Elisabeth Oswald
Elisabeth Oswald
Professor in Cybersecurity at Alpen-Adria Universität Klagenfurt
Verified email at aau.at
TitleCited byYear
Power analysis attacks: Revealing the secrets of smart cards
S Mangard, E Oswald, T Popp
Springer-Verlag New York Inc, 2007
19422007
An ASIC implementation of the AES SBoxes
J Wolkerstorfer, E Oswald, M Lamberger
Cryptographers’ Track at the RSA Conference, 67-78, 2002
4322002
A side-channel analysis resistant description of the AES S-box
E Oswald, S Mangard, N Pramstaller, V Rijmen
International workshop on fast software encryption, 413-423, 2005
3552005
Successfully attacking masked AES hardware implementations
S Mangard, N Pramstaller, E Oswald
International Workshop on Cryptographic Hardware and Embedded Systems, 157-171, 2005
3462005
Power-Analysis Attack on an ASIC AES implementation
SB Ors, F Gurkaynak, E Oswald, B Preneel
International Conference on Information Technology: Coding and Computing …, 2004
2642004
An AES smart card implementation resistant to power analysis attacks
C Herbst, E Oswald, S Mangard
International conference on applied cryptography and network security, 239-252, 2006
2592006
One for all–all for one: unifying standard differential power analysis attacks
S Mangard, E Oswald, FX Standaert
IET Information Security 5 (2), 100-110, 2011
2192011
Practical template attacks
C Rechberger, E Oswald
International Workshop on Information Security Applications, 440-456, 2004
1972004
Power-analysis attacks on an FPGA–first experimental results
SB Örs, E Oswald, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 35-50, 2003
1942003
Practical second-order DPA attacks for masked smart card implementations of block ciphers
E Oswald, S Mangard, C Herbst, S Tillich
Cryptographers’ Track at the RSA Conference, 192-207, 2006
1932006
Randomized addition-subtraction chains as a countermeasure against power attacks
E Oswald, M Aigner
International Workshop on Cryptographic Hardware and Embedded Systems, 39-50, 2001
1742001
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
International Conference on the Theory and Application of Cryptology and …, 2010
1582010
Update on SHA-1
V Rijmen, E Oswald
Cryptographers’ Track at the RSA Conference, 58-71, 2005
1552005
Template attacks on masking—resistance is futile
E Oswald, S Mangard
Cryptographers’ Track at the RSA Conference, 243-256, 2007
1282007
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security, 99-134, 2010
1102010
An efficient masking scheme for AES software implementations
E Oswald, K Schramm
International Workshop on Information Security Applications, 292-305, 2005
1062005
Power analysis attacks and countermeasures
T Popp, S Mangard, E Oswald
IEEE Design & test of Computers 24 (6), 535-543, 2007
872007
Power analysis tutorial
M Aigner, E Oswald
842000
Template attacks on ECDSA
M Medwed, E Oswald
International Workshop on Information Security Applications, 14-27, 2008
802008
Compiler assisted masking
A Moss, E Oswald, D Page, M Tunstall
International Workshop on Cryptographic Hardware and Embedded Systems, 58-75, 2012
742012
The system can't perform the operation now. Try again later.
Articles 1–20