Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jens Rüdinger is active.

Publication


Featured researches published by Jens Rüdinger.


international conference on networking | 2007

Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack

Jens Rüdinger; Adolf Finger

This paper deals with the question of the influence of the design of cryptographic algorithm on their side channel vulnerability. On the example of the DPA attack by Kocher the complexity of the attack and their dependency on algorithmic parameters is analyzed. It is shown that the careful selection or design of algorithms can increase the security of implementations of algorithms in addition to and independent from conventional DPA attack countermeasures.


international conference on telecommunications | 2009

Key dependent operation and algorithm specific complexity of statistical side channel attacks

Jens Rüdinger; Adolf Finger

This paper analyzes the design of cryptographic algorithm and the effect of their vulnerability towards statistical side channel attacks. On the example of the DPA attack by Kocher the complexity of the statistical side channel attacks and their dependency on algorithmic parameters is shown. In particular key dependent operation are considered and their effect is illustrated on the example of the block cipher algorithm AES and Twofish. It is shown that the careful selection or design of algorithms can increase the security of implementations of algorithms in addition to and independent from conventional DPA attack countermeasures.


Archive | 2002

SYSTEM, METHOD AND SMART CARD FOR ACCESSING A PLURALITY OF NETWORKS

Tim Evans; Dierk Dohmann; Jens Rüdinger; Keith Edward Mayes; Lee Power; Stephen Babbage


Archive | 2012

Change of subscription data in an identification module

Holger Jacobs; Jens Rüdinger


Archive | 2012

CHANGE OF THE SUBSCRIPTION IN AN IDENTIFICATION MODULE

Holger Jacobs; Jens Rüdinger


Archive | 2008

Method for verification of authentication functions, involves transmitting reply message to mobile network which is generated with parameters alternatively maintained at mobile terminal

Jens Rüdinger


Archive | 2004

Device and method for securing and monitoring protected data

Dierk Dohmann; Jens Rüdinger


Archive | 2012

Wechsel der Subskription in einem Identifizierungsmodul

Holger Jacobs; Jens Rüdinger


Archive | 2012

Wechsel von Subskriptionsdaten in einem Identifizierungsmodul

Holger Jacobs; Jens Rüdinger


Archive | 2012

Changement de souscription dans un module d'identification

Holger Jacobs; Jens Rüdinger

Collaboration


Dive into the Jens Rüdinger's collaboration.

Top Co-Authors

Avatar

Adolf Finger

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge