- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Physical Unclonable Functions (PUFs) and Hardware Security
- Education Methods and Technologies
- Magnetic properties of thin films
- Physics and Engineering Research Articles
- Physics of Superconductivity and Magnetism
- Surface and Thin Film Phenomena
- History and Theory of Mathematics
- Molecular Junctions and Nanostructures
- Mathematics Education and Teaching Techniques
- Security and Verification in Computing
- Cryptography and Data Security
- Cryptography and Residue Arithmetic
- Electrochemical Analysis and Applications
- Semiconductor materials and interfaces
- Law and Political Science
- Mathematics and Applications
- Force Microscopy Techniques and Applications
- Linguistic research and analysis
- Linguistic Education and Pedagogy
- Vocational Education and Training
- Coding theory and cryptography
- Advanced Condensed Matter Physics
- Usability and User Interface Design
Federal Office for Information Security
2012-2023
Technical University of Munich
2007-2020
National Research Center for Applied Cybersecurity ATHENE
2010-2013
University of Duisburg-Essen
2004-2010
Fraunhofer Institute for Secure Information Technology
2010
Karlsruhe Institute of Technology
1976-2007
Max Planck Institute of Microstructure Physics
1996-2001
University of Regensburg
1989-1997
Max Planck Society
1997
Friedrich-Alexander-Universität Erlangen-Nürnberg
1987-1994
Since the remarkable work of Kocher [7], several papers considering different types timing attacks have been published. In 2003, Brumley and Boneh presented a attack on unprotected OpenSSL implementations [2]. this paper, we improve efficiency their by factor more than 10. We exploit behavior Montgomery multiplications in table initialization phase, which allows us to increase number that provide useful information reveal one prime factors RSA moduli. also present other improvements, can be applied
Magnetic Co clusters have been electrodeposited from an aqueous electrolyte onto Au surfaces in electrochemical scanning tunneling microscope (STM). In a two-step process, is first deposited STM tip, then completely dissolved, and locally the substrate underneath tip due to local Co2+ oversaturation, which results laterally varying increase of Co/Co2+ Nernst potential at surface. Mechanical tip–sample contacts or creation defects can be excluded. The structure size order apex diameter,...
At CHES 2005 a new stochastic approach for differential side channel cryptanalysis on block ciphers was introduced and studied intensively. In the present paper we focus generalized variant that can handle arbitrary masking techniques. Our combines engineer's intuition expertise with precise methods provides insight into 'nature' of leakage signal. particular, this supports design secure cryptosystems constructively. The attacking efficiency our is much better than DPA attacks. It limited by...