Jens Rüdinger
Vodafone
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jens Rüdinger.
international conference on networking | 2007
Jens Rüdinger; Adolf Finger
This paper deals with the question of the influence of the design of cryptographic algorithm on their side channel vulnerability. On the example of the DPA attack by Kocher the complexity of the attack and their dependency on algorithmic parameters is analyzed. It is shown that the careful selection or design of algorithms can increase the security of implementations of algorithms in addition to and independent from conventional DPA attack countermeasures.
international conference on telecommunications | 2009
Jens Rüdinger; Adolf Finger
This paper analyzes the design of cryptographic algorithm and the effect of their vulnerability towards statistical side channel attacks. On the example of the DPA attack by Kocher the complexity of the statistical side channel attacks and their dependency on algorithmic parameters is shown. In particular key dependent operation are considered and their effect is illustrated on the example of the block cipher algorithm AES and Twofish. It is shown that the careful selection or design of algorithms can increase the security of implementations of algorithms in addition to and independent from conventional DPA attack countermeasures.
Archive | 2002
Tim Evans; Dierk Dohmann; Jens Rüdinger; Keith Edward Mayes; Lee Power; Stephen Babbage
Archive | 2012
Holger Jacobs; Jens Rüdinger
Archive | 2012
Holger Jacobs; Jens Rüdinger
Archive | 2008
Jens Rüdinger
Archive | 2004
Dierk Dohmann; Jens Rüdinger
Archive | 2012
Holger Jacobs; Jens Rüdinger
Archive | 2012
Holger Jacobs; Jens Rüdinger
Archive | 2012
Holger Jacobs; Jens Rüdinger