What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Thomas Korak
Google Scholar
10
publications in security and cryptology related venues
Year
Venue
Title
2018
journals/tches
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography.
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Stefan Mangard
Florian Mendel
Robert Primas
2017
conf/ctrsa
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order.
Hannes Groß
Stefan Mangard
Thomas Korak
2016
conf/ccs
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order.
Hannes Groß
Stefan Mangard
Thomas Korak
2016
conf/asiacrypt
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Victor Lomné
Florian Mendel
2016
conf/wisec
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android.
Raphael Spreitzer
Simone Griesmayr
Thomas Korak
Stefan Mangard
2015
journals/tifs
Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness.
Honorio Martín
Thomas Korak
Enrique San Millán
Michael Hutter
2014
conf/host
EM-based detection of hardware trojans on FPGAs.
Oliver Soll
Thomas Korak
Michael Muehlberghuber
Michael Hutter
2014
conf/fdtc
On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms.
Thomas Korak
Michael Hoefler
2014
conf/fdtc
Clock Glitch Attacks in the Presence of Heating.
Thomas Korak
Michael Hutter
Baris Ege
Lejla Batina
2013
conf/ctrsa
Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag.
Thomas Korak
Thomas Plos
Coauthors
Baris Ege
(1)
Christoph Dobraunig
(2)
Enrique San Millán
(1)
Florian Mendel
(2)
Hannes Groß
(2)
Honorio Martín
(1)
Lejla Batina
(1)
Maria Eichlseder
(2)
Michael Hoefler
(1)
Michael Hutter
(3)
Michael Muehlberghuber
(1)
Oliver Soll
(1)
Raphael Spreitzer
(1)
Robert Primas
(1)
Simone Griesmayr
(1)
Stefan Mangard
(4)
Thomas Korak
(10)
Thomas Plos
(1)
Victor Lomné
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to