D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 51 Citations 16,432 179 World Ranking 3456 National Ranking 26

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Topology
  • Cryptography

Computer security, Cache, Embedded system, Smart card and Side channel attack are his primary areas of study. His Computer security research is multidisciplinary, incorporating elements of Electronic circuit, Cloud computing and AND-OR-Invert. His study in Cache is interdisciplinary in nature, drawing from both Dram, Software security assurance and Central processing unit.

His work deals with themes such as Logic gate, CMOS, Encryption and AES implementations, which intersect with Embedded system. Stefan Mangard has included themes like Cryptanalysis, Cryptography and Power analysis in his Smart card study. His research integrates issues of Cycles per instruction, Electronic engineering, Three-input universal logic gate and Leakage in his study of Side channel attack.

His most cited work include:

  • Power Analysis Attacks: Revealing the Secrets of Smart Cards (1021 citations)
  • Spectre Attacks: Exploiting Speculative Execution (593 citations)
  • Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security) (536 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Embedded system, Computer security, Side channel attack, Cryptography and Power analysis. His Embedded system research focuses on Encryption and how it connects with Authentication. His Computer security research integrates issues from Software security assurance, Cloud computing and Cache.

His Cache research is multidisciplinary, relying on both Central processing unit, Process and Instruction set. Stefan Mangard has researched Side channel attack in several fields, including Android, Computer network, Mobile device and Leakage. His research in Power analysis focuses on subjects like Smart card, which are connected to Cryptanalysis.

He most often published in these fields:

  • Embedded system (31.58%)
  • Computer security (29.47%)
  • Side channel attack (28.95%)

What were the highlights of his more recent work (between 2016-2021)?

  • Embedded system (31.58%)
  • Computer security (29.47%)
  • Side channel attack (28.95%)

In recent papers he was focusing on the following fields of study:

Stefan Mangard mainly investigates Embedded system, Computer security, Side channel attack, Encryption and Software. His Embedded system study integrates concerns from other disciplines, such as Exploit, Control flow, Compiler and Pointer. His Computer security research includes elements of Software security assurance, Cloud computing and Cache.

His biological study spans a wide range of topics, including Implementation, Android, Keystroke logging and Power analysis. His Software research incorporates themes from Wireless, Masking, Hardware security module, Randomness and Computation. His work focuses on many connections between Smart card and other disciplines, such as Information sensitivity, that overlap with his field of interest in Mobile device.

Between 2016 and 2021, his most popular works were:

  • Spectre Attacks: Exploiting Speculative Execution (593 citations)
  • Meltdown: reading kernel memory from user space (382 citations)
  • Malware Guard Extension: Using SGX to Conceal Cache Attacks (176 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Topology
  • Programming language

His primary areas of investigation include Computer security, Cache, Side channel attack, Exploit and Cloud computing. Stefan Mangard combines subjects such as User space and Implementation with his study of Computer security. Stefan Mangard interconnects Software, Process, Instruction set and Branch predictor in the investigation of issues within Cache.

The Side channel attack study combines topics in areas such as Speculative execution, Software security assurance, Central processing unit and Power analysis. The concepts of his Exploit study are interwoven with issues in Timing attack, Control flow, Embedded system and Keystroke logging. When carried out as part of a general Embedded system research project, his work on Hardware implementations is frequently linked to work in Masking, therefore connecting diverse disciplines of study.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Power Analysis Attacks: Revealing the Secrets of Smart Cards

Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)

2494 Citations

Power Analysis Attacks: Revealing the Secrets of Smart Cards

Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)

2494 Citations

Spectre Attacks: Exploiting Speculative Execution

Paul Kocher;Jann Horn;Anders Fogh;Daniel Genkin.
ieee symposium on security and privacy (2019)

1811 Citations

Spectre Attacks: Exploiting Speculative Execution

Paul Kocher;Jann Horn;Anders Fogh;Daniel Genkin.
ieee symposium on security and privacy (2019)

1406 Citations

Meltdown: reading kernel memory from user space

Moritz Lipp;Michael Schwarz;Daniel Gruss;Thomas Prescher.
usenix security symposium (2018)

840 Citations

Meltdown: reading kernel memory from user space

Moritz Lipp;Michael Schwarz;Daniel Gruss;Thomas Prescher.
usenix security symposium (2018)

840 Citations

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)

830 Citations

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Stefan Mangard;Elisabeth Oswald;Thomas Popp.
(2007)

830 Citations

Masked dual-rail pre-charge logic : DPA-resistance without routing constraints

Thomas Popp;Stefan Mangard.
Lecture Notes in Computer Science (2005)

517 Citations

Masked dual-rail pre-charge logic : DPA-resistance without routing constraints

Thomas Popp;Stefan Mangard.
Lecture Notes in Computer Science (2005)

517 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Stefan Mangard

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 151

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 120

Thomas Eisenbarth

Thomas Eisenbarth

University of Lübeck

Publications: 58

Christof Paar

Christof Paar

Max Planck Institute for Security and Privacy

Publications: 56

Emmanuel Prouff

Emmanuel Prouff

Apple (France)

Publications: 55

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 52

Lejla Batina

Lejla Batina

Radboud University Nijmegen

Publications: 49

Elisabeth Oswald

Elisabeth Oswald

University of Klagenfurt

Publications: 47

Tim Güneysu

Tim Güneysu

Ruhr University Bochum

Publications: 42

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 39

Takafumi Aoki

Takafumi Aoki

Tohoku University

Publications: 37

Berk Sunar

Berk Sunar

Worcester Polytechnic Institute

Publications: 36

Yuval Yarom

Yuval Yarom

University of Adelaide

Publications: 36

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 35

Daniel Genkin

Daniel Genkin

University of Michigan–Ann Arbor

Publications: 33

Luca Benini

Luca Benini

ETH Zurich

Publications: 30

Trending Scientists

Tao Zha

Tao Zha

Federal Reserve Bank of Atlanta

Ramakrishnan Srikant

Ramakrishnan Srikant

Google (United States)

Wenbin Wang

Wenbin Wang

University of Science and Technology Beijing

Hong-Bin Yao

Hong-Bin Yao

University of Science and Technology of China

Jianguo Hou

Jianguo Hou

University of Science and Technology of China

John G. Scandalios

John G. Scandalios

North Carolina State University

Raghavendra Gadagkar

Raghavendra Gadagkar

Indian Institute of Science

Sean C. Daugherty

Sean C. Daugherty

University of Maryland, Baltimore

Maria-Paz Viveros

Maria-Paz Viveros

Complutense University of Madrid

Jan H. Kamphuis

Jan H. Kamphuis

University of Amsterdam

Lise Fox

Lise Fox

University of South Florida

Nicholas J. Patronas

Nicholas J. Patronas

National Institutes of Health

Vincenzo Berghella

Vincenzo Berghella

Thomas Jefferson University

Jane A. Mitchell

Jane A. Mitchell

National Institutes of Health

Irene M. Ghobrial

Irene M. Ghobrial

Harvard University

Michael J. Lynch

Michael J. Lynch

University of South Florida

Something went wrong. Please try again later.