidates_towards_side_channel_analysis