Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
- J. Blömer, J. Seifert
- Computer Science
- Financial Cryptography
- 27 January 2003
TLDR
On the power of simple branch prediction analysis
- O. Aciiçmez, Ç. K. Koç, J. Seifert
- Computer Science
- ASIACCS '07
- 20 March 2007
TLDR
Advances on Access-Driven Cache Attacks on AES
- M. Neve, J. Seifert
- Computer Science
- Selected Areas in Cryptography
- 17 August 2006
TLDR
Cloning Physically Unclonable Functions
- C. Helfmeier, C. Boit, Dmitry Nedospasov, J. Seifert
- Computer Science
- IEEE International Symposium on Hardware-Oriented…
- 2 June 2013
TLDR
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
- J. Blömer, M. Otto, J. Seifert
- Computer Science
- FDTC
- 10 October 2006
TLDR
A new CRT-RSA algorithm secure against bellcore attacks
- J. Blömer, M. Otto, J. Seifert
- Computer Science
- CCS '03
- 27 October 2003
TLDR
Approximating Shortest Lattice Vectors is Not Harder Than Approximating Closest Lattice Vectors
- Oded Goldreich, Daniele Micciancio, S. Safra, J. Seifert
- Mathematics, Computer Science
- Electron. Colloquium Comput. Complex.
- 30 July 1999
TLDR
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- O. Aciiçmez, Shay Gueron, J. Seifert
- Computer Science
- IMACC
- 18 December 2007
TLDR
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks
- W. Fischer, C. Giraud, Erik Woodward Knudsen, J. Seifert
- Mathematics, Computer Science
- IACR Cryptol. ePrint Arch.
- 2002
TLDR
Secrecy Analysis in Protocol Composition Logic
- Arnab Roy, A. Datta, A. Derek, J. Mitchell, J. Seifert
- Computer Science
- ASIAN
- 6 December 2006
TLDR