What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jakub Szefer
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Security Attacks Abusing Pulse-level Quantum Circuits.
Chuanqi Xu
Jakub Szefer
2024
journals/tches
SDitH in Hardware.
Sanjay Deshpande
James Howe
Jakub Szefer
Dongze Yue
2024
journals/tches
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers.
Ferhat Erata
Chuanqi Xu
Ruzica Piskac
Jakub Szefer
2024
conf/ccs
ASHES '24: Workshop on Attacks and Solutions in Hardware Security.
Lejla Batina
Chip-Hong Chang
Ulrich Rührmair
Jakub Szefer
2024
conf/host
Dynamic Pulse Switching for Protection of Quantum Computation on Untrusted Clouds.
Theodoros Trochatos
Sanjay Deshpande
Chuanqi Xu
Yao Lu
Yongshan Ding
Jakub Szefer
2024
conf/host
A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad.
Chuanqi Xu
Jamie Sikora
Jakub Szefer
2024
conf/host
All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures.
Jessie Chen
Jakub Szefer
2023
journals/tifs
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature.
Florian Frank
Wenjie Xiong
Nikolaos Athanasios Anagnostopoulos
André Schaller
Tolga Arul
Farinaz Koushanfar
Stefan Katzenbeisser
Ulrich Rührmair
Jakub Szefer
2023
conf/ccs
Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers.
Chuanqi Xu
Ferhat Erata
Jakub Szefer
2023
conf/ccs
Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks.
Chuanqi Xu
Jessie Chen
Allen Mi
Jakub Szefer
2023
conf/eurosp
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code.
Ferhat Erata
Ruzica Piskac
Víctor Mateu
Jakub Szefer
2023
conf/host
Design of Quantum Computer Antivirus.
Sanjay Deshpande
Chuanqi Xu
Theodoros Trochatos
Hanrui Wang
Ferhat Erata
Song Han
Yongshan Ding
Jakub Szefer
2023
conf/host
Fast Fingerprinting of Cloud-based NISQ Quantum Computers.
Kaitlin N. Smith
Joshua Viszlai
Lennart Maximilian Seifert
Jonathan M. Baker
Jakub Szefer
Frederic T. Chong
2023
conf/sacrypt
Fast and Efficient Hardware Implementation of HQC.
Sanjay Deshpande
Chuanqi Xu
Mamuri Nawan
Kashif Nawaz
Jakub Szefer
2022
journals/tches
Complete and Improved FPGA Implementation of Classic McEliece.
Po-Jen Chen
Tung Chou
Sanjay Deshpande
Norman Lahr
Ruben Niederhagen
Jakub Szefer
Wen Wang
2022
conf/ccs
Securing Reset Operations in NISQ Quantum Computers.
Allen Mi
Shuwen Deng
Jakub Szefer
2022
conf/host
Towards an Antivirus for Quantum Computers.
Sanjay Deshpande
Chuanqi Xu
Theodoros Trochatos
Yongshan Ding
Jakub Szefer
2021
conf/crypto
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3.
Patrick Longa
Wen Wang
Jakub Szefer
2021
conf/host
Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments.
Ilias Giechaskiel
Shanquan Tian
Jakub Szefer
2020
journals/tches
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA.
Wen Wang
Shanquan Tian
Bernhard Jungk
Nina Bindel
Patrick Longa
Jakub Szefer
2020
journals/tifs
Software Protection Using Dynamic PUFs.
Wenjie Xiong
André Schaller
Stefan Katzenbeisser
Jakub Szefer
2020
conf/sp
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage.
Ilias Giechaskiel
Kasper Bonne Rasmussen
Jakub Szefer
2019
conf/sacrypt
XMSS and Embedded Systems.
Wen Wang
Bernhard Jungk
Julian Wälde
Shuwen Deng
Naina Gupta
Jakub Szefer
Ruben Niederhagen
2018
conf/host
Zero-permission acoustic cross-device tracking.
Nikolay Matyunin
Jakub Szefer
Stefan Katzenbeisser
2017
conf/ches
FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes.
Wen Wang
Jakub Szefer
Ruben Niederhagen
2017
conf/host
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security.
André Schaller
Wenjie Xiong
Nikolaos Athanasios Anagnostopoulos
Muhammad Umair Saleem
Sebastian Gabmeyer
Stefan Katzenbeisser
Jakub Szefer
2016
conf/ches
Run-Time Accessible DRAM PUFs in Commodity Devices.
Wenjie Xiong
André Schaller
Nikolaos A. Anagnostopoulos
Muhammad Umair Saleem
Sebastian Gabmeyer
Stefan Katzenbeisser
Jakub Szefer
2015
conf/ccs
Leveraging Processor Performance Counters for Security and Performance.
Jakub Szefer
2015
conf/fc
Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors.
Sebastian Biedermann
Stefan Katzenbeisser
Jakub Szefer
2014
conf/ccs
Cyber defenses for physical attacks and insider threats in cloud computing.
Jakub Szefer
Pramod A. Jamkhedkar
Diego Perez-Botero
Ruby B. Lee
2014
conf/acsac
Hot-hardening: getting more out of your security settings.
Sebastian Biedermann
Stefan Katzenbeisser
Jakub Szefer
2013
conf/ccs
Characterizing hypervisor vulnerabilities in cloud computing servers.
Diego Perez-Botero
Jakub Szefer
Ruby B. Lee
2012
conf/dsn
Physical attack protection with human-secure virtualization in data centers.
Jakub Szefer
Pramod A. Jamkhedkar
Yu-Yuan Chen
Ruby B. Lee
2011
conf/ccs
Eliminating the hypervisor attack surface for a more secure cloud.
Jakub Szefer
Eric Keller
Ruby B. Lee
Jennifer Rexford
Coauthors
Allen Mi
(2)
André Schaller
(4)
Bernhard Jungk
(2)
Chip-Hong Chang
(1)
Chuanqi Xu
(9)
Diego Perez-Botero
(2)
Dongze Yue
(1)
Eric Keller
(1)
Farinaz Koushanfar
(1)
Ferhat Erata
(4)
Florian Frank
(1)
Frederic T. Chong
(1)
Hanrui Wang
(1)
Ilias Giechaskiel
(2)
Jakub Szefer
(34)
James Howe
(1)
Jamie Sikora
(1)
Jennifer Rexford
(1)
Jessie Chen
(2)
Jonathan M. Baker
(1)
Joshua Viszlai
(1)
Julian Wälde
(1)
Kaitlin N. Smith
(1)
Kashif Nawaz
(1)
Kasper Bonne Rasmussen
(1)
Lejla Batina
(1)
Lennart Maximilian Seifert
(1)
Mamuri Nawan
(1)
Muhammad Umair Saleem
(2)
Naina Gupta
(1)
Nikolaos A. Anagnostopoulos
(1)
Nikolaos Athanasios Anagnostopoulos
(2)
Nikolay Matyunin
(1)
Nina Bindel
(1)
Norman Lahr
(1)
Patrick Longa
(2)
Po-Jen Chen
(1)
Pramod A. Jamkhedkar
(2)
Ruben Niederhagen
(3)
Ruby B. Lee
(4)
Ruzica Piskac
(2)
Sanjay Deshpande
(6)
Sebastian Biedermann
(2)
Sebastian Gabmeyer
(2)
Shanquan Tian
(2)
Shuwen Deng
(2)
Song Han
(1)
Stefan Katzenbeisser
(7)
Theodoros Trochatos
(3)
Tolga Arul
(1)
Tung Chou
(1)
Ulrich Rührmair
(2)
Víctor Mateu
(1)
Wen Wang
(5)
Wenjie Xiong
(4)
Yao Lu
(1)
Yongshan Ding
(3)
Yu-Yuan Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to