Thomas Eisenbarth
Orcid: 0000-0003-1116-6973Affiliations:
- University of Lübeck, Germany
- Worcester Polytechnic Institute, MA, USA (former)
- Florida Atlantic University, FL, USA (former)
- Ruhr University Bochum, Germany (Ph.D.)
According to our database1,
Thomas Eisenbarth
authored at least 139 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge.
IACR Commun. Cryptol., 2024
SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution).
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Okapi: A Lightweight Architecture for Secure Speculation Exploiting Locality of Memory Accesses.
CoRR, 2023
CoRR, 2023
DASH: Accelerating Distributed Private Machine Learning Inference with Arithmetic Garbled Circuits.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Madvex: Instrumentation-Based Adversarial Attacks on Machine Learning Malware Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Help, my Signal has bad Device! Breaking the Signal Messenger's Post-CompromiseSecurity through a Malicious Device.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020
SEVurity: No Security Without Integrity : Breaking Integrity-Free Memory Encryption with Minimal Assumptions.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the XXXV Conference on Design of Circuits and Integrated Systems, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Int. J. Parallel Program., 2019
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IEEE Des. Test, 2018
CoRR, 2018
Proceedings of the 12th European Workshop on Microelectronics Education, 2018
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Trans. Computers, 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries.
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proc. Priv. Enhancing Technol., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IEEE Embed. Syst. Lett., 2015
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery.
Proceedings of the Smart Card Research and Advanced Applications, 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
Proceedings of the Number Theory and Cryptography, 2013
2012
IEEE Trans. Very Large Scale Integr. Syst., 2012
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications.
Integr., 2011
2010
IACR Cryptol. ePrint Arch., 2010
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.
Proceedings of the Topics in Cryptology, 2010
2009
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology.
Trans. Comput. Sci., 2009
Integr., 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
IACR Cryptol. ePrint Arch., 2008
Proceedings of the IEEE Third International Symposium on Industrial Embedded Systems, 2008
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?.
Proceedings of the 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 2008
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
Proceedings of the Advances in Cryptology, 2008
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies.
Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, 2007
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits.
Proceedings of the 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007