DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks P Pessl, D Gruss, C Maurice, M Schwarz, S Mangard USENIX Security Symposium, 565-581, 2016 | 528 | 2016 |
Single-trace side-channel attacks on masked lattice-based encryption R Primas, P Pessl, S Mangard Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 180 | 2017 |
To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures P Pessl, LG Bruinderink, Y Yarom Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 108 | 2017 |
More practical single-trace attacks on the number theoretic transform P Pessl, R Primas Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019 | 90 | 2019 |
Differential fault attacks on deterministic lattice signatures LG Bruinderink, P Pessl IACR Transactions on Cryptographic Hardware and Embedded Systems 2018 (3), 21-43, 2018 | 90* | 2018 |
Analyzing the shuffling side-channel countermeasure for lattice-based signatures P Pessl Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016 | 70 | 2016 |
Single-trace attacks on keccak MJ Kannwischer, P Pessl, R Primas IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3 …, 2020 | 62 | 2020 |
Pushing the limits of SHA-3 hardware implementations to fit on RFID P Pessl, M Hutter Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013 | 53 | 2013 |
Fault Attacks on CCA-secure Lattice KEMs P Peßl, L Prokop IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021 | 36* | 2021 |
Curved tags–a low-resource ECDSA implementation tailored for RFID P Pessl, M Hutter International Workshop on Radio Frequency Identification: Security and …, 2014 | 30 | 2014 |
Enhancing side-channel analysis of binary-field multiplication with bit reliability P Pessl, S Mangard Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016 | 29 | 2016 |
Higher-order masked ciphertext comparison for lattice-based cryptography JP D'Anvers, D Heinz, P Pessl, M Van Beirendonck, I Verbauwhede IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (2 …, 2021 | 27 | 2021 |
Fault-enabled chosen-ciphertext attacks on Kyber J Hermelink, P Pessl, T Pöppelmann Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 24 | 2021 |
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors J Hermelink, E Mårtensson, S Samardjiska, P Pessl, GD Rodosek IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (4 …, 2023 | 7 | 2023 |