What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Thomas Eisenbarth
Google Scholar
ORCID:
0000-0003-1116-6973
74
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits.
Jonas Sander
Sebastian Berndt
Ida Bruhns
Thomas Eisenbarth
2025
conf/sp
BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments.
Jesse De Meulemeester
Luca Wilke
David F. Oswald
Thomas Eisenbarth
Ingrid Verbauwhede
Jo Van Bulck
2025
conf/acns
OCEAN: Open-World Contrastive Authorship Identification.
Felix Mächtle
Jan-Niclas Serr
Nils Loose
Jonas Sander
Thomas Eisenbarth
2025
conf/asiaccs
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments.
Philipp Schmitz
Tobias Jauch
Alex Wezel
Mohammad Rahmani Fadiheh
Thore Tiemann
Jonah Heller
Thomas Eisenbarth
Dominik Stoffel
Wolfgang Kunz
2025
conf/uss
TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs.
Hannes Weissteiner
Fabian Rauscher
Robin Leander Schröder
Jonas Juffinger
Stefan Gast
Jan Wichelmann
Thomas Eisenbarth
Daniel Gruss
Thomas Eisenbarth
2025
conf/uss
TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX.
Fabian Rauscher
Luca Wilke
Hannes Weissteiner
Thomas Eisenbarth
Daniel Gruss
2025
conf/acns
ReDASH: Fast and Efficient Scaling in Arithmetic Garbled Circuits for Secure Outsourced Inference.
Felix Maurer
Jonas Sander
Thomas Eisenbarth
2025
journals/cic
Efficient Weak Key Recovery for QC-MDPC Codes like BIKE.
Tim Gellersen
Till Eifert
Sebastian Berndt
Thomas Eisenbarth
2024
journals/tches
SEV-Step A Single-Stepping Framework for AMD-SEV.
Luca Wilke
Jan Wichelmann
Anja Rabich
Thomas Eisenbarth
2024
journals/tches
TeeJam: Sub-Cache-Line Leakages Strike Back.
Florian Sieck
Zhiyuan Zhang
Sebastian Berndt
Chitchanok Chuengsatiansup
Thomas Eisenbarth
Yuval Yarom
2024
journals/tches
Polynomial sharings on two secrets: Buy one, get one free.
Paula Arnold
Sebastian Berndt
Thomas Eisenbarth
Maximilian Orlt
2024
journals/cic
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge.
Ida Bruhns
Sebastian Berndt
Jonas Sander
Thomas Eisenbarth
2024
conf/ccs
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX.
Luca Wilke
Florian Sieck
Thomas Eisenbarth
2024
conf/sp
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation.
Jan Wichelmann
Anja Rabich
Anna Pätschke
Thomas Eisenbarth
2024
conf/eurosp
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments.
Debopriya Roy Dipta
Thore Tiemann
Berk Gülmezoglu
Eduard Marin
Thomas Eisenbarth
2024
conf/iciss
Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms.
Zane Weissman
Thore Tiemann
Thomas Eisenbarth
Berk Sunar
2024
conf/esorics
Duplication-Based Fault Tolerance for RISC-V Embedded Software.
Volodymyr Bezsmertnyi
Jean-Michel Cioranesco
Thomas Eisenbarth
2024
conf/cans
Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript.
Iliana Fayolle
Jan Wichelmann
Anja Köhl
Walter Rudametkin
Thomas Eisenbarth
Clémentine Maurice
2023
conf/uss
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software.
Jan Wichelmann
Anna Pätschke
Luca Wilke
Thomas Eisenbarth
2023
conf/crypto
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler.
Sebastian Berndt
Thomas Eisenbarth
Sebastian Faust
Marc Gourjon
Maximilian Orlt
Okan Seker
2023
conf/acns
Subversion-Resilient Authenticated Encryption Without Random Oracles.
Pascal Bemmann
Sebastian Berndt
Denis Diemert
Thomas Eisenbarth
Tibor Jager
2023
conf/eurosp
"Act natural!": Exchanging Private Messages on Public Blockchains.
Thore Tiemann
Sebastian Berndt
Thomas Eisenbarth
Maciej Liskiewicz
2023
conf/asiaccs
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems.
Thore Tiemann
Zane Weissman
Thomas Eisenbarth
Berk Sunar
2022
conf/ccs
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications.
Jan Wichelmann
Florian Sieck
Anna Pätschke
Thomas Eisenbarth
2022
conf/sp
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.
Mengyuan Li
Luca Wilke
Jan Wichelmann
Thomas Eisenbarth
Radu Teodorescu
Yinqian Zhang
2022
conf/asiaccs
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols.
Sebastian Berndt
Jan Wichelmann
Claudius Pott
Tim-Henrik Traving
Thomas Eisenbarth
2021
journals/tches
Side-Channel Protections for Picnic Signatures.
Diego F. Aranha
Sebastian Berndt
Thomas Eisenbarth
Okan Seker
Akira Takahashi
Luca Wilke
Greg Zaverucha
2021
journals/tches
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks.
Okan Seker
Thomas Eisenbarth
Maciej Liskiewicz
2021
conf/ccs
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries.
Florian Sieck
Sebastian Berndt
Jan Wichelmann
Thomas Eisenbarth
2021
conf/sp
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation.
Luca Wilke
Jan Wichelmann
Florian Sieck
Thomas Eisenbarth
2021
conf/eurosp
Aim, Wait, Shoot: How the CacheSniper Technique Improves Unprivileged Cache Attacks.
Samira Briongos
Ida Bruhns
Pedro Malagón
Thomas Eisenbarth
José Manuel Moya
2020
journals/tches
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms.
Zane Weissman
Thore Tiemann
Daniel Moghimi
Evan Custodio
Thomas Eisenbarth
Berk Sunar
2020
conf/ccs
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis.
Okan Seker
Sebastian Berndt
Luca Wilke
Thomas Eisenbarth
2020
conf/uss
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks.
Samira Briongos
Pedro Malagón
José Manuel Moya
Thomas Eisenbarth
2020
conf/uss
TPM-FAIL: TPM meets Timing and Lattice Attacks.
Daniel Moghimi
Berk Sunar
Thomas Eisenbarth
Nadia Heninger
2020
conf/sp
SEVurity: No Security Without Integrity : Breaking Integrity-Free Memory Encryption with Minimal Assumptions.
Luca Wilke
Jan Wichelmann
Mathias Morbitzer
Thomas Eisenbarth
2019
conf/ccs
Undermining User Privacy on Mobile Devices Using AI.
Berk Gülmezoglu
Andreas Zankl
M. Caner Tol
Saad Islam
Thomas Eisenbarth
Berk Sunar
2019
conf/uss
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks.
Saad Islam
Ahmad Moghimi
Ida Bruhns
Moritz Krebbel
Berk Gülmezoglu
Thomas Eisenbarth
Berk Sunar
2018
journals/tches
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
Fergus Dall
Gabrielle De Micheli
Thomas Eisenbarth
Daniel Genkin
Nadia Heninger
Ahmad Moghimi
Yuval Yarom
2018
journals/tches
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks.
Okan Seker
Abraham Fernandez-Rubio
Thomas Eisenbarth
Rainer Steinwandt
2018
conf/ctrsa
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX.
Ahmad Moghimi
Thomas Eisenbarth
Berk Sunar
2018
conf/acsac
MicroWalk: A Framework for Finding Side Channels in Binaries.
Jan Wichelmann
Ahmad Moghimi
Thomas Eisenbarth
Berk Sunar
2017
conf/ccs
Hit by the Bus: QoS Degradation Attack on Android.
Mehmet Sinan Inci
Thomas Eisenbarth
Berk Sunar
2017
conf/ccs
Cache-Based Application Detection in the Cloud Using Machine Learning.
Berk Gülmezoglu
Thomas Eisenbarth
Berk Sunar
2017
conf/uss
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think.
Marc Green
Leandro Rodrigues Lima
Andreas Zankl
Gorka Irazoqui
Johann Heyszl
Thomas Eisenbarth
2017
conf/esorics
PerfWeb: How to Violate Web Privacy with Hardware Performance Events.
Berk Gülmezoglu
Andreas Zankl
Thomas Eisenbarth
Berk Sunar
2017
conf/ches
CacheZoom: How SGX Amplifies the Power of Cache Attacks.
Ahmad Moghimi
Gorka Irazoqui
Thomas Eisenbarth
2016
journals/tifs
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem.
Cong Chen
Thomas Eisenbarth
Ingo von Maurich
Rainer Steinwandt
2016
conf/ccs
Cross Processor Cache Attacks.
Gorka Irazoqui
Thomas Eisenbarth
Berk Sunar
2016
conf/ches
Cache Attacks Enable Bulk Key Recovery on the Cloud.
Mehmet Sinan Inci
Berk Gülmezoglu
Gorka Irazoqui
Thomas Eisenbarth
Berk Sunar
2016
conf/asiacrypt
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is Not.
Cong Chen
Mohammad Farmani
Thomas Eisenbarth
2016
conf/acsac
Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure.
Mehmet Sinan Inci
Gorka Irazoqui
Thomas Eisenbarth
Berk Sunar
2015
journals/popets
Know Thy Neighbor: Crypto Library Detection in Cloud.
Gorka Irazoqui
Mehmet Sinan Inci
Thomas Eisenbarth
Berk Sunar
2015
conf/ccs
Lucky 13 Strikes Back.
Gorka Irazoqui Apecechea
Mehmet Sinan Inci
Thomas Eisenbarth
Berk Sunar
2015
conf/ccs
Faster Leakage Detection and Exploitation.
Xin Ye
Mostafa Taha
Cong Chen
Thomas Eisenbarth
2015
conf/sp
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES.
Gorka Irazoqui Apecechea
Thomas Eisenbarth
Berk Sunar
2015
conf/acns
Differential Power Analysis of a McEliece Cryptosystem.
Cong Chen
Thomas Eisenbarth
Ingo von Maurich
Rainer Steinwandt
2015
conf/host
Power analysis of the t-private logic style for FPGAs.
Zachary N. Goddard
Nicholas LaJeunesse
Thomas Eisenbarth
2015
conf/host
Silent Simon: A threshold implementation under 100 slices.
Aria Shahverdi
Mostafa Taha
Thomas Eisenbarth
2015
conf/sacrypt
Near Collision Side Channel Attacks.
Baris Ege
Thomas Eisenbarth
Lejla Batina
2015
conf/sacrypt
Masking Large Keys in Hardware: A Masked Implementation of McEliece.
Cong Chen
Thomas Eisenbarth
Ingo von Maurich
Rainer Steinwandt
2014
conf/fc
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince.
Yarkin Doröz
Aria Shahverdi
Thomas Eisenbarth
Berk Sunar
2013
conf/sacrypt
Faster Hash-Based Signatures with Bounded Leakage.
Thomas Eisenbarth
Ingo von Maurich
Xin Ye
2012
conf/acns
Wide Collisions in Practice.
Xin Ye
Thomas Eisenbarth
2012
conf/africacrypt
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Thomas Eisenbarth
Zheng Gong
Tim Güneysu
Stefan Heyse
Sebastiaan Indesteege
Stéphanie Kerckhof
François Koeune
Tomislav Nad
Thomas Plos
Francesco Regazzoni
François-Xavier Standaert
Loïc van Oldeneel tot Oldenzeel
2010
conf/ches
Correlation-Enhanced Power Analysis Collision Attack.
Amir Moradi
Oliver Mischke
Thomas Eisenbarth
2010
conf/ctrsa
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.
Andrey Bogdanov
Thomas Eisenbarth
Christof Paar
Malte Wienecke
2009
conf/icisc
Power Analysis of Single-Rail Storage Elements as Used in MDPL.
Amir Moradi
Thomas Eisenbarth
Axel Poschmann
Christof Paar
2009
conf/ches
MicroEliece: McEliece for Embedded Devices.
Thomas Eisenbarth
Tim Güneysu
Stefan Heyse
Christof Paar
2009
conf/fdtc
KeeLoq and Side-Channel Analysis-Evolution of an Attack.
Christof Paar
Thomas Eisenbarth
Markus Kasper
Timo Kasper
Amir Moradi
2008
conf/crypto
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
Thomas Eisenbarth
Timo Kasper
Amir Moradi
Christof Paar
Mahmoud Salmasizadeh
Mohammad T. Manzuri Shalmani
2008
conf/ches
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
Andrey Bogdanov
Thomas Eisenbarth
Andy Rupp
Christopher Wolf
2007
conf/ccs
Reconfigurable trusted computing in hardware.
Thomas Eisenbarth
Tim Güneysu
Christof Paar
Ahmad-Reza Sadeghi
Dries Schellekens
Marko Wolf
2007
conf/ches
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations.
Andrey Bogdanov
Thomas Eisenbarth
Andy Rupp
Coauthors
Abraham Fernandez-Rubio
(1)
Ahmad Moghimi
(5)
Ahmad-Reza Sadeghi
(1)
Akira Takahashi
(1)
Alex Wezel
(1)
Amir Moradi
(4)
Andreas Zankl
(3)
Andrey Bogdanov
(3)
Andy Rupp
(2)
Anja Köhl
(1)
Anja Rabich
(2)
Anna Pätschke
(3)
Aria Shahverdi
(2)
Axel Poschmann
(1)
Baris Ege
(1)
Berk Gülmezoglu
(6)
Berk Sunar
(18)
Chitchanok Chuengsatiansup
(1)
Christof Paar
(6)
Christopher Wolf
(1)
Claudius Pott
(1)
Clémentine Maurice
(1)
Cong Chen
(5)
Daniel Genkin
(1)
Daniel Gruss
(2)
Daniel Moghimi
(2)
David F. Oswald
(1)
Debopriya Roy Dipta
(1)
Denis Diemert
(1)
Diego F. Aranha
(1)
Dominik Stoffel
(1)
Dries Schellekens
(1)
Eduard Marin
(1)
Evan Custodio
(1)
Fabian Rauscher
(2)
Felix Mächtle
(1)
Felix Maurer
(1)
Fergus Dall
(1)
Florian Sieck
(5)
Francesco Regazzoni
(1)
François Koeune
(1)
François-Xavier Standaert
(1)
Gabrielle De Micheli
(1)
Gorka Irazoqui
(6)
Gorka Irazoqui Apecechea
(2)
Greg Zaverucha
(1)
Hannes Weissteiner
(2)
Ida Bruhns
(4)
Iliana Fayolle
(1)
Ingo von Maurich
(4)
Ingrid Verbauwhede
(1)
Jan Wichelmann
(12)
Jan-Niclas Serr
(1)
Jean-Michel Cioranesco
(1)
Jesse De Meulemeester
(1)
Jo Van Bulck
(1)
Johann Heyszl
(1)
Jonah Heller
(1)
Jonas Juffinger
(1)
Jonas Sander
(4)
José Manuel Moya
(2)
Leandro Rodrigues Lima
(1)
Lejla Batina
(1)
Loïc van Oldeneel tot Oldenzeel
(1)
Luca Wilke
(10)
M. Caner Tol
(1)
Maciej Liskiewicz
(2)
Mahmoud Salmasizadeh
(1)
Malte Wienecke
(1)
Marc Gourjon
(1)
Marc Green
(1)
Marko Wolf
(1)
Markus Kasper
(1)
Mathias Morbitzer
(1)
Maximilian Orlt
(2)
Mehmet Sinan Inci
(5)
Mengyuan Li
(1)
Mohammad Farmani
(1)
Mohammad Rahmani Fadiheh
(1)
Mohammad T. Manzuri Shalmani
(1)
Moritz Krebbel
(1)
Mostafa Taha
(2)
Nadia Heninger
(2)
Nicholas LaJeunesse
(1)
Nils Loose
(1)
Okan Seker
(5)
Oliver Mischke
(1)
Pascal Bemmann
(1)
Paula Arnold
(1)
Pedro Malagón
(2)
Philipp Schmitz
(1)
Radu Teodorescu
(1)
Rainer Steinwandt
(4)
Robin Leander Schröder
(1)
Saad Islam
(2)
Samira Briongos
(2)
Sebastiaan Indesteege
(1)
Sebastian Berndt
(12)
Sebastian Faust
(1)
Stefan Gast
(1)
Stefan Heyse
(2)
Stéphanie Kerckhof
(1)
Thomas Eisenbarth
(75)
Thomas Plos
(1)
Thore Tiemann
(6)
Tibor Jager
(1)
Till Eifert
(1)
Tim Gellersen
(1)
Tim Güneysu
(3)
Tim-Henrik Traving
(1)
Timo Kasper
(2)
Tobias Jauch
(1)
Tomislav Nad
(1)
Volodymyr Bezsmertnyi
(1)
Walter Rudametkin
(1)
Wolfgang Kunz
(1)
Xin Ye
(3)
Yarkin Doröz
(1)
Yinqian Zhang
(1)
Yuval Yarom
(2)
Zachary N. Goddard
(1)
Zane Weissman
(3)
Zheng Gong
(1)
Zhiyuan Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to