Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
Kurzbiographie
Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.
Seit Okrober 2024 bin ich der Vorsitzende der MINT Sektionen.
Seine Forschungsinteressen umfassen:
- Systemsicherheit , Softwaresicherheit und Code-Analyse
- Angewandte Kryptografie
- Sichere Vortualisierung, Mikroarchitekturen und Trusted Execution Envorinments
- Seitenkanalangriffe, physische Sicherheit und Gegenmaßnahmen
Publikationen
2010
Building a Side Channel Based Disassembler, Trans. Computational Science , vol. 10, pp. 78--99, 2010.
Datei: | 978-3-642-17499-5_4 |
Correlation-Enhanced Power Analysis Collision Attack, in Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010. pp. 125--139.
Datei: | 978-3-642-15031-9_9 |
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs, in Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings , 2010. pp. 235--251.
Datei: | 978-3-642-11925-5_17 |
2009
Power Analysis of Single-Rail Storage Elements as Used in MDPL, in Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers , 2009. pp. 146--160.
Datei: | 978-3-642-14423-3_11 |
Vulnerability modeling of cryptographic hardware to power analysis attacks, Integration , vol. 42, no. 4, pp. 468--478, 2009.
Datei: | j.vlsi.2009.01.001 |
MicroEliece: McEliece for Embedded Devices, in Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009. pp. 49--64.
Datei: | 978-3-642-04138-9_4 |
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology, Trans. Computational Science , vol. 4, pp. 230--243, 2009.
Datei: | 978-3-642-01004-0_13 |
KeeLoq and Side-Channel Analysis-Evolution of an Attack, in Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009 , 2009. pp. 65--69.
Datei: | FDTC.2009.44 |
2008
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme, in Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings , 2008. pp. 203--220.
Datei: | 978-3-540-85174-5_12 |
Susceptibility of eSTREAM Candidates towards Side Channel Analysis, 2008.
Datei: | 228371563_Susceptibility_of_eSTREAM_candidates_towards_side_channel_analysis |
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?, IACR Cryptology ePrint Archive , vol. 2008, pp. 349, 2008.
Datei: | 349 |
Fast Hash-Based Signatures on Constrained Devices, in Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings , 2008. pp. 104--117.
Datei: | 978-3-540-85893-5_8 |
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers, in IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008 , 2008. pp. 58--66.
Datei: | SIES.2008.4577681 |
Efficient Hash-Based Signatures on Embedded Devices, 01 2008.
Datei: | 229001128_Efficient_Hash-Based_Signatures_on_Embedded_Devices |
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?, in 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA, USA , 2008. pp. 202--210.
Datei: | DFT.2008.53 |
2007
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations, in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007. pp. 394--412.
Datei: | 978-3-540-74735-2_27 |
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies, in Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, July 16-19, 2007 , 2007. pp. 209--214.
Datei: | ICSAMOS.2007.4285753 |
A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers , vol. 24, no. 6, pp. 522--533, 2007.
Datei: | MDT.2007.178 |
Establishing Chain of Trust in Reconfigurable Hardware, in IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA , 2007. pp. 289--290.
Datei: | FCCM.2007.23 |
Performance Analysis of Contemporary LightWeight Block Ciphers on 8-bit Microcontrollers, 012007.
Datei: | a5f0b7c6e442406c0c97854eb97f8a21157c3b08 |
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits, in 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 26-28 September 2007, Rome, Italy. , 2007. pp. 508--516.
Datei: | DFT.2007.61 |
Reconfigurable trusted computing in hardware, in Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 , 2007. pp. 15--20.
Datei: | 1314354.1314360 |
Trusted computing for automotive systems: New approaches to enforce security for electronic systems in vehicles, pp. 227-237, 01 2007.
Datei: | 291856499_Trusted_computing_for_automotive_systems_New_approaches_to_enforce_security_for_electronic_systems_in_vehicles |

- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Manojkumar Baskaran
- Paula Arnold
- Jeremy Boy
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Eike Hoffmann
- Timothy Imort
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Tammo Polle
- Yannik Potdevin
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke