Werner Schindler
Orcid: 0000-0002-3073-0106
According to our database1,
Werner Schindler
authored at least 54 papers
between 1991 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the 21st IEEE Interregional NEWCAS Conference, 2023
2022
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis A Report on the CHES Challenge Side-Channel Contest 2020.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
2021
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods.
J. Math. Cryptol., 2021
Timing attacks and local timing attacks against Barrett's modular multiplication algorithm.
J. Cryptogr. Eng., 2021
2020
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples.
IACR Cryptol. ePrint Arch., 2020
Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Datenschutz und Datensicherheit, 2019
2017
J. Cryptogr. Eng., 2017
2016
J. Cryptogr. Eng., 2016
2015
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015
2014
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest.
J. Cryptogr. Eng., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Number Theory and Cryptography, 2013
2012
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012
A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011
Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security.
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the International Conference on Field-Programmable Technology, 2010
2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
Proceedings of the Cryptographic Engineering, 2009
Proceedings of the Cryptographic Engineering, 2009
2008
Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking.
J. Math. Cryptol., 2008
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.
IACR Cryptol. ePrint Arch., 2008
On an Approach to Compute (at least Almost) Exact Probabilities for Differentia Hash Collision Paths.
Proceedings of the Sicherheit 2008: Sicherheit, 2008
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007
Proceedings of the Topics in Cryptology, 2007
2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
2003
Proceedings of the Cryptography and Coding, 2003
A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002.
Proceedings of the Cryptography and Coding, 2003
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003
Measures with symmetry properties.
Lecture notes in mathematics 1808, Springer, ISBN: 978-3-540-00235-2, 2003
2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2001
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies.
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
1994
A Generalization of Weyl's Integration Theorem and Its Meaning for Stochastic Simulations.
Math. Oper. Res., 1994
1991