Juliane Krämer
According to our database1,
Juliane Krämer
authored at least 59 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024
2023
Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
HaMAYO: A Reconfigurable Hardware Implementation of the Post-Quantum Signature Scheme MAYO.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?
CoRR, 2022
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
IACR Cryptol. ePrint Arch., 2021
2020
IACR Cryptol. ePrint Arch., 2020
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Inform. Spektrum, 2019
p3Enum: A New Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
Proceedings of the Computational Science - ICCS 2019, 2019
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
2017
Frontiers Inf. Technol. Electron. Eng., 2017
it Inf. Technol., 2017
IACR Cryptol. ePrint Arch., 2017
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Hampering fault attacks against lattice-based signature schemes: countermeasures and their efficiency (special session).
Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
Warum wir uns in der Kryptographie nicht auf die Komplexität physikalischer Angriffe verlassen sollten.
Proceedings of the Ausgezeichnete Informatikdissertationen 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014
2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
Proceedings of the Information Security Practice and Experience, 2012
Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
"My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones.
Proceedings of the SECRYPT 2010, 2010