D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 46 Citations 8,478 267 World Ranking 4409 National Ranking 196

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • Computer network

His scientific interests lie mostly in Computer security, Embedded system, Side channel attack, Cryptanalysis and Smart card. His Computer security research includes themes of Software, Mobile computing and Mobile telephony. His Embedded system research includes elements of Physical unclonable function, State, Static random-access memory and Integrated circuit.

His work carried out in the field of Side channel attack brings together such families of science as Information leakage, CPU cache, Cache, Code and Branch predictor. His study focuses on the intersection of Cryptanalysis and fields such as Fault with connections in the field of Advanced Encryption Standard, Adversary and Signature. He interconnects Algorithm and AES implementations in the investigation of issues within Smart card.

His most cited work include:

  • Detecting unauthorized use of computing devices based on behavioral patterns (311 citations)
  • Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) (285 citations)
  • Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures (206 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer security, Embedded system, Cryptography, Algorithm and Side channel attack. His Computer security research incorporates themes from Cellular network, Computer network and Mobile device. His Embedded system research is multidisciplinary, incorporating perspectives in Arbiter, Smart card, Chip and Integrated circuit.

The concepts of his Cryptography study are interwoven with issues in Fault, Theoretical computer science and Modular exponentiation, Public-key cryptography. Computation and Modular arithmetic are the primary areas of interest in his Algorithm study. His research integrates issues of Branch predictor and Cache in his study of Side channel attack.

He most often published in these fields:

  • Computer security (30.91%)
  • Embedded system (15.64%)
  • Cryptography (13.45%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (30.91%)
  • Cloud computing (5.45%)
  • Embedded system (15.64%)

In recent papers he was focusing on the following fields of study:

Jean-Pierre Seifert spends much of his time researching Computer security, Cloud computing, Embedded system, Field-programmable gate array and Side channel attack. His study of Blockchain is a part of Computer security. His Cloud computing research is multidisciplinary, relying on both Virtual machine, Anomaly detection, Distributed computing and Encryption.

His research in Embedded system intersects with topics in Plaintext, Adversary, Key generation and Chip. As a part of the same scientific study, Jean-Pierre Seifert usually deals with the Field-programmable gate array, concentrating on Key and frequently concerns with Amplifier, Microcontroller and Reduction. Jean-Pierre Seifert combines subjects such as Photonics, Optoelectronics, Linear system and Complex programmable logic device with his study of Side channel attack.

Between 2016 and 2021, his most popular works were:

  • On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs (37 citations)
  • Taking Control of SDN-based Cloud Systems via the Data Plane (24 citations)
  • PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary (23 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • Programming language

The scientist’s investigation covers issues in Embedded system, Field-programmable gate array, Computer security, Arbiter and Thermal laser stimulation. His biological study spans a wide range of topics, including Plaintext, Adversary, Scheme and Physical security. His studies in Field-programmable gate array integrate themes in fields like Key generation, Control reconfiguration, Chip, Authentication and Fault.

His Computer security study frequently intersects with other fields, such as Base station. His study looks at the relationship between Arbiter and fields such as Linear system, as well as how they intersect with chemical problems. His studies deal with areas such as Multiplication, Karatsuba algorithm, Arithmetic and Modular exponentiation as well as Side channel attack.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

Johannes Blömer;Jean-Pierre Seifert.
financial cryptography (2003)

510 Citations

Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

Johannes Blömer;Jean-Pierre Seifert.
financial cryptography (2003)

510 Citations

Detecting unauthorized use of computing devices based on behavioral patterns

Liang Xie;Xinwen Zhang;Jean-Pierre Seifert;Onur Aciicmez.
(2008)

392 Citations

Detecting unauthorized use of computing devices based on behavioral patterns

Liang Xie;Xinwen Zhang;Jean-Pierre Seifert;Onur Aciicmez.
(2008)

392 Citations

Predicting secret keys via branch prediction

Onur Acıiçmez;Çetin Kaya Koç;Jean-Pierre Seifert.
the cryptographers track at the rsa conference (2007)

370 Citations

Predicting secret keys via branch prediction

Onur Acıiçmez;Çetin Kaya Koç;Jean-Pierre Seifert.
the cryptographers track at the rsa conference (2007)

370 Citations

Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures

Christian Aumüller;Peter Bier;Wieland Fischer;Peter Hofreiter.
cryptographic hardware and embedded systems (2002)

368 Citations

Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures

Christian Aumüller;Peter Bier;Wieland Fischer;Peter Hofreiter.
cryptographic hardware and embedded systems (2002)

368 Citations

Cloning Physically Unclonable Functions

Clemens Helfmeier;Christian Boit;Dmitry Nedospasov;Jean-Pierre Seifert.
hardware oriented security and trust (2013)

303 Citations

Cloning Physically Unclonable Functions

Clemens Helfmeier;Christian Boit;Dmitry Nedospasov;Jean-Pierre Seifert.
hardware oriented security and trust (2013)

303 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Jean-Pierre Seifert

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 59

Berk Sunar

Berk Sunar

Worcester Polytechnic Institute

Publications: 31

Thomas Eisenbarth

Thomas Eisenbarth

University of Lübeck

Publications: 31

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 26

Ramesh Karri

Ramesh Karri

New York University

Publications: 25

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 25

Yuval Yarom

Yuval Yarom

University of Adelaide

Publications: 25

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 24

Rajarshi Gupta

Rajarshi Gupta

Coinbase

Publications: 23

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Publications: 20

Timothy Sherwood

Timothy Sherwood

University of California, Santa Barbara

Publications: 16

Vinay Sridhara

Vinay Sridhara

Balbix

Publications: 16

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 15

Ryan Kastner

Ryan Kastner

University of California, San Diego

Publications: 15

Marc Joye

Marc Joye

Zama

Publications: 13

Pierre-Alain Fouque

Pierre-Alain Fouque

University of Rennes

Publications: 13

Trending Scientists

Janusz Kacprzyk

Janusz Kacprzyk

Polish Academy of Sciences

A.A. El-Sebaii

A.A. El-Sebaii

Tanta University

Ulla Wollenberger

Ulla Wollenberger

University of Potsdam

Yechezkel Barenholz

Yechezkel Barenholz

Hebrew University of Jerusalem

Kenji Hashimoto

Kenji Hashimoto

Kyoto University

Xiao-Xia Liu

Xiao-Xia Liu

Northeastern University

Mailadil Thomas Sebastian

Mailadil Thomas Sebastian

Council of Scientific and Industrial Research

Richard G. Hartnoll

Richard G. Hartnoll

University of Liverpool

Tsuyoshi Fujita

Tsuyoshi Fujita

National Institute for Environmental Studies

Richard R. Ribchester

Richard R. Ribchester

University of Edinburgh

Howard Chertkow

Howard Chertkow

McGill University

Bengt Långström

Bengt Långström

Uppsala University

Richard A. Ehrenkranz

Richard A. Ehrenkranz

Yale University

Timothy E. Wilens

Timothy E. Wilens

Harvard University

Athol U. Wells

Athol U. Wells

Imperial College London

Dirk Schadendorf

Dirk Schadendorf

University of Duisburg-Essen

Something went wrong. Please try again later.