D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 9,308 73 World Ranking 7185 National Ranking 65

Overview

What is she best known for?

The fields of study she is best known for:

  • Cryptography
  • Operating system
  • Algorithm

The scientist’s investigation covers issues in Embedded system, Power analysis, Masking, Smart card and Cryptography. Her studies deal with areas such as Cryptographic hardware and Encryption, Advanced Encryption Standard as well as Embedded system. Her work carried out in the field of Power analysis brings together such families of science as Mutual information and Information security.

Smart card is the subject of her research, which falls under Computer security. Elisabeth Oswald interconnects Volume, Shuffling and Software implementation in the investigation of issues within Computer security. Cryptanalysis, Side channel attack and Block cipher are among the areas of Cryptography where the researcher is concentrating her efforts.

Her most cited work include:

  • Power Analysis Attacks: Revealing the Secrets of Smart Cards (1021 citations)
  • Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security) (536 citations)
  • The World is Not Enough: Another Look on Second-Order DPA (313 citations)

What are the main themes of her work throughout her whole career to date?

Her main research concerns Side channel attack, Cryptography, Power analysis, Computer security and Embedded system. Her Side channel attack study incorporates themes from Computer network, Theoretical computer science, Rank and Implementation. Her work on Cryptanalysis as part of general Cryptography study is frequently linked to NIST, therefore connecting diverse disciplines of science.

Her study in Power analysis is interdisciplinary in nature, drawing from both Elliptic curve, Key, Data mining and Elliptic curve cryptosystem. When carried out as part of a general Computer security research project, her work on Smart card, Masking, Template attack and Data in transit is frequently linked to work in Context, therefore connecting diverse disciplines of study. Her Embedded system study combines topics in areas such as Cryptographic hardware, Software implementation, Block cipher and AES implementations.

She most often published in these fields:

  • Side channel attack (41.13%)
  • Cryptography (33.06%)
  • Power analysis (29.84%)

What were the highlights of her more recent work (between 2016-2021)?

  • Side channel attack (41.13%)
  • Cryptography (33.06%)
  • Theoretical computer science (14.52%)

In recent papers she was focusing on the following fields of study:

Her scientific interests lie mostly in Side channel attack, Cryptography, Theoretical computer science, Algorithm and Software. Her Side channel attack study is associated with Computer security. Her studies deal with areas such as Field-programmable gate array, Measure and Key encapsulation as well as Cryptography.

Her study in the fields of Computational complexity theory under the domain of Algorithm overlaps with other disciplines such as Masking and Kernel Fisher discriminant analysis. Elisabeth Oswald has included themes like Slicing, Computer engineering and Implementation in her Software study. Her Masking study integrates concerns from other disciplines, such as Mathematical proof, Software countermeasures, Embedded system and Power analysis.

Between 2016 and 2021, her most popular works were:

  • Authenticated Encryption in the Face of Protocol and Side Channel Leakage (19 citations)
  • Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages (15 citations)
  • Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited (10 citations)

In her most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Programming language

Her primary scientific interests are in Side channel attack, Theoretical computer science, Reliability engineering, Cryptography and Computer security. The various areas that Elisabeth Oswald examines in her Side channel attack study include Field-programmable gate array, Computation, Software engineering and Authenticated encryption. She interconnects Graphical model, Inference and Power analysis in the investigation of issues within Theoretical computer science.

Her study connects Differential and Reliability engineering. Her Hardware security module study, which is part of a larger body of work in Cryptography, is frequently linked to Lattice-based cryptography, bridging the gap between disciplines. The Computer security study combines topics in areas such as Algorithm, Advice and Quantum computer.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Power Analysis Attacks: Revealing the Secrets of Smart Cards

Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)

2373 Citations

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)

841 Citations

An ASIC Implementation of the AES SBoxes

Johannes Wolkerstorfer;Elisabeth Oswald;Mario Lamberger.
the cryptographers track at the rsa conference (2002)

469 Citations

Successfully attacking masked AES hardware implementations

Stefan Mangard;Norbert Pramstaller;Elisabeth Oswald.
cryptographic hardware and embedded systems (2005)

402 Citations

A side-channel analysis resistant description of the AES s-box

Elisabeth Oswald;Stefan Mangard;Norbert Pramstaller;Vincent Rijmen.
fast software encryption (2005)

396 Citations

An AES smart card implementation resistant to power analysis attacks

Christoph Herbst;Elisabeth Oswald;Stefan Mangard.
applied cryptography and network security (2006)

321 Citations

Cryptographic Hardware and Embedded Systems Ches 2008

Elisabeth Oswald;Pankaj Rohatgi.
(2009)

319 Citations

The World is Not Enough: Another Look on Second-Order DPA

François-Xavier Standaert;Nicolas Veyrat-Charvillon;Elisabeth Oswald;Benedikt Gierlichs.
international conference on the theory and application of cryptology and information security (2010)

314 Citations

Power-analysis attack on an ASIC AES implementation

S.B. Ors;F. Gurkaynak;E. Oswald;B. Preneel.
international conference on information technology coding and computing (2004)

286 Citations

A comprehensive evaluation of mutual information analysis using a fair evaluation framework

Carolyn Whitnall;Elisabeth Oswald.
international cryptology conference (2011)

281 Citations

Best Scientists Citing Elisabeth Oswald

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 147

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 106

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Publications: 62

Emmanuel Prouff

Emmanuel Prouff

Université Paris Cité

Publications: 56

Christof Paar

Christof Paar

Max Planck Society

Publications: 55

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 47

Tim Güneysu

Tim Güneysu

Ruhr University Bochum

Publications: 45

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 41

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 35

Thomas Eisenbarth

Thomas Eisenbarth

University of Lübeck

Publications: 34

Vincent Rijmen

Vincent Rijmen

KU Leuven

Publications: 32

Bart Preneel

Bart Preneel

KU Leuven

Publications: 27

Stefan Mangard

Stefan Mangard

Graz University of Technology

Publications: 25

Pierre-Alain Fouque

Pierre-Alain Fouque

University of Rennes 1

Publications: 21

Christian Rechberger

Christian Rechberger

Graz University of Technology

Publications: 20

Jean-Sébastien Coron

Jean-Sébastien Coron

University of Luxembourg

Publications: 20

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.