Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
2018Open source value chains for addressing security issues efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
Conference Paper
2018Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Journal Article
2018Sovereignty in Information Technology. Security, Safety and Fair Market Access by Openness and Control of the Supply Chain
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Report
2016Minimum requirements for evaluating side-channel attack resistance of elliptic curve implementations
Kasper, Michael; Petri, Richard; Feldhusen, Dirk; Gebhardt, Max; Illies, Georg; Lochter, Manfred; Stein, Oliver; Thumser, Wolfgang; Wicke, Guntram
Report
2016Security in industrie 4.0 - Challenges and solutions for the fourth industrial revolution
Waidner, M.; Kasper, M.
Conference Paper
2014Don't push it: Breaking iButton security
Brandt, C.; Kasper, M.
Conference Paper
2014Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
Clavier, C.; Danger, J.-L.; Duc, G.; Elaabid, M.A.; Gérard, B.; Guilley, S.; Heuser, A.; Kasper, M.; Li, Y.; Lomné, V.; Nakatsu, D.; Ohta, K.; Sakiyama, K.; Sauvage, L.; Schindler, W.; Stöttinger, M.; Veyrat-Charvillon, N.; Walle, M.; Wurcker, A.
Journal Article
2014The role of photons in cryptanalysis
Kramer, J.; Kasper, M.; Seifert, J.-P.
Conference Paper
2013On the Relationship Between Correlation Power Analysis and the Stochastic Approach: an ASIC Designer Perspective
Santis, Fabrizio de; Kasper, Michael; Mangard, Stefan; Sigl, Georg; Stein, Oliver; Stöettinger, Marc
Conference Paper
2012Butterfly-attack on Skein's modular addition
Zohner, M.; Kasper, M.; Stöttinger, M.
Conference Paper
2012A new difference method for side-channel analysis with high-dimensional leakage models
Heuser, A.; Kasper, M.; Schindler, W.; Stöttinger, M.
Conference Paper
2012Side channel analysis of the SHA-3 finalists
Zohner, M.; Kasper, M.; Stöttinger, M.; Huss, S.A.
Conference Paper
2011dcTPM: A generic architecture for dynamic context management
Feller, T.; Malipatlolla, S.; Kasper, M.; Huss, S.A.
Conference Paper
2011A formal approach to distance-bounding RFID protocols
Dürholz, U.; Fischlin, M.; Kasper, M.; Onete, C.
Conference Paper
2011How a symmetry metric assists side-channel evaluation
Heuser, A.; Kasper, M.; Schindler, W.; Stöttinger, M.
Conference Paper
2010A stochastic method for security evaluation of cryptographic FPGA implementations
Kasper, M.; Schindler, W.; Stöttinger, M.
Conference Paper
2008On the deployment of mobile trusted modules
Kasper, M.; Kuntze, N.; Schmidt, A.U.
Conference Paper
2008Subscriber authentication in cellular networks with trusted virtual SIMs
Kasper, M.; Kuntze, N.; Schmidt, A.U.
Conference Paper
2007Virtualisation of a SIM card using trusted computing
Fichtinger, B.; Hett, C.; Petersen, U.; Kasper, M.
Conference Paper
2007Virtualisation of a SIM-card using trusted computing
Kasper, M.
Thesis
2005Green MST design from a designer's perspective: How to base decisions on environmental issues
Schischke, K.; Middendorf, A.; Reichl, H.; Griese, H.; Kasper, M.; Ong, K.
Conference Paper
2004Micro Systems Design Work Flows - Implementation of Environmental Driven Criteria
Ong, K.; Schischke, K.; Kasper, M.; Middendorf, A.; Reichl, H.
Conference Paper
2004A new rat type I-like alveolar epithelial cell line R3/1
Koslowski, R.; Barth, K.; Augstein, A.; Tschernig, T.; Bargsten, G.; Aufderheide, M.; Kasper, M.
Journal Article
1994Systematik des Entwurfs eines Medikamentendosiersystems1
Paeschke, M.; Kasper, M.; Schnakenberg, U.; Hintsche, R.
Book Article
1994Systematik des Entwurfs eines Medikamentendosiersystems2
Paeschke, M.; Kasper, M.; Schnakenberg, U.; Hintsche, R.
Book Article