Follow
Elisabeth Oswald
Elisabeth Oswald
Professor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of Birmingham
Verified email at aau.at
Title
Cited by
Cited by
Year
Power analysis attacks: Revealing the secrets of smart cards
S Mangard, E Oswald, T Popp
Springer-Verlag New York Inc, 2007
29762007
Successfully attacking masked AES hardware implementations
S Mangard, N Pramstaller, E Oswald
International workshop on cryptographic hardware and embedded systems, 157-171, 2005
4942005
An ASIC implementation of the AES SBoxes
J Wolkerstorfer, E Oswald, M Lamberger
Topics in Cryptology—CT-RSA 2002: The Cryptographers’ Track at the RSA …, 2002
4812002
A side-channel analysis resistant description of the AES S-box
E Oswald, S Mangard, N Pramstaller, V Rijmen
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005
4422005
An AES smart card implementation resistant to power analysis attacks
C Herbst, E Oswald, S Mangard
International conference on applied cryptography and network security, 239-252, 2006
3872006
Power-analysis attack on an ASIC AES implementation
SB Ors, F Gurkaynak, E Oswald, B Preneel
International Conference on Information Technology: Coding and Computing …, 2004
3422004
Practical template attacks
C Rechberger, E Oswald
International Workshop on Information Security Applications, 440-456, 2004
2902004
One for all–all for one: unifying standard differential power analysis attacks
S Mangard, E Oswald, FX Standaert
IET Information Security 5 (2), 100-110, 2011
2672011
Practical second-order DPA attacks for masked smart card implementations of block ciphers
E Oswald, S Mangard, C Herbst, S Tillich
Cryptographers’ Track at the RSA Conference, 192-207, 2006
2522006
Power-analysis attacks on an FPGA–first experimental results
SB Örs, E Oswald, B Preneel
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2382003
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
2172010
Template attacks on masking—resistance is futile
E Oswald, S Mangard
Cryptographers’ Track at the RSA Conference, 243-256, 2007
1882007
Randomized addition-subtraction chains as a countermeasure against power attacks
E Oswald, M Aigner
Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001
1862001
Update on SHA-1
V Rijmen, E Oswald
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
1752005
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010
1422010
Power analysis attacks and countermeasures
T Popp, S Mangard, E Oswald
IEEE Design & test of Computers 24 (6), 535-543, 2007
1352007
An efficient masking scheme for AES software implementations
E Oswald, K Schramm
International Workshop on Information Security Applications, 292-305, 2005
1292005
Template attacks on ECDSA
M Medwed, E Oswald
International Workshop on Information Security Applications, 14-27, 2008
1162008
Compiler assisted masking
A Moss, E Oswald, D Page, M Tunstall
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
1102012
Towards Practical Tools for Side Channel Aware Software Engineering:'Grey Box'Modelling for Instruction Leakages
D McCann, E Oswald, C Whitnall
26th USENIX security symposium (USENIX Security 17), 199-216, 2017
108*2017
The system can't perform the operation now. Try again later.
Articles 1–20