Unknown Plaintext Template Attacks Neil Hanley, Michael Tunstall and William P. Marnane To appear in Workshop on Information Security Applications – WISA 2009. |
[J3] | Smart Card Security – Theory and Practice [ doi ] Konstantinos Markantonakis, Michael Tunstall, Gerhard Hancke, Ioannis Askoxylakis, and Keith Mayes In Information Security Technical Report 14:46–56. Elsevier, 2009. |
[J2] | Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs [ doi ] Robert P. McEvoy, Colin C. Murphy, William P. Marnane, and Michael Tunstall In ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2(1):1–23. ACM, 2009. |
[J1] | The
Sorcerer's Apprentice Guide to Fault Attacks [
ieeexplore ] Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and Claire Whelan In Proceedings of the IEEE, Special Issue on Cryptography and Security 94(2):370–382. IEEE, 2006. |
[C18] | Distinguishing Multiplications from Squaring Operations [ pdf ] Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, and William P. Marnane In R. Avanzi, L. Keliher, and F. Sica, Eds., Selected Areas in Cryptography – SAC 2008, vol. 5394 of Lecture Notes in Computer Science, pp. 346–360, Springer-Verlag, 2009. |
[C17] | Random Order m-ary Exponentiation [ pdf ] Michael Tunstall In C. Boyd and J. Gonzalez Nieto, Eds., Australasian Conference on Information Security and Privacy – ACISP 2009, vol. 5594 of Lecture Notes in Computer Science, pp. 437–451. Springer-Verlag, 2009. |
[C16] | Exponent Recoding and Regular Exponentiation Algorithms [ pdf ] Marc Joye and Michael Tunstall In B. Preneel, Ed., Progress in Cryptology – AFRICACRYPT 2009, vol. 5580 of Lecture Notes in Computer Science, pp. 334–349. Springer-Verlag, 2009. |
[C15] | Side Channel Analysis of an Automotive Microprocessor [ pdf ] Mark D. Hamilton, Michael Tunstall, Emanuel M. Popovici, and William P. Marnane In IET Irish Signals and System Conference – ISSC 2008, pp. 4–9. IET, 2008. |
[C14] | Fault Injection Platform for Block Ciphers [ pdf ] Brian Baldwin, Emanuel M. Popovici, Michael Tunstall, and William P. Marnane In IET Irish Signals and System Conference – ISSC 2008, pp. 10–15. IET, 2008. |
[C13] | Differential Power Analysis of HMAC based on SHA-2 on an FPGA, and Countermeasures [ pdf ] Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, and William P. Marnane In S. Kim, M. Yung, and H.-W. Lee, Eds., Workshop on Information Security Applications – WISA 2007, vol. 4867 of Lecture Notes in Computer Science, pp. 317–332. Springer-Verlag, 2007. |
[C12] | Montgomery Multiplication with Redundancy Check [ ieeexplore ] Khanh Nguyen and Michael Tunstall In L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds., Fault Diagnosis and Tolerance in Cryptography 2007 – FDTC 07, pp. 30–36, IEEE, 2007. |
It has been suggested that the above paper is the same as that presented by Shay Gueron at FDTC 2004 (included in the proceedings of FDTC 2006 – springerlink) but this is not in fact the case. | |
[C11] | Correlation Power Analysis of Large Word Sizes [ pdf ] Michael Tunstall, Neil Hanley, Robert P. McEvoy, Claire Whelan, Colin C. Murphy, and William P. Marnane In IET Irish Signals and System Conference – ISSC 2007, pp. 145–150. IET, 2007. |
[C10] | Securing OpenSSL Against Micro-Architectural Attacks [ pdf ] Marc Joye and Michael Tunstall In J. Hernando, E. Fernández-Medina, and M. Malek, Eds., International Conference on Security and Cryptography – SECRYPT 2007, pp. 189–196, INSTICC Press, 2007. |
[C9] | Efficient Use of Random Delays in Embedded Software [ pdf ] Michael Tunstall and Olivier Benoit In D. Sauveron, K. Markantonakis, A. Bilas, and J.-J. Quisquater, Eds., Information Security Theory and Practices 2007 – Smart Cards, Mobile and Ubiquitous Computing Systems – WISTP 2007, vol. 4462 of Lecture Notes in Computer Science, pp. 27–38, Springer-Verlag, 2007. |
[C8] | Inhibiting Card Sharing Attacks [ pdf ] Michael Tunstall, Konstantinos Markantonakis, and Keith Mayes In H. Yoshiura, K. Sakurai, K. Rannenberg, Y. Murayama, and S. Kawamura, Eds., Advances in Information Security and Computer Science, 1st International Workshop on Security – IWSEC 2006, vol. 4266 of Lecture Notes in Computer Science, pp. 239–251, Springer-Verlag, 2006. |
[C7] | Fault Analysis of DPA Resistant Algorithms [ pdf ] Frederic Amiel, Christophe Clavier, and Michael Tunstall In L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, Eds., Workshop on Fault Diagnosis and Tolerance in Cryptography 2006 – FDTC 2006, vol. 4236 of Lecture Notes in Computer Science, pp. 223–236, Springer-Verlag, 2006. |
[C6] | Cache
Based Power Analysis Attacks on AES [ pdf
] Jacques Fournier and Michael Tunstall In L. M. Batten and R. Safavi-Naini, Eds., Australasian Conference on Information Security and Privacy – ACISP 2006, vol. 4058 of Lecture Notes in Computer Science, pp. 17–28, Springer-Verlag, 2006. |
[C5] | Computational Improvements to Differential Side Channel Attacks [ pdf ] David Naccache, Michael Tunstall, and Claire Whelan NATO Security through Science Series D: Information and Communication Security, vol. 2, IOS Press, pp. 26–35, 2006. |
[C4] | Round Reduction Using Faults [ pdf ] Hamid Choukri and Michael Tunstall In L. Breveglieri and I. Koren, Eds., Workshop on Fault Diagnosis and Tolerance in Cryptography 2005 – FDTC 2005, pp. 13–24, 2005. |
[C3] | Experimenting with Faults,
Lattices and the DSA [
pdf ] David Naccache, Phong Q. Nguyen, Michael Tunstall, and Claire Whelan In S. Vaudenay, Ed., Public Key Cryptography – PKC 2005, vol. 3386 of Lecture Notes in Computer Science, pp. 16–28, Springer-Verlag, 2005. |
---|---|
[C2] | How to
Explain Side-channel Leakage to Your Kids? [ pdf
] David Naccache and Michael Tunstall In C. K. Koc and C. Paar, Eds., Cryptographic Hardware and Embedded Systems – CHES 2000, vol. 1965 of Lecture Notes in Computer Science, pp. 229–230, Springer-Verlag, 2000. |
[C1] | Asymmetric
Currency Rounding [ pdf
] David M'Raihi, David Naccache, and Michael Tunstall In Y. Frankel, Ed., Financial Cryptography, vol. 1962 of Lecture Notes in Computer Science, pp. 192–201, Springer-Verlag, 2000. |
![]() |
Smart Cards Konstantinos Markantonakis, Damien Sauveron, Keith Mayes, and Michael Tunstall Chapter in H. Bidgoli, Ed., Handbook of Technology Management, vol. 2, Supply Chain Management, Marketing and Advertising, and Global Management, pp. 248–264, Wiley, 2010. [ Ordering Information ] |
![]() | Smart Card Security Michael Tunstall Chapter in K. Mayes and K. Markantonakis, Eds., Smart Cards, Tokens, Security and Applications, pp. 195–228, Springer-Verlag, 2008. [ Springerlink ] |
![]() | Smart Cards: Communication Protocols and Applications Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, and Michael Tunstall Chapter in H. Bidgoli, Ed., Handbook of Computer Networks, vol. 3, pp. 251–268, Wiley, 2007. [ Ordering Information ] |
![]() |
Smart Card Security Konstantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, and Fred Piper Chapter in N. Nedjah, A. Abraham, and L. M. Mourelle, Eds., Computational Intelligence in Information Assurance and Security, vol. 57 of Studies in Computational Intelligence, pp. 201–233, Springer-Verlag, 2007. [ Springerlink ] |
![]() |
Smart Card
Security Michael Tunstall, Sebastien Petit, and Stephanie Porte Chapter in H. Bidgoli, Ed., Handbook of Information Security, pp. 326–341, Wiley, 2006. [ Ordering information ] |
---|---|
![]() |
Fault
Attacks Hamid Choukri and Michael Tunstall Chapter in H. Bidgoli, Ed., Handbook of Information Security, pp. 230–240, Wiley, 2006. [ Ordering information ] |
[P10] |
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis [ eprint ] Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy and William P. Marnane |
[P9] | Physical Security of Smart Cards [ pdf ] Michael Tunstall Seminar at Limerick Institute of Technology, 2008. |
[P8] | Distinguishing Multiplications from Squaring Operations [ pdf ] Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan and William P. Marnane Claude Shannon Institute Workshop on Coding and Cryptography, Cork, 2008. |
[P7] | All-or-Nothing Transforms as a Differential Power Analysis Countermeasure [ pdf ] Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy and William P. Marnane Poster presented at the rump session of Cryptographic Hardware and Embedded Systems – CHES 2008. |
[P6] | Differential Power Analysis of the HMAC Algorithm [ pdf ] Robert P. McEvoy, Michael Tunstall, Claire Whelan, Neil Hanley, Colin C. Murphy and William P. Marnane Poster presented at the rump session of Cryptographic Hardware and Embedded Systems – CHES 2007. |
[P5] | Efficient Use of Random Delays [ eprint ] Olivier Benoit and Michael Tunstall |
[P4] | Enhancing the Conditional Access Module Security in Light of Smart Card Sharing Attacks [ presentation ] Konstantinos Markantonakis, Michael Tunstall, and Keith Mayes e-Smart, September 2006. |
[P3] | Attacks on Smart Cards [ pdf ]
Presented as part of Royal Holloway's Smart Card course taken by students of the MSc. Information Security and MSc. Secure Electronic Commerce courses in 2006. |
[P2] | Explaining Differential Fault Analysis on DES [ presentation ] Christophe Clavier and Michael Tunstall BCRI Workshop on Coding and Cryptography, Cork, 2006. |
[P1] | The
Sorcerer's Apprentice Guide to Fault Attacks [ presentation ] [ eprint ] Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and Claire Whelan Workshop on Fault Diagnosis an Tolerance in Cryptography, in association with DSN 2004 – The International Conference on Dependable Systems and Networks, June 2004. |
---|
Frederic Amiel Ioannis Askoxylakis Brian Baldwin Hagai Bar-El Olivier Benoit Hamid Choukri Christophe Clavier Benoit Feix Jacques Fournier Mark D. Hamilton Gerhard Hancke Neil Hanley Marc Joye Konstantinos Markantonakis | Keith Mayes David M'Raihi Fred Piper William P. Marnane Robert P. McEvoy Colin C. Murphy David Naccache Khanh Nguyen Phong Q. Nguyen Sebastien Petit Emanuel M. Popovici Stephanie Porte Damien Sauveron Claire Whelan |
---|