Thomas Korak

According to our database1, Thomas Korak authored at least 26 papers between 2012 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2018

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices.
IEEE Commun. Surv. Tutorials, 2018

2017
Leakage Bounds for Gaussian Side Channels.
IACR Cryptol. ePrint Arch., 2017

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order.
IACR Cryptol. ePrint Arch., 2016

Side-Channel Analysis of Keymill.
IACR Cryptol. ePrint Arch., 2016

Practical Fault Attacks on Authenticated Encryption Modes for AES.
IACR Cryptol. ePrint Arch., 2016

SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices.
CoRR, 2016

Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness.
IEEE Trans. Inf. Forensics Secur., 2015

Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
On the power of active relay attacks using custom-made proxies.
Proceedings of the IEEE International Conference on RFID, 2014

EM-based detection of hardware trojans on FPGAs.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

Location-Dependent EM Leakage of the ATxmega Microcontroller.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Clock Glitch Attacks in the Presence of Heating.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

EM Leakage of RFID Devices - Comparison of Two Measurement Approaches.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware.
Proceedings of the Radio Frequency Identification, 2013

Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC.
Proceedings of the HASP 2013, 2013

Investigation of Parameters Influencing the Success of Optical Fault Attacks.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Handling the NDEF signature record type in a secure manner.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012


  Loading...