Frederic Stumpf
Cited by
Cited by
Side-channel analysis of PUFs and fuzzy extractors
D Merli, D Schuster, F Stumpf, G Sigl
International Conference on Trust and Trustworthy Computing, 33-47, 2011
A robust integrity reporting protocol for remote attestation
F Stumpf, O Tafreschi, P Röder, C Eckert
Second Workshop on Advances in Trusted Computing (WATC’06 Fall), 25-36, 2006
A cache timing attack on AES in virtualization environments
M Weiß, B Heinz, F Stumpf
International Conference on Financial Cryptography and Data Security, 314-328, 2012
Semi-invasive EM attack on FPGA RO PUFs and countermeasures
D Merli, D Schuster, F Stumpf, G Sigl
Proceedings of the Workshop on Embedded Systems Security, 1-9, 2011
Improving the quality of ring oscillator PUFs on FPGAs
D Merli, F Stumpf, C Eckert
Proceedings of the 5th workshop on embedded systems security, 1-9, 2010
Localized electromagnetic analysis of cryptographic implementations
J Heyszl, S Mangard, B Heinz, F Stumpf, G Sigl
Cryptographers’ track at the RSA conference, 231-244, 2012
Complementary IBS: Application specific error correction for PUFs
M Hiller, D Merli, F Stumpf, G Sigl
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 1-6, 2012
Detecting node compromise in hybrid wireless sensor networks using attestation techniques
C Krauß, F Stumpf, C Eckert
European Workshop on Security in Ad-hoc and Sensor Networks, 203-217, 2007
Enhancing trusted platform modules with hardware-based virtualization techniques
F Stumpf, C Eckert
2008 Second International Conference on Emerging Security Information …, 2008
An approach to a trustworthy system architecture using virtualization
F Stumpf, M Benz, M Hermanowski, C Eckert
International Conference on Autonomic and Trusted Computing, 191-202, 2007
Localized electromagnetic analysis of RO PUFs
D Merli, J Heyszl, B Heinz, D Schuster, F Stumpf, G Sigl
2013 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2013
Improving the scalability of platform attestation
F Stumpf, A Fuchs, S Katzenbeisser, C Eckert
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 1-10, 2008
Protecting PUF Error Correction by Codeword Masking.
D Merli, F Stumpf, G Sigl
IACR Cryptol. ePrint Arch. 2013, 334, 2013
A new security architecture for smartcards utilizing PUFs
T Esbach, W Fumy, O Kulikovska, D Merli, D Schuster, F Stumpf
ISSE 2012 Securing Electronic Business Processes, 180-194, 2012
Improving mobile device security with operating system-level virtualization
S Wessel, M Huber, F Stumpf, C Eckert
Computers & Security 52, 207-220, 2015
Trust, security and privacy in vanets a multilayered security architecture for c2c-communication
F Stumpf, L Fischer, C Eckert
VDI BERICHTE 2016, 55, 2007
Improving mobile device security with operating system-level virtualization
S Wessel, F Stumpf, I Herdt, C Eckert
IFIP International Information Security Conference, 148-161, 2013
Comprehensive analysis of software countermeasures against fault attacks
N Theissing, D Merli, M Smola, F Stumpf, G Sigl
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 404-409, 2013
A cost-effective FPGA-based fault simulation environment
A Janning, J Heyszl, F Stumpf, G Sigl
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 21-31, 2011
PAL-privacy augmented LTE: A privacy-preserving scheme for vehicular LTE communication
D Angermeier, A Kiening, F Stumpf
Proceeding of the tenth ACM international workshop on Vehicular inter …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20