We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Randomizing the Montgomery Multiplication to Repel Template Attacks on Multiplicative Masking
Medwed M., Herbst C.
Workshop Proceedings COSADE 201, 1st International Workshop on Constructive Side-Channel Analysis and Secure Design, 56-71
Side-Channel Leakage Across Borders
Schmidt J., Plos T., Kirschbaum M., Hutter M., Medwed M., Herbst C.
Smart Card Research and Advanced Applications 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, International Conference on Smart Card Research and Advanced Applications, 36-48, (LNCS)
Side-Channel Analysis Attacks and Countermeasures - An Embedded-Software Developers View
Herbst C.
, Doctoral Thesis
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
Herbst C., Medwed M.
9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, WISA - Workshop on Information Security Applications, 1-13, (Lecture Notes in Computer Science)
A Practical Fault Attack on Square and Multiply
Schmidt J., Herbst C.
5th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2008, Fault Diagnosis and Tolerance in Cryptography, 53-58
Boosting AES Performance on a Tiny Processor Core
Tillich S., Herbst C.
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, 170-186, (Lecture Notes in Computer Science; vol. 4964)
Attacking State-of-the-Art Software Countermeasures—A Case Study for AES
Tillich S., Herbst C.
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop Cryptographic Hardware and Embedded Systems, 228-243, (Lecture Notes in Computer Science; vol. 5154)
Enhancing Side-Channel Analysis with Low-Cost Shielding Techniques
Plos T., Hutter M., Herbst C.
Tagungsband, Austrochip 2008, Linz, Austria, October 8, 2008, Proceedings, Austrochip 2008, 90-95
Protecting AES Software Implementations on 32-bit Processors against Power Analysis
Tillich S., Herbst C., Mangard S.
Applied Cryptography and Network Security, 5th International Conference on Applied Cryptography and Network Security, 141-157, (Lecture Notes in Computer Science; vol. 4521)
Eine 8-bit Highspeed Softwareimplementierung von Whirlpool
Könighofer R., Berger S., Herbst C.
DACH Security 2007, Arbeitskonferenz DACH Security, 459-470, (IT security & IT management)
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
Oswald M., Mangard S., Herbst C., Tillich S.
Topics in Cryptology - CT-RSA 2006, Cryptographers´ Track at the RSA Conference, 192-207, (Lecture Notes in Computer Science)
An AES Smart Card Implementation resitant to Power Analysis Attacks
Herbst C., Oswald M., Mangard S.
Applied cryptography and Network security, 4th International Conference on Applied Cryptography and Network Security, 239-252, (Lecture Notes in Computer Science)