The scientist’s investigation covers issues in Embedded system, Power analysis, Masking, Smart card and Cryptography. Her studies deal with areas such as Cryptographic hardware and Encryption, Advanced Encryption Standard as well as Embedded system. Her work carried out in the field of Power analysis brings together such families of science as Mutual information and Information security.
Smart card is the subject of her research, which falls under Computer security. Elisabeth Oswald interconnects Volume, Shuffling and Software implementation in the investigation of issues within Computer security. Cryptanalysis, Side channel attack and Block cipher are among the areas of Cryptography where the researcher is concentrating her efforts.
Her main research concerns Side channel attack, Cryptography, Power analysis, Computer security and Embedded system. Her Side channel attack study incorporates themes from Computer network, Theoretical computer science, Rank and Implementation. Her work on Cryptanalysis as part of general Cryptography study is frequently linked to NIST, therefore connecting diverse disciplines of science.
Her study in Power analysis is interdisciplinary in nature, drawing from both Elliptic curve, Key, Data mining and Elliptic curve cryptosystem. When carried out as part of a general Computer security research project, her work on Smart card, Masking, Template attack and Data in transit is frequently linked to work in Context, therefore connecting diverse disciplines of study. Her Embedded system study combines topics in areas such as Cryptographic hardware, Software implementation, Block cipher and AES implementations.
Her scientific interests lie mostly in Side channel attack, Cryptography, Theoretical computer science, Algorithm and Software. Her Side channel attack study is associated with Computer security. Her studies deal with areas such as Field-programmable gate array, Measure and Key encapsulation as well as Cryptography.
Her study in the fields of Computational complexity theory under the domain of Algorithm overlaps with other disciplines such as Masking and Kernel Fisher discriminant analysis. Elisabeth Oswald has included themes like Slicing, Computer engineering and Implementation in her Software study. Her Masking study integrates concerns from other disciplines, such as Mathematical proof, Software countermeasures, Embedded system and Power analysis.
Her primary scientific interests are in Side channel attack, Theoretical computer science, Reliability engineering, Cryptography and Computer security. The various areas that Elisabeth Oswald examines in her Side channel attack study include Field-programmable gate array, Computation, Software engineering and Authenticated encryption. She interconnects Graphical model, Inference and Power analysis in the investigation of issues within Theoretical computer science.
Her study connects Differential and Reliability engineering. Her Hardware security module study, which is part of a larger body of work in Cryptography, is frequently linked to Lattice-based cryptography, bridging the gap between disciplines. The Computer security study combines topics in areas such as Algorithm, Advice and Quantum computer.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Power Analysis Attacks: Revealing the Secrets of Smart Cards
Stefan Mangard;Elisabeth Oswald;Thomas Popp.
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Stefan Mangard;Elisabeth Oswald;Thomas Popp.
An ASIC Implementation of the AES SBoxes
Johannes Wolkerstorfer;Elisabeth Oswald;Mario Lamberger.
the cryptographers track at the rsa conference (2002)
Successfully attacking masked AES hardware implementations
Stefan Mangard;Norbert Pramstaller;Elisabeth Oswald.
cryptographic hardware and embedded systems (2005)
A side-channel analysis resistant description of the AES s-box
Elisabeth Oswald;Stefan Mangard;Norbert Pramstaller;Vincent Rijmen.
fast software encryption (2005)
An AES smart card implementation resistant to power analysis attacks
Christoph Herbst;Elisabeth Oswald;Stefan Mangard.
applied cryptography and network security (2006)
Cryptographic Hardware and Embedded Systems Ches 2008
Elisabeth Oswald;Pankaj Rohatgi.
The World is Not Enough: Another Look on Second-Order DPA
François-Xavier Standaert;Nicolas Veyrat-Charvillon;Elisabeth Oswald;Benedikt Gierlichs.
international conference on the theory and application of cryptology and information security (2010)
Power-analysis attack on an ASIC AES implementation
S.B. Ors;F. Gurkaynak;E. Oswald;B. Preneel.
international conference on information technology coding and computing (2004)
A comprehensive evaluation of mutual information analysis using a fair evaluation framework
Carolyn Whitnall;Elisabeth Oswald.
international cryptology conference (2011)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: