Follow
Elisabeth Oswald
Elisabeth Oswald
Professor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of Birmingham
Verified email at aau.at
Title
Cited by
Cited by
Year
Power analysis attacks: Revealing the secrets of smart cards
S Mangard, E Oswald, T Popp
Springer-Verlag New York Inc, 2007
27512007
An ASIC implementation of the AES SBoxes
J Wolkerstorfer, E Oswald, M Lamberger
Topics in Cryptology—CT-RSA 2002: The Cryptographers’ Track at the RSA …, 2002
4832002
Successfully attacking masked AES hardware implementations
S Mangard, N Pramstaller, E Oswald
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
4662005
A side-channel analysis resistant description of the AES S-box
E Oswald, S Mangard, N Pramstaller, V Rijmen
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005
4382005
An AES smart card implementation resistant to power analysis attacks
C Herbst, E Oswald, S Mangard
Applied Cryptography and Network Security: 4th International Conference …, 2006
3692006
Power-analysis attack on an ASIC AES implementation
SB Ors, F Gurkaynak, E Oswald, B Preneel
International Conference on Information Technology: Coding and Computing …, 2004
3312004
Practical template attacks
C Rechberger, E Oswald
Information Security Applications: 5th International Workshop, WISA 2004 …, 2005
2792005
One for all–all for one: unifying standard differential power analysis attacks
S Mangard, E Oswald, FX Standaert
IET Information Security 5 (2), 100-110, 2011
2592011
Practical second-order DPA attacks for masked smart card implementations of block ciphers
E Oswald, S Mangard, C Herbst, S Tillich
Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006
2442006
Power-analysis attacks on an FPGA–first experimental results
SB Örs, E Oswald, B Preneel
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2262003
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
2112010
Randomized addition-subtraction chains as a countermeasure against power attacks
E Oswald, M Aigner
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
1842001
Template attacks on masking—resistance is futile
E Oswald, S Mangard
Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006
1802006
Update on SHA-1
V Rijmen, E Oswald
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
1682005
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010
1312010
An efficient masking scheme for AES software implementations
E Oswald, K Schramm
Information Security Applications: 6th International Workshop, WISA 2005 …, 2006
1302006
Power analysis attacks and countermeasures
T Popp, S Mangard, E Oswald
IEEE Design & test of Computers 24 (6), 535-543, 2007
1272007
Template attacks on ECDSA
M Medwed, E Oswald
Information Security Applications: 9th International Workshop, WISA 2008 …, 2009
1142009
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
L Mather, E Oswald, J Bandenburg, M Wójcik
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1032013
Compiler assisted masking
A Moss, E Oswald, D Page, M Tunstall
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
1032012
The system can't perform the operation now. Try again later.
Articles 1–20