Robert Primas
Geciteerd door
Geciteerd door
SIFA: exploiting ineffective fault inductions on symmetric cryptography
C Dobraunig, M Eichlseder, T Korak, S Mangard, F Mendel, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems, 547-572, 2018
Single-trace side-channel attacks on masked lattice-based encryption
R Primas, P Pessl, S Mangard
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
Isap v2. 0
CE Dobraunig, M Eichlseder, S Mangard, F Mendel, BJM Mennink, ...
Statistical ineffective fault attacks on masked AES with fault countermeasures
C Dobraunig, M Eichlseder, H Groß, S Mangard, F Mendel, R Primas
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
More practical single-trace attacks on the number theoretic transform
P Pessl, R Primas
Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019
Single-trace attacks on keccak
MJ Kannwischer, P Pessl, R Primas
Cryptology ePrint Archive, 2020
Protecting against statistical ineffective fault attacks
J Daemen, CE Dobraunig, M Eichlseder, H Gross, F Mendel, R Primas
Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs.
B Gigerl, V Hadzic, R Primas, S Mangard, R Bloem
USENIX Security Symposium, 1469-1468, 2021
Fault attacks on nonce-based authenticated encryption: Application to keyak and ketje
C Dobraunig, S Mangard, F Mendel, R Primas
Selected Areas in Cryptography–SAC 2018: 25th International Conference …, 2019
Chosen ciphertext k-trace attacks on masked CCA2 secure kyber
M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021
Analyzing the linear keystream biases in AEGIS
M Eichlseder, M Nageler, R Primas
IACR Transactions on Symmetric Cryptology, 348-368, 2019
A fast and compact RISC-V accelerator for ascon and friends
S Steinegger, R Primas
Smart Card Research and Advanced Applications: 19th International Conference …, 2021
Secure and efficient software masking on superscalar pipelined processors
B Gigerl, R Primas, S Mangard
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
Leakage and Tamper Resilient Permutation-Based Cryptography
R Primas, CE Dobraunig, B Mennink
2022 ACM SIGSAC Conference on Computer and Communications Security: ACM CSS …, 2022
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
R Nagpal, B Gigerl, R Primas, S Mangard
Cryptology ePrint Archive, 2022
Statistical effective fault attacks: The other side of the coin
N Vafaei, S Zarei, N Bagheri, M Eichlseder, R Primas, H Soleimany
IEEE Transactions on Information Forensics and Security 17, 1855-1867, 2022
Formal Verification of Arithmetic Masking in Hardware and Software
B Gigerl, R Primas, S Mangard
Applied Cryptography and Network Security: 21st International Conference …, 2023
Proving SIFA protection of masked redundant circuits
V Hadžić, R Primas, R Bloem
Innovations in Systems and Software Engineering 18 (3), 471-481, 2022
Power Contracts: Provably Complete Power Leakage Models for Processors.
R Bloem, B Gigerl, M Gourjon, V Hadzic, S Mangard, R Primas
IACR Cryptol. ePrint Arch. 2022, 565, 2022
TVLA On Selected NIST LWC Finalists
T Steinbauer, R Nagpal, R Primas, S Mangard
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20