Elisabeth Oswald

ORCID: 0000-0001-7502-3184
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Chaos-based Image/Signal Encryption
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Coding theory and cryptography
  • Cryptography and Data Security
  • Cryptography and Residue Arithmetic
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Intelligence, Security, War Strategy
  • Software Testing and Debugging Techniques
  • Digital Media Forensic Detection
  • Internet Traffic Analysis and Secure E-voting
  • Radiation Effects in Electronics
  • Osteoarthritis Treatment and Mechanisms
  • Bacillus and Francisella bacterial research
  • Public Administration and Political Analysis
  • Smart Grid Security and Resilience
  • Electrostatic Discharge in Electronics
  • Advanced Authentication Protocols Security
  • Quantum-Dot Cellular Automata
  • Formal Methods in Verification
  • RFID technology advancements
  • Embedded Systems Design Techniques

University of Klagenfurt
2019-2025

University of Birmingham
2024

University of Bristol
2012-2023

Malteser Waldkrankenhaus Erlangen
2018

Engineering and Physical Sciences Research Council
2015

State Key Laboratory of Cryptology
2007-2010

Graz University of Technology
2001-2009

University of Toronto
2005

Institut für Informationsverarbeitung
2002-2004

Technical University of Munich
2004

The AES (advanced encryption standard) is a new block cipher standard published by the US government in November 2001. As consequence, there growing interest efficient implementations of AES. For many applications, these need to be resistant against side channel attacks, that is, it should not too easy extract secret information from physical measurements on device. We present first results feasibility power analysis attack an hardware implementation. Our targeted ASIC implementation...

10.1109/itcc.2004.1286711 article EN 2004-01-01

In this study, the authors examine relationship between and efficiency of different approaches to standard (univariate) differential power analysis (DPA) attacks. The first show that, when fed with same assumptions about target device (i.e. leakage model), most popular such as using a distance-of-means test, correlation Bayes attacks are essentially equivalent in setting. Differences observed practice not because differences statistical tests but artefacts. Then, establish link coefficient...

10.1049/iet-ifs.2010.0096 article EN IET Information Security 2011-06-14

This article focuses on power analysis attacks because they have received by far the most attention in recent years. They are powerful and can be executed relatively easily. provides an introduction to these discusses countermeasures against them. In particular, we focus that implemented at cell level. presents overview of attacks, which based measurement consumed cryptographic ICs,

10.1109/mdt.2007.200 article EN IEEE Design & Test of Computers 2007-11-01
Coming Soon ...