Combining clickstream analyses and graph-modeled data clustering for identifying common response processes E Ulitzsch, Q He, V Ulitzsch, H Molter, A Nichterlein, R Niedermeier, ... psychometrika 86 (1), 190-214, 2021 | 42 | 2021 |
Profiling side-channel attacks on Dilithium: A small bit-fiddling leak breaks it all S Marzougui, V Ulitzsch, M Tibouchi, JP Seifert Cryptology ePrint Archive, 2022 | 33 | 2022 |
A machine learning-based procedure for leveraging clickstream data to investigate early predictability of failure on interactive tasks E Ulitzsch, V Ulitzsch, Q He, O Lüdtke Behavior Research Methods 55 (3), 1392-1412, 2023 | 17 | 2023 |
Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN? F Klement, S Katzenbeisser, V Ulitzsch, J Krämer, S Stanczak, Z Utkovski, ... arXiv preprint arXiv:2204.12227, 2022 | 15 | 2022 |
A post-quantum secure subscription concealed identifier for 6G VQ Ulitzsch, S Park, S Marzougui, JP Seifert Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 13 | 2022 |
An in-principle super-polynomial quantum advantage for approximating combinatorial optimization problems via computational learning theory N Pirnay, V Ulitzsch, F Wilde, J Eisert, JP Seifert Science Advances 10 (11), eadj5170, 2024 | 7* | 2024 |
Breaking the quadratic barrier: quantum cryptanalysis of Milenage, telecommunications’ cryptographic backbone VQ Ulitzsch, JP Seifert International Conference on Post-Quantum Cryptography, 476-504, 2023 | 4 | 2023 |
Follow the white rabbit simplifying fuzz testing using fuzzexmachina V Ulitzsch, B Shastry, D Maier | 3 | 2020 |
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP VQ Ulitzsch, S Marzougui, A Bagia, M Tibouchi, JP Seifert IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (4 …, 2023 | 1 | 2023 |
ASanity: On Bug Shadowing by Early ASan Exits V Ulitzsch, D Scholz, D Maier 2023 IEEE Security and Privacy Workshops (SPW), 364-370, 2023 | | 2023 |
Universal Forgery Attack on Dilithium Leveraging Power Side Channels V Ulitzsch, S Marzougui, M Tibouchi, JP Seifert | | |