His scientific interests lie mostly in Computer security, Embedded system, Side channel attack, Cryptanalysis and Smart card. His Computer security research includes themes of Software, Mobile computing and Mobile telephony. His Embedded system research includes elements of Physical unclonable function, State, Static random-access memory and Integrated circuit.
His work carried out in the field of Side channel attack brings together such families of science as Information leakage, CPU cache, Cache, Code and Branch predictor. His study focuses on the intersection of Cryptanalysis and fields such as Fault with connections in the field of Advanced Encryption Standard, Adversary and Signature. He interconnects Algorithm and AES implementations in the investigation of issues within Smart card.
His primary scientific interests are in Computer security, Embedded system, Cryptography, Algorithm and Side channel attack. His Computer security research incorporates themes from Cellular network, Computer network and Mobile device. His Embedded system research is multidisciplinary, incorporating perspectives in Arbiter, Smart card, Chip and Integrated circuit.
The concepts of his Cryptography study are interwoven with issues in Fault, Theoretical computer science and Modular exponentiation, Public-key cryptography. Computation and Modular arithmetic are the primary areas of interest in his Algorithm study. His research integrates issues of Branch predictor and Cache in his study of Side channel attack.
Jean-Pierre Seifert spends much of his time researching Computer security, Cloud computing, Embedded system, Field-programmable gate array and Side channel attack. His study of Blockchain is a part of Computer security. His Cloud computing research is multidisciplinary, relying on both Virtual machine, Anomaly detection, Distributed computing and Encryption.
His research in Embedded system intersects with topics in Plaintext, Adversary, Key generation and Chip. As a part of the same scientific study, Jean-Pierre Seifert usually deals with the Field-programmable gate array, concentrating on Key and frequently concerns with Amplifier, Microcontroller and Reduction. Jean-Pierre Seifert combines subjects such as Photonics, Optoelectronics, Linear system and Complex programmable logic device with his study of Side channel attack.
The scientist’s investigation covers issues in Embedded system, Field-programmable gate array, Computer security, Arbiter and Thermal laser stimulation. His biological study spans a wide range of topics, including Plaintext, Adversary, Scheme and Physical security. His studies in Field-programmable gate array integrate themes in fields like Key generation, Control reconfiguration, Chip, Authentication and Fault.
His Computer security study frequently intersects with other fields, such as Base station. His study looks at the relationship between Arbiter and fields such as Linear system, as well as how they intersect with chemical problems. His studies deal with areas such as Multiplication, Karatsuba algorithm, Arithmetic and Modular exponentiation as well as Side channel attack.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
Johannes Blömer;Jean-Pierre Seifert.
financial cryptography (2003)
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
Johannes Blömer;Jean-Pierre Seifert.
financial cryptography (2003)
Detecting unauthorized use of computing devices based on behavioral patterns
Liang Xie;Xinwen Zhang;Jean-Pierre Seifert;Onur Aciicmez.
(2008)
Detecting unauthorized use of computing devices based on behavioral patterns
Liang Xie;Xinwen Zhang;Jean-Pierre Seifert;Onur Aciicmez.
(2008)
Predicting secret keys via branch prediction
Onur Acıiçmez;Çetin Kaya Koç;Jean-Pierre Seifert.
the cryptographers track at the rsa conference (2007)
Predicting secret keys via branch prediction
Onur Acıiçmez;Çetin Kaya Koç;Jean-Pierre Seifert.
the cryptographers track at the rsa conference (2007)
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
Christian Aumüller;Peter Bier;Wieland Fischer;Peter Hofreiter.
cryptographic hardware and embedded systems (2002)
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
Christian Aumüller;Peter Bier;Wieland Fischer;Peter Hofreiter.
cryptographic hardware and embedded systems (2002)
Cloning Physically Unclonable Functions
Clemens Helfmeier;Christian Boit;Dmitry Nedospasov;Jean-Pierre Seifert.
hardware oriented security and trust (2013)
Cloning Physically Unclonable Functions
Clemens Helfmeier;Christian Boit;Dmitry Nedospasov;Jean-Pierre Seifert.
hardware oriented security and trust (2013)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Samsung (South Korea)
Technische Universität Braunschweig
University of Haifa
University of California, Santa Barbara
Max Planck Society
University of Vienna
University of Massachusetts Amherst
École Normale Supérieure
Tel Aviv University
Télécom ParisTech
Polish Academy of Sciences
Tanta University
University of Potsdam
Hebrew University of Jerusalem
Kyoto University
Northeastern University
Council of Scientific and Industrial Research
University of Liverpool
National Institute for Environmental Studies
University of Edinburgh
McGill University
Uppsala University
Yale University
Harvard University
Imperial College London
University of Duisburg-Essen