- Cryptographic Implementations and Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Coding theory and cryptography
- Cryptography and Data Security
- Cryptography and Residue Arithmetic
- Network Security and Intrusion Detection
- Information and Cyber Security
- Intelligence, Security, War Strategy
- Software Testing and Debugging Techniques
- Digital Media Forensic Detection
- Internet Traffic Analysis and Secure E-voting
- Radiation Effects in Electronics
- Osteoarthritis Treatment and Mechanisms
- Bacillus and Francisella bacterial research
- Public Administration and Political Analysis
- Smart Grid Security and Resilience
- Electrostatic Discharge in Electronics
- Advanced Authentication Protocols Security
- Quantum-Dot Cellular Automata
- Formal Methods in Verification
- RFID technology advancements
- Embedded Systems Design Techniques
University of Klagenfurt
2019-2025
University of Birmingham
2024
University of Bristol
2012-2023
Malteser Waldkrankenhaus Erlangen
2018
Engineering and Physical Sciences Research Council
2015
State Key Laboratory of Cryptology
2007-2010
Graz University of Technology
2001-2009
University of Toronto
2005
Institut für Informationsverarbeitung
2002-2004
Technical University of Munich
2004
The AES (advanced encryption standard) is a new block cipher standard published by the US government in November 2001. As consequence, there growing interest efficient implementations of AES. For many applications, these need to be resistant against side channel attacks, that is, it should not too easy extract secret information from physical measurements on device. We present first results feasibility power analysis attack an hardware implementation. Our targeted ASIC implementation...
In this study, the authors examine relationship between and efficiency of different approaches to standard (univariate) differential power analysis (DPA) attacks. The first show that, when fed with same assumptions about target device (i.e. leakage model), most popular such as using a distance-of-means test, correlation Bayes attacks are essentially equivalent in setting. Differences observed practice not because differences statistical tests but artefacts. Then, establish link coefficient...
This article focuses on power analysis attacks because they have received by far the most attention in recent years. They are powerful and can be executed relatively easily. provides an introduction to these discusses countermeasures against them. In particular, we focus that implemented at cell level. presents overview of attacks, which based measurement consumed cryptographic ICs,