scispace - formally typeset
O

Oliver Mischke

Researcher at Ruhr University Bochum

Publications -  23
Citations -  779

Oliver Mischke is an academic researcher from Ruhr University Bochum. The author has contributed to research in topics: Side channel attack & Field-programmable gate array. The author has an hindex of 12, co-authored 23 publications receiving 718 citations. Previous affiliations of Oliver Mischke include Infineon Technologies.

Papers
More filters
Posted Content

Correlation-Enhanced Power Analysis Collision Attack.

TL;DR: In this article, a side-channel based collision attack is proposed to break an AES implementation based on the corrected version of the masked S-box of Canright and Batina presented at ACNS 2008.
Book ChapterDOI

Correlation-enhanced power analysis collision attack

TL;DR: This work shows that the principles of collision attacks can be adapted to efficiently break some masked hardware implementation of the AES which still have first-order leakage.
Book ChapterDOI

On the power of fault sensitivity analysis and collision side-channel attacks in a combined setting

TL;DR: Two solutions are presented; both extract leakage information by the fault sensitivity analysis method while each one applies a slightly different collision attack to deduce the secret information without the need of any hypothetical leakage model.
Book ChapterDOI

On the simplicity of converting leakages from multivariate to univariate: case study of a glitch-resistant masking scheme

TL;DR: This paper provides a guideline on how to implement Shamir's secret sharing scheme, and provides practical side-channel evaluations based on a Virtex-5 FPGA, demonstrating that the implemented scheme is indeed secure against univariate power analysis attacks given a basic measurement setup.
Proceedings ArticleDOI

MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-processor

TL;DR: This paper presents compact FPGA-based architectures for standardized elliptic curve cryptography over prime fields and presents two implementations, not fixed to a single curve and support point multiplications for both NIST curves P-256 and P-224.