Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
Kurzbiographie
Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.
Seit Okrober 2024 bin ich der Vorsitzende der MINT Sektionen.
Seine Forschungsinteressen umfassen:
- Systemsicherheit , Softwaresicherheit und Code-Analyse
- Angewandte Kryptografie
- Sichere Vortualisierung, Mikroarchitekturen und Trusted Execution Envorinments
- Seitenkanalangriffe, physische Sicherheit und Gegenmaßnahmen
Publikationen
2015
Near Collision Side Channel Attacks, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 277--292.
Datei: | 978-3-319-31301-6_17 |
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors, in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015 , 2015. pp. 629--636.
Datei: | DSD.2015.56 |
SSA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 , 2015. pp. 591--604.
Datei: | SP.2015.42 |
Silent Simon: A threshold implementation under 100 slices, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 1--6.
Datei: | HST.2015.7140227 |
Power analysis of the t-private logic style for FPGAs, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 68--71.
Datei: | HST.2015.7140239 |
On the security margin of MAC striping, Inf. Process. Lett. , vol. 115, no. 11, pp. 899--902, 2015.
Datei: | j.ipl.2015.05.009 |
Faster Leakage Detection and Exploitation, in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 , 2015. pp. 21--29.
DOI: | 10.1145/2808414.2808419 |
Datei: | 301419853_Faster_Leakage_Detection_and_Exploitation |
Masking Large Keys in Hardware: A Masked Implementation of McEliece, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 293--309.
Datei: | 978-3-319-31301-6_18 |
Lucky 13 Strikes Back, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 , 2015. pp. 85--96.
Datei: | 2714576.2714625 |
Know Thy Neighbor: Crypto Library Detection in Cloud, PoPETs , vol. 2015, no. 1, pp. 25--40, 2015.
Datei: | popets-2015-0003.xml |
Guest Editorial: Special Section on Embedded System Security, IEEE Embedded Systems Letters , vol. 7, no. 1, pp. 1-2, 2015.
Datei: | LES.2015.2404940 |
Differential Power Analysis of a McEliece Cryptosystem, in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers , 2015. pp. 538--556.
DOI: | 10.1007/978-3-319-28166-7_26 |
Datei: | 534 |
A Faster and More Realistic Flush+Reload Attack on AES, in Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers , 2015. pp. 111--126.
Datei: | 978-3-319-21476-4_8 |
2014
Non-Linear Collision Analysis, in Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers , 2014. pp. 198--214.
Datei: | 978-3-319-13066-8_13 |
Wait a minute! A fast, Cross-VM attack on AES, IACR Cryptology ePrint Archive , vol. 2014, pp. 435, 2014.
Datei: | 435 |
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince, in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers , 2014. pp. 208--220.
Datei: | 978-3-662-44774-1_17 |
Fine Grain Cross-VM Attacks on Xen and VMware, in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014 , 2014. pp. 737--744.
DOI: | 10.1109/BDCloud.2014.102 |
Datei: | 248 |
Balanced Encoding to Mitigate Power Analysis: A Case Study, IACR Cryptology ePrint Archive , vol. 2014, pp. 952, 2014.
Datei: | 952 |
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, in Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers , 2014. pp. 215--232.
Datei: | 978-3-319-16763-3_13 |
2013
A Performance Boost for Hash-Based Signatures, in Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday , 2013. pp. 166--182.
Datei: | 978-3-642-42001-6_13 |
On the Vulnerability of Low Entropy Masking Schemes, in Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers , 2013. pp. 44--60.
Datei: | 978-3-319-08302-5_4 |
2012
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices, in Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings , 2012. pp. 172--187.
Datei: | 978-3-642-31410-0_11 |
Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods, IEEE Trans. VLSI Syst. , vol. 20, no. 9, pp. 1578--1589, 2012.
Datei: | TVLSI.2011.2160375 |
Wide Collisions in Practice, in Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings , 2012. pp. 329--343.
Datei: | 978-3-642-31284-7_20 |
2011
Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications, Integration , vol. 44, no. 4, pp. 290--304, 2011.
Datei: | j.vlsi.2010.09.001 |

- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Manojkumar Baskaran
- Paula Arnold
- Jeremy Boy
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Eike Hoffmann
- Timothy Imort
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Tammo Polle
- Yannik Potdevin
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke