Prof. Dr.-Ing. Thomas Eisenbarth

Photo of Thomas  Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 043

Email: thomas.eisenbarth(at)uni-luebeck.de
Phone: +49 451 3101 6600
Fax: +49 451 3101 6604

About Me

I am Professor for IT Security at University of Lübeck.  I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I  spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.

My research interests are in:

  • Applied Cryptology
  • Systems security and secure computer architecture
  • Side channel analysis, physical attacks and their prevention
  • Cloud and virtualization security

Publications

2009

Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani, and Thomas Eisenbarth,
Vulnerability modeling of cryptographic hardware to power analysis attacks, Integration , vol. 42, no. 4, pp. 468--478, 2009.
File: j.vlsi.2009.01.001

2008

Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and Mohammad T. Manzuri Shalmani,
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme, in Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings , 2008. pp. 203--220.
File: 978-3-540-85174-5_12
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, and Christopher Wolf,
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?, IACR Cryptology ePrint Archive , vol. 2008, pp. 349, 2008.
File: 349
Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi, and Elisabeth Oswald,
Susceptibility of eSTREAM Candidates towards Side Channel Analysis, 2008.
File: 228371563_Susceptibility_of_eSTREAM_candidates_towards_side_channel_analysis
Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, and Christof Paar,
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers, in IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008 , 2008. pp. 58--66.
File: SIES.2008.4577681
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes A. Buchmann, and Christof Paar,
Fast Hash-Based Signatures on Constrained Devices, in Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings , 2008. pp. 104--117.
File: 978-3-540-85893-5_8
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, and Christof Paar,
Efficient Hash-Based Signatures on Embedded Devices, 01 2008.
File: 229001128_Efficient_Hash-Based_Signatures_on_Embedded_Devices
Francesco Regazzoni, Thomas Eisenbarth, Luca Breveglieri, Paolo Ienne, and Israel Koren,
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?, in 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA, USA , 2008. pp. 202--210.
File: DFT.2008.53

2007

Andrey Bogdanov, Thomas Eisenbarth, and Andy Rupp,
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations, in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007. pp. 394--412.
File: 978-3-540-74735-2_27
Francesco Regazzoni, Stephane Badel, Thomas Eisenbarth, Johann Großschädl, Axel Poschmann, Zeynep Toprak Deniz, Marco Macchetti, Laura Pozzi, Christof Paar, Yusuf Leblebici, and Paolo Ienne,
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies, in Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, July 16-19, 2007 , 2007. pp. 209--214.
File: ICSAMOS.2007.4285753
Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, and Leif Uhsadel,
A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers , vol. 24, no. 6, pp. 522--533, 2007.
File: MDT.2007.178
Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, and Russell Tessier,
Establishing Chain of Trust in Reconfigurable Hardware, in IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA , 2007. pp. 289--290.
File: FCCM.2007.23
Soren Rinne, Thomas Eisenbarth, and Christof Paar,
Performance Analysis of Contemporary LightWeight Block Ciphers on 8-bit Microcontrollers, 012007.
File: a5f0b7c6e442406c0c97854eb97f8a21157c3b08
Francesco Regazzoni, Thomas Eisenbarth, Johann Großschädl, Luca Breveglieri, Paolo Ienne, Israel Koren, and Christof Paar,
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits, in 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 26-28 September 2007, Rome, Italy. , 2007. pp. 508--516.
File: DFT.2007.61
Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, and Marko Wolf,
Reconfigurable trusted computing in hardware, in Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 , 2007. pp. 15--20.
File: 1314354.1314360
Andrey Bogdanov, Thomas Eisenbarth, M. Wolf, and Thomas Wollinger,
Trusted computing for automotive systems: New approaches to enforce security for electronic systems in vehicles, pp. 227-237, 01 2007.
File: 291856499_Trusted_computing_for_automotive_systems_New_approaches_to_enforce_security_for_electronic_systems_in_vehicles