D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 5,049 94 World Ranking 7402 National Ranking 362

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Cryptography
  • Central processing unit

His primary areas of study are Embedded system, Computer security, Cache, Cloud computing and Exploit. When carried out as part of a general Embedded system research project, his work on Microcontroller is frequently linked to work in Implementation, therefore connecting diverse disciplines of study. His research in the fields of Power analysis and Side channel attack overlaps with other disciplines such as Pre-play attack.

In his research on the topic of Power analysis, Key is strongly related with Access control. His Cache study incorporates themes from Virtualization and Shared resource. His Cloud computing research focuses on Data deduplication and how it relates to Vulnerability, Virtual machine and Timing attack.

His most cited work include:

  • A Survey of Lightweight-Cryptography Implementations (330 citations)
  • On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme (221 citations)
  • S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES (220 citations)

What are the main themes of his work throughout his whole career to date?

Thomas Eisenbarth mainly focuses on Computer security, Embedded system, Cache, Cryptography and Side channel attack. His Code, Lightweight cryptography and Malware study in the realm of Computer security interacts with subjects such as Privacy software. His research in Embedded system intersects with topics in Software, Smart card and Source code.

His work deals with themes such as Exploit, Cloud computing and Microarchitecture, which intersect with Cache. The study incorporates disciplines such as Key and Encryption in addition to Cryptography. His Side channel attack study integrates concerns from other disciplines, such as Secure multi-party computation, Computer network and Power analysis.

He most often published in these fields:

  • Computer security (35.86%)
  • Embedded system (31.03%)
  • Cache (29.66%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (35.86%)
  • Cache (29.66%)
  • Embedded system (31.03%)

In recent papers he was focusing on the following fields of study:

Thomas Eisenbarth mainly focuses on Computer security, Cache, Embedded system, Side channel attack and Cryptography. His work in Computer security addresses subjects such as Cloud computing, which are connected to disciplines such as Code. His study in Cache is interdisciplinary in nature, drawing from both Process, Interface, Deep learning, Artificial intelligence and Exploit.

His Exploit research includes elements of Timing attack and CPU cache. His Embedded system study which covers Dram that intersects with Reverse engineering, Dependency and Privilege. His Side channel attack research integrates issues from Scalability, Computer hardware, Zero-knowledge proof, Software and Information sensitivity.

Between 2017 and 2021, his most popular works were:

  • MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX (46 citations)
  • MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX (46 citations)
  • CacheShield: Detecting Cache Attacks through Self-Observation (28 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Cryptography
  • Central processing unit

Thomas Eisenbarth spends much of his time researching Cache, Embedded system, Computer security, Side channel attack and Exploit. His research is interdisciplinary, bridging the disciplines of Guard and Cache. His Embedded system research is multidisciplinary, incorporating perspectives in Dram, Speedup and Cryptography.

His Cryptography research incorporates themes from CPU cache, Key, Encryption and Source code. His biological study spans a wide range of topics, including Process and Cloud computing. Thomas Eisenbarth focuses mostly in the field of Side channel attack, narrowing it down to matters related to Software and, in some cases, Computation, CPU time and Information leakage.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A Survey of Lightweight-Cryptography Implementations

T. Eisenbarth;S. Kumar.
IEEE Design & Test of Computers (2007)

600 Citations

On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme

Thomas Eisenbarth;Timo Kasper;Amir Moradi;Christof Paar.
international cryptology conference (2008)

372 Citations

S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES

Gorka Irazoqui;Thomas Eisenbarth;Berk Sunar.
ieee symposium on security and privacy (2015)

309 Citations

Wait a Minute! A fast, Cross-VM Attack on AES

Gorka Irazoqui;Mehmet Sinan Inci;Thomas Eisenbarth;Berk Sunar.
recent advances in intrusion detection (2014)

300 Citations

Correlation-enhanced power analysis collision attack

Amir Moradi;Oliver Mischke;Thomas Eisenbarth.
cryptographic hardware and embedded systems (2010)

232 Citations

CacheZoom: How SGX Amplifies the Power of Cache Attacks

Ahmad Moghimi;Gorka Irazoqui;Thomas Eisenbarth.
cryptographic hardware and embedded systems (2017)

173 Citations

A survey of lighweight- cryptography implementations

Thomas Eisenbarth;Sandeep Kumar;Christof Paar;Axel Poschmann.
IEEE Design & Test of Computers (2007)

145 Citations

Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud.

Mehmet Sinan Inci;Berk Gülmezoglu;Gorka Irazoqui Apecechea;Thomas Eisenbarth.
IACR Cryptology ePrint Archive (2015)

135 Citations

Cache Attacks Enable Bulk Key Recovery on the Cloud

Mehmet Sinan İnci;Berk Gulmezoglu;Gorka Irazoqui;Thomas Eisenbarth.
cryptographic hardware and embedded systems (2016)

131 Citations

Compact implementation and performance evaluation of block ciphers in ATtiny devices

Thomas Eisenbarth;Zheng Gong;Tim Güneysu;Stefan Heyse.
international conference on cryptology in africa (2012)

119 Citations

Best Scientists Citing Thomas Eisenbarth

Christof Paar

Christof Paar

Max Planck Society

Publications: 53

Tim Güneysu

Tim Güneysu

Ruhr University Bochum

Publications: 41

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 41

Yuval Yarom

Yuval Yarom

University of Adelaide

Publications: 38

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 37

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 33

Stefan Mangard

Stefan Mangard

Graz University of Technology

Publications: 29

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 24

Daniel Genkin

Daniel Genkin

University of Michigan–Ann Arbor

Publications: 23

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 18

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 18

Berk Sunar

Berk Sunar

Worcester Polytechnic Institute

Publications: 18

Cristiano Giuffrida

Cristiano Giuffrida

Vrije Universiteit Amsterdam

Publications: 16

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 14

Onur Mutlu

Onur Mutlu

ETH Zurich

Publications: 13

Frank Piessens

Frank Piessens

KU Leuven

Publications: 12

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.