Author of the publication

Exploiting the Difference of Side-Channel Leakages.

, , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 1-16. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. -Ing. Thomas Maier University of Stuttgart

Methodischer Ansatz zur Analyse haptischer Bedienelemente im Kraftfahrzeug, , , and . Stuttgarter Symposium für Produktentwicklung SSP 2021, Stuttgart, Fraunhofer-Institut für Arbeitswirtschaft und Organisation IAO, (2021)
 

Other publications of authors with the same name

Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps., , and . ARES, page 169-177. IEEE Computer Society, (2013)EM Leakage of RFID Devices - Comparison of Two Measurement Approaches., and . ARES, page 120-125. IEEE Computer Society, (2014)Optical Fault Attacks on AES: A Threat in Violet., , and . FDTC, page 13-22. IEEE Computer Society, (2009)Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices., , , , , , , , , and 2 other author(s). AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 172-187. Springer, (2012)On the Applicability of Time-Driven Cache Attacks on Mobile Devices., and . NSS, volume 7873 of Lecture Notes in Computer Science, page 656-662. Springer, (2013)On the security of RFID devices against implementation attacks., , and . IJSN, 5 (2/3): 106-118 (2010)Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag., and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 426-435. Springer, (2011)On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller., and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 149-164. Springer, (2012)Cache-Access Pattern Attack on Disaligned AES T-Tables., and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 200-214. Springer, (2013)Exploiting the Difference of Side-Channel Leakages., , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 1-16. Springer, (2012)