Juliane Krämer

According to our database1, Juliane Krämer authored at least 59 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC.
IACR Cryptol. ePrint Arch., 2024

Fault Attacks on UOV and Rainbow.
IACR Cryptol. ePrint Arch., 2024

HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024

2023
Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

HaMAYO: A Reconfigurable Hardware Implementation of the Post-Quantum Signature Scheme MAYO.
IACR Cryptol. ePrint Arch., 2023

On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT.
IACR Cryptol. ePrint Arch., 2023

Committing AE from Sponges: Security Analysis of the NIST LWC Finalists.
IACR Cryptol. ePrint Arch., 2023

A Lightweight Identification Protocol Based on Lattices.
IACR Cryptol. ePrint Arch., 2023

Separating Oil and Vinegar with a Single Trace.
IACR Cryptol. ePrint Arch., 2023

On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2022
Application of automorphic forms to lattice problems.
J. Math. Cryptol., 2022

On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP.
IACR Cryptol. ePrint Arch., 2022

On the Related-Key Attack Security of Authenticated Encryption Schemes.
IACR Cryptol. ePrint Arch., 2022

Disorientation faults in CSIDH.
IACR Cryptol. ePrint Arch., 2022

Recovering Rainbow's Secret Key with a First-Order Fault Attack.
IACR Cryptol. ePrint Arch., 2022

User Perceptions of Security and Privacy for Group Chat.
DTRAP, 2022

Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?
CoRR, 2022

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Classic McEliece Implementation with Low Memory Footprint.
IACR Cryptol. ePrint Arch., 2021

Verifying Post-Quantum Signatures in 8 kB of RAM.
IACR Cryptol. ePrint Arch., 2021

Safe-Error Attacks on SIKE and CSIDH.
IACR Cryptol. ePrint Arch., 2021

qTESLA: Practical Implementations of a Quantum Attack Resistant Signature Scheme.
IACR Cryptol. ePrint Arch., 2021

A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
IACR Cryptol. ePrint Arch., 2021

2020
Security of Public Key Encryption against Resetting Attacks.
IACR Cryptol. ePrint Arch., 2020

Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2020

Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
IACR Cryptol. ePrint Arch., 2020

Quantum Indistinguishability for Public Key Encryption.
IACR Cryptol. ePrint Arch., 2020

Secure Two-Party Computation in a Quantum World.
IACR Cryptol. ePrint Arch., 2020

Deterministic Wallets in a Quantum World.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Post-Quantum Cryptography and its Application to the IoT - (Extended Abstract).
Inform. Spektrum, 2019

The Lattice-Based Digital Signature Scheme qTESLA.
IACR Cryptol. ePrint Arch., 2019

p3Enum: A New Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
Proceedings of the Computational Science - ICCS 2019, 2019

Sicherheit, Zuverlässigkeit, Korrektheit.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

Post-Quantum Cryptography in Embedded Systems.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Differential Power Analysis of XMSS and SPHINCS.
IACR Cryptol. ePrint Arch., 2018

2017
Quantum security analysis of a lattice-based oblivious transfer protocol.
Frontiers Inf. Technol. Electron. Eng., 2017

Why cryptography should not rely on physical attack complexity.
it Inf. Technol., 2017

Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
IACR Cryptol. ePrint Arch., 2017

Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
IACR Cryptol. ePrint Arch., 2017

A Framework to Select Parameters for Lattice-Based Cryptography.
IACR Cryptol. ePrint Arch., 2017

Revisiting TESLA in the Quantum Random Oracle Model.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Hampering fault attacks against lattice-based signature schemes: countermeasures and their efficiency (special session).
Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion, 2017

2016
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
IACR Cryptol. ePrint Arch., 2016

Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
IACR Cryptol. ePrint Arch., 2016

An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
IACR Cryptol. ePrint Arch., 2016

2015
Why cryptography should not rely on physical attack complexity.
PhD thesis, 2015

Warum wir uns in der Kryptographie nicht auf die Komplexität physikalischer Angriffe verlassen sollten.
Proceedings of the Ausgezeichnete Informatikdissertationen 2015, 2015

Lattice Basis Reduction Attack against Physically Unclonable Functions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
On the Optimality of Differential Fault Analyses on CLEFIA.
IACR Cryptol. ePrint Arch., 2014

A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.
IACR Cryptol. ePrint Arch., 2014

The role of photons in cryptanalysis.
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014

2013
Simple photonic emission analysis of AES.
J. Cryptogr. Eng., 2013

Differential Photonic Emission Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Structure-Based RSA Fault Attacks.
Proceedings of the Information Security Practice and Experience, 2012

Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Weaknesses in Current RSA Signature Schemes.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
"My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones.
Proceedings of the SECRYPT 2010, 2010


  Loading...