Peter Pessl
Cited by
Cited by
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P Pessl, D Gruss, C Maurice, M Schwarz, S Mangard
USENIX Security Symposium, 565-581, 2016
Single-trace side-channel attacks on masked lattice-based encryption
R Primas, P Pessl, S Mangard
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures
P Pessl, LG Bruinderink, Y Yarom
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
More practical single-trace attacks on the number theoretic transform
P Pessl, R Primas
Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019
Differential fault attacks on deterministic lattice signatures
LG Bruinderink, P Pessl
IACR Transactions on Cryptographic Hardware and Embedded Systems 2018 (3), 21-43, 2018
Analyzing the shuffling side-channel countermeasure for lattice-based signatures
P Pessl
Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016
Single-trace attacks on keccak
MJ Kannwischer, P Pessl, R Primas
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3 …, 2020
Pushing the limits of SHA-3 hardware implementations to fit on RFID
P Pessl, M Hutter
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
Fault Attacks on CCA-secure Lattice KEMs
P Peßl, L Prokop
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021
Curved tags–a low-resource ECDSA implementation tailored for RFID
P Pessl, M Hutter
International Workshop on Radio Frequency Identification: Security and …, 2014
Enhancing side-channel analysis of binary-field multiplication with bit reliability
P Pessl, S Mangard
Topics in Cryptology-CT-RSA 2016: The Cryptographers' Track at the RSA …, 2016
Higher-order masked ciphertext comparison for lattice-based cryptography
JP D'Anvers, D Heinz, P Pessl, M Van Beirendonck, I Verbauwhede
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (2 …, 2021
Fault-enabled chosen-ciphertext attacks on Kyber
J Hermelink, P Pessl, T Pöppelmann
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
J Hermelink, E Mårtensson, S Samardjiska, P Pessl, GD Rodosek
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (4 …, 2023
The system can't perform the operation now. Try again later.
Articles 1–14