2008 |
21 | EE | Wolfgang Killmann,
Werner Schindler:
A Design for a Physical RNG with Robust Entropy Estimators.
CHES 2008: 146-163 |
20 | EE | Onur Aciiçmez,
Werner Schindler:
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
CT-RSA 2008: 256-273 |
19 | | Max Gebhardt,
Georg Illies,
Werner Schindler:
On an Approach to Compute (at least Almost) Exact Probabilities for Differentia Hash Collision Paths.
Sicherheit 2008: 111-125 |
2007 |
18 | EE | Onur Aciiçmez,
Werner Schindler,
Çetin Kaya Koç:
Cache Based Remote Timing Attack on the AES.
CT-RSA 2007: 271-286 |
17 | | Max Gebhardt,
Georg Illies,
Werner Schindler:
Hashkollisionen und Qualifizierte Zertifikate.
GI Jahrestagung (2) 2007: 174-178 |
2006 |
16 | | Max Gebhardt,
Georg Illies,
Werner Schindler:
A Note on the Practical Value of Single Hash Collisions for Special File Formats.
Sicherheit 2006: 333-344 |
2005 |
15 | EE | Onur Aciiçmez,
Werner Schindler,
Çetin Kaya Koç:
Improving Brumley and Boneh timing attack on unprotected SSL implementations.
ACM Conference on Computer and Communications Security 2005: 139-146 |
14 | EE | Werner Schindler,
Kerstin Lemke,
Christof Paar:
A Stochastic Model for Differential Side Channel Cryptanalysis.
CHES 2005: 30-46 |
13 | EE | Werner Schindler:
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods.
Public Key Cryptography 2005: 85-103 |
2004 |
12 | EE | Le Van Ly,
Werner Schindler:
How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers.
SCN 2004: 367-380 |
2003 |
11 | | Wolfgang Killmann,
Werner Schindler:
Über die Prüftiefe und Aussagekraft von IT-Sicherheitsgutachten.
GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 203-214 |
10 | EE | Werner Schindler,
Colin D. Walter:
More Detail for a Combined Timing and Power Attack against Implementations of RSA.
IMA Int. Conf. 2003: 245-263 |
9 | EE | Werner Schindler:
A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002.
IMA Int. Conf. 2003: 276-289 |
2002 |
8 | EE | Werner Schindler,
Wolfgang Killmann:
Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications.
CHES 2002: 431-449 |
7 | EE | Werner Schindler:
A Combined Timing and Power Attack.
Public Key Cryptography 2002: 263-279 |
6 | EE | Frank Niedermeyer,
Werner Schindler:
On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure.
SCN 2002: 133-145 |
2001 |
5 | EE | Werner Schindler:
Efficient Online Tests for True Random Number Generators.
CHES 2001: 103-117 |
4 | EE | Werner Schindler,
François Koeune,
Jean-Jacques Quisquater:
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies.
IMA Int. Conf. 2001: 245-267 |
2000 |
3 | EE | Werner Schindler:
A Timing Attack against RSA with the Chinese Remainder Theorem.
CHES 2000: 109-124 |
1994 |
2 | | Werner Schindler:
Equivariant Mappings: a New Approach in Stochastic Simulations.
Comput. Geom. 4: 327-343 (1994) |
1991 |
1 | | Jürgen Bokowski,
Jürgen Richter-Gebert,
Werner Schindler:
On the Distribution of Order Types.
Comput. Geom. 1: 127-142 (1991) |