Elisabeth Oswald
#95,844
Most Influential Person Now
Austrian cryptographer
Elisabeth Oswald's AcademicInfluence.com Rankings
Elisabeth Oswaldcomputer-science Degrees
Computer Science
#5562
World Rank
#5873
Historical Rank
Database
#8413
World Rank
#8803
Historical Rank
Download Badge
Computer Science
Elisabeth Oswald's Degrees
- Masters Computer Science University of Vienna
- Bachelors Computer Science University of Vienna
Similar Degrees You Can Earn
Why Is Elisabeth Oswald Influential?
(Suggest an Edit or Addition)According to Wikipedia, Maria Elisabeth Oswald is an Austrian cryptographer known for her work on side-channel attacks including power analysis and on implementations of cryptosystems that are resistant to these attacks. She is a professor at the University of Klagenfurt.
Elisabeth Oswald's Published Works
Published Works
- Power analysis attacks - revealing the secrets of smart cards (2007) (1957)
- Successfully Attacking Masked AES Hardware Implementations (2005) (384)
- An ASIC Implementation of the AES SBoxes (2002) (345)
- A Side-Channel Analysis Resistant Description of the AES S-Box (2005) (340)
- The World is Not Enough: Another Look on Second-Order DPA (2010) (335)
- A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework (2011) (270)
- An AES Smart Card Implementation Resistant to Power Analysis Attacks (2006) (255)
- Power-analysis attack on an ASIC AES implementation (2004) (230)
- Practical Template Attacks (2004) (196)
- Power-Analysis Attacks on an FPGA - First Experimental Results (2003) (192)
- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers (2006) (183)
- One for all - all for one: unifying standard differential power analysis attacks (2011) (174)
- Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings (2008) (159)
- Update on SHA-1 (2005) (138)
- Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks (2001) (138)
- Template Attacks on Masking - Resistance Is Futile (2007) (134)
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests (2013) (132)
- Power Analysis Attacks and Countermeasures (2007) (128)
- Leakage Resilient Cryptography in Practice (2010) (117)
- Template Attacks on ECDSA (2009) (101)
- The Myth of Generic DPA...and the Magic of Learning (2014) (91)
- Compiler Assisted Masking (2012) (87)
- An Efficient Masking Scheme for AES Software Implementations (2005) (84)
- One for All - All for One: Unifying Standard DPA Attacks (2009) (75)
- A fair evaluation framework for comparing side-channel distinguishers (2011) (70)
- An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis (2011) (69)
- Cryptographic Hardware and Embedded Systems Ches 2008 (2009) (67)
- Counting Keys in Parallel After a Side Channel Attack (2015) (66)
- Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages (2017) (62)
- Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems (2002) (58)
- Secure and Efficient Masking of AES - A Mission Impossible? (2004) (57)
- Profiling DPA: Efficacy and Efficiency Trade-Offs (2013) (55)
- Masking Tables - An Underestimated Security Risk (2013) (55)
- Advances in Cryptology – EUROCRYPT 2014 (2014) (50)
- Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications (2009) (50)
- Authenticated Encryption in the Face of Protocol and Side Channel Leakage (2017) (48)
- Susceptibility of eSTREAM Candidates towards Side Channel Analysis (2008) (42)
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations (2016) (38)
- Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer (2014) (36)
- A Critical Analysis of ISO 17825 ('Testing methods for the mitigation of non-invasive attack classes against cryptographic modules') (2019) (34)
- Searching for Differential Paths in MD4 (2006) (31)
- Robust Profiling for DPA-Style Attacks (2015) (31)
- Power Analysis Tutorial (2000) (30)
- Assessing the Feasibility of Single Trace Power Analysis of Frodo (2018) (29)
- Share-slicing: Friend or Foe? (2019) (28)
- A Leakage Resilient MAC (2015) (27)
- Stream Ciphers and Side-Channel Analysis ? (2004) (25)
- Simulatable Leakage: Analysis, Pitfalls, and New Constructions (2014) (23)
- Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I (2015) (22)
- Fly, you fool! Faster Frodo for the ARM Cortex-M4 (2018) (20)
- Constructive Side-Channel Analysis and Secure Design (2016) (20)
- A Masked AES ASIC Implementation ∗ (2004) (20)
- A Systematic Appraisal of Side Channel Evaluation Strategies (2020) (18)
- Randomised representations (2008) (18)
- How low can you go? Using side-channel data to enhance brute-force key recovery (2016) (18)
- Introduction to Elliptic Curve Cryptography (2002) (17)
- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES (2018) (17)
- Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited (2018) (17)
- Quantum Key Search with Side Channel Advice (2017) (15)
- Reliable information extraction for single trace attacks (2015) (15)
- Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography (2019) (14)
- Advances in cryptology - EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques Copenhagen, Denmark, May 11-15, 2014 : proceedings (2014) (14)
- Pinpointing side-channel information leaks in web applications (2012) (14)
- A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation (2019) (14)
- Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor (2021) (11)
- Advances in Cryptology -- EUROCRYPT 2015 (2015) (11)
- Electromagnetic Analysis and Fault Attacks : State of the Art (2005) (10)
- Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices (2015) (9)
- A Survey on Passive Side-Channel Attacks and their Countermeasures for the NESSIE Public-Key Cryptosystems (2003) (9)
- Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES (2014) (7)
- Quantifying Side-Channel Information Leakage from Web Applications (2012) (7)
- A Novel Completeness Test and its Application to Side Channel Attacks and Simulators (2021) (6)
- Optimised Lattice-Based Key Encapsulation in Hardware (2019) (6)
- Automatic Insertion of DPA Countermeasures (2011) (6)
- A Theoretical Evaluation of some NESSIE Candidates regarding their Susceptibility towards Power Analysis Attacks (2002) (5)
- Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware (2021) (5)
- NESSIE security report y (2002) (5)
- Examining the practical side channel resilience of ARX-boxes (2019) (5)
- Representations and Rijndael Descriptions (2004) (5)
- Differential Power Analysis of an AES Implementation (2004) (5)
- Investigations of Power Analysis Attacks and Countermeasures for ARIA (2006) (5)
- Challenges for Cryptology Research in Europe for 2007-2013 and beyond (2006) (4)
- VAM . 10 State of the Art in Hardware Implementations of Cryptographic Algorithms (2006) (4)
- Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations (2019) (4)
- Exploring Potential 6LoWPAN Traffic Side Channels (2018) (3)
- AES-The State of the Art of Rijndael ’ s Security (2002) (3)
- Counteracting Power Analysis Attacks by Masking (2010) (3)
- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks (2015) (3)
- Advances in Cryptology - EUROCRYPT 2015 (2015) (2)
- How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack (2015) (2)
- Advances in Elliptic Curve Cryptography: Side-Channel Analysis (2005) (2)
- Cryptographic randomness on a CC2538: A case study (2016) (2)
- A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices (2013) (2)
- Effects of privacy risk perception and cultural bias on intention of connected autonomous vehicle use (2018) (2)
- Choosing Distinguishers for Di erential Power Analysis Attacks (2011) (2)
- A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators (2022) (1)
- Side-Channel Analysis and Its Relevance to Fault Attacks (2012) (1)
- Open Problems in Implementation and Application Open Problems in Implementation and Application (1)
- A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher (2017) (1)
- Comparing Key Rank Estimation Methods (2022) (1)
- Practical evaluation of masking software countermeasures on an IoT processor (2017) (1)
- Making and Breaking Leakage Simulators (2014) (1)
- Categorising and Comparing Cluster-Based DPA Distinguishers (2017) (1)
- An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage (2020) (1)
- Exploring multi-task learning in the context of two masked AES implementations (2023) (0)
- Consistent, Efficient and Leakage-Model Free Mutual Information Estimation (2022) (0)
- Pinpointing side-channel information leaks in web applications (2012) (0)
- Side Channels: Attacks, Defences, and Evaluation Schemes Part 2 — Evaluation Techniques (2021) (0)
- Work in progress - effects of privacy risk perception and cultural bias on the intention of CAV use (2018) (0)
- Non-profiled Mask Recovery: the impact of Independent Component Analysis (2018) (0)
- Micropayment in the context of distributed digital libraries (2005) (0)
- Forschungsbericht Side Channel Analysen (2007) (0)
- Side-Channel Attacks (2009) (0)
- Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices. In Proceedings of 2015 International Workshop on Secure Internet of Things (2015) (0)
- A Novel Framework for Explainable Leakage Assessment (2022) (0)
- Proling Dpa: Ecacy and Eciency Trade-os (2013) (0)
- Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets (2019) (0)
- Security of IEEE 802 . 11 considering Power and EM Side-Channel Information ∗ (2004) (0)
- Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical (2022) (0)
- Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems (2008) (0)
- Neyman’s Smoothness Test: A Trade-Off Between Moment-Based and Distribution-Based Leakage Detections (2021) (0)
- ECRYPT D.VAM.15 Theoretical Models for Side-Channel Attacks (2008) (0)
This paper list is powered by the following services:
Other Resources About Elisabeth Oswald
What Schools Are Affiliated With Elisabeth Oswald?
Elisabeth Oswald is affiliated with the following schools: