Markus G. Kuhn

Orcid: 0000-0003-3902-5435

Affiliations:
  • University of Cambridge, UK


According to our database1, Markus G. Kuhn authored at least 41 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

2021
Single-Trace Fragment Template Attack on a 32-Bit Implementation of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2021

2020
A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020

2018
Efficient, Portable Template Attacks.
IEEE Trans. Inf. Forensics Secur., 2018

Technical perspective: Backdoor engineering.
Commun. ACM, 2018

2016
SMAPs: Short Message Authentication Protocols.
Proceedings of the Security Protocols XXIV, 2016

2014
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits.
IACR Cryptol. ePrint Arch., 2014

Template Attacks on Different Devices.
IACR Cryptol. ePrint Arch., 2014

2013
Efficient Template Attacks.
IACR Cryptol. ePrint Arch., 2013

2011
Tempest.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Smartcard Tamper Resistance.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Data Remanence.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Compromising Emanations.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Signal Authentication in Trusted Satellite Navigation Receivers.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Exact JPEG recompression.
Proceedings of the Visual Information Processing and Communication, 2010

2009
Towards copy-evident JPEG images.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

A Protocol for Secure Remote Updates of FPGA Configurations.
Proceedings of the Reconfigurable Computing: Architectures, 2009

2008
Attacks on time-of-flight distance bounding channels.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2006
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Tempest.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Smartcard tamper resistance.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Data Remanence.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

compromising emanations.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

An RFID Distance Bounding Protocol.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Security Limits for Compromising Emanations.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Electromagnetic Eavesdropping Risks of Flat-Panel Displays.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

An Asymmetric Security Mechanism for Navigation Signals.
Proceedings of the Information Hiding, 6th International Workshop, 2004

2002
Compromising emanations: eavesdropping risks of computer displays
PhD thesis, 2002

Optical Time-Domain Eavesdropping Risks of CRT Displays.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

2001
Real World Patterns of Failure in Anonymity Systems.
Proceedings of the Information Hiding, 4th International Workshop, 2001

2000
Probabilistic Counting of Large Digital Signature Collections.
Proceedings of the 9th USENIX Security Symposium, 2000

1999
Information hiding-a survey.
Proc. IEEE, 1999

Physical security of smartcards.
Inf. Secur. Tech. Rep., 1999

Design Principles for Tamper-Resistant Smartcard Processors.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

StegFS: A Steganographic File System for Linux.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP.
IEEE Trans. Computers, 1998

Attacks on Copyright Marking Systems.
Proceedings of the Information Hiding, 1998

Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.
Proceedings of the Information Hiding, 1998

1997
Low Cost Attacks on Tamper Resistant Devices.
Proceedings of the Security Protocols, 1997

Analysis of a Denial of Service Attack on TCP.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Low-threat security patches and tools.
Proceedings of the 1997 International Conference on Software Maintenance (ICSM '97), 1997


  Loading...