default search action
Thomas Korak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j3]Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard:
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices. IEEE Commun. Surv. Tutorials 20(1): 465-488 (2018) - [j2]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 547-572 (2018) - [i6]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2018: 71 (2018) - 2017
- [c20]Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank K. Gürkaynak, Michael Muehlberghuber:
Leakage Bounds for Gaussian Side Channels. CARDIS 2017: 88-104 - [c19]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. COSADE 2017: 138-152 - [c18]Hannes Groß, Stefan Mangard, Thomas Korak:
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order. CT-RSA 2017: 95-112 - [i5]Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank K. Gürkaynak, Michael Muehlberghuber:
Leakage Bounds for Gaussian Side Channels. IACR Cryptol. ePrint Arch. 2017: 992 (2017) - 2016
- [c17]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. ASIACRYPT (1) 2016: 369-395 - [c16]Hannes Groß, Stefan Mangard, Thomas Korak:
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order. TIS@CCS 2016: 3 - [c15]Raphael Spreitzer, Simone Griesmayr, Thomas Korak, Stefan Mangard:
Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android. WISEC 2016: 49-60 - [i4]Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard:
SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices. CoRR abs/1611.03748 (2016) - [i3]Hannes Groß, Stefan Mangard, Thomas Korak:
Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order. IACR Cryptol. ePrint Arch. 2016: 486 (2016) - [i2]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Practical Fault Attacks on Authenticated Encryption Modes for AES. IACR Cryptol. ePrint Arch. 2016: 616 (2016) - [i1]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. IACR Cryptol. ePrint Arch. 2016: 793 (2016) - 2015
- [j1]Honorio Martín, Thomas Korak, Enrique San Millán, Michael Hutter:
Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness. IEEE Trans. Inf. Forensics Secur. 10(2): 266-277 (2015) - [c14]Michael Muehlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter:
Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC. COSADE 2015: 222-236 - 2014
- [c13]Thomas Korak, Thomas Plos:
EM Leakage of RFID Devices - Comparison of Two Measurement Approaches. ARES 2014: 120-125 - [c12]Thomas Korak, Michael Hoefler:
On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms. FDTC 2014: 8-17 - [c11]Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina:
Clock Glitch Attacks in the Presence of Heating. FDTC 2014: 104-114 - [c10]Thomas Korak:
Location-Dependent EM Leakage of the ATxmega Microcontroller. FPS 2014: 17-32 - [c9]Oliver Soll, Thomas Korak, Michael Muehlberghuber, Michael Hutter:
EM-based detection of hardware trojans on FPGAs. HOST 2014: 84-87 - [c8]Thomas Korak, Michael Hutter:
On the power of active relay attacks using custom-made proxies. IEEE RFID 2014: 126-133 - 2013
- [c7]Thomas Korak, Thomas Plos, Andreas Zankl:
Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps. ARES 2013: 169-177 - [c6]Thomas Korak, Thomas Plos:
Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag. CT-RSA 2013: 207-222 - [c5]Thomas Korak:
Investigation of Parameters Influencing the Success of Optical Fault Attacks. FPS 2013: 140-157 - [c4]Michael Muehlberghuber, Frank K. Gürkaynak, Thomas Korak, Philipp Dunst, Michael Hutter:
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. HASP@ISCA 2013: 1 - [c3]Erich Wenger, Thomas Korak, Mario Kirschbaum:
Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware. RFIDSec 2013: 128-144 - 2012
- [c2]Thomas Korak, Thomas Plos, Michael Hutter:
Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario. COSADE 2012: 17-32 - [c1]Thomas Korak, Lukas Wilfinger:
Handling the NDEF signature record type in a secure manner. RFID-TA 2012: 107-112
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint