| 1 | 2013 | FSE | pc |
| 2 | 2012 | CHES | pc |
| 3 | 2012 | FSE | pc |
| 4 | 2011 | Eurocrypt | pc |
| 5 | 2011 | FSE | pc |
| 6 | 2011 | CHES | pc |
| 7 | 2010 | FSE | pc |
| 8 | 2010 | CHES | pc |
| 9 | 2010 | Asiacrypt | pc |
| 10 | 2009 | Asiacrypt | pc |
| 11 | 2009 | CHES | pc |
| 12 | 2008 | CHES | pc chair |
| 13 | 2008 | FSE | pc |
| 14 | 2007 | CHES | general chair |
| 15 | 2007 | Asiacrypt | pc |
| 16 | 2007 | FSE | pc |
| 17 | 2006 | CHES | pc |
| 18 | 2006 | FSE | pc |
| 19 | 2005 | CHES | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2012 | Compiler Assisted Masking | ches | 58-75 |
| 2 | 2011 | A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework | crypto | 311 |
| 3 | 2010 | The World Is Not Enough: Another Look on Second-Order DPA | asiacrypt | 112-129 |
| 4 | 2010 | The World is Not Enough: Another Look on Second-Order DPA | eprint | online |
| 5 | 2008 | Template Attacks on ECDSA | eprint | online |
| 6 | 2006 | Searching for Differential Paths in MD4 | fse | online |
| 7 | 2005 | Update on SHA-1 | eprint | online |
| 8 | 2005 | Successfully Attacking Masked AES Hardware Implementations | ches | online |
| 9 | 2005 | A Side-Channel Analysis Resistant Description of the AES S-Box | fse | online |
| 10 | 2004 | Secure and Efficient Masking of AES - A Mission Impossible? | eprint | online |
| 11 | 2003 | Power-Analysis Attacks on an FPGA - First Experimental Results | ches | 35-50 |
| 12 | 2002 | Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems | ches | 82-97 |
| 13 | 2001 | Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks | ches | 39-50 |
Coauthors of Elisabeth Oswald |