Prof. Dr.-Ing. Thomas Eisenbarth

Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
About Me
I am a Professor of IT Security at the University of Lübeck. I received my Ph.D. in ECE from Ruhr-Universität Bochum, Germany, where I was a member of the Horst Goertz Institute for IT Security (HGI). Starting in 2010, I spent two years at the Center for Cryptology and Information Security (CCIS) at Florida Atlantic University. In 2012, I joined the Department of Electrical and Computer Engineering at WPI. Since August 2017 I am the Director of the Institute of IT Security at the University of Lübeck.
Since October 2024, I am the head of the STEM sections (the non-medical departments) of University of Lübeck.
My research interests are in:
- Systems security, software security and code analysis
- Applied Cryptology
- Secure virtualization, computer architecture and trusted execution environments
- Side channel analysis, physical attacks and their prevention
Publications
2016
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not, Cheon, Jung Hee and Takagi, Tsuyoshi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, pp. 819--843.
ISBN: | 978-3-662-53887-6 |
File: | 10.1007%2F978-3-662-53887-6_30 |
2015
Near Collision Side Channel Attacks, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 277--292.
File: | 978-3-319-31301-6_17 |
Systematic Reverse Engineering of Cache Slice Selection in Intel Processors, in 2015 Euromicro Conference on Digital System Design, DSD 2015, Madeira, Portugal, August 26-28, 2015 , 2015. pp. 629--636.
File: | DSD.2015.56 |
SSA: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 , 2015. pp. 591--604.
File: | SP.2015.42 |
Silent Simon: A threshold implementation under 100 slices, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 1--6.
File: | HST.2015.7140227 |
Power analysis of the t-private logic style for FPGAs, in IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 , 2015. pp. 68--71.
File: | HST.2015.7140239 |
On the security margin of MAC striping, Inf. Process. Lett. , vol. 115, no. 11, pp. 899--902, 2015.
File: | j.ipl.2015.05.009 |
Faster Leakage Detection and Exploitation, in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 , 2015. pp. 21--29.
DOI: | 10.1145/2808414.2808419 |
File: | 301419853_Faster_Leakage_Detection_and_Exploitation |
Masking Large Keys in Hardware: A Masked Implementation of McEliece, in Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers , 2015. pp. 293--309.
File: | 978-3-319-31301-6_18 |
Lucky 13 Strikes Back, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 , 2015. pp. 85--96.
File: | 2714576.2714625 |
Know Thy Neighbor: Crypto Library Detection in Cloud, PoPETs , vol. 2015, no. 1, pp. 25--40, 2015.
File: | popets-2015-0003.xml |
Guest Editorial: Special Section on Embedded System Security, IEEE Embedded Systems Letters , vol. 7, no. 1, pp. 1-2, 2015.
File: | LES.2015.2404940 |
Differential Power Analysis of a McEliece Cryptosystem, in Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers , 2015. pp. 538--556.
DOI: | 10.1007/978-3-319-28166-7_26 |
File: | 534 |
A Faster and More Realistic Flush+Reload Attack on AES, in Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers , 2015. pp. 111--126.
File: | 978-3-319-21476-4_8 |
2014
Non-Linear Collision Analysis, in Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers , 2014. pp. 198--214.
File: | 978-3-319-13066-8_13 |
Wait a minute! A fast, Cross-VM attack on AES, IACR Cryptology ePrint Archive , vol. 2014, pp. 435, 2014.
File: | 435 |
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince, in Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers , 2014. pp. 208--220.
File: | 978-3-662-44774-1_17 |
Fine Grain Cross-VM Attacks on Xen and VMware, in 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014 , 2014. pp. 737--744.
DOI: | 10.1109/BDCloud.2014.102 |
File: | 248 |
Balanced Encoding to Mitigate Power Analysis: A Case Study, IACR Cryptology ePrint Archive , vol. 2014, pp. 952, 2014.
File: | 952 |
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, in Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers , 2014. pp. 215--232.
File: | 978-3-319-16763-3_13 |
2013
A Performance Boost for Hash-Based Signatures, in Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday , 2013. pp. 166--182.
File: | 978-3-642-42001-6_13 |
On the Vulnerability of Low Entropy Masking Schemes, in Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers , 2013. pp. 44--60.
File: | 978-3-319-08302-5_4 |
2012
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices, in Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings , 2012. pp. 172--187.
File: | 978-3-642-31410-0_11 |
Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods, IEEE Trans. VLSI Syst. , vol. 20, no. 9, pp. 1578--1589, 2012.
File: | TVLSI.2011.2160375 |
Wide Collisions in Practice, in Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings , 2012. pp. 329--343.
File: | 978-3-642-31284-7_20 |

- Staff
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Manojkumar Krishnaramanujam Baskaran
- Joseph Bienhüls
- Jeremy Boy
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Eike Hoffmann
- Timothy Imort
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Tammo Polle
- Yannik Potdevin
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann