Follow
Elisabeth Oswald
Elisabeth Oswald
Professor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of Birmingham
Verified email at aau.at
Title
Cited by
Cited by
Year
Power analysis attacks: Revealing the secrets of smart cards
S Mangard, E Oswald, T Popp
Springer-Verlag New York Inc, 2007
28502007
An ASIC implementation of the AES SBoxes
J Wolkerstorfer, E Oswald, M Lamberger
Topics in Cryptology—CT-RSA 2002: The Cryptographers’ Track at the RSA …, 2002
4862002
Successfully attacking masked AES hardware implementations
S Mangard, N Pramstaller, E Oswald
International Workshop on Cryptographic Hardware and Embedded Systems, 157-171, 2005
4772005
A side-channel analysis resistant description of the AES S-box
E Oswald, S Mangard, N Pramstaller, V Rijmen
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005
4382005
An AES smart card implementation resistant to power analysis attacks
C Herbst, E Oswald, S Mangard
International conference on applied cryptography and network security, 239-252, 2006
3752006
Power-analysis attack on an ASIC AES implementation
SB Ors, F Gurkaynak, E Oswald, B Preneel
International Conference on Information Technology: Coding and Computing …, 2004
3352004
Practical template attacks
C Rechberger, E Oswald
International Workshop on Information Security Applications, 440-456, 2004
2882004
One for all–all for one: unifying standard differential power analysis attacks
S Mangard, E Oswald, FX Standaert
IET Information Security 5 (2), 100-110, 2011
2642011
Practical second-order DPA attacks for masked smart card implementations of block ciphers
E Oswald, S Mangard, C Herbst, S Tillich
Cryptographers’ Track at the RSA Conference, 192-207, 2006
2462006
Power-analysis attacks on an FPGA–first experimental results
SB Örs, E Oswald, B Preneel
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2332003
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
2122010
Template attacks on masking—resistance is futile
E Oswald, S Mangard
Cryptographers’ Track at the RSA Conference, 243-256, 2007
1892007
Randomized addition-subtraction chains as a countermeasure against power attacks
E Oswald, M Aigner
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
1852001
Update on SHA-1
V Rijmen, E Oswald
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
1692005
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010
1392010
An efficient masking scheme for AES software implementations
E Oswald, K Schramm
International Workshop on Information Security Applications, 292-305, 2005
1302005
Power analysis attacks and countermeasures
T Popp, S Mangard, E Oswald
IEEE Design & test of Computers 24 (6), 535-543, 2007
1282007
Template attacks on ECDSA
M Medwed, E Oswald
International Workshop on Information Security Applications, 14-27, 2008
1142008
Compiler assisted masking
A Moss, E Oswald, D Page, M Tunstall
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
1082012
The myth of generic DPA… and the magic of learning
C Whitnall, E Oswald, FX Standaert
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
1052014
The system can't perform the operation now. Try again later.
Articles 1–20