default search action
Werner Schindler
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Li-Wei Chen, Ziang Chen, Werner Schindler, Xianyue Zhao, Heidemarie Schmidt, Nan Du, Ilia Polian:
On Side-Channel Analysis of Memristive Cryptographic Circuits. IEEE Trans. Inf. Forensics Secur. 18: 463-476 (2023) - [c31]Ilia Polian, Nan Du, Werner Schindler:
Overview of Memristive Cryptography. NEWCAS 2023: 1-5 - 2022
- [j13]Aron Gohr, Friederike Laus, Werner Schindler:
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis A Report on the CHES Challenge Side-Channel Contest 2020. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 397-437 (2022) - [i8]Aron Gohr, Friederike Laus, Werner Schindler:
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020. IACR Cryptol. ePrint Arch. 2022: 471 (2022) - 2021
- [j12]Johannes Mittmann, Werner Schindler:
Timing attacks and local timing attacks against Barrett's modular multiplication algorithm. J. Cryptogr. Eng. 11(4): 369-397 (2021) - [j11]Margaux Dugardin, Werner Schindler, Sylvain Guilley:
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. J. Math. Cryptol. 15(1): 408-433 (2021) - 2020
- [j10]Aron Gohr, Dominik Klein, Werner Schindler:
Verräterischer Stromverbrauch. Datenschutz und Datensicherheit 44(7): 431-435 (2020) - [c30]Aron Gohr, Sven Jacob, Werner Schindler:
Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations. SAC 2020: 567-592 - [i7]Aron Gohr, Sven Jacob, Werner Schindler:
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples. IACR Cryptol. ePrint Arch. 2020: 165 (2020) - [i6]Johannes Mittmann, Werner Schindler:
Timing attacks and local timing attacks against Barrett's modular multiplication algorithm. IACR Cryptol. ePrint Arch. 2020: 946 (2020)
2010 – 2019
- 2019
- [j9]Martina Rohde, Werner Schindler:
Künstliche Intelligenz in Evaluierung und Zulassung. Datenschutz und Datensicherheit 43(10): 627-630 (2019) - [i5]Aron Gohr, Sven Jacob, Werner Schindler:
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges. IACR Cryptol. ePrint Arch. 2019: 94 (2019) - [i4]Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, Karim Tobich:
Machine learning and side channel analysis in a CTF competition. IACR Cryptol. ePrint Arch. 2019: 860 (2019) - 2017
- [j8]Werner Schindler, Andreas Wiemers:
Generic power attacks on RSA with CRT and exponent blinding: new results. J. Cryptogr. Eng. 7(4): 255-272 (2017) - 2016
- [j7]Werner Schindler:
Exclusive exponent blinding is not enough to prevent any timing attack on RSA. J. Cryptogr. Eng. 6(2): 101-119 (2016) - 2015
- [c29]Werner Schindler:
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA. CHES 2015: 229-247 - 2014
- [j6]Werner Schindler, Andreas Wiemers:
Power attacks in the presence of exponent blinding. J. Cryptogr. Eng. 4(4): 213-236 (2014) - [j5]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [i3]Werner Schindler:
Exponent Blinding May Not Prevent Timing Attacks on RSA. IACR Cryptol. ePrint Arch. 2014: 869 (2014) - 2013
- [c28]Werner Schindler:
When Should an Implementation Attack Be Viewed as Successful? Number Theory and Cryptography 2013: 139-150 - 2012
- [c27]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models. CT-RSA 2012: 365-382 - [c26]Annelie Heuser, Werner Schindler, Marc Stöttinger:
Revealing side-channel issues of complex circuits by enhanced leakage models. DATE 2012: 1179-1184 - [e1]Werner Schindler, Sorin A. Huss:
Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7275, Springer 2012, ISBN 978-3-642-29911-7 [contents] - 2011
- [c25]Werner Schindler, Kouichi Itoh:
Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security. ACNS 2011: 73-90 - [c24]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis. DSD 2011: 674-681 - 2010
- [c23]Michael Kasper, Werner Schindler, Marc Stöttinger:
A stochastic method for security evaluation of cryptographic FPGA implementations. FPT 2010: 146-153
2000 – 2009
- 2009
- [c22]François-Xavier Standaert, François Koeune, Werner Schindler:
How to Compare Profiled Side-Channel Attacks?. ACNS 2009: 485-498 - [c21]Thomas Finke, Max Gebhardt, Werner Schindler:
A New Side-Channel Attack on RSA Prime Generation. CHES 2009: 141-155 - [c20]Werner Schindler, Colin D. Walter:
Optimal Recovery of Secret Keys from Weak Side Channel Traces. IMACC 2009: 446-468 - [p2]Werner Schindler:
Random Number Generators for Cryptographic Applications. Cryptographic Engineering 2009: 5-23 - [p1]Werner Schindler:
Evaluation Criteria for Physical Random Number Generators. Cryptographic Engineering 2009: 25-54 - 2008
- [j4]Werner Schindler:
Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking. J. Math. Cryptol. 2(3): 291-310 (2008) - [c19]Wolfgang Killmann, Werner Schindler:
A Design for a Physical RNG with Robust Entropy Estimators. CHES 2008: 146-163 - [c18]Onur Aciiçmez, Werner Schindler:
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. CT-RSA 2008: 256-273 - [c17]Max Gebhardt, Georg Illies, Werner Schindler:
On an Approach to Compute (at least Almost) Exact Probabilities for Differentia Hash Collision Paths. Sicherheit 2008: 111-125 - [i2]Max Gebhardt, Georg Illies, Werner Schindler:
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods. IACR Cryptol. ePrint Arch. 2008: 22 (2008) - 2007
- [c16]Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç:
Cache Based Remote Timing Attack on the AES. CT-RSA 2007: 271-286 - [c15]Max Gebhardt, Georg Illies, Werner Schindler:
Hashkollisionen und Qualifizierte Zertifikate. GI Jahrestagung (2) 2007: 174-178 - [i1]Onur Aciiçmez, Werner Schindler:
A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat. IACR Cryptol. ePrint Arch. 2007: 336 (2007) - 2006
- [c14]Max Gebhardt, Georg Illies, Werner Schindler:
A Note on the Practical Value of Single Hash Collisions for Special File Formats. Sicherheit 2006: 333-344 - 2005
- [c13]Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç:
Improving Brumley and Boneh timing attack on unprotected SSL implementations. CCS 2005: 139-146 - [c12]Werner Schindler, Kerstin Lemke, Christof Paar:
A Stochastic Model for Differential Side Channel Cryptanalysis. CHES 2005: 30-46 - [c11]Werner Schindler:
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods. Public Key Cryptography 2005: 85-103 - 2004
- [c10]Van-Ly Le, Werner Schindler:
How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers. SCN 2004: 367-380 - 2003
- [b1]Werner Schindler:
Measures with symmetry properties. Lecture notes in mathematics 1808, Springer 2003, ISBN 978-3-540-00235-2, pp. I-VIII, 1-167 - [c9]Wolfgang Killmann, Werner Schindler:
Über die Prüftiefe und Aussagekraft von IT-Sicherheitsgutachten. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 203-214 - [c8]Werner Schindler, Colin D. Walter:
More Detail for a Combined Timing and Power Attack against Implementations of RSA. IMACC 2003: 245-263 - [c7]Werner Schindler:
A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002. IMACC 2003: 276-289 - 2002
- [c6]Werner Schindler, Wolfgang Killmann:
Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications. CHES 2002: 431-449 - [c5]Werner Schindler:
A Combined Timing and Power Attack. Public Key Cryptography 2002: 263-279 - [c4]Frank Niedermeyer, Werner Schindler:
On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure. SCN 2002: 133-145 - 2001
- [c3]Werner Schindler:
Efficient Online Tests for True Random Number Generators. CHES 2001: 103-117 - [c2]Werner Schindler, François Koeune, Jean-Jacques Quisquater:
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. IMACC 2001: 245-267 - 2000
- [c1]Werner Schindler:
A Timing Attack against RSA with the Chinese Remainder Theorem. CHES 2000: 109-124
1990 – 1999
- 1994
- [j3]Werner Schindler:
Equivariant Mappings: a New Approach in Stochastic Simulations. Comput. Geom. 4: 327-343 (1994) - [j2]Werner Schindler:
A Generalization of Weyl's Integration Theorem and Its Meaning for Stochastic Simulations. Math. Oper. Res. 19(3): 523-538 (1994) - 1991
- [j1]Jürgen Bokowski, Jürgen Richter-Gebert, Werner Schindler:
On the Distribution of Order Types. Comput. Geom. 1: 127-142 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint