Prof. Dr.-Ing. Thomas Eisenbarth

Photo of Thomas  Eisenbarth

Institutsdirektor


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 043

Email: thomas.eisenbarth(at)uni-luebeck.de
Phone: +49 451 3101 6600
Fax: +49 451 3101 6604

Kurzbiographie

Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.

Seine Forschungsinteressen umfassen:

  • Systemsicherheit und Sichere Mikroarchitekturen
  • Angewandte Kryptografie
  • Seitenkanalangriffe, physische Sicherheit und Gegenmaßnahmen
  • Sicherheit von Cloud und virtualisierten Systemen

Publikationen

2009

Amir Moradi, Mahmoud Salmasizadeh, Mohammad Taghi Manzuri Shalmani, and Thomas Eisenbarth,
Vulnerability modeling of cryptographic hardware to power analysis attacks, Integration , vol. 42, no. 4, pp. 468--478, 2009.
Datei: j.vlsi.2009.01.001

2008

Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and Mohammad T. Manzuri Shalmani,
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme, in Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings , 2008. pp. 203--220.
Datei: 978-3-540-85174-5_12
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, and Christopher Wolf,
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?, IACR Cryptology ePrint Archive , vol. 2008, pp. 349, 2008.
Datei: 349
Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi, and Elisabeth Oswald,
Susceptibility of eSTREAM Candidates towards Side Channel Analysis, 2008.
Datei: 228371563_Susceptibility_of_eSTREAM_candidates_towards_side_channel_analysis
Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, and Christof Paar,
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers, in IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008 , 2008. pp. 58--66.
Datei: SIES.2008.4577681
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes A. Buchmann, and Christof Paar,
Fast Hash-Based Signatures on Constrained Devices, in Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings , 2008. pp. 104--117.
Datei: 978-3-540-85893-5_8
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, and Christof Paar,
Efficient Hash-Based Signatures on Embedded Devices, 01 2008.
Datei: 229001128_Efficient_Hash-Based_Signatures_on_Embedded_Devices
Francesco Regazzoni, Thomas Eisenbarth, Luca Breveglieri, Paolo Ienne, and Israel Koren,
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?, in 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA, USA , 2008. pp. 202--210.
Datei: DFT.2008.53

2007

Andrey Bogdanov, Thomas Eisenbarth, and Andy Rupp,
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations, in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007. pp. 394--412.
Datei: 978-3-540-74735-2_27
Francesco Regazzoni, Stephane Badel, Thomas Eisenbarth, Johann Großschädl, Axel Poschmann, Zeynep Toprak Deniz, Marco Macchetti, Laura Pozzi, Christof Paar, Yusuf Leblebici, and Paolo Ienne,
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies, in Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, July 16-19, 2007 , 2007. pp. 209--214.
Datei: ICSAMOS.2007.4285753
Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, and Leif Uhsadel,
A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers , vol. 24, no. 6, pp. 522--533, 2007.
Datei: MDT.2007.178
Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, and Russell Tessier,
Establishing Chain of Trust in Reconfigurable Hardware, in IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA , 2007. pp. 289--290.
Datei: FCCM.2007.23
Soren Rinne, Thomas Eisenbarth, and Christof Paar,
Performance Analysis of Contemporary LightWeight Block Ciphers on 8-bit Microcontrollers, 012007.
Datei: a5f0b7c6e442406c0c97854eb97f8a21157c3b08
Francesco Regazzoni, Thomas Eisenbarth, Johann Großschädl, Luca Breveglieri, Paolo Ienne, Israel Koren, and Christof Paar,
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits, in 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 26-28 September 2007, Rome, Italy. , 2007. pp. 508--516.
Datei: DFT.2007.61
Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, and Marko Wolf,
Reconfigurable trusted computing in hardware, in Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 , 2007. pp. 15--20.
Datei: 1314354.1314360
Andrey Bogdanov, Thomas Eisenbarth, M. Wolf, and Thomas Wollinger,
Trusted computing for automotive systems: New approaches to enforce security for electronic systems in vehicles, pp. 227-237, 01 2007.
Datei: 291856499_Trusted_computing_for_automotive_systems_New_approaches_to_enforce_security_for_electronic_systems_in_vehicles