His primary areas of study are Embedded system, Computer security, Cache, Cloud computing and Exploit. When carried out as part of a general Embedded system research project, his work on Microcontroller is frequently linked to work in Implementation, therefore connecting diverse disciplines of study. His research in the fields of Power analysis and Side channel attack overlaps with other disciplines such as Pre-play attack.
In his research on the topic of Power analysis, Key is strongly related with Access control. His Cache study incorporates themes from Virtualization and Shared resource. His Cloud computing research focuses on Data deduplication and how it relates to Vulnerability, Virtual machine and Timing attack.
Thomas Eisenbarth mainly focuses on Computer security, Embedded system, Cache, Cryptography and Side channel attack. His Code, Lightweight cryptography and Malware study in the realm of Computer security interacts with subjects such as Privacy software. His research in Embedded system intersects with topics in Software, Smart card and Source code.
His work deals with themes such as Exploit, Cloud computing and Microarchitecture, which intersect with Cache. The study incorporates disciplines such as Key and Encryption in addition to Cryptography. His Side channel attack study integrates concerns from other disciplines, such as Secure multi-party computation, Computer network and Power analysis.
Thomas Eisenbarth mainly focuses on Computer security, Cache, Embedded system, Side channel attack and Cryptography. His work in Computer security addresses subjects such as Cloud computing, which are connected to disciplines such as Code. His study in Cache is interdisciplinary in nature, drawing from both Process, Interface, Deep learning, Artificial intelligence and Exploit.
His Exploit research includes elements of Timing attack and CPU cache. His Embedded system study which covers Dram that intersects with Reverse engineering, Dependency and Privilege. His Side channel attack research integrates issues from Scalability, Computer hardware, Zero-knowledge proof, Software and Information sensitivity.
Thomas Eisenbarth spends much of his time researching Cache, Embedded system, Computer security, Side channel attack and Exploit. His research is interdisciplinary, bridging the disciplines of Guard and Cache. His Embedded system research is multidisciplinary, incorporating perspectives in Dram, Speedup and Cryptography.
His Cryptography research incorporates themes from CPU cache, Key, Encryption and Source code. His biological study spans a wide range of topics, including Process and Cloud computing. Thomas Eisenbarth focuses mostly in the field of Side channel attack, narrowing it down to matters related to Software and, in some cases, Computation, CPU time and Information leakage.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Survey of Lightweight-Cryptography Implementations
T. Eisenbarth;S. Kumar.
IEEE Design & Test of Computers (2007)
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
Thomas Eisenbarth;Timo Kasper;Amir Moradi;Christof Paar.
international cryptology conference (2008)
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES
Gorka Irazoqui;Thomas Eisenbarth;Berk Sunar.
ieee symposium on security and privacy (2015)
Wait a Minute! A fast, Cross-VM Attack on AES
Gorka Irazoqui;Mehmet Sinan Inci;Thomas Eisenbarth;Berk Sunar.
recent advances in intrusion detection (2014)
Correlation-enhanced power analysis collision attack
Amir Moradi;Oliver Mischke;Thomas Eisenbarth.
cryptographic hardware and embedded systems (2010)
CacheZoom: How SGX Amplifies the Power of Cache Attacks
Ahmad Moghimi;Gorka Irazoqui;Thomas Eisenbarth.
cryptographic hardware and embedded systems (2017)
A survey of lighweight- cryptography implementations
Thomas Eisenbarth;Sandeep Kumar;Christof Paar;Axel Poschmann.
IEEE Design & Test of Computers (2007)
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud.
Mehmet Sinan Inci;Berk Gülmezoglu;Gorka Irazoqui Apecechea;Thomas Eisenbarth.
IACR Cryptology ePrint Archive (2015)
Cache Attacks Enable Bulk Key Recovery on the Cloud
Mehmet Sinan İnci;Berk Gulmezoglu;Gorka Irazoqui;Thomas Eisenbarth.
cryptographic hardware and embedded systems (2016)
Compact implementation and performance evaluation of block ciphers in ATtiny devices
Thomas Eisenbarth;Zheng Gong;Tim Güneysu;Stefan Heyse.
international conference on cryptology in africa (2012)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: