What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jean-Pierre Seifert
Google Scholar
77
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Three Glitches to Rule One Car: Fault Injection Attacks on a Connected EV.
Niclas Kühnapfel
Christian Werling
Hans Niklas Jacob
Jean-Pierre Seifert
2024
journals/tches
Through the Looking-Glass: Sensitive Data Extraction by Optical Probing of Scan Chains.
Tuba Kiyan
Lars Renkes
Xhani Marvin Saß
Antonio Saavedra
Norbert Herfurth
Elham Amini
Jean-Pierre Seifert
2024
conf/eurosp
Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs.
Frederik Dermot Pustelnik
Xhani Marvin Saß
Jean-Pierre Seifert
2024
conf/asiaccs
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications.
Sebastian Neef
Lorenz Kleissner
Jean-Pierre Seifert
2024
conf/fdtc
MAYo or MAY-not: Exploring Implementation Security of the Post-Quantum Signature Scheme MAYO Against Physical Attacks.
Thomas Aulbach
Soundes Marzougui
Jean-Pierre Seifert
Vincent Quentin Ulitzsch
2024
conf/wisec
Security Testing The O-RAN Near-Real Time RIC & A1 Interface.
Kashyap Thimmaraju
Altaf Shaik
Sunniva Flück
Pere Joan Fullana Mora
Christian Werling
Jean-Pierre Seifert
2023
journals/tches
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP.
Vincent Quentin Ulitzsch
Soundes Marzougui
Alexis Bagia
Mehdi Tibouchi
Jean-Pierre Seifert
2023
conf/eurosp
faulTPM: Exposing AMD fTPMs' Deepest Secrets.
Hans Niklas Jacob
Christian Werling
Robert Buhren
Jean-Pierre Seifert
2023
conf/csr2
Verified Value Chains, Innovation and Competition.
Arnd Weber
Sylvain Guilley
René Rathfelder
Marc Stöttinger
Christoph Lüth
Maja Malenko
Torsten Grawunder
Steffen Reith
Armand Puccetti
Jean-Pierre Seifert
Norbert Herfurth
Hagen Sankowski
Gernot Heiser
2022
journals/tifs
Neural Network Modeling Attacks on Arbiter-PUF-Based Designs.
Nils Wisiol
Bipana Thapaliya
Khalid T. Mursi
Jean-Pierre Seifert
Yu Zhuang
2022
conf/wisec
A Post-Quantum Secure Subscription Concealed Identifier for 6G.
Vincent Quentin Ulitzsch
Shinjo Park
Soundes Marzougui
Jean-Pierre Seifert
2022
conf/sacrypt
Profiling Side-Channel Attacks on Dilithium - A Small Bit-Fiddling Leak Breaks It All.
Vincent Quentin Ulitzsch
Soundes Marzougui
Mehdi Tibouchi
Jean-Pierre Seifert
2021
journals/compsec
RNNIDS: Enhancing network intrusion detection systems through deep learning.
Soroush M. Sohi
Jean-Pierre Seifert
Fatemeh Ganji
2021
conf/ccs
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging.
Thilo Krachenfels
Jean-Pierre Seifert
Shahin Tajik
2021
conf/ccs
One Glitch to Rule Them All: Fault Injection Attacks Against AMD's Secure Encrypted Virtualization.
Robert Buhren
Hans Niklas Jacob
Thilo Krachenfels
Jean-Pierre Seifert
2021
conf/ccs
Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers.
Elias Heftrig
Jean-Pierre Seifert
Haya Schulmann
Michael Waidner
Nils Wisiol
2021
conf/uss
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks.
Thilo Krachenfels
Tuba Kiyan
Shahin Tajik
Jean-Pierre Seifert
2021
conf/sp
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.
Thilo Krachenfels
Fatemeh Ganji
Amir Moradi
Shahin Tajik
Jean-Pierre Seifert
2021
conf/fdtc
The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs.
Otto Bittner
Thilo Krachenfels
Andreas Galauner
Jean-Pierre Seifert
2021
conf/acsac
VIA: Analyzing Device Interfaces of Protected Virtual Machines.
Felicitas Hetzelt
Martin Radev
Robert Buhren
Mathias Morbitzer
Jean-Pierre Seifert
2021
conf/cans
Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services.
Julian Fietkau
David Pascal Runge
Jean-Pierre Seifert
2020
journals/tches
Splitting the Interpose PUF: A Novel Modeling Attack Strategy.
Nils Wisiol
Christopher Mühl
Niklas Pirnay
Phuong Ha Nguyen
Marian Margraf
Jean-Pierre Seifert
Marten van Dijk
Ulrich Rührmair
2020
conf/uss
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints.
Dokyung Song
Felicitas Hetzelt
Jonghwan Kim
Brent ByungHoon Kang
Jean-Pierre Seifert
Michael Franz
2019
conf/ccs
Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation.
Robert Buhren
Christian Werling
Jean-Pierre Seifert
2019
conf/ndss
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.
Dokyung Song
Felicitas Hetzelt
Dipanjan Das
Chad Spensky
Yeoul Na
Stijn Volckaert
Giovanni Vigna
Christopher Kruegel
Jean-Pierre Seifert
Michael Franz
2019
conf/wisec
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities.
Altaf Shaik
Ravishankar Borgaonkar
Shinjo Park
Jean-Pierre Seifert
2018
journals/tches
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.
Heiko Lohrke
Shahin Tajik
Thilo Krachenfels
Christian Boit
Jean-Pierre Seifert
2018
conf/fc
A Fourier Analysis Based Attack Against Physically Unclonable Functions.
Fatemeh Ganji
Shahin Tajik
Jean-Pierre Seifert
2018
conf/wisec
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks.
Altaf Shaik
Ravishankar Borgaonkar
Shinjo Park
Jean-Pierre Seifert
2017
journals/joc
Photonic Side-Channel Analysis of Arbiter PUFs.
Shahin Tajik
Enrico Dietz
Sven Frohmann
Helmar Dittrich
Dmitry Nedospasov
Clemens Helfmeier
Jean-Pierre Seifert
Christian Boit
Heinz-Wilhelm Hübers
2017
conf/ccs
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs.
Shahin Tajik
Heiko Lohrke
Jean-Pierre Seifert
Christian Boit
2017
conf/ccs
The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser.
Kashyap Thimmaraju
Bhargava Shastry
Tobias Fiebig
Felicitas Hetzelt
Jean-Pierre Seifert
Anja Feldmann
Stefan Schmid
2017
conf/host
Photonic side channel attacks against RSA.
Elad Carmon
Jean-Pierre Seifert
Avishai Wool
2016
conf/ccs
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones.
Shinjo Park
Altaf Shaik
Ravishankar Borgaonkar
Jean-Pierre Seifert
2016
conf/ches
Strong Machine Learning Attack Against PUFs with No Mathematical Model.
Fatemeh Ganji
Shahin Tajik
Fabian Fäßler
Jean-Pierre Seifert
2016
conf/ches
No Place to Hide: Contactless Probing of Secret Data on FPGAs.
Heiko Lohrke
Shahin Tajik
Christian Boit
Jean-Pierre Seifert
2016
conf/ndss
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.
Altaf Shaik
Jean-Pierre Seifert
Ravishankar Borgaonkar
N. Asokan
Valtteri Niemi
2016
conf/dsn
NetCo: Reliable Routing With Unreliable Routers.
Anja Feldmann
Philipp Heyder
Michael Kreutzer
Stefan Schmid
Jean-Pierre Seifert
Haya Schulmann
Kashyap Thimmaraju
Michael Waidner
Jens Sieberg
2015
conf/ccs
Lattice Basis Reduction Attack against Physically Unclonable Functions.
Fatemeh Ganji
Juliane Krämer
Jean-Pierre Seifert
Shahin Tajik
2015
conf/icisc
Let Me Prove It to You: RO PUFs Are Provably Learnable.
Fatemeh Ganji
Shahin Tajik
Jean-Pierre Seifert
2015
conf/fdtc
Laser Fault Attack on Physically Unclonable Functions.
Shahin Tajik
Heiko Lohrke
Fatemeh Ganji
Jean-Pierre Seifert
Christian Boit
2014
conf/ches
Physical Characterization of Arbiter PUFs.
Shahin Tajik
Enrico Dietz
Sven Frohmann
Jean-Pierre Seifert
Dmitry Nedospasov
Clemens Helfmeier
Christian Boit
Helmar Dittrich
2014
conf/fdtc
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.
Johannes Blömer
Ricardo Gomes da Silva
Peter Günther
Juliane Krämer
Jean-Pierre Seifert
2013
conf/ccs
Third international workshop on trustworthy embedded devices (TrustED 2013).
Frederik Armknecht
Jean-Pierre Seifert
2013
conf/ccs
Breaking and entering through the silicon.
Clemens Helfmeier
Dmitry Nedospasov
Christopher Tarnovsky
Jan Starbug Krissler
Christian Boit
Jean-Pierre Seifert
2013
conf/uss
Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks.
Nico Golde
Kevin Redon
Jean-Pierre Seifert
2013
conf/icisc
Dark Side of the Shader: Mobile GPU-Aided Malware Delivery.
Janis Danisevskis
Marta Piekarska
Jean-Pierre Seifert
2013
conf/host
Cloning Physically Unclonable Functions.
Clemens Helfmeier
Christian Boit
Dmitry Nedospasov
Jean-Pierre Seifert
2013
conf/fdtc
Invasive PUF Analysis.
Dmitry Nedospasov
Jean-Pierre Seifert
Clemens Helfmeier
Christian Boit
2012
conf/ches
Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us.
Alexander Schlösser
Dmitry Nedospasov
Juliane Krämer
Susanna Orlic
Jean-Pierre Seifert
2012
conf/host
Functional integrated circuit analysis.
Dmitry Nedospasov
Jean-Pierre Seifert
Alexander Schlösser
Susanna Orlic
2012
conf/dsn
Taming Mr Hayes: Mitigating signaling based attacks on smartphones.
Collin Mulliner
Steffen Liebergeld
Matthias Lange
Jean-Pierre Seifert
2011
conf/ccs
Poster: Towards detecting DMA malware.
Patrick Stewin
Jean-Pierre Seifert
Collin Mulliner
2011
conf/uss
SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale.
Collin Mulliner
Nico Golde
Jean-Pierre Seifert
2011
conf/icisc
Weaknesses in Current RSA Signature Schemes.
Juliane Krämer
Dmitry Nedospasov
Jean-Pierre Seifert
2010
conf/ccs
In God we trust all others we monitor.
Patrick Stewin
Jean-Pierre Seifert
2010
conf/esorics
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Wenjuan Xu
Gail-Joon Ahn
Hongxin Hu
Xinwen Zhang
Jean-Pierre Seifert
2010
conf/icics
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms.
Xinwen Zhang
Jean-Pierre Seifert
Onur Aciiçmez
2010
conf/wisec
pBMDS: a behavior-based malware detection system for cellphone devices.
Liang Xie
Xinwen Zhang
Jean-Pierre Seifert
Sencun Zhu
2009
conf/sec
On the Impossibility of Detecting Virtual Machine Monitors.
Shay Gueron
Jean-Pierre Seifert
2008
conf/ccs
Usage control platformization via trustworthy SELinux.
Masoom Alam
Jean-Pierre Seifert
Qi Li
Xinwen Zhang
2008
conf/ccs
Deconstructing new cache designs for thwarting software cache-based side channel attacks.
Jingfei Kong
Onur Aciiçmez
Jean-Pierre Seifert
Huiyang Zhou
2007
conf/ccs
A trusted mobile phone reference architecturevia secure kernel.
Xinwen Zhang
Onur Aciiçmez
Jean-Pierre Seifert
2007
conf/ctrsa
Predicting Secret Keys Via Branch Prediction.
Onur Aciiçmez
Çetin Kaya Koç
Jean-Pierre Seifert
2007
conf/fdtc
Cheap Hardware Parallelism Implies Cheap Security.
Onur Aciiçmez
Jean-Pierre Seifert
2006
conf/ccs
A refined look at Bernstein's AES side-channel analysis.
Michael Neve
Jean-Pierre Seifert
Zhenghong Wang
2006
conf/fdtc
Is It Wise to Publish Your Public RSA Keys?
Shay Gueron
Jean-Pierre Seifert
2006
conf/fdtc
Sign Change Fault Attacks on Elliptic Curve Cryptosystems.
Johannes Blömer
Martin Otto
Jean-Pierre Seifert
2006
conf/sacrypt
Advances on Access-Driven Cache Attacks on AES.
Michael Neve
Jean-Pierre Seifert
2005
conf/ccs
On authenticated computing and RSA-based authentication.
Jean-Pierre Seifert
2004
conf/ctrsa
High-Speed Modular Multiplication.
Wieland Fischer
Jean-Pierre Seifert
2003
conf/ccs
A new CRT-RSA algorithm secure against bellcore attacks.
Johannes Blömer
Martin Otto
Jean-Pierre Seifert
2003
conf/fc
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).
Johannes Blömer
Jean-Pierre Seifert
2002
conf/acisp
Note on Fast Computation of Secret RSA Exponents.
Wieland Fischer
Jean-Pierre Seifert
2002
conf/ches
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures.
Christian Aumüller
Peter Bier
Wieland Fischer
Peter Hofreiter
Jean-Pierre Seifert
2002
conf/ches
Increasing the Bitlength of a Crypto-Coprocessor.
Wieland Fischer
Jean-Pierre Seifert
2001
conf/ctrsa
Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation.
Jean-Pierre Seifert
Coauthors
Alexander Schlösser
(2)
Alexis Bagia
(1)
Altaf Shaik
(5)
Amir Moradi
(1)
Andreas Galauner
(1)
Anja Feldmann
(2)
Antonio Saavedra
(1)
Armand Puccetti
(1)
Arnd Weber
(1)
Avishai Wool
(1)
Bhargava Shastry
(1)
Bipana Thapaliya
(1)
Brent ByungHoon Kang
(1)
Çetin Kaya Koç
(1)
Chad Spensky
(1)
Christian Aumüller
(1)
Christian Boit
(9)
Christian Werling
(4)
Christoph Lüth
(1)
Christopher Kruegel
(1)
Christopher Mühl
(1)
Christopher Tarnovsky
(1)
Clemens Helfmeier
(5)
Collin Mulliner
(3)
David Pascal Runge
(1)
Dipanjan Das
(1)
Dmitry Nedospasov
(8)
Dokyung Song
(2)
Elad Carmon
(1)
Elham Amini
(1)
Elias Heftrig
(1)
Enrico Dietz
(2)
Fabian Fäßler
(1)
Fatemeh Ganji
(7)
Felicitas Hetzelt
(4)
Frederik Armknecht
(1)
Frederik Dermot Pustelnik
(1)
Gail-Joon Ahn
(1)
Gernot Heiser
(1)
Giovanni Vigna
(1)
Hagen Sankowski
(1)
Hans Niklas Jacob
(3)
Haya Schulmann
(2)
Heiko Lohrke
(4)
Heinz-Wilhelm Hübers
(1)
Helmar Dittrich
(2)
Hongxin Hu
(1)
Huiyang Zhou
(1)
Jan Starbug Krissler
(1)
Janis Danisevskis
(1)
Jean-Pierre Seifert
(77)
Jens Sieberg
(1)
Jingfei Kong
(1)
Johannes Blömer
(4)
Jonghwan Kim
(1)
Julian Fietkau
(1)
Juliane Krämer
(4)
Kashyap Thimmaraju
(3)
Kevin Redon
(1)
Khalid T. Mursi
(1)
Lars Renkes
(1)
Liang Xie
(1)
Lorenz Kleissner
(1)
Maja Malenko
(1)
Marc Stöttinger
(1)
Marian Margraf
(1)
Marta Piekarska
(1)
Marten van Dijk
(1)
Martin Otto
(2)
Martin Radev
(1)
Masoom Alam
(1)
Mathias Morbitzer
(1)
Matthias Lange
(1)
Mehdi Tibouchi
(2)
Michael Franz
(2)
Michael Kreutzer
(1)
Michael Neve
(2)
Michael Waidner
(2)
N. Asokan
(1)
Niclas Kühnapfel
(1)
Nico Golde
(2)
Niklas Pirnay
(1)
Nils Wisiol
(3)
Norbert Herfurth
(2)
Onur Aciiçmez
(5)
Otto Bittner
(1)
Patrick Stewin
(2)
Pere Joan Fullana Mora
(1)
Peter Bier
(1)
Peter Günther
(1)
Peter Hofreiter
(1)
Philipp Heyder
(1)
Phuong Ha Nguyen
(1)
Qi Li
(1)
Ravishankar Borgaonkar
(4)
René Rathfelder
(1)
Ricardo Gomes da Silva
(1)
Robert Buhren
(4)
Sebastian Neef
(1)
Sencun Zhu
(1)
Shahin Tajik
(13)
Shay Gueron
(2)
Shinjo Park
(4)
Soroush M. Sohi
(1)
Soundes Marzougui
(4)
Stefan Schmid
(2)
Steffen Liebergeld
(1)
Steffen Reith
(1)
Stijn Volckaert
(1)
Sunniva Flück
(1)
Susanna Orlic
(2)
Sven Frohmann
(2)
Sylvain Guilley
(1)
Thilo Krachenfels
(6)
Thomas Aulbach
(1)
Tobias Fiebig
(1)
Torsten Grawunder
(1)
Tuba Kiyan
(2)
Ulrich Rührmair
(1)
Valtteri Niemi
(1)
Vincent Quentin Ulitzsch
(4)
Wenjuan Xu
(1)
Wieland Fischer
(4)
Xhani Marvin Saß
(2)
Xinwen Zhang
(5)
Yeoul Na
(1)
Yu Zhuang
(1)
Zhenghong Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to