default search action
Jean-Pierre Seifert
Person information
- affiliation: Telekom Innovation Laboratories, Berlin, Germany
- affiliation: Technical University of Berlin, Department of Mathematics, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Tuba Kiyan, Lars Renkes, Xhani Marvin Saß, Antonio Saavedra, Norbert Herfurth, Elham Amini, Jean-Pierre Seifert:
Through the Looking-Glass: Sensitive Data Extraction by Optical Probing of Scan Chains. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 541-568 (2024) - [c144]Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert:
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications. AsiaCCS 2024 - [c143]Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, Jean-Pierre Seifert:
HaMAYO: A Fault-Tolerant Reconfigurable Hardware Implementation of the MAYO Signature Scheme. COSADE 2024: 240-259 - [c142]Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert:
Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs. EuroS&P 2024: 345-360 - [c141]Kashyap Thimmaraju, Altaf Shaik, Sunniva Flück, Pere Joan Fullana Mora, Christian Werling, Jean-Pierre Seifert:
Security Testing The O-RAN Near-Real Time RIC & A1 Interface. WISEC 2024: 277-287 - [i63]Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert:
Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs. CoRR abs/2401.08881 (2024) - [i62]Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert:
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications. CoRR abs/2406.06261 (2024) - 2023
- [j27]Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version). J. Cryptogr. Eng. 13(4): 485-499 (2023) - [j26]Vincent Quentin Ulitzsch, Soundes Marzougui, Alexis Bagia, Mehdi Tibouchi, Jean-Pierre Seifert:
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 367-392 (2023) - [c140]Xhani Marvin Saß, Thilo Krachenfels, Frederik Dermot Pustelnik, Jean-Pierre Seifert, Frank Altmann:
Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis. ASHES@CCS 2023: 113-122 - [c139]Soundes Marzougui, Ievgen Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert:
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT. COSADE 2023: 149-169 - [c138]Arnd Weber, Sylvain Guilley, René Rathfelder, Marc Stöttinger, Christoph Lüth, Maja Malenko, Torsten Grawunder, Steffen Reith, Armand Puccetti, Jean-Pierre Seifert, Norbert Herfurth, Hagen Sankowski, Gernot Heiser:
Verified Value Chains, Innovation and Competition. CSR 2023: 470-476 - [c137]Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert:
faulTPM: Exposing AMD fTPMs' Deepest Secrets. EuroS&P 2023: 1128-1142 - [c136]Sajjad Parvin, Mehran Goli, Thilo Krachenfels, Shahin Tajik, Jean-Pierre Seifert, Frank Sill Torres, Rolf Drechsler:
LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing. ISVLSI 2023: 1-6 - [c135]Vincent Quentin Ulitzsch, Jean-Pierre Seifert:
Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications' Cryptographic Backbone. PQCrypto 2023: 476-504 - [i61]Jonathan Conrad, Jens Eisert, Jean-Pierre Seifert:
Good Gottesman-Kitaev-Preskill codes from the NTRU cryptosystem. CoRR abs/2303.02432 (2023) - [i60]Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert:
faulTPM: Exposing AMD fTPMs' Deepest Secrets. CoRR abs/2304.14717 (2023) - [i59]Xhani Marvin Saß, Thilo Krachenfels, Frederik Dermot Pustelnik, Jean-Pierre Seifert, Christian Große, Frank Altmann:
Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis. CoRR abs/2309.09782 (2023) - [i58]Soundes Marzougui, Ievgan Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert:
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler using a CDT. IACR Cryptol. ePrint Arch. 2023: 142 (2023) - [i57]Oussama Sayari, Soundes Marzougui, Thomas Aulbach, Juliane Krämer, Jean-Pierre Seifert:
HaMAYO: A Reconfigurable Hardware Implementation of the Post-Quantum Signature Scheme MAYO. IACR Cryptol. ePrint Arch. 2023: 1135 (2023) - 2022
- [j25]Niklas Pirnay, Anna Pappa, Jean-Pierre Seifert:
Learning classical readout quantum PUFs based on single-qubit gates. Quantum Mach. Intell. 4(2): 1-10 (2022) - [j24]Nils Wisiol, Bipana Thapaliya, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang:
Neural Network Modeling Attacks on Arbiter-PUF-Based Designs. IEEE Trans. Inf. Forensics Secur. 17: 2719-2731 (2022) - [c134]Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert:
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS. ARES 2022: 34:1-34:11 - [c133]Sajjad Parvin, Thilo Krachenfels, Shahin Tajik, Jean-Pierre Seifert, Frank Sill Torres, Rolf Drechsler:
Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques. ASP-DAC 2022: 429-435 - [c132]Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert:
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: A Case Study on Gaussian Sampling. CARDIS 2022: 205-224 - [c131]Vincent Quentin Ulitzsch, Soundes Marzougui, Mehdi Tibouchi, Jean-Pierre Seifert:
Profiling Side-Channel Attacks on Dilithium - A Small Bit-Fiddling Leak Breaks It All. SAC 2022: 3-32 - [c130]Vincent Quentin Ulitzsch, Shinjo Park, Soundes Marzougui, Jean-Pierre Seifert:
A Post-Quantum Secure Subscription Concealed Identifier for 6G. WISEC 2022: 157-168 - [i56]Marcel Hinsche, Marios Ioannou, Alexander Nietner, Jonas Haferkamp, Yihui Quek, Dominik Hangleiter, Jean-Pierre Seifert, Jens Eisert, Ryan Sweke:
A single T-gate makes distribution learning hard. CoRR abs/2207.03140 (2022) - [i55]Niclas Kühnapfel, Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Christian Werling, Jean-Pierre Seifert:
EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware. CoRR abs/2209.09835 (2022) - [i54]Niklas Pirnay, Ryan Sweke, Jens Eisert, Jean-Pierre Seifert:
A super-polynomial quantum-classical separation for density modelling. CoRR abs/2210.14936 (2022) - [i53]Niklas Pirnay, Vincent Ulitzsch, Frederik Wilde, Jens Eisert, Jean-Pierre Seifert:
A super-polynomial quantum advantage for combinatorial optimization problems. CoRR abs/2212.08678 (2022) - [i52]Soundes Marzougui, Vincent Ulitzsch, Mehdi Tibouchi, Jean-Pierre Seifert:
Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All. IACR Cryptol. ePrint Arch. 2022: 106 (2022) - [i51]Vincent Ulitzsch, Jean-Pierre Seifert:
Breaking the quadratic barrier: Quantum cryptanalysis of Milenage, telecommunications' cryptographic backbone. IACR Cryptol. ePrint Arch. 2022: 733 (2022) - [i50]Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert:
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling. IACR Cryptol. ePrint Arch. 2022: 903 (2022) - 2021
- [j23]Soroush M. Sohi, Jean-Pierre Seifert, Fatemeh Ganji:
RNNIDS: Enhancing network intrusion detection systems through deep learning. Comput. Secur. 102: 102151 (2021) - [j22]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Mark M. Tehranipoor, Domenic Forte:
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version). J. Cryptogr. Eng. 11(2): 105-118 (2021) - [j21]Ryan Sweke, Jean-Pierre Seifert, Dominik Hangleiter, Jens Eisert:
On the Quantum versus Classical Learnability of Discrete Distributions. Quantum 5: 417 (2021) - [c129]Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert:
VIA: Analyzing Device Interfaces of Protected Virtual Machines. ACSAC 2021: 273-284 - [c128]Julian Fietkau, David Pascal Runge, Jean-Pierre Seifert:
Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services. CANS 2021: 315-333 - [c127]Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging. ASHES@CCS 2021: 17-27 - [c126]Elias Heftrig, Jean-Pierre Seifert, Haya Schulmann, Michael Waidner, Nils Wisiol:
Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. CCS 2021: 2423-2425 - [c125]Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert:
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization. CCS 2021: 2875-2889 - [c124]Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, Jens Trommer:
Nano Security: From Nano-Electronics to Secure Systems. DATE 2021: 1334-1339 - [c123]Otto Bittner, Thilo Krachenfels, Andreas Galauner, Jean-Pierre Seifert:
The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs. FDTC 2021: 86-97 - [c122]Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. SP 2021: 1955-1971 - [c121]Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert:
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. USENIX Security Symposium 2021: 627-644 - [c120]Elham Amini, Kai Bartels, Christian Boit, Marius Eggert, Norbert Herfurth, Tuba Kiyan, Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities. VTS 2021: 1-12 - [c119]Julian Fietkau, Kashyap Thimmaraju, Felix Kybranz, Sebastian Neef, Jean-Pierre Seifert:
The Elephant in the Background: A Quantitative Approachto Empower Users Against Web Browser Fingerprinting. WPES@CCS 2021: 167-180 - [i49]Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert:
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks. CoRR abs/2102.11656 (2021) - [i48]Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging. CoRR abs/2107.10147 (2021) - [i47]Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, Jean-Pierre Seifert:
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization. CoRR abs/2108.04575 (2021) - [i46]Otto Bittner, Thilo Krachenfels, Andreas Galauner, Jean-Pierre Seifert:
The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs. CoRR abs/2108.06131 (2021) - [i45]Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert:
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS. CoRR abs/2109.09461 (2021) - [i44]Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert:
VIA: Analyzing Device Interfaces of Protected Virtual Machines. CoRR abs/2109.10660 (2021) - [i43]Marcel Hinsche, Marios Ioannou, Alexander Nietner, Jonas Haferkamp, Yihui Quek, Dominik Hangleiter, Jean-Pierre Seifert, Jens Eisert, Ryan Sweke:
Learnability of the output distributions of local quantum circuits. CoRR abs/2110.05517 (2021) - [i42]Anna Pappa, Niklas Pirnay, Jean-Pierre Seifert:
Learning Classical Readout Quantum PUFs based on single-qubit gates. CoRR abs/2112.06661 (2021) - [i41]Nils Wisiol, Khalid T. Mursi, Jean-Pierre Seifert, Yu Zhuang:
Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited. IACR Cryptol. ePrint Arch. 2021: 555 (2021) - 2020
- [j20]Thilo Krachenfels, Heiko Lohrke, Jean-Pierre Seifert, Enrico Dietz, Sven Frohmann, Heinz-Wilhelm Hübers:
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout. J. Hardw. Syst. Secur. 4(1): 24-33 (2020) - [j19]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 97-120 (2020) - [c118]Fatemeh Ganji, Sarah Amir, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems. DATE 2020: 514-519 - [c117]Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent ByungHoon Kang, Jean-Pierre Seifert, Michael Franz:
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints. USENIX Security Symposium 2020: 2541-2557 - [i40]Thilo Krachenfels, Heiko Lohrke, Jean-Pierre Seifert, Enrico Dietz, Sven Frohmann, Heinz-Wilhelm Hübers:
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout. CoRR abs/2006.06290 (2020) - [i39]Ryan Sweke, Jean-Pierre Seifert, Dominik Hangleiter, Jens Eisert:
On the Quantum versus Classical Learnability of Discrete Distributions. CoRR abs/2007.14451 (2020) - [i38]Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. CoRR abs/2009.04263 (2020)
2010 – 2019
- 2019
- [j18]Fatemeh Ganji, Domenic Forte, Jean-Pierre Seifert:
PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks. IEEE Access 7: 122513-122521 (2019) - [c116]Robert Buhren, Christian Werling, Jean-Pierre Seifert:
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation. CCS 2019: 1087-1099 - [c115]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
Anatomy of Commercial IMSI Catchers and Detectors. Krypto-Tag 2019 - [c114]Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, Michael Franz:
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. NDSS 2019 - [c113]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones. PROOFS 2019: 33-48 - [c112]Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert:
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. WiSec 2019: 221-231 - [c111]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
Anatomy of Commercial IMSI Catchers and Detectors. WPES@CCS 2019: 74-86 - [i37]Robert Buhren, Christian Werling, Jean-Pierre Seifert:
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation. CoRR abs/1908.11680 (2019) - [i36]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Theoretical and Practical Approaches for Hardness Amplification of PUFs. IACR Cryptol. ePrint Arch. 2019: 534 (2019) - [i35]Fatemeh Ganji, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Blockchain-enabled Cryptographically-secure Hardware Obfuscation. IACR Cryptol. ePrint Arch. 2019: 928 (2019) - [i34]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Cryptol. ePrint Arch. 2019: 1473 (2019) - 2018
- [j17]Arnd Weber, Steffen Reith, Michael Kasper, Dirk Kuhlmann, Jean-Pierre Seifert, Christoph Krauß:
Souveränität und die IT-Wertschöpfungskette. Datenschutz und Datensicherheit 42(5): 291-293 (2018) - [j16]Alexander Oppermann, Federico Grasso Toro, Florian Thiel, Jean-Pierre Seifert:
Secure Cloud Computing: Reference Architecture for Measuring Instrument under Legal Control. Secur. Priv. 1(3) (2018) - [j15]Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert:
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 573-595 (2018) - [j14]Byeongdo Hong, Shinjo Park, Hongil Kim, Dongkwan Kim, Hyunwook Hong, Hyunwoo Choi, Jean-Pierre Seifert, Sung-Ju Lee, Yongdae Kim:
Peeking Over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -. IEEE Trans. Mob. Comput. 17(10): 2366-2380 (2018) - [c110]Alexander Oppermann, Federico Grasso Toro, Florian Thiel, Jean-Pierre Seifert:
Anomaly Detection Approaches for Secure Cloud Reference Architectures in Legal Metrology. CLOSER 2018: 549-556 - [c109]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
A Fourier Analysis Based Attack Against Physically Unclonable Functions. Financial Cryptography 2018: 310-328 - [c108]Alexander Oppermann, Marko Esche, Florian Thiel, Jean-Pierre Seifert:
Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology. FedCSIS 2018: 593-602 - [c107]Alexander Oppermann, Federico Grasso Toro, Florian Thiel, Jean-Pierre Seifert:
Secure cloud computing: Continuous anomaly detection approach in legal metrology. I2MTC 2018: 1-6 - [c106]Daniel Peters, Jan Wetzlich, Florian Thiel, Jean-Pierre Seifert:
Blockchain applications for legal metrology. I2MTC 2018: 1-6 - [c105]Arnd Weber, Steffen Reith, Dirk Kuhlmann, Michael Kasper, Jean-Pierre Seifert, Christoph Krauß:
Open Source Value Chains for Addressing Security Issues Efficiently. QRS Companion 2018: 599-606 - [c104]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid:
Taking Control of SDN-based Cloud Systems via the Data Plane. SOSR 2018: 1:1-1:15 - [c103]Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert:
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks. WISEC 2018: 75-86 - [c102]Julian Fietkau, Starbug, Jean-Pierre Seifert:
Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud. WOOT @ USENIX Security Symposium 2018 - [i33]Soroush M. Sohi, Fatemeh Ganji, Jean-Pierre Seifert:
Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems. CoRR abs/1807.03212 (2018) - [i32]Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert:
Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs. IACR Cryptol. ePrint Arch. 2018: 717 (2018) - 2017
- [j13]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Having no mathematical model may not secure PUFs. J. Cryptogr. Eng. 7(2): 113-128 (2017) - [j12]Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers:
Photonic Side-Channel Analysis of Arbiter PUFs. J. Cryptol. 30(2): 550-571 (2017) - [c101]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid:
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser. CCSW 2017: 11-15 - [c100]Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs. CCS 2017: 1661-1674 - [c99]Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter:
Fault Attacks on Encrypted General Purpose Compute Platforms. CODASPY 2017: 197-204 - [c98]Daniel Peters, Johannes Fischer, Florian Thiel, Jean-Pierre Seifert:
FLOUDS: A Succinct File System Structure. FedCSIS (Position Papers) 2017: 51-57 - [c97]Jan Wetzlich, Martin Nischwitz, Florian Thiel, Jean-Pierre Seifert:
A Modular Testbed for Intelligent Meters and their Ecosystem. FedCSIS (Position Papers) 2017: 119-125 - [c96]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic side channel attacks against RSA. HOST 2017: 74-78 - [c95]Shahin Tajik, Julian Fietkau, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
PUFMon: Security monitoring of FPGAs using physically unclonable functions. IOLTS 2017: 186-191 - [c94]Alexander Oppermann, Artem Yurchenko, Marko Esche, Jean-Pierre Seifert:
Secure Cloud Computing: Multithreaded Fully Homomorphic Encryption for Legal Metrology. ISDDC 2017: 35-54 - [c93]Alexander Oppermann, Federico Grasso Toro, Artem Yurchenko, Jean-Pierre Seifert:
Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing. ISPA/IUCC 2017: 503-510 - [c92]Bhargava Shastry, Markus Leutner, Tobias Fiebig, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid, Jean-Pierre Seifert, Anja Feldmann:
Static Program Analysis as a Fuzzing Aid. RAID 2017: 26-47 - [c91]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, Jean-Pierre Seifert:
White-Stingray: Evaluating IMSI Catchers Detection Applications. WOOT 2017 - [c90]Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. WOOT 2017 - [c89]Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi:
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. WOOT 2017 - [i31]Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi:
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. CoRR abs/1704.02786 (2017) - [i30]Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. CoRR abs/1706.00206 (2017) - [i29]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic Side Channel Attacks Against RSA. IACR Cryptol. ePrint Arch. 2017: 108 (2017) - [i28]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions. IACR Cryptol. ePrint Arch. 2017: 551 (2017) - [i27]Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit:
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs. IACR Cryptol. ePrint Arch. 2017: 822 (2017) - 2016
- [j11]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC learning of arbiter PUFs. J. Cryptogr. Eng. 6(3): 249-258 (2016) - [c88]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones. SPSM@CCS 2016: 13-21 - [c87]Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:
No Place to Hide: Contactless Probing of Secret Data on FPGAs. CHES 2016: 147-167 - [c86]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack Against PUFs with No Mathematical Model. CHES 2016: 391-411 - [c85]Alexander Oppermann, Jean-Pierre Seifert, Florian Thiel:
Secure Cloud Reference Architectures for Measuring Instruments under Legal Control. CLOSER (1) 2016: 289-294 - [c84]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. COSADE 2016: 35-51 - [c83]Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert:
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. COSADE 2016: 111-129 - [c82]Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert:
Towards Vulnerability Discovery Using Staged Program Analysis. DIMVA 2016: 78-97 - [c81]Anja Feldmann, Philipp Heyder, Michael Kreutzer, Stefan Schmid, Jean-Pierre Seifert, Haya Schulmann, Kashyap Thimmaraju, Michael Waidner, Jens Sieberg:
NetCo: Reliable Routing With Unreliable Routers. DSN Workshops 2016: 128-135 - [c80]Altaf Shaik, Jean-Pierre Seifert, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi:
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. NDSS 2016 - [i26]Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid:
Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR abs/1610.08717 (2016) - [i25]Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter:
Fault Attacks on Encrypted General Purpose Compute Platforms. CoRR abs/1612.03744 (2016) - [i24]Lejla Batina, Swarup Bhunia, Patrick Schaumont, Jean-Pierre Seifert:
Foundations of Secure Scaling (Dagstuhl Seminar 16342). Dagstuhl Reports 6(8): 65-90 (2016) - [i23]Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert:
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. IACR Cryptol. ePrint Arch. 2016: 238 (2016) - [i22]Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:
No Place to Hide: Contactless Probing of Secret Data on FPGAs. IACR Cryptol. ePrint Arch. 2016: 593 (2016) - [i21]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack against PUFs with No Mathematical Model. IACR Cryptol. ePrint Arch. 2016: 606 (2016) - 2015
- [j10]Daniel Peters, Michael Peter, Jean-Pierre Seifert, Florian Thiel:
A Secure System Architecture for Measuring Instruments in Legal Metrology. Comput. 4(2): 61-86 (2015) - [c79]Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik:
Lattice Basis Reduction Attack against Physically Unclonable Functions. CCS 2015: 1070-1080 - [c78]Shahin Tajik, Heiko Lohrke, Fatemeh Ganji, Jean-Pierre Seifert, Christian Boit:
Laser Fault Attack on Physically Unclonable Functions. FDTC 2015: 85-96 - [c77]Jean-Pierre Seifert, Michael Peter:
Automotive MILS. GI-Jahrestagung 2015: 1647 - [c76]Daniel Peters, Florian Thiel, Michael Peter, Jean-Pierre Seifert:
A secure software framework for Measuring Instruments in legal metrology. I2MTC 2015: 1596-1601 - [c75]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Let Me Prove It to You: RO PUFs Are Provably Learnable. ICISC 2015: 345-358 - [c74]Michael Peter, Matthias Petschick, Julian Vetter, Jan Nordholz, Janis Danisevskis, Jean-Pierre Seifert:
Undermining Isolation Through Covert Channels in the Fiasco.OC Microkernel. ISCIS 2015: 147-156 - [c73]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Why Attackers Win: On the Learnability of XOR Arbiter PUFs. TRUST 2015: 22-39 - [i20]Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert:
Practical attacks against privacy and availability in 4G/LTE mobile communication systems. CoRR abs/1510.07563 (2015) - [i19]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC Learning of Arbiter PUFs. IACR Cryptol. ePrint Arch. 2015: 378 (2015) - [i18]Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers:
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family. IACR Cryptol. ePrint Arch. 2015: 871 (2015) - [i17]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. IACR Cryptol. ePrint Arch. 2015: 1206 (2015) - 2014
- [j9]Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez:
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms. IEEE Trans. Mob. Comput. 13(1): 188-201 (2014) - [c72]Juliane Krämer, Michael Kasper, Jean-Pierre Seifert:
The role of photons in cryptanalysis. ASP-DAC 2014: 780-787 - [c71]Alexandra Mikityuk, Jean-Pierre Seifert, Oliver Friedrich:
Paradigm shift in IPTV service generation: Comparison between locally- and Cloud-rendered IPTV UI. CCNC 2014: 205-212 - [c70]Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich:
Physical Characterization of Arbiter PUFs. CHES 2014: 493-509 - [c69]Clemens Helfmeier, Christian Boit, Dmitry Nedospasov, Shahin Tajik, Jean-Pierre Seifert:
Physical vulnerabilities of Physically Unclonable Functions. DATE 2014: 1-4 - [c68]Shahin Tajik, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit:
Emission Analysis of Hardware Implementations. DSD 2014: 528-534 - [c67]Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert:
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. FDTC 2014: 123-136 - [c66]Daniel Peters, Ulrich Grottker, Florian Thiel, Michael Peter, Jean-Pierre Seifert:
Achieving Software Security for Measuring Instruments under Legal Control. FedCSIS (Position Papers) 2014: 123-130 - [i16]Daniel DeFreez, Bhargava Shastry, Hao Chan, Jean-Pierre Seifert:
A First Look at Firefox OS Security. CoRR abs/1410.7754 (2014) - [i15]Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert:
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. IACR Cryptol. ePrint Arch. 2014: 543 (2014) - [i14]Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich:
Physical Characterization of Arbiter PUFs. IACR Cryptol. ePrint Arch. 2014: 802 (2014) - [i13]Michael Peter, Jan Nordholz, Matthias Petschick, Janis Danisevskis, Julian Vetter, Jean-Pierre Seifert:
Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel. IACR Cryptol. ePrint Arch. 2014: 984 (2014) - 2013
- [j8]Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert:
Simple photonic emission analysis of AES. J. Cryptogr. Eng. 3(1): 3-15 (2013) - [j7]Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou:
Architecting against Software Cache-Based Side-Channel Attacks. IEEE Trans. Computers 62(7): 1276-1288 (2013) - [c65]Clemens Helfmeier, Dmitry Nedospasov, Christopher Tarnovsky, Jan Starbug Krissler, Christian Boit, Jean-Pierre Seifert:
Breaking and entering through the silicon. CCS 2013: 733-744 - [c64]Frederik Armknecht, Jean-Pierre Seifert:
Third international workshop on trustworthy embedded devices (TrustED 2013). CCS 2013: 1479-1480 - [c63]Juliane Krämer, Dmitry Nedospasov, Alexander Schlösser, Jean-Pierre Seifert:
Differential Photonic Emission Analysis. COSADE 2013: 1-16 - [c62]Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, Jean-Pierre Seifert:
SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper). DIMVA 2013: 150-159 - [c61]Dmitry Nedospasov, Jean-Pierre Seifert, Clemens Helfmeier, Christian Boit:
Invasive PUF Analysis. FDTC 2013: 30-38 - [c60]Clemens Helfmeier, Christian Boit, Dmitry Nedospasov, Jean-Pierre Seifert:
Cloning Physically Unclonable Functions. HOST 2013: 1-6 - [c59]Alexandra Mikityuk, Jean-Pierre Seifert, Oliver Friedrich:
The virtual Set-Top Box: On the shift of IPTV service execution, service & UI composition into the cloud. ICIN 2013: 1-8 - [c58]Janis Danisevskis, Marta Piekarska, Jean-Pierre Seifert:
Dark Side of the Shader: Mobile GPU-Aided Malware Delivery. ICISC 2013: 483-495 - [c57]Nico Golde, Kevin Redon, Jean-Pierre Seifert:
Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks. USENIX Security Symposium 2013: 33-48 - [e8]Ahmad-Reza Sadeghi, Frederik Armknecht, Jean-Pierre Seifert:
TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2486-1 [contents] - [e7]Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert:
Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings. Lecture Notes in Computer Science 7967, Springer 2013, ISBN 978-3-642-39234-4 [contents] - 2012
- [j6]Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn, Jean-Pierre Seifert:
Remote Attestation with Domain-Based Integrity Model and Policy Analysis. IEEE Trans. Dependable Secur. Comput. 9(3): 429-442 (2012) - [c56]Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert:
Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us. CHES 2012: 41-57 - [c55]Collin Mulliner, Steffen Liebergeld, Matthias Lange, Jean-Pierre Seifert:
Taming Mr Hayes: Mitigating signaling based attacks on smartphones. DSN 2012: 1-12 - [c54]Dmitry Nedospasov, Jean-Pierre Seifert, Alexander Schlösser, Susanna Orlic:
Functional integrated circuit analysis. HOST 2012: 102-107 - [c53]Benjamin Michéle, Juliane Krämer, Jean-Pierre Seifert:
Structure-Based RSA Fault Attacks. ISPEC 2012: 301-318 - 2011
- [j5]Han-Chieh Chao, Jean-Pierre Seifert, Shiguo Lian, Liang Zhou:
Dependable multimedia communications: Systems, services, and applications. J. Netw. Comput. Appl. 34(5): 1447-1448 (2011) - [c52]Patrick Stewin, Jean-Pierre Seifert, Collin Mulliner:
Poster: Towards detecting DMA malware. CCS 2011: 857-860 - [c51]Juliane Krämer, Dmitry Nedospasov, Jean-Pierre Seifert:
Weaknesses in Current RSA Signature Schemes. ICISC 2011: 155-168 - [c50]Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert:
Security analysis of a femtocell device. SIN 2011: 95-102 - [c49]Collin Mulliner, Nico Golde, Jean-Pierre Seifert:
SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale. USENIX Security Symposium 2011 - 2010
- [c48]Patrick Stewin, Jean-Pierre Seifert:
In God we trust all others we monitor. CCS 2010: 639-641 - [c47]Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert:
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. ESORICS 2010: 182-198 - [c46]Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez:
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. ICICS 2010: 107-125 - [c45]Collin Mulliner, Jean-Pierre Seifert:
Rise of the iBots: Owning a telco network. MALWARE 2010: 71-80 - [c44]Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert:
Experimental Analysis of the Femtocell Location Verification Techniques. NordSec 2010: 49-54 - [c43]Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert:
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. TRUST 2010: 1-15 - [c42]Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu:
pBMDS: a behavior-based malware detection system for cellphone devices. WISEC 2010: 37-48
2000 – 2009
- 2009
- [c41]Onur Aciiçmez, Jean-Pierre Seifert, Xinwen Zhang:
A Secure DVB Set-Top Box via Trusting Computing Technologies. CCNC 2009: 1-8 - [c40]Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou:
Hardware-software integrated approaches to defend against software cache-based side channel attacks. HPCA 2009: 393-404 - [c39]Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert:
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. MobiSec 2009: 71-82 - [c38]Shay Gueron, Jean-Pierre Seifert:
On the Impossibility of Detecting Virtual Machine Monitors. SEC 2009: 143-151 - [e6]Shouhuai Xu, N. Asokan, Cristina Nita-Rotaru, Jean-Pierre Seifert:
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-788-2 [contents] - [e5]Luca Breveglieri, Israel Koren, David Naccache, Elisabeth Oswald, Jean-Pierre Seifert:
Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3824-2 [contents] - 2008
- [c37]Onur Aciiçmez, Afshin Latifi, Jean-Pierre Seifert, Xinwen Zhang:
A Trusted Mobile Phone Prototype. CCNC 2008: 1208-1209 - [c36]Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou:
Deconstructing new cache designs for thwarting software cache-based side channel attacks. CSAW 2008: 25-34 - [c35]Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang:
Usage control platformization via trustworthy SELinux. AsiaCCS 2008: 245-248 - [c34]Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert:
A general obligation model and continuity: enhanced policy enforcement engine for usage control. SACMAT 2008: 123-132 - [c33]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert:
Model-based behavioral attestation. SACMAT 2008: 175-184 - [c32]Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu:
Security Enforcement Model for Distributed Usage Control. SUTC 2008: 10-18 - [e4]Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert:
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-295-5 [contents] - [e3]Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert:
Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3314-8 [contents] - 2007
- [j4]Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç:
Micro-Architectural Cryptanalysis. IEEE Secur. Priv. 5(4): 62-64 (2007) - [j3]Shay Gueron, Jean-Pierre Seifert, Geoffrey Strongin, Derek Chiou, Resit Sendag, Joshua J. Yi:
Where Does Security Stand? New Vulnerabilities vs. Trusted Computing. IEEE Micro 27(6): 25-35 (2007) - [c31]Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert:
A trusted mobile phone reference architecturevia secure kernel. STC 2007: 7-14 - [c30]Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
Predicting Secret Keys Via Branch Prediction. CT-RSA 2007: 225-242 - [c29]Masoom Alam, Jean-Pierre Seifert, Xinwen Zhang:
A Model-Driven Framework for Trusted Computing Based Systems. EDOC 2007: 75-86 - [c28]Onur Aciiçmez, Jean-Pierre Seifert:
Cheap Hardware Parallelism Implies Cheap Security. FDTC 2007: 80-91 - [c27]Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei Xu:
Flexible Authorization with Decentralized Access Control Model for Grid Computing. HASE 2007: 156-165 - [c26]Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert:
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. IMACC 2007: 185-203 - [c25]Berthold Agreiter, Muhammad Alam, Ruth Breu, Michael Hafner, Alexander Pretschner, Jean-Pierre Seifert, Xinwen Zhang:
A technical architecture for enforcing usage control requirements in service-oriented architectures. SWS 2007: 18-25 - [e2]Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert:
Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007. IEEE Computer Society 2007, ISBN 0-7695-2982-8 [contents] - [i12]Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert:
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. IACR Cryptol. ePrint Arch. 2007: 39 (2007) - 2006
- [c24]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert:
Secrecy Analysis in Protocol Composition Logic. ASIAN 2006: 197-213 - [c23]Michael Neve, Jean-Pierre Seifert, Zhenghong Wang:
A refined look at Bernstein's AES side-channel analysis. AsiaCCS 2006: 369 - [c22]Shay Gueron, Jean-Pierre Seifert:
Is It Wise to Publish Your Public RSA Keys? FDTC 2006: 1-12 - [c21]Johannes Blömer, Martin Otto, Jean-Pierre Seifert:
Sign Change Fault Attacks on Elliptic Curve Cryptosystems. FDTC 2006: 36-52 - [c20]Michael Neve, Jean-Pierre Seifert:
Advances on Access-Driven Cache Attacks on AES. Selected Areas in Cryptography 2006: 147-162 - [e1]Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert:
Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings. Lecture Notes in Computer Science 4236, Springer 2006, ISBN 3-540-46250-3 [contents] - [i11]Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert:
Software mitigations to hedge AES against cache-based software side channel vulnerabilities. IACR Cryptol. ePrint Arch. 2006: 52 (2006) - [i10]Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç:
Predicting Secret Keys via Branch Prediction. IACR Cryptol. ePrint Arch. 2006: 288 (2006) - [i9]Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
On the Power of Simple Branch Prediction Analysis. IACR Cryptol. ePrint Arch. 2006: 351 (2006) - 2005
- [c19]Jean-Pierre Seifert:
On authenticated computing and RSA-based authentication. CCS 2005: 122-127 - [c18]Régis Leveugle, Yervant Zorian, Luca Breveglieri, André K. Nieuwland, Klaus Rothbart, Jean-Pierre Seifert:
On-Line Testing for Secure Implementations: Design and Validation. IOLTS 2005: 211 - [i8]Wieland Fischer, Jean-Pierre Seifert:
Duality between Multiplication and Modular Reduction. IACR Cryptol. ePrint Arch. 2005: 78 (2005) - 2004
- [c17]Wieland Fischer, Jean-Pierre Seifert:
High-Speed Modular Multiplication. CT-RSA 2004: 264-277 - [i7]Johannes Blömer, Martin Otto, Jean-Pierre Seifert:
Sign Change Fault Attacks On Elliptic Curve Cryptosystems. IACR Cryptol. ePrint Arch. 2004: 227 (2004) - 2003
- [c16]Johannes Blömer, Martin Otto, Jean-Pierre Seifert:
A new CRT-RSA algorithm secure against bellcore attacks. CCS 2003: 311-320 - [c15]Johannes Blömer, Jean-Pierre Seifert:
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). Financial Cryptography 2003: 162-181 - [c14]Wieland Fischer, Jean-Pierre Seifert:
Unfolded Modular Multiplication. ISAAC 2003: 726-735 - 2002
- [c13]Wieland Fischer, Jean-Pierre Seifert:
Note on Fast Computation of Secret RSA Exponents. ACISP 2002: 136-143 - [c12]Antonio Valverde Garcia, Jean-Pierre Seifert:
On the Implementation of the Advanced Encryption Standard on a Public-key Crypto-Coprocessor. CARDIS 2002: 135-146 - [c11]Wieland Fischer, Jean-Pierre Seifert:
Increasing the Bitlength of a Crypto-Coprocessor. CHES 2002: 71-81 - [c10]Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert:
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. CHES 2002: 260-275 - [i6]Wieland Fischer, Christophe Giraud, Erik Woodward Knudsen, Jean-Pierre Seifert:
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2002: 7 (2002) - [i5]Christian Aumüller, Peter Bier, Peter Hofreiter, Wieland Fischer, Jean-Pierre Seifert:
Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures. IACR Cryptol. ePrint Arch. 2002: 73 (2002) - [i4]Johannes Blömer, Jean-Pierre Seifert:
Fault based cryptanalysis of the Advanced Encryption Standard. IACR Cryptol. ePrint Arch. 2002: 75 (2002) - 2001
- [c9]Jean-Pierre Seifert:
Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation. CT-RSA 2001: 319-327 - [c8]Tanja Römer, Jean-Pierre Seifert:
Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. E-smart 2001: 211-219 - 2000
- [i3]Jean-Pierre Seifert:
Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation. Electron. Colloquium Comput. Complex. TR00 (2000) - [i2]Jean-Pierre Seifert:
Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation. IACR Cryptol. ePrint Arch. 2000: 36 (2000)
1990 – 1999
- 1999
- [j2]Oded Goldreich, Daniele Micciancio, Shmuel Safra, Jean-Pierre Seifert:
Approximating Shortest Lattice Vectors is not Harder than Approximating Closest Lattice Vectors. Inf. Process. Lett. 71(2): 55-61 (1999) - [c7]Jin-yi Cai, George Havas, Bernard Mans, Ajay Nerurkar, Jean-Pierre Seifert, Igor E. Shparlinski:
On Routing in Circulant Graphs. COCOON 1999: 360-369 - [c6]Nick Howgrave-Graham, Jean-Pierre Seifert:
Extending Wiener's Attack in the Presence of Many Decrypting Exponents. CQRE 1999: 153-166 - [c5]Roger Fischlin, Jean-Pierre Seifert:
Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography. IMACC 1999: 244-257 - [c4]George Havas, Jean-Pierre Seifert:
The Complexity of the Extended GCD Problem. MFCS 1999: 103-113 - [c3]Johannes Blömer, Jean-Pierre Seifert:
On the Complexity of Computing Short Linearly Independent Vectors and Short Bases in a Lattice. STOC 1999: 711-720 - [i1]Oded Goldreich, Daniele Micciancio, Shmuel Safra, Jean-Pierre Seifert:
Approximating Shortest Lattice Vectors is Not Harder Than Approximating Closest Lattice Vectors. Electron. Colloquium Comput. Complex. TR99 (1999) - 1998
- [j1]Carsten Rössner, Jean-Pierre Seifert:
On the Hardness of Approximating Shortest Integer Relations among Rational Numbers. Theor. Comput. Sci. 209(1-2): 287-297 (1998) - 1996
- [c2]Carsten Rössner, Jean-Pierre Seifert:
The Complexity of Approximate Optima for Greatest Common Divisor Computations. ANTS 1996: 307-322 - [c1]Carsten Rössner, Jean-Pierre Seifert:
Approximating Good Simultaneous Diophantine Approximations Is Almost NP-Hard. MFCS 1996: 494-505
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint