Masked accelerators and instruction set extensions for post-quantum cryptography T Fritzmann, M Van Beirendonck, DB Roy, P Karl, T Schamberger, ... Cryptology ePrint Archive, 2021 | 96 | 2021 |
Chosen ciphertext k-trace attacks on masked cca2 secure kyber M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021 | 64 | 2021 |
A power side-channel attack on the CCA2-secure HQC KEM T Schamberger, J Renner, G Sigl, A Wachter-Zeh Smart Card Research and Advanced Applications: 19th International Conference …, 2021 | 32 | 2021 |
Information-set decoding with hints AL Horlemann, S Puchinger, J Renner, T Schamberger, A Wachter-Zeh Code-Based Cryptography Workshop, 60-83, 2021 | 22 | 2021 |
DOMREP–An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection M Gruber, M Probst, P Karl, T Schamberger, L Tebelmann, ... IEEE Transactions on Information Forensics and Security 16, 4321-4335, 2021 | 22 | 2021 |
Secure and compact full NTRU hardware implementation K Braun, T Fritzmann, G Maringer, T Schamberger, J Sepúlveda 2018 IFIP/IEEE International Conference on Very Large Scale Integration …, 2018 | 21 | 2018 |
Retrofitting leakage resilient authenticated encryption to microcontrollers F Unterstein, M Schink, T Schamberger, L Tebelmann, M Ilg, J Heyszl IACR Transactions on Cryptographic Hardware and Embedded Systems, 365-388, 2020 | 16 | 2020 |
FuLeeca: A Lee-based Signature Scheme S Ritterhoff, G Maringer, S Bitzer, V Weger, P Karl, T Schamberger, ... Cryptology ePrint Archive, 2023 | 15 | 2023 |
Efficient hardware/software co-design for NTRU T Fritzmann, T Schamberger, C Frisch, K Braun, G Maringer, J Sepúlveda VLSI-SoC: Design and Engineering of Electronics Systems Based on New …, 2019 | 12 | 2019 |
A power side-channel attack on the reed-muller reed-solomon version of the HQC cryptosystem T Schamberger, L Holzbaur, J Renner, A Wachter-Zeh, G Sigl International Conference on Post-Quantum Cryptography, 327-352, 2022 | 11 | 2022 |
A second look at the ascad databases M Egger, T Schamberger, L Tebelmann, F Lippert, G Sigl International Workshop on Constructive Side-Channel Analysis and Secure …, 2022 | 9 | 2022 |
Finding the needle in the haystack: Metrics for best trace selection in unsupervised side-channel attacks on blinded RSA A Kulow, T Schamberger, L Tebelmann, G Sigl IEEE Transactions on Information Forensics and Security 16, 3254-3268, 2021 | 9 | 2021 |
Practical evaluation of masking for NTRUEncrypt on ARM Cortex-M4 T Schamberger, O Mischke, J Sepulveda Constructive Side-Channel Analysis and Secure Design: 10th International …, 2019 | 9 | 2019 |
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs T Schamberger, M Egger, L Tebelmann Artificial Intelligence in Hardware Security Workshop, 2023 | 1 | 2023 |
On Software Implementation of Gabidulin Decoders J Kunz, J Renner, G Maringer, T Schamberger, A Wachter-Zeh 2020 Algebraic and Combinatorial Coding Theory (ACCT), 95-101, 2020 | 1 | 2020 |
Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs: An Evaluation of the ASCAD Databases T Schamberger, M Egger, L Tebelmann International Conference on Applied Cryptography and Network Security, 139-158, 2023 | | 2023 |
Submission to the NIST Post-Quantum Cryptography Standardization Process Algorithm Specifications and Supporting Documentation S Ritterhoff, S Bitzer, P Karl, G Maringer, T Schamberger, J Schupp, G Sigl, ... | | 2023 |
Information-Set Decoding with Hints T Schamberger, A Wachter-Zeh Code-Based Cryptography: 9th International Workshop, CBCrypto 2021 Munich …, 2022 | | 2022 |
Post-quantum security: Power Analysis of NTRUEncrypt T Schamberger crypto day matters 28, 2018 | | 2018 |