Peter Pessl
Cited by
Cited by
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P Pessl, D Gruss, C Maurice, M Schwarz, S Mangard
USENIX Security Symposium, 565-581, 2016
To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures
P Pessl, LG Bruinderink, Y Yarom
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Analyzing the shuffling side-channel countermeasure for lattice-based signatures
P Pessl
International Conference on Cryptology in India, 153-170, 2016
Pushing the limits of SHA-3 hardware implementations to fit on RFID
P Pessl, M Hutter
International Workshop on Cryptographic Hardware and Embedded Systems, 126-141, 2013
Single-trace side-channel attacks on masked lattice-based encryption
R Primas, P Pessl, S Mangard
International Conference on Cryptographic Hardware and Embedded Systems, 513-533, 2017
Curved tags–a low-resource ECDSA implementation tailored for RFID
P Pessl, M Hutter
International Workshop on Radio Frequency Identification: Security and …, 2015
Differential fault attacks on deterministic lattice signatures
LG Bruinderink, P Pessl
IACR Transactions on Cryptographic Hardware and Embedded Systems, 21-43, 2018
Enhancing side-channel analysis of binary-field multiplication with bit reliability
P Pessl, S Mangard
Cryptographers’ Track at the RSA Conference, 255-270, 2016
More practical single-trace attacks on the number theoretic transform
P Pessl, R Primas
International Conference on Cryptology and Information Security in Latin …, 2019
Single-Trace Attacks on Keccak.
MJ Kannwischer, P Pessl, R Primas
IACR Cryptol. ePrint Arch. 2020, 371, 2020
The system can't perform the operation now. Try again later.
Articles 1–10