Stefan Mangard
Orcid: 0000-0001-9650-8041Affiliations:
- Graz University of Technology, Austria
According to our database1,
Stefan Mangard
authored at least 149 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
CoRR, 2024
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel.
Proceedings of the 33rd USENIX Security Symposium, 2024
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels.
Proceedings of the 33rd USENIX Security Symposium, 2024
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, 2022
FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Cybersecur., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
2019
J. Cryptogr. Eng., 2019
Small Faults Grow Up - Verification of Error Masking Robustness in Arithmetically Encoded Programs.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Proceedings of ACM Workshop on Theory of Implementation Security, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2018
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics.
IEEE Trans. Circuits Syst. I Regul. Pap., 2017
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS.
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, 2017
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order.
IACR Cryptol. ePrint Arch., 2016
ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
2014
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis.
J. Cryptogr. Eng., 2014
2013
IACR Cryptol. ePrint Arch., 2013
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
2012
Datenschutz und Datensicherheit, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
2011
IET Inf. Secur., 2011
Proceedings of the Design, Automation and Test in Europe, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Secure Integrated Circuits and Systems, 2010
2009
IACR Cryptol. ePrint Arch., 2009
2007
Proceedings of the 20th International Conference on VLSI Design (VLSI Design 2007), 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
Power analysis attacks - revealing the secrets of smart cards.
Springer, ISBN: 978-0-387-30857-9, 2007
2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Topics in Cryptology, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness.
Proceedings of the Topics in Cryptology, 2004
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
2003
2002
Proceedings of the Information Security and Cryptology, 2002
2001