Prof. Dr.-Ing. Thomas Eisenbarth
Institutsdirektor
Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG,
Raum 043
Email: | thomas.eisenbarth(at)uni-luebeck.de |
Phone: | +49 451 3101 6600 |
Fax: | +49 451 3101 6604 |
Kurzbiographie
Thomas Eisenbarth ist Professor für IT Sicherheit an der Universität zu Lübeck. Er studierte bis 2006 Elektro- und Informationstechnik an der Ruhr Universität Bochum, wo er bis 2009 am Horst Görtz Institut für IT-Sicherheit promovierte. Ab 2010 forschte er als Assistant Professor am Center for Cryptography and Information Security (CCIS) an der Florida Atlantic University. 2012 wechselte er an das Worcester Polytechnic Institute (WPI). Seit August 2017 ist er als Direktor des Instituts für IT Sicherheit an der Universität zu Lübeck.
Seine Forschungsinteressen umfassen:
- Systemsicherheit und Sichere Mikroarchitekturen
- Angewandte Kryptografie
- Seitenkanalangriffe, physische Sicherheit und Gegenmaßnahmen
- Sicherheit von Cloud und virtualisierten Systemen
Publikationen
2009
Vulnerability modeling of cryptographic hardware to power analysis attacks, Integration , vol. 42, no. 4, pp. 468--478, 2009.
Datei: | j.vlsi.2009.01.001 |
2008
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme, in Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings , 2008. pp. 203--220.
Datei: | 978-3-540-85174-5_12 |
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?, IACR Cryptology ePrint Archive , vol. 2008, pp. 349, 2008.
Datei: | 349 |
Susceptibility of eSTREAM Candidates towards Side Channel Analysis, 2008.
Datei: | 228371563_Susceptibility_of_eSTREAM_candidates_towards_side_channel_analysis |
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers, in IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008 , 2008. pp. 58--66.
Datei: | SIES.2008.4577681 |
Fast Hash-Based Signatures on Constrained Devices, in Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings , 2008. pp. 104--117.
Datei: | 978-3-540-85893-5_8 |
Efficient Hash-Based Signatures on Embedded Devices, 01 2008.
Datei: | 229001128_Efficient_Hash-Based_Signatures_on_Embedded_Devices |
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?, in 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA, USA , 2008. pp. 202--210.
Datei: | DFT.2008.53 |
2007
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations, in Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007. pp. 394--412.
Datei: | 978-3-540-74735-2_27 |
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies, in Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, July 16-19, 2007 , 2007. pp. 209--214.
Datei: | ICSAMOS.2007.4285753 |
A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers , vol. 24, no. 6, pp. 522--533, 2007.
Datei: | MDT.2007.178 |
Establishing Chain of Trust in Reconfigurable Hardware, in IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA , 2007. pp. 289--290.
Datei: | FCCM.2007.23 |
Performance Analysis of Contemporary LightWeight Block Ciphers on 8-bit Microcontrollers, 012007.
Datei: | a5f0b7c6e442406c0c97854eb97f8a21157c3b08 |
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits, in 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 26-28 September 2007, Rome, Italy. , 2007. pp. 508--516.
Datei: | DFT.2007.61 |
Reconfigurable trusted computing in hardware, in Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 , 2007. pp. 15--20.
Datei: | 1314354.1314360 |
Trusted computing for automotive systems: New approaches to enforce security for electronic systems in vehicles, pp. 227-237, 01 2007.
Datei: | 291856499_Trusted_computing_for_automotive_systems_New_approaches_to_enforce_security_for_electronic_systems_in_vehicles |
- Mitarbeiter*innen
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Jeremy Boy
- Finn Burmester
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Timothy Imort
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Tammo Polle
- Yannik Potdevin
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke