• Publications
  • Influence
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
TLDR
We present an implementation independent attack as well as attacks on several implementations of AES aimed at making AES timing analysis secure. Expand
  • 380
  • 37
  • PDF
On the power of simple branch prediction analysis
TLDR
We prove that a carefully written spy-process running simultaneously with an RSA-process, is able to collect during one single RSA signing execution almost all of the secret key bits. Expand
  • 236
  • 17
  • PDF
Advances on Access-Driven Cache Attacks on AES
TLDR
An access-driven attack is a class of cache-based side channel analysis. Expand
  • 169
  • 17
Cloning Physically Unclonable Functions
TLDR
This work demonstrates that SRAM PUFs are not well suited as PUFs, as they do not meet several requirements that constitute an ideal PUF. Expand
  • 216
  • 15
  • PDF
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
TLDR
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. Expand
  • 125
  • 15
  • PDF
A new CRT-RSA algorithm secure against bellcore attacks
TLDR
In this paper we describe a new algorithm to prevent fault attacks on RSA signature algorithms using the Chinese Remainder Theorem (CRT-RSA). Expand
  • 147
  • 13
  • PDF
Approximating Shortest Lattice Vectors is Not Harder Than Approximating Closest Lattice Vectors
TLDR
We show that given oracle access to a subroutine which returns approximate closest vectors in a lattice, one may find in polynomial time approximate shortest vectors in the lattice. Expand
  • 151
  • 12
  • PDF
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
TLDR
We present a new and yet unforeseen side channel attack that is enabled by the recently published Simple Branch Prediction Analysis (SBPA) which is another type of MicroArchitectural Analysis. Expand
  • 93
  • 12
  • PDF
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks
TLDR
For speeding up elliptic curve scalar multiplication and making it secure against sidechannel attacks such as timing or power analysis, various methods have been proposed using speci cally chosen elliptic curves. Expand
  • 91
  • 9
  • PDF
Secrecy Analysis in Protocol Composition Logic
TLDR
Extending a compositional protocol logic with an induction rule for secrecy, we prove soundness for a conventional symbolic protocol execution model, adapt and extend previous composition theorems, and illustrate the logic by proving properties of two key agreement protocols. Expand
  • 50
  • 7
  • PDF