Peter Pessl
Peter Pessl
Bestätigte E-Mail-Adresse bei iaik.tugraz.at
TitelZitiert vonJahr
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P Pessl, D Gruss, C Maurice, M Schwarz, S Mangard
USENIX Security Symposium, 565-581, 2016
148*2016
Pushing the limits of SHA-3 hardware implementations to fit on RFID
P Pessl, M Hutter
International Workshop on Cryptographic Hardware and Embedded Systems, 126-141, 2013
372013
To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures
P Pessl, LG Bruinderink, Y Yarom
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
342017
Analyzing the shuffling side-channel countermeasure for lattice-based signatures
P Pessl
International Conference on Cryptology in India, 153-170, 2016
322016
Single-trace side-channel attacks on masked lattice-based encryption
R Primas, P Pessl, S Mangard
International Conference on Cryptographic Hardware and Embedded Systems, 513-533, 2017
222017
Curved tags–a low-resource ECDSA implementation tailored for RFID
P Pessl, M Hutter
International Workshop on Radio Frequency Identification: Security and …, 2015
202015
Enhancing side-channel analysis of binary-field multiplication with bit reliability
P Pessl, S Mangard
Cryptographers’ Track at the RSA Conference, 255-270, 2016
182016
Differential fault attacks on deterministic lattice signatures
LG Bruinderink, P Pessl
IACR Transactions on Cryptographic Hardware and Embedded Systems, 21-43, 2018
102018
More Practical Single-Trace Attacks on the Number Theoretic Transform
P Pessl, R Primas
International Conference on Cryptology and Information Security in Latin …, 2019
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–9