关注
Thomas Schamberger
Thomas Schamberger
Chair of Security in Information Technology, Technical University of Munich
在 tum.de 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Masked accelerators and instruction set extensions for post-quantum cryptography
T Fritzmann, M Van Beirendonck, DB Roy, P Karl, T Schamberger, ...
Cryptology ePrint Archive, 2021
842021
Chosen ciphertext k-trace attacks on masked cca2 secure kyber
M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021
522021
A power side-channel attack on the CCA2-secure HQC KEM
T Schamberger, J Renner, G Sigl, A Wachter-Zeh
Smart Card Research and Advanced Applications: 19th International Conference …, 2021
282021
Information-set decoding with hints
AL Horlemann, S Puchinger, J Renner, T Schamberger, A Wachter-Zeh
Code-Based Cryptography Workshop, 60-83, 2021
202021
DOMREP–An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection
M Gruber, M Probst, P Karl, T Schamberger, L Tebelmann, ...
IEEE Transactions on Information Forensics and Security 16, 4321-4335, 2021
182021
Secure and compact full NTRU hardware implementation
K Braun, T Fritzmann, G Maringer, T Schamberger, J Sepúlveda
2018 IFIP/IEEE International Conference on Very Large Scale Integration …, 2018
182018
Retrofitting leakage resilient authenticated encryption to microcontrollers
F Unterstein, M Schink, T Schamberger, L Tebelmann, M Ilg, J Heyszl
IACR Transactions on Cryptographic Hardware and Embedded Systems, 365-388, 2020
152020
FuLeeca: A Lee-based Signature Scheme
S Ritterhoff, G Maringer, S Bitzer, V Weger, P Karl, T Schamberger, ...
Cryptology ePrint Archive, 2023
112023
Efficient hardware/software co-design for NTRU
T Fritzmann, T Schamberger, C Frisch, K Braun, G Maringer, J Sepúlveda
VLSI-SoC: Design and Engineering of Electronics Systems Based on New …, 2019
112019
A power side-channel attack on the reed-muller reed-solomon version of the HQC cryptosystem
T Schamberger, L Holzbaur, J Renner, A Wachter-Zeh, G Sigl
International Conference on Post-Quantum Cryptography, 327-352, 2022
102022
Finding the needle in the haystack: Metrics for best trace selection in unsupervised side-channel attacks on blinded RSA
A Kulow, T Schamberger, L Tebelmann, G Sigl
IEEE Transactions on Information Forensics and Security 16, 3254-3268, 2021
82021
Practical evaluation of masking for NTRUEncrypt on ARM Cortex-M4
T Schamberger, O Mischke, J Sepulveda
Constructive Side-Channel Analysis and Secure Design: 10th International …, 2019
82019
A second look at the ascad databases
M Egger, T Schamberger, L Tebelmann, F Lippert, G Sigl
International Workshop on Constructive Side-Channel Analysis and Secure …, 2022
62022
On Software Implementation of Gabidulin Decoders
J Kunz, J Renner, G Maringer, T Schamberger, A Wachter-Zeh
2020 Algebraic and Combinatorial Coding Theory (ACCT), 95-101, 2020
12020
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs: An Evaluation of the ASCAD Databases
T Schamberger, M Egger, L Tebelmann
International Conference on Applied Cryptography and Network Security, 139-158, 2023
2023
Submission to the NIST Post-Quantum Cryptography Standardization Process Algorithm Specifications and Supporting Documentation
S Ritterhoff, S Bitzer, P Karl, G Maringer, T Schamberger, J Schupp, G Sigl, ...
2023
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs
T Schamberger, M Egger, L Tebelmann
Artificial Intelligence in Hardware Security Workshop, 2023
2023
Information-Set Decoding with Hints
T Schamberger, A Wachter-Zeh
Code-Based Cryptography: 9th International Workshop, CBCrypto 2021 Munich …, 2022
2022
Post-quantum security: Power Analysis of NTRUEncrypt
T Schamberger
crypto day matters 28, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–19