Peter Pessl
Title
Cited by
Cited by
Year
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P Pessl, D Gruss, C Maurice, M Schwarz, S Mangard
USENIX Security Symposium, 565-581, 2016
2762016
Single-trace side-channel attacks on masked lattice-based encryption
R Primas, P Pessl, S Mangard
International Conference on Cryptographic Hardware and Embedded Systems, 513-533, 2017
692017
To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures
P Pessl, LG Bruinderink, Y Yarom
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
672017
Analyzing the shuffling side-channel countermeasure for lattice-based signatures
P Pessl
International Conference on Cryptology in India, 153-170, 2016
482016
Pushing the limits of SHA-3 hardware implementations to fit on RFID
P Pessl, M Hutter
International Conference on Cryptographic Hardware and Embedded Systems, 126-141, 2013
472013
Differential fault attacks on deterministic lattice signatures
LG Bruinderink, P Pessl
IACR Transactions on Cryptographic Hardware and Embedded Systems, 21-43, 2018
342018
Curved tags–a low-resource ECDSA implementation tailored for RFID
P Pessl, M Hutter
International Workshop on Radio Frequency Identification: Security and …, 2015
242015
Enhancing side-channel analysis of binary-field multiplication with bit reliability
P Pessl, S Mangard
Cryptographers’ Track at the RSA Conference, 255-270, 2016
212016
Single-trace attacks on keccak
MJ Kannwischer, P Pessl, R Primas
172020
More practical single-trace attacks on the number theoretic transform
P Pessl, R Primas
International Conference on Cryptology and Information Security in Latin …, 2019
162019
Fault Attacks on CCA-secure Lattice KEMs
L Prokop, P Peßl
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021
2*2021
The system can't perform the operation now. Try again later.
Articles 1–11