Follow
Juliane Krämer
Title
Cited by
Cited by
Year
Simple photonic emission analysis of AES: photonic side channel analysis for the rest of us
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
1342012
An efficient lattice-based signature scheme with provably secure instantiation
S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
1142016
The Lattice-Based Digital Signature Scheme qTESLA.
E Alkim, PSLM Barreto, N Bindel, J Krämer, P Longa, JE Ricardini
IACR Cryptology ePrint Archive 2019, 85, 2019
1092019
Lattice-based signature schemes and their sensitivity to fault attacks
N Bindel, J Buchmann, J Krämer
2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 63-77, 2016
912016
Revisiting TESLA in the quantum random oracle model
E Alkim, N Bindel, J Buchmann, Ö Dagdelen, E Eaton, G Gutoski, ...
Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017
862017
A practical second-order fault attack against a real-world pairing implementation
J Blömer, RG Da Silva, P Günther, J Krämer, JP Seifert
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 123-136, 2014
532014
Differential power analysis of XMSS and SPHINCS
MJ Kannwischer, A Genêt, D Butin, J Krämer, J Buchmann
International Workshop on Constructive Side-Channel Analysis and Secure …, 2018
502018
Differential photonic emission analysis
J Krämer, D Nedospasov, A Schlösser, JP Seifert
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
492013
Simple photonic emission analysis of AES
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Journal of cryptographic engineering 3, 3-15, 2013
472013
qTESLA
N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ...
NIST Post-Quantum Cryptography Standardization: Round 2, 2019
422019
“My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones
T Dörflinger, A Voth, J Krämer, R Fromm
2010 international conference on security and cryptography (SECRYPT), 1-10, 2010
38*2010
Lattice basis reduction attack against physically unclonable functions
F Ganji, J Krämer, JP Seifert, S Tajik
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
322015
Creating cryptographic challenges using multi-party computation: The LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
272016
Deterministic wallets in a quantum world
N Alkeilani Alkadri, P Das, A Erwig, S Faust, J Krämer, S Riahi, P Struck
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
232020
Classic McEliece implementation with low memory footprint
J Roth, E Karatsiolis, J Krämer
Smart Card Research and Advanced Applications: 19th International Conference …, 2021
212021
Fault attacks on UOV and rainbow
J Krämer, M Loiero
Constructive Side-Channel Analysis and Secure Design: 10th International …, 2019
212019
Verifying post-quantum signatures in 8 kB of RAM
R Gonzalez, A Hülsing, MJ Kannwischer, J Krämer, T Lange, M Stöttinger, ...
Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021
192021
Secure two-party computation in a quantum world
N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ...
Applied Cryptography and Network Security: 18th International Conference …, 2020
192020
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
N Bindel, J Buchmann, J Krämer, H Mantel, J Schickel, A Weber
Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018
192018
Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT
Á Kiss, J Krämer, P Rauzy, JP Seifert
Constructive Side-Channel Analysis and Secure Design: 7th International …, 2016
192016
The system can't perform the operation now. Try again later.
Articles 1–20