Follow
Jörn-Marc Schmidt
Jörn-Marc Schmidt
Institute for Applied Information Processing and Communications, Graz University of Technology
Verified email at iaik.tugraz.at
Title
Cited by
Cited by
Year
The temperature side channel and heating fault attacks
M Hutter, JM Schmidt
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
2642014
Hardware designer's guide to fault attacks
D Karaklajić, JM Schmidt, I Verbauwhede
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 21 (12 …, 2013
2242013
Optical and em fault-attacks on crt-based rsa: Concrete results
JM Schmidt, M Hutter
na, 2007
1772007
A practical fault attack on square and multiply
JM Schmidt, C Herbst
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 53-58, 2008
1492008
Improved glucose tolerance in rats treated with the dipeptidyl peptidase IV (CD26) inhibitor Ile-thiazolidide
RP Pauly, HU Demuth, F Rosche, J Schmidt, HA White, F Lynn, ...
Metabolism 48 (3), 385-389, 1999
1461999
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output
B Gierlichs, JM Schmidt, M Tunstall
Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012
1062012
The fault attack jungle-a classification model to guide you
I Verbauwhede, D Karaklajic, JM Schmidt
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 3-8, 2011
1052011
High-speed hardware implementations of blake, blue midnight wish, cubehash, echo, fugue, grøstl, hamsi, jh, keccak, luffa, shabal, shavite-3, simd, and skein
S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely
Cryptology EPrint Archive, 2009
912009
Optical fault attacks on AES: A threat in violet
JM Schmidt, M Hutter, T Plos
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 13-22, 2009
862009
A fault attack on ECDSA
JM Schmidt, M Medwed
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 93-99, 2009
752009
RFID and its vulnerability to faults
M Hutter, JM Schmidt, T Plos
Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008
692008
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
S Belaïd, F De Santis, J Heyszl, S Mangard, M Medwed, JM Schmidt, ...
Journal of Cryptographic Engineering 4, 157-171, 2014
442014
Contact-based fault injections and power analysis on RFID tags
M Hutter, JM Schmidt, T Plos
2009 European Conference on Circuit Theory and Design, 409-412, 2009
402009
Combined implementation attack resistant exponentiation
JM Schmidt, M Tunstall, R Avanzi, I Kizhvatov, T Kasper, D Oswald
Progress in Cryptology–LATINCRYPT 2010: First International Conference on …, 2010
342010
Uniform evaluation of hardware implementations of the round-two SHA-3 candidates
S Tillich, M Feldhofer, M Kirschbaum, T Plos, JM Schmidt, A Szekely
The Second SHA-3 Candidate Conference, 2010
322010
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
Trusted Systems: Second International Conference, INTRUST 2010, Beijing …, 2011
252011
Side-channel leakage across borders
JM Schmidt, T Plos, M Kirschbaum, M Hutter, M Medwed, C Herbst
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
232010
A probing attack on AES
JM Schmidt, CH Kim
Information Security Applications: 9th International Workshop, WISA 2008 …, 2009
232009
A generic fault countermeasure providing data and program flow integrity
M Medwed, JM Schmidt
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 68-73, 2008
232008
Connecting passive RFID tags to the Internet of Things
S Dominikus, JM Schmidt
Interconnecting Smart Objects with the Internet Workshop, Prague, 2011
222011
The system can't perform the operation now. Try again later.
Articles 1–20