Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sven Bauer is active.

Publication


Featured researches published by Sven Bauer.


international workshop constructive side-channel analysis and secure design | 2012

Attacking exponent blinding in RSA without CRT

Sven Bauer

A standard SPA protection for RSA implementations is exponent blinding (see [7]). Fouque et al., [4] and more recently Schindler and Itoh, [8] have described side-channel attacks against such implementations. The attack in [4] requires that the attacker knows some bits of the blinded exponent with certainty. The attack methods of [8] can be defeated by choosing a sufficiently large blinding factor (about 64 bit). In this paper we start from a more realistic model for the information an attacker can obtain by simple power analysis (SPA) than the one that forms the base of the attack in [4]. We show how the methods of [4] can be extended to work in this setting. This new attack works, under certain restrictions, even for long blinding factors (i.e. 64 bit or more).


Archive | 2003

Modular inversion that is protected against espionage

Sven Bauer


Archive | 2017

Hardened White Box Implementation 2

Hermann Drexler; Sven Bauer; Jürgen Pulkus


Archive | 2016

Verfahren zum Testen und zum Härten von Softwareapplikationen

Hermann Drexler; Sven Bauer


Archive | 2011

METHOD FOR CHECKING WHETHER PROGRAM INSTRUCTIONS HAVE BEEN EXECUTED BY A PORTABLE END DEVICE

Sven Bauer


Archive | 2010

Verfahren zur Durchführung einer Applikation mit Hilfe eines tragbaren Datenträgers

Sven Bauer


Archive | 2008

Cryptographic computation method for participants of voice over Internet protocol (VoIP) connection involves performing cryptographic computation at least partly in safety module after accomplishing part of key administrative minutes

Hans Aschauer; Sven Bauer


Archive | 2007

Switching from boolean to arithmetic masking

Sven Bauer


Archive | 2007

Cryptographical calculations for VoIP connections

Hans Aschauer; Sven Bauer


Archive | 2017

Kryptoalgorithmus mit schlüsselabhängigem maskiertem Rechenschritt (SBOX-Aufruf)

Sven Bauer; Hermann Drexler; Jürgen Pulkus

Collaboration


Dive into the Sven Bauer's collaboration.

Researchain Logo
Decentralizing Knowledge