dblp.uni-trier.dewww.uni-trier.de

Werner Schindler

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
21EEWolfgang Killmann, Werner Schindler: A Design for a Physical RNG with Robust Entropy Estimators. CHES 2008: 146-163
20EEOnur Aciiçmez, Werner Schindler: A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. CT-RSA 2008: 256-273
19 Max Gebhardt, Georg Illies, Werner Schindler: On an Approach to Compute (at least Almost) Exact Probabilities for Differentia Hash Collision Paths. Sicherheit 2008: 111-125
2007
18EEOnur Aciiçmez, Werner Schindler, Çetin Kaya Koç: Cache Based Remote Timing Attack on the AES. CT-RSA 2007: 271-286
17 Max Gebhardt, Georg Illies, Werner Schindler: Hashkollisionen und Qualifizierte Zertifikate. GI Jahrestagung (2) 2007: 174-178
2006
16 Max Gebhardt, Georg Illies, Werner Schindler: A Note on the Practical Value of Single Hash Collisions for Special File Formats. Sicherheit 2006: 333-344
2005
15EEOnur Aciiçmez, Werner Schindler, Çetin Kaya Koç: Improving Brumley and Boneh timing attack on unprotected SSL implementations. ACM Conference on Computer and Communications Security 2005: 139-146
14EEWerner Schindler, Kerstin Lemke, Christof Paar: A Stochastic Model for Differential Side Channel Cryptanalysis. CHES 2005: 30-46
13EEWerner Schindler: On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods. Public Key Cryptography 2005: 85-103
2004
12EELe Van Ly, Werner Schindler: How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers. SCN 2004: 367-380
2003
11 Wolfgang Killmann, Werner Schindler: Über die Prüftiefe und Aussagekraft von IT-Sicherheitsgutachten. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 203-214
10EEWerner Schindler, Colin D. Walter: More Detail for a Combined Timing and Power Attack against Implementations of RSA. IMA Int. Conf. 2003: 245-263
9EEWerner Schindler: A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002. IMA Int. Conf. 2003: 276-289
2002
8EEWerner Schindler, Wolfgang Killmann: Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications. CHES 2002: 431-449
7EEWerner Schindler: A Combined Timing and Power Attack. Public Key Cryptography 2002: 263-279
6EEFrank Niedermeyer, Werner Schindler: On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure. SCN 2002: 133-145
2001
5EEWerner Schindler: Efficient Online Tests for True Random Number Generators. CHES 2001: 103-117
4EEWerner Schindler, François Koeune, Jean-Jacques Quisquater: Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. IMA Int. Conf. 2001: 245-267
2000
3EEWerner Schindler: A Timing Attack against RSA with the Chinese Remainder Theorem. CHES 2000: 109-124
1994
2 Werner Schindler: Equivariant Mappings: a New Approach in Stochastic Simulations. Comput. Geom. 4: 327-343 (1994)
1991
1 Jürgen Bokowski, Jürgen Richter-Gebert, Werner Schindler: On the Distribution of Order Types. Comput. Geom. 1: 127-142 (1991)

Coauthor Index

1Onur Aciiçmez [15] [18] [20]
2Jürgen Bokowski [1]
3Max Gebhardt [16] [17] [19]
4Georg Illies [16] [17] [19]
5Wolfgang Killmann [8] [11] [21]
6Çetin Kaya Koç [15] [18]
7François Koeune [4]
8Kerstin Lemke-Rust (Kerstin Lemke) [14]
9Le Van Ly [12]
10Frank Niedermeyer [6]
11Christof Paar [14]
12Jean-Jacques Quisquater [4]
13Jürgen Richter-Gebert [1]
14Colin D. Walter [10]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)