Elisabeth Oswald
Orcid: 0000-0001-7502-3184Affiliations:
- University of Klagenfurt, Austria
- University of Bristol, UK
According to our database1,
Elisabeth Oswald
authored at least 96 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
IACR Commun. Cryptol., 2024
IACR Commun. Cryptol., 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
Neyman's Smoothness Test: A Trade-Off Between Moment-Based and Distribution-Based Leakage Detections.
IEEE Trans. Inf. Forensics Secur., 2021
J. Cryptogr. Eng., 2021
Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor.
IACR Cryptol. ePrint Arch., 2021
A Novel Completeness Test and its Application to Side Channel Attacks and Simulators.
IACR Cryptol. ePrint Arch., 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
A Critical Analysis of ISO 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules').
IACR Cryptol. ePrint Arch., 2019
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets.
IACR Cryptol. ePrint Arch., 2019
2018
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
IACR Cryptol. ePrint Arch., 2018
Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018
2017
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages.
Proceedings of the 26th USENIX Security Symposium, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations.
IACR Cryptol. ePrint Arch., 2016
2015
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices.
IACR Cryptol. ePrint Arch., 2013
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Proceedings of the Fault Analysis in Cryptography, 2012
J. Cryptogr. Eng., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
J. Cryptogr. Eng., 2011
IET Inf. Secur., 2011
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis.
IACR Cryptol. ePrint Arch., 2011
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.
IACR Cryptol. ePrint Arch., 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Secure Integrated Circuits and Systems, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications.
IACR Cryptol. ePrint Arch., 2009
2008
2007
Proceedings of the Topics in Cryptology, 2007
Power analysis attacks - revealing the secrets of smart cards.
Springer, ISBN: 978-0-387-30857-9, 2007
2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001