default search action
Michael Tunstall
Person information
- affiliation: Rambus Cryptography Research Division, San Francisco, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c37]Mike Hamburg, Mike Tunstall, Qinglai Xiao:
Improvements to RSA Key Generation and CRT on Embedded Devices. CT-RSA 2021: 633-656 - [c36]Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos:
On Applying Boolean Masking to Exponents. ICETE (Selected Papers) 2021: 334-361 - [c35]Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos:
Boolean Exponent Splitting. SECRYPT 2021: 321-332 - 2020
- [c34]Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont:
Augmenting Leakage Detection Using Bootstrapping. COSADE 2020: 104-119 - [i27]Yuan Yao, Michael Tunstall, Elke De Mulder, Anton Kochepasov, Patrick Schaumont:
Augmenting Leakage Detection using Bootstrapping. IACR Cryptol. ePrint Arch. 2020: 508 (2020) - [i26]Lauren De Meyer, Elke De Mulder, Michael Tunstall:
On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software. IACR Cryptol. ePrint Arch. 2020: 1297 (2020) - [i25]Mike Hamburg, Mike Tunstall, Qinglai Xiao:
Improvements to RSA key generation and CRT on embedded devices. IACR Cryptol. ePrint Arch. 2020: 1507 (2020)
2010 – 2019
- 2019
- [j12]Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall:
Online template attacks. J. Cryptogr. Eng. 9(1): 21-36 (2019) - [j11]Michael Hutter, Michael Tunstall:
Constant-time higher-order Boolean-to-arithmetic masking. J. Cryptogr. Eng. 9(2): 173-184 (2019) - 2018
- [i24]Michael Tunstall, Louiza Papachristodoulou, Kostas Papagiannopoulos:
Boolean Exponent Splitting. IACR Cryptol. ePrint Arch. 2018: 1226 (2018) - 2017
- [p3]Michael Tunstall:
Smart Card Security. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 217-251 - [e4]Kerstin Lemke-Rust, Michael Tunstall:
Smart Card Research and Advanced Applications - 15th International Conference, CARDIS 2016, Cannes, France, November 7-9, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10146, Springer 2017, ISBN 978-3-319-54668-1 [contents] - 2016
- [c33]Sami Saab, Andrew Leiserson, Michael Tunstall:
Key extraction from the primary side of a switched-mode power supply. AsianHOST 2016: 1-7 - [i23]Michael Tunstall, Gilbert Goodwill:
Applying TVLA to Public Key Cryptographic Algorithms. IACR Cryptol. ePrint Arch. 2016: 513 (2016) - [i22]Michael Hutter, Michael Tunstall:
Constant-Time Higher-Order Boolean-to-Arithmetic Masking. IACR Cryptol. ePrint Arch. 2016: 1023 (2016) - 2015
- [j10]Michael Tunstall, Marc Joye:
The distributions of individual bits in the output of multiplicative operations. Cryptogr. Commun. 7(1): 71-90 (2015) - [c32]Jake Longo, Elke De Mulder, Dan Page, Michael Tunstall:
SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. CHES 2015: 620-640 - [c31]Neil Hanley, HeeSeok Kim, Michael Tunstall:
Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace. CT-RSA 2015: 431-448 - [c30]Duc-Phong Le, Chik How Tan, Michael Tunstall:
Randomizing the Montgomery Powering Ladder. WISTP 2015: 169-184 - [i21]Sami Saab, Andrew Leiserson, Michael Tunstall:
Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply. IACR Cryptol. ePrint Arch. 2015: 512 (2015) - [i20]Jake Longo, Elke De Mulder, Daniel Page, Michael Tunstall:
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip. IACR Cryptol. ePrint Arch. 2015: 561 (2015) - [i19]Duc-Phong Le, Chik How Tan, Michael Tunstall:
Randomizing the Montgomery Powering Ladder. IACR Cryptol. ePrint Arch. 2015: 657 (2015) - 2014
- [j9]Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane:
All-or-Nothing Transforms as a countermeasure to differential side-channel analysis. Int. J. Inf. Sec. 13(3): 291-304 (2014) - [c29]Jake Longo, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijn Stam, Michael Tunstall:
Simulatable Leakage: Analysis, Pitfalls, and New Constructions. ASIACRYPT (1) 2014: 223-242 - [c28]Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall:
Online Template Attacks. INDOCRYPT 2014: 21-36 - [c27]Neil Hanley, Máire O'Neill, Michael Tunstall, William P. Marnane:
Empirical evaluation of multi-device profiling side-channel attacks. SiPS 2014: 226-231 - [p2]Michael Tunstall:
Smart Card Security. Secure Smart Embedded Devices, Platforms and Applications 2014: 145-177 - 2013
- [j8]Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential fault analysis of AES: towards reaching its limits. J. Cryptogr. Eng. 3(2): 73-97 (2013) - [c26]Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald:
Masking Tables - An Underestimated Security Risk. FSE 2013: 425-444 - [i18]Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald:
Masking Tables - An Underestimated Security Risk. IACR Cryptol. ePrint Arch. 2013: 735 (2013) - 2012
- [j7]Roberto Avanzi, Simon Hoerder, Dan Page, Michael Tunstall:
Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. J. Cryptogr. Eng. 2(1): 75 (2012) - [c25]Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Compiler Assisted Masking. CHES 2012: 58-75 - [c24]Kimmo Järvinen, Céline Blondeau, Dan Page, Michael Tunstall:
Harnessing Biased Faults in Attacks on ECC-Based Signature Schemes. FDTC 2012: 72-82 - [c23]Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall:
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. LATINCRYPT 2012: 305-321 - [c22]Michael Tunstall:
Improved "Partial Sums"-based Square Attack on AES. SECRYPT 2012: 25-34 - [e3]Marc Joye, Michael Tunstall:
Fault Analysis in Cryptography. Information Security and Cryptography, Springer 2012, ISBN 978-3-642-29655-0 [contents] - [i17]Michael Tunstall:
Improved "Partial Sums"-based Square Attack on AES. IACR Cryptol. ePrint Arch. 2012: 280 (2012) - [i16]Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential Fault Analysis of AES: Towards Reaching its Limits. IACR Cryptol. ePrint Arch. 2012: 446 (2012) - [i15]Neil Hanley, HeeSeok Kim, Michael Tunstall:
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms. IACR Cryptol. ePrint Arch. 2012: 485 (2012) - [i14]Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall:
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. IACR Cryptol. ePrint Arch. 2012: 678 (2012) - 2011
- [j6]Neil Hanley, Michael Tunstall, William P. Marnane:
Using templates to distinguish multiplications from squaring operations. Int. J. Inf. Sec. 10(4): 255-266 (2011) - [j5]Michael Tunstall:
Practical complexity differential cryptanalysis and fault analysis of AES. J. Cryptogr. Eng. 1(3): 219-230 (2011) - [j4]Roberto Avanzi, Simon Hoerder, Dan Page, Michael Tunstall:
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. J. Cryptogr. Eng. 1(4): 271-281 (2011) - [c21]Antoine Amarilli, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall:
Can Code Polymorphism Limit Information Leakage? WISTP 2011: 1-21 - [c20]Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali:
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. WISTP 2011: 224-233 - [e2]Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall:
Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings. Lecture Notes in Computer Science 7011, Springer 2011, ISBN 978-3-642-24585-5 [contents] - [i13]Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall:
Can Code Polymorphism Limit Information Leakage? IACR Cryptol. ePrint Arch. 2011: 99 (2011) - [i12]Neil Hanley, Michael Tunstall, William P. Marnane:
Using Templates to Distinguish Multiplications from Squaring Operations. IACR Cryptol. ePrint Arch. 2011: 236 (2011) - [i11]Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:
Automatic Insertion of DPA Countermeasures. IACR Cryptol. ePrint Arch. 2011: 412 (2011) - [i10]Michael Tunstall:
Practical Complexity Differential Cryptanalysis and Fault Analysis of AES. IACR Cryptol. ePrint Arch. 2011: 453 (2011) - 2010
- [c19]Christophe Giraud, Erik Woodward Knudsen, Michael Tunstall:
Improved Fault Analysis of Signature Schemes. CARDIS 2010: 164-181 - [c18]Michael Tunstall, Marc Joye:
Coordinate Blinding over Large Prime Fields. CHES 2010: 443-455 - [c17]Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David F. Oswald:
Combined Implementation Attack Resistant Exponentiation. LATINCRYPT 2010: 305-322 - [c16]Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall:
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations. WISA 2010: 243-257 - [e1]Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron:
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6033, Springer 2010, ISBN 978-3-642-12367-2 [contents] - [i9]Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall:
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations. IACR Cryptol. ePrint Arch. 2010: 408 (2010) - [i8]Roberto Maria Avanzi, Simon Hoerder, Daniel Page, Michael Tunstall:
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems. IACR Cryptol. ePrint Arch. 2010: 479 (2010) - [i7]Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall:
Differential Fault Analysis of AES using a Single Multiple-Byte Fault. IACR Cryptol. ePrint Arch. 2010: 636 (2010)
2000 – 2009
- 2009
- [j3]Konstantinos Markantonakis, Michael Tunstall, Gerhard P. Hancke, Ioannis G. Askoxylakis, Keith Mayes:
Attacking smart card systems: Theory and practice. Inf. Secur. Tech. Rep. 14(2): 46-56 (2009) - [j2]Robert P. McEvoy, Colin C. Murphy, William P. Marnane, Michael Tunstall:
Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs. ACM Trans. Reconfigurable Technol. Syst. 2(1): 3:1-3:23 (2009) - [c15]Michael Tunstall:
Random Order m-ary Exponentiation. ACISP 2009: 437-451 - [c14]Marc Joye, Michael Tunstall:
Exponent Recoding and Regular Exponentiation Algorithms. AFRICACRYPT 2009: 334-349 - [c13]Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. ICISC 2009: 176-192 - [c12]Neil Hanley, Michael Tunstall, William P. Marnane:
Unknown Plaintext Template Attacks. WISA 2009: 148-162 - [i6]Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane:
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2009: 185 (2009) - [i5]Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall:
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. IACR Cryptol. ePrint Arch. 2009: 538 (2009) - [i4]Michael Tunstall, Debdeep Mukhopadhyay:
Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault. IACR Cryptol. ePrint Arch. 2009: 575 (2009) - 2008
- [c11]Frédéric Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, William P. Marnane:
Distinguishing Multiplications from Squaring Operations. Selected Areas in Cryptography 2008: 346-360 - 2007
- [c10]Khanh Nguyen, Michael Tunstall:
Montgomery Multiplication with Redundancy Check. FDTC 2007: 30-36 - [c9]Marc Joye, Michael Tunstall:
Securing OpenSSL against Micro-Architectural Attacks. SECRYPT 2007: 189-196 - [c8]Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane:
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. WISA 2007: 317-332 - [c7]Michael Tunstall, Olivier Benoît:
Efficient Use of Random Delays in Embedded Software. WISTP 2007: 27-38 - [p1]Constantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper:
Smart Card Security. Computational Intelligence in Information Assurance and Security 2007: 201-233 - 2006
- [j1]Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan:
The Sorcerer's Apprentice Guide to Fault Attacks. Proc. IEEE 94(2): 370-382 (2006) - [c6]Jacques J. A. Fournier, Michael Tunstall:
Cache Based Power Analysis Attacks on AES. ACISP 2006: 17-28 - [c5]Frédéric Amiel, Christophe Clavier, Michael Tunstall:
Fault Analysis of DPA-Resistant Algorithms. FDTC 2006: 223-236 - [c4]Michael Tunstall, Constantinos Markantonakis, Keith Mayes:
Inhibiting Card Sharing Attacks. IWSEC 2006: 239-251 - [i3]Olivier Benoît, Michael Tunstall:
Efficient Use of Random Delays. IACR Cryptol. ePrint Arch. 2006: 272 (2006) - 2005
- [c3]David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan:
Experimenting with Faults, Lattices and the DSA. Public Key Cryptography 2005: 16-28 - 2004
- [i2]Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan:
The Sorcerer's Apprentice Guide to Fault Attacks. IACR Cryptol. ePrint Arch. 2004: 100 (2004) - [i1]David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan:
Experimenting with Faults, Lattices and the DSA. IACR Cryptol. ePrint Arch. 2004: 277 (2004) - 2000
- [c2]David Naccache, Michael Tunstall:
How to Explain Side-Channel Leakage to Your Kids. CHES 2000: 229-230 - [c1]David M'Raïhi, David Naccache, Michael Tunstall:
Asymmetric Currency Rounding. Financial Cryptography 2000: 192-201
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint