Prof. Dr.-Ing. Thomas Eisenbarth
Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
About Me
I am Professor for IT Security at University of Lübeck. I received my Ph.D. in ECE from Ruhr University Bochum, Germany, where I worked as a member of the Horst Goertz Institute for IT Security (HGI). From 2010 I spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012 I joined the Electrical and Computer Engineering Department at WPI. Since August of 2017, I am the Director of the Institute for IT Security at the University of Lübeck.
My research interests are in:
- Applied Cryptology
- Systems security and secure computer architecture
- Side channel analysis, physical attacks and their prevention
- Cloud and virtualization security
Publications
2015
Know Thy Neighbor: Crypto Library Detection in Cloud, PoPETs , vol. 2015, no. 1, pp. 25--40, 2015.
File: | popets-2015-0003.xml |
Guest Editorial: Special Section on Embedded System Security, IEEE Embedded Systems Letters , vol. 7, no. 1, pp. 1-2, 2015.
File: | LES.2015.2404940 |
Faster Leakage Detection and Exploitation, in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 , 2015. pp. 21--29.
DOI: | 10.1145/2808414.2808419 |
File: | 301419853_Faster_Leakage_Detection_and_Exploitation |
Differential Power Analysis of a McEliece Cryptosystem, in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers , 2015. pp. 538--556.
DOI: | 10.1007/978-3-319-28166-7_26 |
File: | 534 |
A Faster and More Realistic Flush+Reload Attack on AES, in Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers , 2015. pp. 111--126.
File: | 978-3-319-21476-4_8 |
On the security margin of MAC striping, Inf. Process. Lett. , vol. 115, no. 11, pp. 899--902, 2015.
File: | j.ipl.2015.05.009 |
2014
Balanced Encoding to Mitigate Power Analysis: A Case Study, IACR Cryptology ePrint Archive , vol. 2014, pp. 952, 2014.
File: | 952 |
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, in Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers , 2014. pp. 215--232.
File: | 978-3-319-16763-3_13 |
Fine Grain Cross-VM Attacks on Xen and VMware, in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014 , 2014. pp. 737--744.
DOI: | 10.1109/BDCloud.2014.102 |
File: | 248 |
Non-Linear Collision Analysis, in Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers , 2014. pp. 198--214.
File: | 978-3-319-13066-8_13 |
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince, in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers , 2014. pp. 208--220.
File: | 978-3-662-44774-1_17 |
Wait a minute! A fast, Cross-VM attack on AES, IACR Cryptology ePrint Archive , vol. 2014, pp. 435, 2014.
File: | 435 |
2013
A Performance Boost for Hash-Based Signatures, in Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday , 2013. pp. 166--182.
File: | 978-3-642-42001-6_13 |
On the Vulnerability of Low Entropy Masking Schemes, in Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers , 2013. pp. 44--60.
File: | 978-3-319-08302-5_4 |
2012
Wide Collisions in Practice, in Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings , 2012. pp. 329--343.
File: | 978-3-642-31284-7_20 |
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices, in Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings , 2012. pp. 172--187.
File: | 978-3-642-31410-0_11 |
Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods, IEEE Trans. VLSI Syst. , vol. 20, no. 9, pp. 1578--1589, 2012.
File: | TVLSI.2011.2160375 |
2011
Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications, Integration , vol. 44, no. 4, pp. 290--304, 2011.
File: | j.vlsi.2010.09.001 |
2010
Building a Side Channel Based Disassembler, Trans. Computational Science , vol. 10, pp. 78--99, 2010.
File: | 978-3-642-17499-5_4 |
Correlation-Enhanced Power Analysis Collision Attack, in Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010. pp. 125--139.
File: | 978-3-642-15031-9_9 |
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs, in Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings , 2010. pp. 235--251.
File: | 978-3-642-11925-5_17 |
2009
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology, Trans. Computational Science , vol. 4, pp. 230--243, 2009.
File: | 978-3-642-01004-0_13 |
KeeLoq and Side-Channel Analysis-Evolution of an Attack, in Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009 , 2009. pp. 65--69.
File: | FDTC.2009.44 |
MicroEliece: McEliece for Embedded Devices, in Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009. pp. 49--64.
File: | 978-3-642-04138-9_4 |
Power Analysis of Single-Rail Storage Elements as Used in MDPL, in Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers , 2009. pp. 146--160.
File: | 978-3-642-14423-3_11 |
- Staff
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Jeremy Boy
- Finn Burmester
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Timothy Imort
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Tammo Polle
- Yannik Potdevin
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke