default search action
Jörn-Marc Schmidt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [i6]Jörn-Marc Schmidt:
Requirements for Password-Authenticated Key Agreement (PAKE) Schemes. RFC 8125: 1-10 (2017) - 2014
- [j2]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J. Cryptogr. Eng. 4(3): 157-171 (2014) - [c23]Raphael Spreitzer, Jörn-Marc Schmidt:
Group-signature schemes on constrained devices: the gap between theory and practice. CS2@HiPEAC 2014: 31-36 - [i5]Michael Hutter, Jörn-Marc Schmidt:
The Temperature Side Channel and Heating Fault Attacks. IACR Cryptol. ePrint Arch. 2014: 190 (2014) - [i4]Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze:
Requirements for Standard Elliptic Curves. IACR Cryptol. ePrint Arch. 2014: 832 (2014) - 2013
- [j1]Dusko Karaklajic, Jörn-Marc Schmidt, Ingrid Verbauwhede:
Hardware Designer's Guide to Fault Attacks. IEEE Trans. Very Large Scale Integr. Syst. 21(12): 2295-2306 (2013) - [c22]Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt:
On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems. ARES 2013: 230-235 - [c21]Michael Hutter, Jörn-Marc Schmidt:
The Temperature Side Channel and Heating Fault Attacks. CARDIS 2013: 219-235 - [e2]Wieland Fischer, Jörn-Marc Schmidt:
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5059-6 [contents] - [e1]Michael Hutter, Jörn-Marc Schmidt:
Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8262, Springer 2013, ISBN 978-3-642-41331-5 [contents] - [i3]Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis. IACR Cryptol. ePrint Arch. 2013: 305 (2013) - 2012
- [c20]Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Stefan Mangard:
Exploiting the Difference of Side-Channel Leakages. COSADE 2012: 1-16 - [c19]Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall:
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. LATINCRYPT 2012: 305-321 - [p1]Jörn-Marc Schmidt, Marcel Medwed:
Countermeasures for Symmetric Key Ciphers. Fault Analysis in Cryptography 2012: 73-87 - [i2]Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall:
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. IACR Cryptol. ePrint Arch. 2012: 678 (2012) - 2011
- [c18]Dusko Karaklajic, Junfeng Fan, Jörn-Marc Schmidt, Ingrid Verbauwhede:
Low-cost fault detection method for ECC using Montgomery powering ladder. DATE 2011: 1016-1021 - [c17]Ingrid Verbauwhede, Dusko Karaklajic, Jörn-Marc Schmidt:
The Fault Attack Jungle - A Classification Model to Guide You. FDTC 2011: 3-8 - [c16]Jörn-Marc Schmidt:
Secure Implementations for the Internet of Things. InfoSecHiComNet 2011: 2 - 2010
- [c15]Jörn-Marc Schmidt, Thomas Plos, Mario Kirschbaum, Michael Hutter, Marcel Medwed, Christoph Herbst:
Side-Channel Leakage across Borders. CARDIS 2010: 36-48 - [c14]Marcel Medwed, Jörn-Marc Schmidt:
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate. FDTC 2010: 66-71 - [c13]Jörn-Marc Schmidt, Marcel Medwed:
Fault Attacks on the Montgomery Powering Ladder. ICISC 2010: 396-406 - [c12]Jean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, Marcin Wójcik:
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software. INTRUST 2010: 253-270 - [c11]Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David F. Oswald:
Combined Implementation Attack Resistant Exponentiation. LATINCRYPT 2010: 305-322
2000 – 2009
- 2009
- [c10]Jörn-Marc Schmidt, Stefan Tillich:
On the Security of Untrusted Memory. ARES 2009: 329-334 - [c9]Michael Hutter, Jörn-Marc Schmidt, Thomas Plos:
Contact-based fault injections and power analysis on RFID tags. ECCTD 2009: 409-412 - [c8]Jörn-Marc Schmidt, Michael Hutter, Thomas Plos:
Optical Fault Attacks on AES: A Threat in Violet. FDTC 2009: 13-22 - [c7]Jörn-Marc Schmidt, Marcel Medwed:
A Fault Attack on ECDSA. FDTC 2009: 93-99 - [c6]Marcel Medwed, Jörn-Marc Schmidt:
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? WISA 2009: 51-65 - [i1]Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely:
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein. IACR Cryptol. ePrint Arch. 2009: 510 (2009) - 2008
- [c5]Jörn-Marc Schmidt:
A Chemical Memory Snapshot. CARDIS 2008: 283-289 - [c4]Michael Hutter, Jörn-Marc Schmidt, Thomas Plos:
RFID and Its Vulnerability to Faults. CHES 2008: 363-379 - [c3]Jörn-Marc Schmidt, Christoph Herbst:
A Practical Fault Attack on Square and Multiply. FDTC 2008: 53-58 - [c2]Marcel Medwed, Jörn-Marc Schmidt:
A Generic Fault Countermeasure Providing Data and Program Flow Integrity. FDTC 2008: 68-73 - [c1]Jörn-Marc Schmidt, Chong Hee Kim:
A Probing Attack on AES. WISA 2008: 256-265
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint