Follow
Jörn-Marc Schmidt
Jörn-Marc Schmidt
Institute for Applied Information Processing and Communications, Graz University of Technology
Verified email at iaik.tugraz.at
Title
Cited by
Cited by
Year
The temperature side channel and heating fault attacks
M Hutter, JM Schmidt
International Conference on Smart Card Research and Advanced Applications …, 2013
2242013
Hardware designer's guide to fault attacks
D Karaklajić, JM Schmidt, I Verbauwhede
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 21 (12 …, 2013
1932013
Optical and em fault-attacks on crt-based rsa: Concrete results
JM Schmidt, M Hutter
na, 2007
1552007
Improved glucose tolerance in rats treated with the dipeptidyl peptidase IV (CD26) inhibitor Ile-thiazolidide
RP Pauly, HU Demuth, F Rosche, J Schmidt, HA White, F Lynn, ...
Metabolism 48 (3), 385-389, 1999
1421999
A practical fault attack on square and multiply
JM Schmidt, C Herbst
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 53-58, 2008
1382008
The fault attack jungle-a classification model to guide you
I Verbauwhede, D Karaklajic, JM Schmidt
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 3-8, 2011
972011
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output
B Gierlichs, JM Schmidt, M Tunstall
International conference on cryptology and information security in Latin …, 2012
892012
High-speed hardware implementations of blake, blue midnight wish, cubehash, echo, fugue, grøstl, hamsi, jh, keccak, luffa, shabal, shavite-3, simd, and skein
S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely
Cryptology EPrint Archive, 2009
862009
Optical fault attacks on AES: A threat in violet
JM Schmidt, M Hutter, T Plos
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 13-22, 2009
772009
RFID and its vulnerability to faults
M Hutter, JM Schmidt, T Plos
International Workshop on Cryptographic Hardware and Embedded Systems, 363-379, 2008
652008
A fault attack on ECDSA
JM Schmidt, M Medwed
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 93-99, 2009
642009
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
S Belaïd, F De Santis, J Heyszl, S Mangard, M Medwed, JM Schmidt, ...
Journal of Cryptographic Engineering 4 (3), 157-171, 2014
382014
Contact-based fault injections and power analysis on RFID tags
M Hutter, JM Schmidt, T Plos
2009 European Conference on Circuit Theory and Design, 409-412, 2009
362009
Uniform evaluation of hardware implementations of the round-two SHA-3 candidates
S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely
The Second SHA-3 Candidate Conference, 2010
312010
Combined implementation attack resistant exponentiation
JM Schmidt, M Tunstall, R Avanzi, I Kizhvatov, T Kasper, D Oswald
International Conference on Cryptology and Information Security in Latin …, 2010
312010
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
International Conference on Trusted Systems, 253-270, 2010
242010
A generic fault countermeasure providing data and program flow integrity
M Medwed, JM Schmidt
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 68-73, 2008
242008
A continuous fault countermeasure for AES providing a constant error detection rate
M Medwed, JM Schmidt
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 66-71, 2010
222010
Connecting passive RFID tags to the Internet of Things
S Dominikus, JM Schmidt
Interconnecting Smart Objects with the Internet Workshop, Prague, 2011
212011
Low-cost fault detection method for ECC using Montgomery powering ladder
D Karaklajić, J Fan, JM Schmidt, I Verbauwhede
2011 Design, Automation & Test in Europe, 1-6, 2011
182011
The system can't perform the operation now. Try again later.
Articles 1–20