Thomas Eisenbarth
Affiliations: | Mathematical Sciences | Florida Atlantic University, Boca Raton, FL, United States |
Area:
MathematicsGoogle:
"Thomas Eisenbarth"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Moghimi A, Wichelmann J, Eisenbarth T, et al. (2019) MemJam : A False Dependency Attack Against Constant-Time Crypto Implementations International Journal of Parallel Programming. 47: 538-570 |
Shahverdi A, Taha M, Eisenbarth T. (2017) Lightweight Side Channel Resistance: Threshold Implementations of S imon Ieee Transactions On Computers. 66: 661-671 |
Irazoqui G, Eisenbarth T, Sunar B. (2016) Cross processor cache attacks Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 353-364 |
Chen C, Eisenbarth T, Von Maurich I, et al. (2016) Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem Ieee Transactions On Information Forensics and Security. 11: 1093-1105 |
Chen C, Eisenbarth T, von Maurich I, et al. (2016) Masking large keys in hardware: A masked implementation of McEliece Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9566: 293-309 |
Ege B, Eisenbarth T, Batina L. (2016) Near collision side channel attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9566: 277-292 |
Eisenbarth T, Fei Y, Serpanos D. (2015) Guest Editorial: Special Section on Embedded System Security Ieee Embedded Systems Letters. 7: 1-2 |
Shahverdi A, Taha M, Eisenbarth T. (2015) Silent Simon: A threshold implementation under 100 slices Proceedings of the 2015 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2015. 1-6 |
Chen C, Eisenbarth T, Von Maurich I, et al. (2015) Differential power analysis of a McEliece cryptosystem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9092: 538-556 |
Chen C, Eisenbarth T, Shahverdi A, et al. (2015) Balanced Encoding to Mitigate Power Analysis: A Case Study Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8968: 49-63 |