Werner Schindler

ORCID: 0000-0002-3073-0106
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Magnetic properties of thin films
  • Education Methods and Technologies
  • Physics and Engineering Research Articles
  • Physics of Superconductivity and Magnetism
  • Surface and Thin Film Phenomena
  • History and Theory of Mathematics
  • Molecular Junctions and Nanostructures
  • Security and Verification in Computing
  • Electrochemical Analysis and Applications
  • Mathematics Education and Teaching Techniques
  • Cryptography and Residue Arithmetic
  • Cryptography and Data Security
  • Semiconductor materials and interfaces
  • Mathematics and Applications
  • Vocational Education and Training
  • Force Microscopy Techniques and Applications
  • Usability and User Interface Design
  • Advanced Malware Detection Techniques
  • Advanced Condensed Matter Physics
  • Coding theory and cryptography
  • Linguistic research and analysis
  • Advanced Materials Characterization Techniques

Federal Office for Information Security
2012-2023

Technical University of Munich
2007-2020

National Research Center for Applied Cybersecurity ATHENE
2010-2013

University of Duisburg-Essen
2004-2010

Fraunhofer Institute for Secure Information Technology
2010

Karlsruhe Institute of Technology
1976-2007

Max Planck Institute of Microstructure Physics
1996-2001

University of Regensburg
1989-1997

Max Planck Society
1997

Friedrich-Alexander-Universität Erlangen-Nürnberg
1987-1994

Since the remarkable work of Kocher [7], several papers considering different types timing attacks have been published. In 2003, Brumley and Boneh presented a attack on unprotected OpenSSL implementations [2]. this paper, we improve efficiency their by factor more than 10. We exploit behavior Montgomery multiplications in table initialization phase, which allows us to increase number that provide useful information reveal one prime factors RSA moduli. also present other improvements, can be applied

10.1145/1102120.1102140 article EN 2005-11-07

Magnetic Co clusters have been electrodeposited from an aqueous electrolyte onto Au surfaces in electrochemical scanning tunneling microscope (STM). In a two-step process, is first deposited STM tip, then completely dissolved, and locally the substrate underneath tip due to local Co2+ oversaturation, which results laterally varying increase of Co/Co2+ Nernst potential at surface. Mechanical tip–sample contacts or creation defects can be excluded. The structure size order apex diameter,...

10.1063/1.122744 article EN Applied Physics Letters 1998-11-30

At CHES 2005 a new stochastic approach for differential side channel cryptanalysis on block ciphers was introduced and studied intensively. In the present paper we focus generalized variant that can handle arbitrary masking techniques. Our combines engineer's intuition expertise with precise methods provides insight into 'nature' of leakage signal. particular, this supports design secure cryptosystems constructively. The attacking efficiency our is much better than DPA attacks. It limited by...

10.1515/jmc.2008.013 article EN cc-by-nc-nd Journal of Mathematical Cryptology 2008-01-01

The mechanism of localized electrodeposition on the nanometer scale is studied using tip an electrochemical scanning tunneling microscope as a "nanoelectrode," which retracted from substrate (working electrode) during growth clusters. system chosen exemplarily shows relatively weak substrate/deposit interaction compared to strong characteristic underpotential deposition systems. width and height clusters, can be grown with diameters even below 10 nm, are determined by diameter apex, distance...

10.1149/1.1343107 article EN Journal of The Electrochemical Society 2001-01-01

Ultrathin Co films have been electrodeposited on Cu(001) from an aqueous ${\mathrm{Na}}_{2}$${\mathrm{SO}}_{4}$/${\mathrm{CoSO}}_{4}$ electrolyte under cleanliness conditions equivalent to ultrahigh vacuum of 5\ifmmode\times\else\texttimes\fi{}${10}^{\mathrm{\ensuremath{-}}10}$ mbar. Films thicker than 1.5 ML show in-plane magnetization and square hysteresis loops. The saturation increases linearly with film thickness. vanishes below in agreement molecular-beam epitaxy (MBE) at 300 K....

10.1103/physrevb.55.r1989 article EN Physical review. B, Condensed matter 1997-01-15

Localized electrochemical deposition of small Co clusters on Au (111) has been achieved by using the tip a scanning tunneling microscope (STM) as an nanoelectrode. In contrast to most reported techniques create nanostructures, this approach avoids irreversible modifications both substrate and deposit during preparation process. A special polarization routine STM allows purely growth with diameters 15 nm.

10.1063/1.372913 article EN Journal of Applied Physics 2000-05-01

We introduce a stochastic method for the security evaluation and dynamic power consumption analysis in context of side-channel analysis. This allows to estimate data-dependent induced by secret parameters, e.g. cryptographic key, which may be exploited attacks. In particular, IP-cores applications on FPGAs have made secure against these show that same methods provide FPGA designers constructive feedback information leakage design. Applied as tool allow designer quantify resistance weaknesses...

10.1109/fpt.2010.5681772 article EN 2010-12-01

Au ∕ n - Si ( 111 ) contacts with interface areas in the range of 10−12cm2 have been fabricated at solid/liquid by electrochemical nucleation onto n-Si(111):H substrates. The show a Schottky diode behavior current densities much higher than expected from thermionic emission theory. applied sophisticated situ measurement technique allows, general, studies electronic properties any (semi-) conducting nanostructure interfaces under well-defined conditions.

10.1063/1.1808871 article EN Applied Physics Letters 2004-10-18

In the light of implementation attacks a better understanding complex circuits security sensitive applications is an important issue. Appropriate evaluation tools and metrics are required to understand origin flaws within design process. The selected leakage model has significant influence on reliability results concerning side-channel resistance cryptographic implementation. this contribution we introduce methods, which determine accuracy characterization allow quantify signal-to-noise...

10.5555/2492708.2493000 article EN 2012-03-12
Coming Soon ...