Jean-Pierre Seifert
Jean-Pierre Seifert
Professor for Computer & Communication Security, TU Berlin & T-Labs
Verified email at
Cited by
Cited by
Fault based cryptanalysis of the advanced encryption standard (AES)
J Blömer, JP Seifert
Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe …, 2003
Detecting unauthorized use of computing devices based on behavioral patterns
L Xie, X Zhang, JP Seifert, O Aciicmez, A Latifi
US Patent 8,595,834, 2013
Predicting secret keys via branch prediction
O Acıiçmez, ÇK Koç, JP Seifert
Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006
Fault attacks on RSA with CRT: Concrete results and practical countermeasures
C Aumüller, P Bier, W Fischer, P Hofreiter, JP Seifert
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
On the power of simple branch prediction analysis
O Aciiçmez, ÇK Koç, JP Seifert
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Cloning physically unclonable functions
C Helfmeier, C Boit, D Nedospasov, JP Seifert
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
Practical attacks against privacy and availability in 4G/LTE mobile communication systems
A Shaik, R Borgaonkar, N Asokan, V Niemi, JP Seifert
NDSS 2016, 2015
Advances on access-driven cache attacks on AES
M Neve, JP Seifert
Selected Areas in Cryptography: 13th International Workshop, SAC 2006 …, 2007
Approximating shortest lattice vectors is not harder than approximating closest lattice vectors
O Goldreich, D Micciancio, S Safra, JP Seifert
Information Processing Letters 71 (2), 55-61, 1999
A new CRT-RSA algorithm secure against bellcore attacks
J Blömer, M Otto, JP Seifert
Proceedings of the 10th ACM conference on Computer and communications …, 2003
pBMDS: a behavior-based malware detection system for cellphone devices
L Xie, X Zhang, JP Seifert, S Zhu
Proceedings of the third ACM conference on Wireless network security, 37-48, 2010
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
E Brickell, G Graunke, M Neve, JP Seifert
Cryptology ePrint Archive, 2006
Sign change fault attacks on elliptic curve cryptosystems
J Blömer, M Otto, JP Seifert
Fault Diagnosis and Tolerance in Cryptography: Third International Workshop …, 2006
Breaking and entering through the silicon
C Helfmeier, D Nedospasov, C Tarnovsky, JS Krissler, C Boit, JP Seifert
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Invasive PUF analysis
D Nedospasov, JP Seifert, C Helfmeier, C Boit
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 30-38, 2013
Simple photonic emission analysis of AES: photonic side channel analysis for the rest of us
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
SMS-Based One-Time Passwords: Attacks and Defense: (Short Paper)
C Mulliner, R Borgaonkar, P Stewin, JP Seifert
Detection of Intrusions and Malware, and Vulnerability Assessment: 10th …, 2013
New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures
O Acıiçmez, S Gueron, JP Seifert
Cryptography and Coding: 11th IMA International Conference, Cirencester, UK …, 2007
Hardware-software integrated approaches to defend against software cache-based side channel attacks
J Kong, O Aciiçmez, JP Seifert, H Zhou
2009 IEEE 15th International Symposium on High Performance Computer …, 2009
Physical characterization of arbiter PUFs
S Tajik, E Dietz, S Frohmann, JP Seifert, D Nedospasov, C Helfmeier, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 493-509, 2014
The system can't perform the operation now. Try again later.
Articles 1–20