dblp.uni-trier.dewww.uni-trier.de

Jean-Pierre Seifert Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
49EEJingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou: Hardware-software integrated approaches to defend against software cache-based side channel attacks. HPCA 2009: 393-404
48EEXinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert: Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. MobiSec 2009: 71-82
47EEShay Gueron, Jean-Pierre Seifert: On the Impossibility of Detecting Virtual Machine Monitors. SEC 2009: 143-151
2008
46 Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
45 Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008 IEEE Computer Society 2008
44EEMasoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang: Usage control platformization via trustworthy SELinux. ASIACCS 2008: 245-248
43EEJingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou: Deconstructing new cache designs for thwarting software cache-based side channel attacks. CSAW 2008: 25-34
42EEBasel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert: A general obligation model and continuity: enhanced policy enforcement engine for usage control. SACMAT 2008: 123-132
41EEMasoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert: Model-based behavioral attestation. SACMAT 2008: 175-184
40EEXinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu: Security Enforcement Model for Distributed Usage Control. SUTC 2008: 10-18
2007
39 Luca Breveglieri, Shay Gueron, Israel Koren, David Naccache, Jean-Pierre Seifert: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007 IEEE Computer Society 2007
38EEOnur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert: Predicting Secret Keys Via Branch Prediction. CT-RSA 2007: 225-242
37EEMasoom Alam, Jean-Pierre Seifert, Xinwen Zhang: A Model-Driven Framework for Trusted Computing Based Systems. EDOC 2007: 75-86
36EEOnur Aciiçmez, Jean-Pierre Seifert: Cheap Hardware Parallelism Implies Cheap Security. FDTC 2007: 80-91
35EEXinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei Xu: Flexible Authorization with Decentralized Access Control Model for Grid Computing. HASE 2007: 156-165
34EEOnur Aciiçmez, Shay Gueron, Jean-Pierre Seifert: New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. IMA Int. Conf. 2007: 185-203
33EEXinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert: A trusted mobile phone reference architecturevia secure kernel. STC 2007: 7-14
32EEBerthold Agreiter, Muhammad Alam, Ruth Breu, Michael Hafner, Alexander Pretschner, Jean-Pierre Seifert, Xinwen Zhang: A technical architecture for enforcing usage control requirements in service-oriented architectures. SWS 2007: 18-25
31EEShay Gueron, Jean-Pierre Seifert, Geoffrey Strongin, Derek Chiou, Resit Sendag, Joshua J. Yi: Where Does Security Stand? New Vulnerabilities vs. Trusted Computing. IEEE Micro 27(6): 25-35 (2007)
30EEOnur Acucmez, Jean-Pierre Seifert, Çetin Kaya Koç: Micro-Architectural Cryptanalysis. IEEE Security & Privacy 5(4): 62-64 (2007)
2006
29 Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings Springer 2006
28EEMichael Neve, Jean-Pierre Seifert, Zhenghong Wang: A refined look at Bernstein's AES side-channel analysis. ASIACCS 2006: 369
27EEArnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert: Secrecy Analysis in Protocol Composition Logic. ASIAN 2006: 197-213
26EEShay Gueron, Jean-Pierre Seifert: Is It Wise to Publish Your Public RSA Keys? FDTC 2006: 1-12
25EEJohannes Blömer, Martin Otto, Jean-Pierre Seifert: Sign Change Fault Attacks on Elliptic Curve Cryptosystems. FDTC 2006: 36-52
24EEMichael Neve, Jean-Pierre Seifert: Advances on Access-Driven Cache Attacks on AES. Selected Areas in Cryptography 2006: 147-162
2005
23EEJean-Pierre Seifert: On authenticated computing and RSA-based authentication. ACM Conference on Computer and Communications Security 2005: 122-127
22EERégis Leveugle, Yervant Zorian, Luca Breveglieri, André K. Nieuwland, Klaus Rothbart, Jean-Pierre Seifert: On-Line Testing for Secure Implementations: Design and Validation. IOLTS 2005: 211
2004
21EEWieland Fischer, Jean-Pierre Seifert: High-Speed Modular Multiplication. CT-RSA 2004: 264-277
2003
20EEJohannes Blömer, Martin Otto, Jean-Pierre Seifert: A new CRT-RSA algorithm secure against bellcore attacks. ACM Conference on Computer and Communications Security 2003: 311-320
19EEJohannes Blömer, Jean-Pierre Seifert: Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). Financial Cryptography 2003: 162-181
18EEWieland Fischer, Jean-Pierre Seifert: Unfolded Modular Multiplication. ISAAC 2003: 726-735
2002
17EEWieland Fischer, Jean-Pierre Seifert: Note on Fast Computation of Secret RSA Exponents. ACISP 2002: 136-143
16EEAntonio Valverde Garcia, Jean-Pierre Seifert: On the Implementation of the Advanced Encryption Standard on a Public-key Crypto-Coprocessor. CARDIS 2002: 135-146
15EEChristian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert: Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. CHES 2002: 260-275
14EEWieland Fischer, Jean-Pierre Seifert: Increasing the Bitlength of a Crypto-Coprocessor. CHES 2002: 71-81
2001
13EEJean-Pierre Seifert: Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation. CT-RSA 2001: 319-327
12EETanja Römer, Jean-Pierre Seifert: Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. E-smart 2001: 211-219
2000
11EEJean-Pierre Seifert: Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation Electronic Colloquium on Computational Complexity (ECCC) 7(78): (2000)
1999
10EEJin-yi Cai, George Havas, Bernard Mans, Ajay Nerurkar, Jean-Pierre Seifert, Igor Shparlinski: On Routing in Circulant Graphs. COCOON 1999: 360-369
9EENick Howgrave-Graham, Jean-Pierre Seifert: Extending Wiener's Attack in the Presence of Many Decrypting Exponents. CQRE 1999: 153-166
8EERoger Fischlin, Jean-Pierre Seifert: Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography. IMA Int. Conf. 1999: 244-257
7EEGeorge Havas, Jean-Pierre Seifert: The Complexity of the Extended GCD Problem. MFCS 1999: 103-113
6EEJohannes Blömer, Jean-Pierre Seifert: On the Complexity of Computing Short Linearly Independent Vectors and Short Bases in a Lattice. STOC 1999: 711-720
5EEOded Goldreich, Daniele Micciancio, Shmuel Safra, Jean-Pierre Seifert: Approximating Shortest Lattice Vectors is Not Harder Than Approximating Closest Lattice Vectors. Electronic Colloquium on Computational Complexity (ECCC) 6(2): (1999)
4EEOded Goldreich, Daniele Micciancio, Shmuel Safra, Jean-Pierre Seifert: Approximating Shortest Lattice Vectors is not Harder than Approximating Closest Lattice Vectors. Inf. Process. Lett. 71(2): 55-61 (1999)
1998
3EECarsten Rössner, Jean-Pierre Seifert: On the Hardness of Approximating Shortest Integer Relations among Rational Numbers. Theor. Comput. Sci. 209(1-2): 287-297 (1998)
1996
2 Carsten Rössner, Jean-Pierre Seifert: The Complexity of Approximate Optima for Greatest Common Divisor Computations. ANTS 1996: 307-322
1EECarsten Rössner, Jean-Pierre Seifert: Approximating Good Simultaneous Diophantine Approximations Is Almost NP-Hard. MFCS 1996: 494-505

Coauthor Index

1Onur Aciiçmez [33] [34] [36] [38] [43] [48] [49]
2Onur Acucmez [30]
3Berthold Agreiter [32]
4Masoom Alam [37] [41] [44]
5Muhammad Alam [32]
6Tamleek Ali [41]
7Christian Aumüller [15]
8Peter Bier [15]
9Johannes Blömer [6] [19] [20] [25]
10Ruth Breu [32] [42]
11Luca Breveglieri [22] [29] [39] [45]
12Jin-yi Cai [10]
13Derek Chiou [31]
14Anupam Datta [27]
15Ante Derek [27]
16Wieland Fischer [14] [15] [17] [18] [21]
17Roger Fischlin [8]
18Antonio Valverde Garcia [16]
19Oded Goldreich [4] [5]
20Shay Gueron [26] [31] [34] [39] [45] [47]
21Michael Hafner [32] [42]
22George Havas [7] [10]
23Peter Hofreiter [15]
24Nick Howgrave-Graham [9]
25Basel Katt [42]
26Çetin Kaya Koç [30] [38]
27Jingfei Kong [43] [49]
28Israel Koren [29] [39] [45]
29Régis Leveugle [22]
30Qi Li [35] [44]
31Bernard Mans [10]
32Daniele Micciancio [4] [5]
33John C. Mitchell [27]
34David Naccache [29] [39] [45]
35Mohammad Nauman [41]
36Ajay Nerurkar [10]
37Michael Neve [24] [28]
38André K. Nieuwland [22]
39Cristina Nita-Rotaru [46]
40Martin Otto [20] [25]
41Alexander Pretschner [32]
42Tanja Römer [12]
43Carsten Rössner [1] [2] [3]
44Klaus Rothbart [22]
45Arnab Roy [27]
46Shmuel Safra [4] [5]
47Ravi S. Sandhu [40]
48Resit Sendag [31]
49Igor Shparlinski [10]
50Geoffrey Strongin [31]
51Zhenghong Wang [28]
52Mingwei Xu [35]
53Shouhuai Xu [46]
54Joshua J. Yi [31]
55Xinwen Zhang [32] [33] [35] [37] [40] [41] [42] [44] [48]
56Huiyang Zhou [43] [49]
57Yervant Zorian [22]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)