Publications

To Appear

Unknown Plaintext Template Attacks 
Neil Hanley, Michael Tunstall and William P. Marnane
To appear in Workshop on Information Security Applications – WISA 2009.

Journal

[J3] Smart Card Security – Theory and Practice  [ doi ]
Konstantinos Markantonakis, Michael Tunstall, Gerhard Hancke, Ioannis Askoxylakis, and Keith Mayes
In Information Security Technical Report 14:46–56. Elsevier, 2009.
[J2]Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs  [ doi ]
Robert P. McEvoy, Colin C. Murphy, William P. Marnane, and Michael Tunstall
In ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2(1):1–23. ACM, 2009.
[J1] The Sorcerer's Apprentice Guide to Fault Attacks  [ ieeexplore ]
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and Claire Whelan
In Proceedings of the IEEE, Special Issue on Cryptography and Security 94(2):370–382. IEEE, 2006.

Proceedings

[C18] Distinguishing Multiplications from Squaring Operations  [ pdf ]
Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, and William P. Marnane
In R. Avanzi, L. Keliher, and F. Sica, Eds., Selected Areas in Cryptography – SAC 2008, vol. 5394 of Lecture Notes in Computer Science, pp. 346–360, Springer-Verlag, 2009.
[C17] Random Order m-ary Exponentiation  [ pdf ]
Michael Tunstall
In C. Boyd and J. Gonzalez Nieto, Eds., Australasian Conference on Information Security and Privacy – ACISP 2009, vol. 5594 of Lecture Notes in Computer Science, pp. 437–451. Springer-Verlag, 2009.
[C16] Exponent Recoding and Regular Exponentiation Algorithms  [ pdf ]
Marc Joye and Michael Tunstall
In B. Preneel, Ed., Progress in Cryptology – AFRICACRYPT 2009, vol. 5580 of Lecture Notes in Computer Science, pp. 334–349. Springer-Verlag, 2009.
[C15]Side Channel Analysis of an Automotive Microprocessor  [ pdf ]
Mark D. Hamilton, Michael Tunstall, Emanuel M. Popovici, and William P. Marnane
In IET Irish Signals and System Conference – ISSC 2008, pp. 4–9. IET, 2008.
[C14]Fault Injection Platform for Block Ciphers  [ pdf ]
Brian Baldwin, Emanuel M. Popovici, Michael Tunstall, and William P. Marnane
In IET Irish Signals and System Conference – ISSC 2008, pp. 10–15. IET, 2008.
[C13]Differential Power Analysis of HMAC based on SHA-2 on an FPGA, and Countermeasures  [ pdf ]
Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, and William P. Marnane
In S. Kim, M. Yung, and H.-W. Lee, Eds., Workshop on Information Security Applications – WISA 2007, vol. 4867 of Lecture Notes in Computer Science, pp. 317–332. Springer-Verlag, 2007.
[C12] Montgomery Multiplication with Redundancy Check  [ ieeexplore ]
Khanh Nguyen and Michael Tunstall
In L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds., Fault Diagnosis and Tolerance in Cryptography 2007 –
FDTC 07, pp. 30–36, IEEE, 2007.

It has been suggested that the above paper is the same as that presented by Shay Gueron at FDTC 2004 (included in the proceedings of FDTC 2006 – springerlink) but this is not in fact the case.
[C11] Correlation Power Analysis of Large Word Sizes  [ pdf ]
Michael Tunstall, Neil Hanley, Robert P. McEvoy, Claire Whelan, Colin C. Murphy, and William P. Marnane
In IET Irish Signals and System Conference – ISSC 2007, pp. 145–150. IET, 2007.
[C10] Securing OpenSSL Against Micro-Architectural Attacks  [ pdf ]
Marc Joye and Michael Tunstall
In J. Hernando, E. Fernández-Medina, and M. Malek, Eds., International Conference on Security and Cryptography – SECRYPT 2007, pp. 189–196, INSTICC Press, 2007.
[C9] Efficient Use of Random Delays in Embedded Software  [ pdf ]
Michael Tunstall and Olivier Benoit
In D. Sauveron, K. Markantonakis, A. Bilas, and J.-J. Quisquater, Eds., Information Security Theory and Practices 2007 – Smart Cards, Mobile and Ubiquitous Computing Systems – WISTP 2007, vol. 4462 of Lecture Notes in Computer Science, pp. 27–38, Springer-Verlag, 2007.
[C8] Inhibiting Card Sharing Attacks  pdf ]
Michael Tunstall, Konstantinos Markantonakis, and Keith Mayes
In H. Yoshiura, K. Sakurai, K. Rannenberg, Y. Murayama, and S. Kawamura, Eds., Advances in Information Security and Computer Science, 1st International Workshop on Security – IWSEC 2006, vol. 4266 of  Lecture Notes in Computer Science, pp. 239–251, Springer-Verlag, 2006.
[C7] Fault Analysis of DPA Resistant Algorithms  [ pdf ]
Frederic Amiel, Christophe Clavier, and Michael Tunstall
In L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, Eds., Workshop on Fault Diagnosis and Tolerance in Cryptography 2006 – FDTC 2006, vol. 4236 of Lecture Notes in Computer Science, pp. 223–236, Springer-Verlag, 2006.
[C6] Cache Based Power Analysis Attacks on AES  [ pdf ]
Jacques Fournier and Michael Tunstall
In L. M. Batten and R. Safavi-Naini, Eds., Australasian Conference on Information Security and Privacy – ACISP 2006, vol. 4058 of Lecture Notes in Computer Science, pp. 17–28, Springer-Verlag, 2006.
[C5] Computational Improvements to Differential Side Channel Attacks [ pdf ]
David Naccache, Michael Tunstall, and Claire Whelan
NATO Security through Science Series D: Information and Communication Security, vol. 2, IOS Press, pp. 26–35, 2006.
[C4] Round Reduction Using Faults [ pdf ]
Hamid Choukri and Michael Tunstall
In L. Breveglieri and I. Koren, Eds., Workshop on Fault Diagnosis and Tolerance in Cryptography 2005 – FDTC 2005, pp. 13–24, 2005.
[C3] Experimenting with Faults, Lattices and the DSA  [ pdf ]
David Naccache, Phong Q. Nguyen, Michael Tunstall, and Claire Whelan
In S. Vaudenay, Ed., Public Key Cryptography – PKC 2005, vol. 3386 of Lecture Notes in Computer Science, pp. 16–28, Springer-Verlag, 2005.
[C2] How to Explain Side-channel Leakage to Your Kids?  [ pdf ]
David Naccache and Michael Tunstall
In C. K. Koc and C. Paar, Eds., Cryptographic Hardware and Embedded Systems 
CHES 2000, vol. 1965 of Lecture Notes in Computer Science, pp. 229230, Springer-Verlag, 2000.
[C1] Asymmetric Currency Rounding  [ pdf ]
David M'Raihi, David Naccache, and Michael Tunstall
In Y. Frankel, Ed., Financial Cryptography, vol. 1962 of Lecture Notes in Computer Science, pp. 192201, Springer-Verlag, 2000.

Book Chapters


Smart Cards
Konstantinos Markantonakis, Damien Sauveron, Keith Mayes, and Michael Tunstall
Chapter in H. Bidgoli, Ed., Handbook of Technology Management, vol. 2, Supply Chain Management, Marketing and Advertising, and Global Management, pp. 248–264, Wiley, 2010.
[ Ordering Information ]
...Smart Card Security
Michael Tunstall
Chapter in K. Mayes and K. Markantonakis, Eds., Smart Cards, Tokens, Security and Applications, pp. 195–228, Springer-Verlag, 2008.
[ Springerlink ]
Smart Cards: Communication Protocols and Applications
Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, and Michael Tunstall
Chapter in H. Bidgoli, Ed., Handbook of Computer Networks, vol. 3, pp. 251–268, Wiley, 2007.
[ Ordering Information ]
Smart Card Security
Konstantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, and Fred Piper
Chapter in N. Nedjah, A. Abraham, and L. M. Mourelle, Eds., Computational Intelligence in Information Assurance and Security,  vol. 57 of Studies in Computational Intelligence, pp. 201–233, Springer-Verlag, 2007.
Springerlink ]
Smart Card Security
Michael Tunstall, Sebastien Petit, and Stephanie Porte
Chapter in H. Bidgoli, Ed., Handbook of Information Security, pp. 326
341, Wiley, 2006.
Ordering information ]
Fault Attacks
Hamid Choukri and Michael Tunstall
Chapter in H. Bidgoli, Ed., Handbook of Information Security, pp. 230
240, Wiley, 2006.
Ordering information ]

Theses

PhD. Thesis

Secure Cryptographic Algorithm Implementation on Embedded Platforms  [ pdf ]
PhD. Thesis, Royal Holloway, University of London, 2006.
Technical report RHUL–MA–20075 (Department of Mathematics, Royal Holloway, University of London, 2007),  
http://www.rhul.ac.uk/
mathematics/techreports.

Masters Thesis 

Differential Fault Analysis on Smartcards
MSc. in Secure Electronic Commerce, Royal Holloway, University of London, September, 2001.

Presentations/Other

[P10]
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis  [ eprint ]
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy and William P. Marnane
[P9]Physical Security of Smart Cards  [ pdf ]
Michael Tunstall
Seminar at Limerick Institute of Technology, 2008.
[P8]Distinguishing Multiplications from Squaring Operations  [ pdf ]
Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan and William P. Marnane
Claude Shannon Institute Workshop on Coding and Cryptography, Cork, 2008.
[P7]All-or-Nothing Transforms as a Differential Power Analysis Countermeasure  [ pdf ]
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy and William P. Marnane
Poster presented at the rump session of  Cryptographic Hardware and Embedded Systems  CHES 2008.
[P6]Differential Power Analysis of the HMAC Algorithm  [ pdf ]
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Neil Hanley, Colin C. Murphy and William P. Marnane
Poster presented at the rump session of  Cryptographic Hardware and Embedded Systems  CHES 2007.
[P5] Efficient Use of Random Delays  [ eprint  ]
Olivier Benoit and Michael Tunstall
[P4] Enhancing the Conditional Access Module Security in Light of Smart Card Sharing Attacks  [ presentation ]
Konstantinos Markantonakis, Michael Tunstall, and Keith Mayes
e-Smart, September 2006.
[P3] Attacks on Smart Cards  [ pdf ]
Presented as part of Royal Holloway's Smart Card course taken by students of the MSc. Information Security and MSc. Secure Electronic Commerce courses in 2006.
[P2] Explaining Differential Fault Analysis on DES  [ presentation ]
Christophe Clavier and Michael Tunstall
BCRI Workshop on Coding and Cryptography, Cork, 2006.
[P1] The Sorcerer's Apprentice Guide to Fault Attacks  [ presentation ] [ eprint ]
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and Claire Whelan
Workshop on Fault Diagnosis an Tolerance in Cryptography, in association with DSN 2004 
The International Conference on Dependable Systems and Networks, June 2004.

Coauthors:

Frederic Amiel
Ioannis Askoxylakis
Brian Baldwin
Hagai Bar-El
Olivier Benoit
Hamid Choukri
Christophe Clavier
Benoit Feix
Jacques Fournier
Mark D. Hamilton
Gerhard Hancke
Neil Hanley
Marc Joye
Konstantinos Markantonakis

Keith Mayes
David M'Raihi
Fred Piper
William P. Marnane
Robert P. McEvoy
Colin C. Murphy
David Naccache
Khanh Nguyen
Phong Q. Nguyen
Sebastien Petit
Emanuel M. Popovici
Stephanie Porte
Damien Sauveron
Claire Whelan