![]() |
Fault Analysis in Cryptography [ doi ] Marc Joye and Michael Tunstall (Eds.) Springer, 2012. |
![]() |
Proceedings of Security Aspects in Information Technology—InfoSecHiComNet 2011 [ springerlink ] Marc Joye, Debdeep Mukhopadhyay and Michael Tunstall (Eds.) Vol. 7011 of Lecture Notes in Computer Science, Springer, 2011. |
![]() |
Proceedings of 4th Workshop on Information Secutity Theory and Practices [ springerlink ] Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis and Damien Sauveron (Eds.) Vol. 6033 of Lecture Notes in Computer Science, IFIP-Springer-Verlag, 2010. |
| [J6] | Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems [ springerlink ] Roberto Avanzi, Simon Hoerder, Dan Page and Michael Tunstall Journal of Cryptographic Engineering 1(4):271–281, Springer 2011. |
| [J5] | Practical Complexity Differential Cryptanalysis and Fault Analysis of AES [ doi ] Michael Tunstall Journal of Cryptographic Engineering 1(3):219–230, Springer 2011. |
| [J4] | Using Templates to Distinguish Multiplications from Squaring Operations [ doi ] Neil Hanley, Michael Tunstall and William P. Marnane International Journal of Information Security 10(4):255–266, Springer, 2011. |
| [J3] | Smart Card Security—Theory and Practice [ doi ] Konstantinos Markantonakis, Michael Tunstall, Gerhard Hancke, Ioannis Askoxylakis and Keith Mayes In Information Security Technical Report 14:46–56. Elsevier, 2009. |
| [J2] | Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs [ doi ] Robert P. McEvoy, Colin C. Murphy, William P. Marnane and Michael Tunstall In ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2(1):1–23. ACM, 2009. |
| [J1] | The
Sorcerer's Apprentice Guide to Fault Attacks [
ieeexplore ] Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall and Claire Whelan In Proceedings of the IEEE, Special Issue on Cryptography and Security 94(2):370–382. IEEE, 2006. |
| [C30] | Compiler Assisted Masking [ pdf ] Andrew Moss, Elisabeth Oswald, Dan Page and Michael Tunstall In E. Prouff and P. Schaumont (Eds.), Cryptographic Hardware and Embedded Systems—CHES 2012, vol. 7428 of Lecture Notes in Computer Science, pp. 58–75, Springer, 2012. |
| [C29] | Harnessing Biased Faults in Attacks on ECC-based Signature Schemes [ ieeexplore ] Kimmo Järvinen, Céline Blondeau, Dan Page and Michael Tunstall In G. Bertoni and B. Gierlichs (Eds.), Fault Diagnosis and Tolerance in Cryptography—FDTC 2012, pp. 72–82, IEEE, 2012. |
| [C28] | Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output [ pdf ] Benedikt Gierlichs, Jörn-Marc Schmidt and Michael Tunstall In A. Hevia and G. Neven (Eds.), LATINCRYPT 2012, vol. 7533 of Lecture Notes in Computer Science, pp. 305–321, Springer, 2012. |
| [C27] | Improved “Partial Sums”-based Square Attack on AES [ pdf ] Michael Tunstall In P. Samarati (Ed.), International Conference on Security and Cryptography—SECRYPT 2012, pp. 25–34, INSTICC Press, 2012. |
| [C26] | Can Code Polymorphism Limit Information Leakage? [ pdf ] Antoine Amarilli, Sascha Mulller, David Naccache, Dan Page, Pablo Rauzy and Michael Tunstall In C. A. Ardagna and J. Zhou (Eds.), Information Security Theory and Practices—WISTP 2011, vol. 6633 of Lecture Notes in Computer Science, pp. 1–21, Springer-Verlag, 2011. |
| [C25] | Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault [ pdf ] Michael Tunstall, Debdeep Mukhopadhyay and Subidh Ali In C. A. Ardagna and J. Zhou (Eds.), Information Security Theory and Practices—WISTP 2011, vol. 6633 of Lecture Notes in Computer Science, pp. 224–233, Springer-Verlag, 2011. |
| [C24] | Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations [ pdf ] Jean-François Gallais, Ilya Kizhvatov and Michael Tunstall In Y. Chung and M. Yung (Eds.), Workshop on Information Security Applications—WISA 2010, vol. 6513 of Lecture Notes in Computer Science, pp. 243–257, Springer-Verlag, 2011. |
| [C23] | Coordinate Blinding over Large Prime Fields [ pdf ] Michael Tunstall and Marc Joye In S. Mangard, F.-X. Standaert (Eds.), Cryptographic Hardware and Embedded Systems—CHES 2010, vol. 6225 of Lecture Notes in Computer Science, pp. 443–455, Springer-Verlag, 2010. |
| [C22] | Combined Implementation Attack Resistant Exponentiation [ pdf ] Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper and David Oswald In M. Abdalla and P. S. L. M. Barreto (Eds.), LATINCRYPT 2010, vol. 6212 of Lecture Notes in Computer Science, pp. 305–322, Springer-Verlag, 2010. |
| [C21] | Side Channel Analysis of Cryptographic Software via Early-Terminating Multiplications [ pdf ] Johann Großschädl, Elisabeth Oswald, Dan Page and Michael Tunstall In D. Lee and S. Hong (Eds.), International Conference on Information Security and Cryptology—ICISC 2009, vol. 5984 of Lecture Notes in Computer Science, pp. 176–192, Springer-Verlag, 2010. |
| [C20] | Improved Fault Analysis of Signature Schemes [ pdf ] Christophe Giraud, Erik W. Knudsen and Michael Tunstall In D. Gollman, J.-L. Lanet and J. Iguchi-Cartigny (Eds.), CARDIS 2010, vol. 6035 of Lecture Notes in Computer Science, pp. 164–181, IFIP–Springer-Verlag, 2010. |
| [C19] | Unknown Plaintext Template Attacks [ pdf ] Neil Hanley, Michael Tunstall and William P. Marnane In H.Y. Youm and M. Yung, Eds., Workshop on Information Security Applications—WISA 2009, vol. 5932 of Lecture Notes in Computer Science, pp. 148–162, Springer-Verlag, 2009. |
| [C18] | Distinguishing Multiplications from Squaring Operations [ pdf ] Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan and William P. Marnane In R. Avanzi, L. Keliher, and F. Sica, Eds., Selected Areas in Cryptography—SAC 2008, vol. 5394 of Lecture Notes in Computer Science, pp. 346–360, Springer-Verlag, 2009. |
| [C17] | Random Order m-ary Exponentiation [ pdf ] Michael Tunstall In C. Boyd and J. Gonzalez Nieto, Eds., Australasian Conference on Information Security and Privacy—ACISP 2009, vol. 5594 of Lecture Notes in Computer Science, pp. 437–451. Springer-Verlag, 2009. |
| [C16] | Exponent Recoding and Regular Exponentiation Algorithms [ pdf ] Marc Joye and Michael Tunstall In B. Preneel, Ed., Progress in Cryptology—AFRICACRYPT 2009, vol. 5580 of Lecture Notes in Computer Science, pp. 334–349. Springer-Verlag, 2009. |
| [C15] | Side Channel Analysis of an Automotive Microprocessor [ pdf ] Mark D. Hamilton, Michael Tunstall, Emanuel M. Popovici and William P. Marnane In IET Irish Signals and System Conference—ISSC 2008, pp. 4–9. IET, 2008. |
| [C14] | Fault Injection Platform for Block Ciphers [ pdf ] Brian Baldwin, Emanuel M. Popovici, Michael Tunstall and William P. Marnane In IET Irish Signals and System Conference—ISSC 2008, pp. 10–15. IET, 2008. |
| [C13] | Differential Power Analysis of HMAC based on SHA-2 on an FPGA, and Countermeasures [ pdf ] Robert P. McEvoy, Michael Tunstall, Colin C. Murphy and William P. Marnane In S. Kim, M. Yung, and H.-W. Lee, Eds., Workshop on Information Security Applications—WISA 2007, vol. 4867 of Lecture Notes in Computer Science, pp. 317–332. Springer-Verlag, 2007. |
| [C12] | Montgomery Multiplication with Redundancy Check [ ieeexplore ] Khanh Nguyen and Michael Tunstall In L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds., Fault Diagnosis and Tolerance in Cryptography 2007—FDTC 07, pp. 30–36, IEEE, 2007. |
| [C11] | Correlation Power Analysis of Large Word Sizes [ pdf ] Michael Tunstall, Neil Hanley, Robert P. McEvoy, Claire Whelan, Colin C. Murphy and William P. Marnane In IET Irish Signals and System Conference—ISSC 2007, pp. 145–150. IET, 2007. |
| [C10] | Securing OpenSSL Against Micro-Architectural Attacks [ pdf ] Marc Joye and Michael Tunstall In J. Hernando, E. Fernández-Medina, and M. Malek, Eds., International Conference on Security and Cryptography—SECRYPT 2007, pp. 189–196, INSTICC Press, 2007. |
| [C9] | Efficient Use of Random Delays in Embedded Software [ pdf ] Michael Tunstall and Olivier Benoit In D. Sauveron, K. Markantonakis, A. Bilas, and J.-J. Quisquater, Eds., Information Security Theory and Practices 2007—Smart Cards, Mobile and Ubiquitous Computing Systems—WISTP 2007, vol. 4462 of Lecture Notes in Computer Science, pp. 27–38, Springer-Verlag, 2007. |
| [C8] | Inhibiting Card Sharing Attacks [ pdf ] Michael Tunstall, Konstantinos Markantonakis and Keith Mayes In H. Yoshiura, K. Sakurai, K. Rannenberg, Y. Murayama, and S. Kawamura, Eds., Advances in Information Security and Computer Science, 1st International Workshop on Security—IWSEC 2006, vol. 4266 of Lecture Notes in Computer Science, pp. 239–251, Springer-Verlag, 2006. |
| [C7] | Fault Analysis of DPA Resistant Algorithms [ pdf ] Frederic Amiel, Christophe Clavier and Michael Tunstall In L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, Eds., Workshop on Fault Diagnosis and Tolerance in Cryptography 2006—FDTC 2006, vol. 4236 of Lecture Notes in Computer Science, pp. 223–236, Springer-Verlag, 2006. |
| [C6] | Cache
Based Power Analysis Attacks on AES [ pdf
] Jacques Fournier and Michael Tunstall In L. M. Batten and R. Safavi-Naini, Eds., Australasian Conference on Information Security and Privacy—ACISP 2006, vol. 4058 of Lecture Notes in Computer Science, pp. 17–28, Springer-Verlag, 2006. |
| [C5] | Computational Improvements to Differential Side Channel Attacks [ pdf ] David Naccache, Michael Tunstall and Claire Whelan NATO Security through Science Series D: Information and Communication Security, vol. 2, IOS Press, pp. 26–35, 2006. |
| [C4] | Round Reduction Using Faults [ pdf ] Hamid Choukri and Michael Tunstall In L. Breveglieri and I. Koren, Eds., Workshop on Fault Diagnosis and Tolerance in Cryptography 2005—FDTC 2005, pp. 13–24, 2005. |
| [C3] | Experimenting with Faults,
Lattices and the DSA [
pdf ] David Naccache, Phong Q. Nguyen, Michael Tunstall and Claire Whelan In S. Vaudenay, Ed., Public Key Cryptography—PKC 2005, vol. 3386 of Lecture Notes in Computer Science, pp. 16–28, Springer-Verlag, 2005. |
|---|---|
| [C2] | How to
Explain Side-channel Leakage to Your Kids? [ pdf
] David Naccache and Michael Tunstall In C. K. Koc and C. Paar, Eds., Cryptographic Hardware and Embedded Systems—CHES 2000, vol. 1965 of Lecture Notes in Computer Science, pp. 229–230, Springer-Verlag, 2000. |
| [C1] | Asymmetric
Currency Rounding [ pdf
] David M'Raihi, David Naccache and Michael Tunstall In Y. Frankel, Ed., Financial Cryptography, vol. 1962 of Lecture Notes in Computer Science, pp. 192–201, Springer-Verlag, 2000. |
![]() |
Smart Cards Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, and Michael Tunstall Chapter in H. Bidgoli, Ed., Handbook of Technology Management, vol. 2, Supply Chain Management, Marketing and Advertising, and Global Management, pp. 248–264, Wiley, 2010. [ Ordering Information ] |
![]() | Smart Card Security Michael Tunstall Chapter in K. Mayes and K. Markantonakis, Eds., Smart Cards, Tokens, Security and Applications, pp. 195–228, Springer-Verlag, 2008. [ Springerlink ] |
![]() | Smart Cards: Communication Protocols and Applications Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, and Michael Tunstall Chapter in H. Bidgoli, Ed., Handbook of Computer Networks, vol. 3, pp. 251–268, Wiley, 2007. [ Ordering Information ] |
![]() |
Smart Card Security Konstantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, and Fred Piper Chapter in N. Nedjah, A. Abraham, and L. M. Mourelle, Eds., Computational Intelligence in Information Assurance and Security, vol. 57 of Studies in Computational Intelligence, pp. 201–233, Springer-Verlag, 2007. [ Springerlink ] |
![]() |
Smart Card
Security Michael Tunstall, Sebastien Petit, and Stephanie Porte Chapter in H. Bidgoli, Ed., Handbook of Information Security, pp. 326–341, Wiley, 2006. [ Ordering information ] |
|---|---|
![]() |
Fault
Attacks Hamid Choukri and Michael Tunstall Chapter in H. Bidgoli, Ed., Handbook of Information Security, pp. 230–240, Wiley, 2006. [ Ordering information ] |
| [P11] |
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems Roberto M. Avanzi, Simon Hoerder, Dan Page and Michael Tunstall Presented at COSADE 2011 |
| [P10] |
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis [ eprint ] Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy and William P. Marnane |
| [P9] | Physical Security of Smart Cards [ pdf ] Michael Tunstall Seminar at Limerick Institute of Technology, 2008. |
| [P8] | Distinguishing Multiplications from Squaring Operations [ pdf ] Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan and William P. Marnane Claude Shannon Institute Workshop on Coding and Cryptography, Cork, 2008. |
| [P7] | All-or-Nothing Transforms as a Differential Power Analysis Countermeasure [ pdf ] Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy and William P. Marnane Poster presented at the rump session of Cryptographic Hardware and Embedded Systems – CHES 2008. |
| [P6] | Differential Power Analysis of the HMAC Algorithm [ pdf ] Robert P. McEvoy, Michael Tunstall, Claire Whelan, Neil Hanley, Colin C. Murphy and William P. Marnane Poster presented at the rump session of Cryptographic Hardware and Embedded Systems – CHES 2007. |
| [P5] | Efficient Use of Random Delays [ eprint ] Olivier Benoit and Michael Tunstall |
| [P4] | Enhancing the Conditional Access Module Security in Light of Smart Card Sharing Attacks [ presentation ] Konstantinos Markantonakis, Michael Tunstall, and Keith Mayes e-Smart, September 2006. |
| [P3] | Attacks on Smart Cards [ pdf ]
Presented as part of Royal Holloway's Smart Card course taken by students of the MSc. Information Security and MSc. Secure Electronic Commerce courses in 2006. |
| [P2] | Explaining Differential Fault Analysis on DES [ presentation ] Christophe Clavier and Michael Tunstall BCRI Workshop on Coding and Cryptography, Cork, 2006. |
| [P1] | The
Sorcerer's Apprentice Guide to Fault Attacks [ presentation ] [ eprint ] Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and Claire Whelan Workshop on Fault Diagnosis an Tolerance in Cryptography, in association with DSN 2004 – The International Conference on Dependable Systems and Networks, June 2004. |
|---|