The SCEAS System
Navigation Menu

Search the dblp DataBase


Elisabeth Oswald: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christoph Herbst, Elisabeth Oswald, Stefan Mangard
    An AES Smart Card Implementation Resistant to Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:239-252 [Conf]
  2. Vincent Rijmen, Elisabeth Oswald
    Representations and Rijndael Descriptions. [Citation Graph (0, 0)][DBLP]
    AES Conference, 2004, pp:148-158 [Conf]
  3. Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald
    Successfully Attacking Masked AES Hardware Implementations. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:157-171 [Conf]
  4. Siddika Berna Örs, Elisabeth Oswald, Bart Preneel
    Power-Analysis Attacks on an FPGA - First Experimental Results. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:35-50 [Conf]
  5. Elisabeth Oswald
    Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:82-97 [Conf]
  6. Elisabeth Oswald, Manfred Josef Aigner
    Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:39-50 [Conf]
  7. Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich
    Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:192-207 [Conf]
  8. Vincent Rijmen, Elisabeth Oswald
    Update on SHA-1. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:58-71 [Conf]
  9. Johannes Wolkerstorfer, Elisabeth Oswald, Mario Lamberger
    An ASIC Implementation of the AES SBoxes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:67-78 [Conf]
  10. Elisabeth Oswald, Stefan Mangard
    Template Attacks on Masking - Resistance Is Futile. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:243-256 [Conf]
  11. Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen
    A Side-Channel Analysis Resistant Description of the AES S-Box. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:413-423 [Conf]
  12. Martin Schläffer, Elisabeth Oswald
    Searching for Differential Paths in MD4. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:242-261 [Conf]
  13. Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel
    Power-Analysis Attack on an ASIC AES implementation. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:546-552 [Conf]
  14. Christian Rechberger, Elisabeth Oswald
    Practical Template Attacks. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:440-456 [Conf]
  15. Elisabeth Oswald, Kai Schramm
    An Efficient Masking Scheme for AES Software Implementations. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:292-305 [Conf]
  16. HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon
    Investigations of Power Analysis Attacks and Countermeasures for ARIA. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:160-172 [Conf]

  17. Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. [Citation Graph (, )][DBLP]

  18. Template Attacks on ECDSA. [Citation Graph (, )][DBLP]

  19. Power Analysis Attacks and Countermeasures. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002