Marcel Medwed
Marcel Medwed
Verified email at
Cited by
Cited by
Shuffling against side-channel attacks: A comprehensive study with cautionary note
N Veyrat-Charvillon, M Medwed, S Kerckhof, FX Standaert
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on theá…, 2012
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on theá…, 2010
Fresh re-keying: Security against side-channel and fault attacks for low-cost devices
M Medwed, FX Standaert, J Gro▀schńdl, F Regazzoni
Progress in Cryptology–AFRICACRYPT 2010: Third International Conference oná…, 2010
Template attacks on ECDSA
M Medwed, E Oswald
International Workshop on Information Security Applications, 14-27, 2008
A fault attack on ECDSA
JM Schmidt, M Medwed
2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 93-99, 2009
Energy evaluation of software implementations of block ciphers under memory constraints
J Grossschadl, S Tillich, C Rechberger, M Hofmann, M Medwed
2007 Design, Automation & Test in Europe Conference & Exhibition, 1-6, 2007
Towards super-exponential side-channel security with efficient leakage-resilient PRFs
M Medwed, FX Standaert, A Joux
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th Internationalá…, 2012
Fresh re-keying II: securing multiple parties against side-channel and fault attacks
M Medwed, C Petit, F Regazzoni, M Renauld, FX Standaert
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2á…, 2011
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
S Bela´d, F De Santis, J Heyszl, S Mangard, M Medwed, JM Schmidt, ...
Journal of Cryptographic Engineering 4, 157-171, 2014
Iot security challenges and ways forward
M Medwed
Proceedings of the 6th International Workshop on Trustworthy Embeddedá…, 2016
Attacking ECDSA-enabled RFID devices
M Hutter, M Medwed, D Hein, J Wolkerstorfer
Applied Cryptography and Network Security: 7th International Conferenceá…, 2009
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
JF Gallais, J Gro▀schńdl, N Hanley, M Kasper, M Medwed, F Regazzoni, ...
Trusted Systems: Second International Conference, INTRUST 2010, Beijingá…, 2011
CrypTag: Thwarting physical and logical memory vulnerabilities using cryptographically colored memory
P Nasahl, R Schilling, M Werner, J Hoogerbrugge, M Medwed, ...
Proceedings of the 2021 ACM Asia Conference on Computer and Communicationsá…, 2021
Side-channel leakage across borders
JM Schmidt, T Plos, M Kirschbaum, M Hutter, M Medwed, C Herbst
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2á…, 2010
A generic fault countermeasure providing data and program flow integrity
M Medwed, JM Schmidt
2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, 68-73, 2008
Unknown-input attacks in the parallel setting: Improving the security of the CHES 2012 leakage-resilient PRF
M Medwed, FX Standaert, V Nikov, M Feldhofer
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on theá…, 2016
A continuous fault countermeasure for AES providing a constant error detection rate
M Medwed, JM Schmidt
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 66-71, 2010
Using templates to attack masked montgomery ladder implementations of modular exponentiation
C Herbst, M Medwed
Information Security Applications: 9th International Workshop, WISA 2008á…, 2009
Extractors against side-channel attacks: weak or strong?
M Medwed, FX Standaert
Journal of Cryptographic Engineering 1, 231-241, 2011
Arithmetic logic units with high error detection rates to counteract fault attacks
M Medwed, S Mangard
2011 Design, Automation & Test in Europe, 1-6, 2011
The system can't perform the operation now. Try again later.
Articles 1–20