Research Output per year
Fingerprint Dive into the research topics where Peter Peßl is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 3 Similar Profiles
Cryptography
Engineering & Materials Science
Recovery
Engineering & Materials Science
Dynamic random access storage
Engineering & Materials Science
Mathematical transformations
Engineering & Materials Science
Program processors
Engineering & Materials Science
Quantum cryptography
Engineering & Materials Science
Microcontrollers
Engineering & Materials Science
Data storage equipment
Engineering & Materials Science
Network
Recent external collaboration on country level. Dive into details by clicking on the dots.
Research Output 2013 2019
More Practical Single-Trace Attacks on the Number Theoretic Transform
Peßl, P. & Primas, R., 2019, Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Springer, (Lecture Notes in Computer Science; vol. 11774).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
Open Access
Cryptography
Mathematical transformations
Microcontrollers
Recovery
Side channel attack
Differential Fault Attacks on Deterministic Lattice Signatures
Peßl, P. & Groot Bruinderink, L., 2018, In : IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 21-43Research output: Contribution to journal › Article › Research › peer-review
Open Access
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Primas, R., Peßl, P. & Mangard, S., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017. Cham: Springer, p. 513-533 (Lecture Notes in Computer Science; vol. 10529).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
Open Access
Cryptography
Quantum cryptography
Recovery
Template matching
Microcontrollers
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures
Peßl, P., Groot Bruinderink, L. & Yarom, Y., 2017, CCS 2017. Association of Computing MachineryResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
Open Access
Recovery
Cryptography
Quantum cryptography
Experiments
Side channel attack
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Peßl, P., 11 Dec 2016, Progress in Cryptology – INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Springer, p. 153-170 18 p. (Lecture Notes in Computer Science; vol. 10095).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
Open Access
Activities 2019 2019
- 1 Talk at conference or symposium
More Practical Single-Trace Attacks on the Number Theoretic Transform
Peter Peßl (Speaker)2 Oct 2019
Activity: Talk or presentation › Talk at conference or symposium › Science to science
Projects 1999 2019
- 2 Finished
SCALAS - Secure Contactless Applications based on Leakage-resilient cryptographic Schemes
1/07/14 → 31/12/16
Project: Research project