- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Physical Unclonable Functions (PUFs) and Hardware Security
- Magnetic properties of thin films
- Education Methods and Technologies
- Physics and Engineering Research Articles
- Physics of Superconductivity and Magnetism
- Surface and Thin Film Phenomena
- History and Theory of Mathematics
- Molecular Junctions and Nanostructures
- Security and Verification in Computing
- Electrochemical Analysis and Applications
- Mathematics Education and Teaching Techniques
- Cryptography and Residue Arithmetic
- Cryptography and Data Security
- Semiconductor materials and interfaces
- Mathematics and Applications
- Vocational Education and Training
- Force Microscopy Techniques and Applications
- Usability and User Interface Design
- Advanced Malware Detection Techniques
- Advanced Condensed Matter Physics
- Coding theory and cryptography
- Linguistic research and analysis
- Advanced Materials Characterization Techniques
Federal Office for Information Security
2012-2023
Technical University of Munich
2007-2020
National Research Center for Applied Cybersecurity ATHENE
2010-2013
University of Duisburg-Essen
2004-2010
Fraunhofer Institute for Secure Information Technology
2010
Karlsruhe Institute of Technology
1976-2007
Max Planck Institute of Microstructure Physics
1996-2001
University of Regensburg
1989-1997
Max Planck Society
1997
Friedrich-Alexander-Universität Erlangen-Nürnberg
1987-1994
Since the remarkable work of Kocher [7], several papers considering different types timing attacks have been published. In 2003, Brumley and Boneh presented a attack on unprotected OpenSSL implementations [2]. this paper, we improve efficiency their by factor more than 10. We exploit behavior Montgomery multiplications in table initialization phase, which allows us to increase number that provide useful information reveal one prime factors RSA moduli. also present other improvements, can be applied
Magnetic Co clusters have been electrodeposited from an aqueous electrolyte onto Au surfaces in electrochemical scanning tunneling microscope (STM). In a two-step process, is first deposited STM tip, then completely dissolved, and locally the substrate underneath tip due to local Co2+ oversaturation, which results laterally varying increase of Co/Co2+ Nernst potential at surface. Mechanical tip–sample contacts or creation defects can be excluded. The structure size order apex diameter,...
At CHES 2005 a new stochastic approach for differential side channel cryptanalysis on block ciphers was introduced and studied intensively. In the present paper we focus generalized variant that can handle arbitrary masking techniques. Our combines engineer's intuition expertise with precise methods provides insight into 'nature' of leakage signal. particular, this supports design secure cryptosystems constructively. The attacking efficiency our is much better than DPA attacks. It limited by...
The mechanism of localized electrodeposition on the nanometer scale is studied using tip an electrochemical scanning tunneling microscope as a "nanoelectrode," which retracted from substrate (working electrode) during growth clusters. system chosen exemplarily shows relatively weak substrate/deposit interaction compared to strong characteristic underpotential deposition systems. width and height clusters, can be grown with diameters even below 10 nm, are determined by diameter apex, distance...
Ultrathin Co films have been electrodeposited on Cu(001) from an aqueous ${\mathrm{Na}}_{2}$${\mathrm{SO}}_{4}$/${\mathrm{CoSO}}_{4}$ electrolyte under cleanliness conditions equivalent to ultrahigh vacuum of 5\ifmmode\times\else\texttimes\fi{}${10}^{\mathrm{\ensuremath{-}}10}$ mbar. Films thicker than 1.5 ML show in-plane magnetization and square hysteresis loops. The saturation increases linearly with film thickness. vanishes below in agreement molecular-beam epitaxy (MBE) at 300 K....
Localized electrochemical deposition of small Co clusters on Au (111) has been achieved by using the tip a scanning tunneling microscope (STM) as an nanoelectrode. In contrast to most reported techniques create nanostructures, this approach avoids irreversible modifications both substrate and deposit during preparation process. A special polarization routine STM allows purely growth with diameters 15 nm.
We introduce a stochastic method for the security evaluation and dynamic power consumption analysis in context of side-channel analysis. This allows to estimate data-dependent induced by secret parameters, e.g. cryptographic key, which may be exploited attacks. In particular, IP-cores applications on FPGAs have made secure against these show that same methods provide FPGA designers constructive feedback information leakage design. Applied as tool allow designer quantify resistance weaknesses...
Au ∕ n - Si ( 111 ) contacts with interface areas in the range of 10−12cm2 have been fabricated at solid/liquid by electrochemical nucleation onto n-Si(111):H substrates. The show a Schottky diode behavior current densities much higher than expected from thermionic emission theory. applied sophisticated situ measurement technique allows, general, studies electronic properties any (semi-) conducting nanostructure interfaces under well-defined conditions.
In the light of implementation attacks a better understanding complex circuits security sensitive applications is an important issue. Appropriate evaluation tools and metrics are required to understand origin flaws within design process. The selected leakage model has significant influence on reliability results concerning side-channel resistance cryptographic implementation. this contribution we introduce methods, which determine accuracy characterization allow quantify signal-to-noise...