Jean-Pierre Seifert
Orcid: 0000-0002-5372-4825Affiliations:
- Telekom Innovation Laboratories, Berlin, Germany
- Technical University of Berlin, Department of Mathematics, Germany
According to our database1,
Jean-Pierre Seifert
authored at least 195 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Through the Looking-Glass: Sensitive Data Extraction by Optical Probing of Scan Chains.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
MAYo or MAY-not: Exploring Implementation Security of the Post-Quantum Signature Scheme MAYO Against Physical Attacks.
Proceedings of the Workshop on Fault Detection and Tolerance in Cryptography, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version).
J. Cryptogr. Eng., November, 2023
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
HaMAYO: A Reconfigurable Hardware Implementation of the Post-Quantum Signature Scheme MAYO.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis.
CoRR, 2023
LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023
Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Quantum Mach. Intell., 2022
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling.
IACR Cryptol. ePrint Arch., 2022
Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications' cryptographic backbone.
IACR Cryptol. ePrint Arch., 2022
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All.
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware.
CoRR, 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Quantum, 2021
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version).
J. Cryptogr. Eng., 2021
IACR Cryptol. ePrint Arch., 2021
Comput. Secur., 2021
The Elephant in the Background: A Quantitative Approachto Empower Users Against Web Browser Fingerprinting.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities.
Proceedings of the 39th IEEE VLSI Test Symposium, 2021
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging.
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout.
J. Hardw. Syst. Secur., 2020
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks.
IEEE Access, 2019
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Mob. Comput., 2018
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Secure Cloud Computing: Reference Architecture for Measuring Instrument under Legal Control.
Secur. Priv., 2018
Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems.
CoRR, 2018
Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the Symposium on SDN Research, 2018
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018
Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Anomaly Detection Approaches for Secure Cloud Reference Architectures in Legal Metrology.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018
2017
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017
Proceedings of the 23rd IEEE International Symposium on On-Line Testing and Robust System Design, 2017
Proceedings of the Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017
Proceedings of the Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 9th Cloud Computing Security Workshop, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the CLOSER 2016, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comput., 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2015
Proceedings of the 45. Jahrestagung der Gesellschaft für Informatik, Informatik, Energie und Umwelt, INFORMATIK 2015, Cottbus, Germany, September 28, 2015
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms.
IEEE Trans. Mob. Comput., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Position Papers of the 2014 Federated Conference on Computer Science and Information Systems, 2014
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Paradigm shift in IPTV service generation: Comparison between locally- and Cloud-rendered IPTV UI.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014
2013
IEEE Trans. Computers, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
The virtual Set-Top Box: On the shift of IPTV service execution, service & UI composition into the cloud.
Proceedings of the 17th International Conference on Intelligence in Next Generation Networks, 2013
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
J. Netw. Comput. Appl., 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the Computer Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Hardware-software integrated approaches to defend against software cache-based side channel attacks.
Proceedings of the 15th International Conference on High-Performance Computer Architecture (HPCA-15 2009), 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Proceedings of the IEEE International Conference on Sensor Networks, 2008
A general obligation model and continuity: enhanced policy enforcement engine for usage control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Deconstructing new cache designs for thwarting software cache-based side channel attacks.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
IEEE Micro, 2007
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures.
IACR Cryptol. ePrint Arch., 2007
A technical architecture for enforcing usage control requirements in service-oriented architectures.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007
2006
Software mitigations to hedge AES against cache-based software side channel vulnerabilities.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Advances in Computer Science, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 11th IEEE International On-Line Testing Symposium (IOLTS 2005), 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
IACR Cryptol. ePrint Arch., 2004
2003
Proceedings of the Algorithms and Computation, 14th International Symposium, 2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Parallel scalar multiplication on general elliptic curves over F<sub>p</sub> hedged against Non-Differential Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
On the Implementation of the Advanced Encryption Standard on a Public-key Crypto-Coprocessor.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm.
Proceedings of the Smart Card Programming and Security, 2001
2000
Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation
Electron. Colloquium Comput. Complex., 2000
1999
Approximating Shortest Lattice Vectors is not Harder than Approximating Closest Lattice Vectors.
Inf. Process. Lett., 1999
On the Complexity of Computing Short Linearly Independent Vectors and Short Bases in a Lattice.
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999
Proceedings of the Mathematical Foundations of Computer Science 1999, 1999
Proceedings of the Cryptography and Coding, 1999
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
Proceedings of the Computing and Combinatorics, 5th Annual International Conference, 1999
1998
Theor. Comput. Sci., 1998
1996
Proceedings of the Mathematical Foundations of Computer Science 1996, 1996
Proceedings of the Algorithmic Number Theory, Second International Symposium, 1996