Markus Kuhn
#47,443
Most Influential Person Now
German computer scientist
Markus Kuhn 's AcademicInfluence.com Rankings
Markus Kuhn computer-science Degrees
Computer Science
#3011
World Rank
#3155
Historical Rank
Database
#8356
World Rank
#8743
Historical Rank

Download Badge
Computer Science
Why Is Markus Kuhn Influential?
(Suggest an Edit or Addition)According to Wikipedia, Markus Guenther Kuhn is a German computer scientist, currently working at the Computer Laboratory, University of Cambridge and a fellow of Wolfson College, Cambridge. Education Kuhn was educated at University of Erlangen , he received his Master of Science degree at Purdue University and PhD at the University of Cambridge.
Markus Kuhn 's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Information hiding-a survey (1999) (2811)
- Tamper resistance: a cautionary note (1996) (1159)
- Attacks on Copyright Marking Systems (1998) (1020)
- Low Cost Attacks on Tamper Resistant Devices (1997) (787)
- Design Principles for Tamper-Resistant Smartcard Processors (1999) (693)
- Analysis of a denial of service attack on TCP (1997) (554)
- An RFID Distance Bounding Protocol (2005) (551)
- Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations (1998) (312)
- Compromising emanations: eavesdropping risks of computer displays (2003) (272)
- Information hiding-A survey : Identification and protection of multimedia information (1999) (185)
- Efficient Template Attacks (2013) (176)
- An Asymmetric Security Mechanism for Navigation Signals (2004) (174)
- So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks (2006) (171)
- Optical time-domain eavesdropping risks of CRT displays (2002) (166)
- Electromagnetic Eavesdropping Risks of Flat-Panel Displays (2004) (162)
- StegFS: A Steganographic File System for Linux (1999) (159)
- Attacks on time-of-flight distance bounding channels (2008) (104)
- Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP (1998) (81)
- Security Limits for Compromising Emanations (2005) (79)
- Efficient, Portable Template Attacks (2018) (55)
- A Protocol for Secure Remote Updates of FPGA Configurations (2009) (55)
- Compromising Emanations of LCD TV Sets (2013) (53)
- Template Attacks on Different Devices (2014) (53)
- Compromising emanations of LCD TV sets (2011) (50)
- Eavesdropping attacks on computer displays (2006) (31)
- Real World Patterns of Failure in Anonymity Systems (2001) (31)
- Soft Tempest { An Opportunity for NATO (1999) (24)
- The TrustNo 1 Cryptoprocessor Concept (1997) (19)
- Analysis of the Nagravision Video Scrambling Method (1998) (17)
- Ecient Template Attacks (2014) (17)
- Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits (2014) (17)
- Low-threat security patches and tools (1997) (13)
- Known Attacks against Smartcards (12)
- Known Attacks against Smartcards (12)
- Probabilistic Counting of Large Digital Signature Collections (2000) (11)
- \TeX{} (2019) (10)
- Attacks on Pay-TV Access Control Systems (1997) (9)
- Exact JPEG recompression (2010) (8)
- SMAPs: Short Message Authentication Protocols (2016) (4)
- Signal Authentication in Trusted Satellite Navigation Receivers (2010) (4)
- Towards copy-evident JPEG images (2009) (4)
- Physical security of smartcards (1999) (4)
- Leap-second considerations in distributed computer systems (2003) (3)
- A Bit Naming Convention for Cryptographic Algorithms (1999) (2)
- Tamper Resistance (1999) (2)
- Cloud computing security ( 8 / 8 ) Nigori : Storing secrets in the cloud (2)
- Coordinated Universal Time with Smoothed Leap Seconds (UTC-SLS) (2006) (2)
- A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device (2020) (2)
- Image Steganography based on a Parameterized Canny Edge Detection Algorithm (2016) (1)
- A Comparative Analysis of Image Steganography (2016) (0)
- Attacks Beyond 8 Bits (2015) (0)
- A Model for Symmetric Replication Among Untrusted Peers (2003) (0)
- A new Relational Watermarking Scheme Resilient to Additive Attacks (2020) (0)
- Smartcard tamper resistance (2005) (0)
- iPhone 5 c NAND mirroring attack (2018) (0)
- Information security technical report - prospectus: Physical security of smartcards (1999) (0)
- Economics and psychology of security ( 2 / 11 ) Security economics (2013) (0)
- Real-time signal-processing platform for compromising video emanations (2005) (0)
- Thwarting timing attacks using ATM networks. Discussion (2002) (0)
- A Generation-based Text Steganography Method using SQL Queries (2018) (0)
- Improved Video Eavesdropping using Pixel Clock Tracking and Complex-Domain Averaging (poster) (2017) (0)
- Cryptography – exercises (2019) (0)
- Technical perspective: Backdoor engineering (2018) (0)
- Single-Trace Fragment Template Attack on a 32-Bit Implementation of Keccak (2021) (0)
- Constructive Role of SFC & RGB Fusion versus Destructive Intrusion (2016) (0)
This paper list is powered by the following services:
Other Resources About Markus Kuhn
What Schools Are Affiliated With Markus Kuhn ?
Markus Kuhn is affiliated with the following schools: