Juliane Krämer
Cited by
Cited by
Simple photonic emission analysis of AES: photonic side channel analysis for the rest of us
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
An efficient lattice-based signature scheme with provably secure instantiation
S Akleylek, N Bindel, J Buchmann, J Krämer, GA Marson
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
The Lattice-Based Digital Signature Scheme qTESLA.
E Alkim, PSLM Barreto, N Bindel, J Krämer, P Longa, JE Ricardini
IACR Cryptology ePrint Archive 2019, 85, 2019
Revisiting TESLA in the quantum random oracle model
E Alkim, N Bindel, J Buchmann, Ö Dagdelen, E Eaton, G Gutoski, ...
Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017 …, 2017
Lattice-based signature schemes and their sensitivity to fault attacks
N Bindel, J Buchmann, J Krämer
2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 63-77, 2016
A practical second-order fault attack against a real-world pairing implementation
J Blömer, RG Da Silva, P Günther, J Krämer, JP Seifert
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 123-136, 2014
Simple photonic emission analysis of AES
A Schlösser, D Nedospasov, J Krämer, S Orlic, JP Seifert
Journal of Cryptographic Engineering 3, 3-15, 2013
Differential photonic emission analysis
J Krämer, D Nedospasov, A Schlösser, JP Seifert
Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013
Differential power analysis of XMSS and SPHINCS
MJ Kannwischer, A Genêt, D Butin, J Krämer, J Buchmann
International Workshop on Constructive Side-Channel Analysis and Secure …, 2018
N Bindel, S Akleylek, E Alkim, PSLM Barreto, J Buchmann, E Eaton, ...
NIST Post-Quantum Cryptography Standardization: Round 2, 2019
“My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones
T Dörflinger, A Voth, J Krämer, R Fromm
2010 international conference on security and cryptography (SECRYPT), 1-10, 2010
Lattice basis reduction attack against physically unclonable functions
F Ganji, J Krämer, JP Seifert, S Tajik
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Creating cryptographic challenges using multi-party computation: The LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
Fault attacks on UOV and rainbow
J Krämer, M Loiero
Constructive Side-Channel Analysis and Secure Design: 10th International …, 2019
Classic McEliece implementation with low memory footprint
J Roth, E Karatsiolis, J Krämer
Smart Card Research and Advanced Applications: 19th International Conference …, 2021
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics
N Bindel, J Buchmann, J Krämer, H Mantel, J Schickel, A Weber
Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018
Deterministic wallets in a quantum world
N Alkeilani Alkadri, P Das, A Erwig, S Faust, J Krämer, S Riahi, P Struck
Proceedings of the 2020 ACM SIGSAC Conference On Computer And Communications …, 2020
Secure two-party computation in a quantum world
N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ...
Applied Cryptography and Network Security: 18th International Conference …, 2020
Why cryptography should not rely on physical attack complexity
J Krämer
it-Information Technology 59 (1), 53-56, 2017
Quantum indistinguishability for public key encryption
T Gagliardoni, J Krämer, P Struck
International Conference on Post-Quantum Cryptography, 463-482, 2021
The system can't perform the operation now. Try again later.
Articles 1–20