Marcel Medwed
Marcel Medwed
Geverifieerd e-mailadres voor nxp.com
Titel
Geciteerd door
Geciteerd door
Jaar
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
International Conference on the Theory and Application of Cryptology andá…, 2010
1672010
Shuffling against side-channel attacks: A comprehensive study with cautionary note
N Veyrat-Charvillon, M Medwed, S Kerckhof, FX Standaert
International Conference on the Theory and Application of Cryptology andá…, 2012
1402012
Fresh re-keying: Security against side-channel and fault attacks for low-cost devices
M Medwed, FX Standaert, J Gro▀schńdl, F Regazzoni
International Conference on Cryptology in Africa, 279-296, 2010
1372010
Template attacks on ECDSA
M Medwed, E Oswald
International Workshop on Information Security Applications, 14-27, 2008
872008
Energy evaluation of software implementations of block ciphers under memory constraints
J Grossschadl, S Tillich, C Rechberger, M Hofmann, M Medwed
2007 Design, Automation & Test in Europe Conference & Exhibition, 1-6, 2007
542007
A fault attack on ECDSA
JM Schmidt, M Medwed
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 93-99, 2009
512009
Towards super-exponential side-channel security with efficient leakage-resilient PRFs
M Medwed, FX Standaert, A Joux
International Workshop on Cryptographic Hardware and Embedded Systems, 193-212, 2012
502012
Fresh re-keying II: securing multiple parties against side-channel and fault attacks
M Medwed, C Petit, F Regazzoni, M Renauld, FX Standaert
International Conference on Smart Card Research and Advanced Applicationsá…, 2011
432011
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
S Bela´d, F De Santis, J Heyszl, S Mangard, M Medwed, JM Schmidt, ...
Journal of Cryptographic Engineering 4 (3), 157-171, 2014
372014
Attacking ECDSA-enabled RFID devices
M Hutter, M Medwed, D Hein, J Wolkerstorfer
International Conference on Applied Cryptography and Network Security, 519-534, 2009
292009
Using templates to attack masked montgomery ladder implementations of modular exponentiation
C Herbst, M Medwed
International Workshop on Information Security Applications, 1-13, 2008
212008
Iot security challenges and ways forward
M Medwed
Proceedings of the 6th International Workshop on Trustworthy Embeddedá…, 2016
202016
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Gro▀schńdl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
International Conference on Trusted Systems, 253-270, 2010
192010
A continuous fault countermeasure for AES providing a constant error detection rate
M Medwed, JM Schmidt
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 66-71, 2010
192010
A generic fault countermeasure providing data and program flow integrity
M Medwed, JM Schmidt
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 68-73, 2008
192008
Extractors against side-channel attacks: weak or strong?
M Medwed, FX Standaert
Journal of Cryptographic Engineering 1 (3), 231, 2011
182011
Unknown-input attacks in the parallel setting: Improving the security of the CHES 2012 leakage-resilient PRF
M Medwed, FX Standaert, V Nikov, M Feldhofer
International Conference on the Theory and Application of Cryptology andá…, 2016
162016
Side-channel leakage across borders
JM Schmidt, T Plos, M Kirschbaum, M Hutter, M Medwed, C Herbst
International Conference on Smart Card Research and Advanced Applications, 36-48, 2010
142010
Fault attacks on the montgomery powering ladder
JM Schmidt, M Medwed
International Conference on Information Security and Cryptology, 396-406, 2010
132010
Coding schemes for arithmetic and logic operations-how robust are they?
M Medwed, JM Schmidt
International Workshop on Information Security Applications, 51-65, 2009
122009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20