Publications

To Appear

Masking TablesAn Underestimated Security Risk
Michael Tunstall, Carolyn Whitnall and Elisabeth Oswald
To appear in Fast Software Encryption
—FSE 2013

Books


Fault Analysis in Cryptography  [ doi ]
Marc Joye and Michael Tunstall (Eds.)
Springer, 2012.

Proceedings of Security Aspects in Information Technology—InfoSecHiComNet 2011  [ springerlink ]
Marc Joye, Debdeep Mukhopadhyay and Michael Tunstall (Eds.)
Vol. 7011 of Lecture Notes in Computer Science, Springer, 2011.

Proceedings of 4th Workshop on Information Secutity Theory and Practices   [ springerlink ]
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis and Damien Sauveron (Eds.)
Vol. 6033 of Lecture Notes in Computer Science, IFIP-Springer-Verlag, 2010.

Journal

[J6] Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems  [ springerlink ]
Roberto Avanzi, Simon Hoerder, Dan Page and Michael Tunstall
Journal of Cryptographic Engineering 1(4):271–281, Springer 2011.
[J5] Practical Complexity Differential Cryptanalysis and Fault Analysis of AES  [ doi ]
Michael Tunstall
Journal of Cryptographic Engineering 1(3):219–230, Springer 2011.
[J4] Using Templates to Distinguish Multiplications from Squaring Operations  [ doi ]
Neil Hanley, Michael Tunstall and William P. Marnane
International Journal of Information Security 10(4):255–266, Springer, 2011.
[J3] Smart Card Security—Theory and Practice  [ doi ]
Konstantinos Markantonakis, Michael Tunstall, Gerhard Hancke, Ioannis Askoxylakis and Keith Mayes
In Information Security Technical Report 14:46–56. Elsevier, 2009.
[J2]Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs  [ doi ]
Robert P. McEvoy, Colin C. Murphy, William P. Marnane and Michael Tunstall
In ACM Transactions on Reconfigurable Technology and Systems (TRETS) 2(1):1–23. ACM, 2009.
[J1] The Sorcerer's Apprentice Guide to Fault Attacks  [ ieeexplore ]
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall and Claire Whelan
In Proceedings of the IEEE, Special Issue on Cryptography and Security 94(2):370–382. IEEE, 2006.

Proceedings

[C30] Compiler Assisted Masking  [ pdf ]
Andrew Moss, Elisabeth Oswald, Dan Page and Michael Tunstall
In E. Prouff and P. Schaumont (Eds.), Cryptographic Hardware and Embedded Systems—CHES 2012, vol. 7428 of Lecture Notes in Computer Science, pp. 5875, Springer, 2012.
[C29] Harnessing Biased Faults in Attacks on ECC-based Signature Schemes  [ ieeexplore ]
Kimmo Järvinen, Céline Blondeau, Dan Page and Michael Tunstall
In G. Bertoni and B. Gierlichs (Eds.), Fault Diagnosis and Tolerance in CryptographyFDTC 2012, pp. 7282, IEEE, 2012.
[C28] Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output  [ pdf ]
Benedikt Gierlichs, Jörn-Marc Schmidt and Michael Tunstall
In A. Hevia and G. Neven (Eds.), LATINCRYPT 2012, vol. 7533 of Lecture Notes in Computer Science, pp. 305321, Springer, 2012.
[C27] Improved “Partial Sums”-based Square Attack on AES  [ pdf ]
Michael Tunstall
In P. Samarati (Ed.), International Conference on Security and Cryptography—SECRYPT 2012, pp. 25–34, INSTICC Press, 2012.
[C26] Can Code Polymorphism Limit Information Leakage?  [ pdf ]
Antoine Amarilli, Sascha Mulller, David Naccache, Dan Page, Pablo Rauzy and Michael Tunstall
In C. A. Ardagna and J. Zhou (Eds.), Information Security Theory and Practices—WISTP 2011, vol. 6633 of Lecture Notes in Computer Science, pp. 1–21, Springer-Verlag, 2011.
[C25] Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault  [ pdf ]
Michael Tunstall, Debdeep Mukhopadhyay and Subidh Ali
In C. A. Ardagna and J. Zhou (Eds.), Information Security Theory and Practices—WISTP 2011, vol. 6633 of Lecture Notes in Computer Science, pp. 224–233, Springer-Verlag, 2011.
[C24] Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations  [ pdf ]
Jean-François Gallais, Ilya Kizhvatov and Michael Tunstall
In Y. Chung and M. Yung (Eds.), Workshop on Information Security Applications—WISA 2010, vol. 6513 of Lecture Notes in Computer Science, pp. 243–257, Springer-Verlag, 2011.
[C23]Coordinate Blinding over Large Prime Fields  [ pdf ]
Michael Tunstall and Marc Joye
In S. Mangard, F.-X. Standaert (Eds.), Cryptographic Hardware and Embedded SystemsCHES 2010, vol. 6225 of Lecture Notes in Computer Science, pp. 443–455, Springer-Verlag, 2010.
[C22]Combined Implementation Attack Resistant Exponentiation  [ pdf ]
Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper and David Oswald
In M. Abdalla and P. S. L. M. Barreto (Eds.), LATINCRYPT 2010, vol. 6212 of Lecture Notes in Computer Science, pp. 305–322, Springer-Verlag, 2010.
[C21] Side Channel Analysis of Cryptographic Software via Early-Terminating Multiplications  [ pdf ]
Johann Großschädl, Elisabeth Oswald, Dan Page and Michael Tunstall
In D. Lee and S. Hong (Eds.), International Conference on Information Security and Cryptology—ICISC 2009, vol. 5984 of Lecture Notes in Computer Science, pp. 176–192, Springer-Verlag, 2010.
[C20] Improved Fault Analysis of Signature Schemes  [ pdf ]
Christophe Giraud, Erik W. Knudsen and Michael Tunstall
In D. Gollman, J.-L. Lanet and J. Iguchi-Cartigny (Eds.), CARDIS 2010, vol. 6035 of Lecture Notes in Computer Science, pp. 164–181, IFIP–Springer-Verlag, 2010.
[C19] Unknown Plaintext Template Attacks  [ pdf ]
Neil Hanley, Michael Tunstall and William P. Marnane
In H.Y. Youm and M. Yung, Eds., Workshop on Information Security Applications—WISA 2009, vol. 5932 of Lecture Notes in Computer Science, pp. 148–162, Springer-Verlag, 2009.
[C18] Distinguishing Multiplications from Squaring Operations  [ pdf ]
Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan and William P. Marnane
In R. Avanzi, L. Keliher, and F. Sica, Eds., Selected Areas in Cryptography—SAC 2008, vol. 5394 of Lecture Notes in Computer Science, pp. 346–360, Springer-Verlag, 2009.
[C17] Random Order m-ary Exponentiation  [ pdf ]
Michael Tunstall
In C. Boyd and J. Gonzalez Nieto, Eds., Australasian Conference on Information Security and Privacy—ACISP 2009, vol. 5594 of Lecture Notes in Computer Science, pp. 437–451. Springer-Verlag, 2009.
[C16] Exponent Recoding and Regular Exponentiation Algorithms  [ pdf ]
Marc Joye and Michael Tunstall
In B. Preneel, Ed., Progress in Cryptology—AFRICACRYPT 2009, vol. 5580 of Lecture Notes in Computer Science, pp. 334–349. Springer-Verlag, 2009.
[C15]Side Channel Analysis of an Automotive Microprocessor  [ pdf ]
Mark D. Hamilton, Michael Tunstall, Emanuel M. Popovici and William P. Marnane
In IET Irish Signals and System Conference—ISSC 2008, pp. 4–9. IET, 2008.
[C14]Fault Injection Platform for Block Ciphers  [ pdf ]
Brian Baldwin, Emanuel M. Popovici, Michael Tunstall and William P. Marnane
In IET Irish Signals and System Conference—ISSC 2008, pp. 10–15. IET, 2008.
[C13]Differential Power Analysis of HMAC based on SHA-2 on an FPGA, and Countermeasures  [ pdf ]
Robert P. McEvoy, Michael Tunstall, Colin C. Murphy and William P. Marnane
In S. Kim, M. Yung, and H.-W. Lee, Eds., Workshop on Information Security Applications—WISA 2007, vol. 4867 of Lecture Notes in Computer Science, pp. 317–332. Springer-Verlag, 2007.
[C12] Montgomery Multiplication with Redundancy Check  [ ieeexplore ]
Khanh Nguyen and Michael Tunstall
In L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds., Fault Diagnosis and Tolerance in Cryptography 2007—FDTC 07, pp. 30–36, IEEE, 2007.
[C11] Correlation Power Analysis of Large Word Sizes  [ pdf ]
Michael Tunstall, Neil Hanley, Robert P. McEvoy, Claire Whelan, Colin C. Murphy and William P. Marnane
In IET Irish Signals and System Conference—ISSC 2007, pp. 145–150. IET, 2007.
[C10] Securing OpenSSL Against Micro-Architectural Attacks  [ pdf ]
Marc Joye and Michael Tunstall
In J. Hernando, E. Fernández-Medina, and M. Malek, Eds., International Conference on Security and Cryptography—SECRYPT 2007, pp. 189–196, INSTICC Press, 2007.
[C9] Efficient Use of Random Delays in Embedded Software  [ pdf ]
Michael Tunstall and Olivier Benoit
In D. Sauveron, K. Markantonakis, A. Bilas, and J.-J. Quisquater, Eds., Information Security Theory and Practices 2007—Smart Cards, Mobile and Ubiquitous Computing Systems—WISTP 2007, vol. 4462 of Lecture Notes in Computer Science, pp. 27–38, Springer-Verlag, 2007.
[C8] Inhibiting Card Sharing Attacks  pdf ]
Michael Tunstall, Konstantinos Markantonakis and Keith Mayes
In H. Yoshiura, K. Sakurai, K. Rannenberg, Y. Murayama, and S. Kawamura, Eds., Advances in Information Security and Computer Science, 1st International Workshop on Security—IWSEC 2006, vol. 4266 of  Lecture Notes in Computer Science, pp. 239–251, Springer-Verlag, 2006.
[C7] Fault Analysis of DPA Resistant Algorithms  [ pdf ]
Frederic Amiel, Christophe Clavier and Michael Tunstall
In L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, Eds., Workshop on Fault Diagnosis and Tolerance in Cryptography 2006—FDTC 2006, vol. 4236 of Lecture Notes in Computer Science, pp. 223–236, Springer-Verlag, 2006.
[C6] Cache Based Power Analysis Attacks on AES  [ pdf ]
Jacques Fournier and Michael Tunstall
In L. M. Batten and R. Safavi-Naini, Eds., Australasian Conference on Information Security and Privacy—ACISP 2006, vol. 4058 of Lecture Notes in Computer Science, pp. 17–28, Springer-Verlag, 2006.
[C5] Computational Improvements to Differential Side Channel Attacks [ pdf ]
David Naccache, Michael Tunstall and Claire Whelan
NATO Security through Science Series D: Information and Communication Security, vol. 2, IOS Press, pp. 26–35, 2006.
[C4] Round Reduction Using Faults [ pdf ]
Hamid Choukri and Michael Tunstall
In L. Breveglieri and I. Koren, Eds., Workshop on Fault Diagnosis and Tolerance in Cryptography 2005—FDTC 2005, pp. 13–24, 2005.
[C3] Experimenting with Faults, Lattices and the DSA  [ pdf ]
David Naccache, Phong Q. Nguyen, Michael Tunstall and Claire Whelan
In S. Vaudenay, Ed., Public Key Cryptography—PKC 2005, vol. 3386 of Lecture Notes in Computer Science, pp. 16–28, Springer-Verlag, 2005.
[C2] How to Explain Side-channel Leakage to Your Kids?  [ pdf ]
David Naccache and Michael Tunstall
In C. K. Koc and C. Paar, Eds., Cryptographic Hardware and Embedded Systems
CHES 2000, vol. 1965 of Lecture Notes in Computer Science, pp. 229230, Springer-Verlag, 2000.
[C1] Asymmetric Currency Rounding  [ pdf ]
David M'Raihi, David Naccache and Michael Tunstall
In Y. Frankel, Ed., Financial Cryptography, vol. 1962 of Lecture Notes in Computer Science, pp. 192201, Springer-Verlag, 2000.

Book Chapters


Smart Cards
Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, and Michael Tunstall
Chapter in H. Bidgoli, Ed., Handbook of Technology Management, vol. 2, Supply Chain Management, Marketing and Advertising, and Global Management, pp. 248–264, Wiley, 2010.
[ Ordering Information ]
...Smart Card Security
Michael Tunstall
Chapter in K. Mayes and K. Markantonakis, Eds., Smart Cards, Tokens, Security and Applications, pp. 195–228, Springer-Verlag, 2008.
[ Springerlink ]
Smart Cards: Communication Protocols and Applications
Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, and Michael Tunstall
Chapter in H. Bidgoli, Ed., Handbook of Computer Networks, vol. 3, pp. 251–268, Wiley, 2007.
[ Ordering Information ]
Smart Card Security
Konstantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, and Fred Piper
Chapter in N. Nedjah, A. Abraham, and L. M. Mourelle, Eds., Computational Intelligence in Information Assurance and Security,  vol. 57 of Studies in Computational Intelligence, pp. 201–233, Springer-Verlag, 2007.
Springerlink ]
Smart Card Security
Michael Tunstall, Sebastien Petit, and Stephanie Porte
Chapter in H. Bidgoli, Ed., Handbook of Information Security, pp. 326
341, Wiley, 2006.
Ordering information ]
Fault Attacks
Hamid Choukri and Michael Tunstall
Chapter in H. Bidgoli, Ed., Handbook of Information Security, pp. 230
240, Wiley, 2006.
Ordering information ]

Theses

PhD. Thesis

Secure Cryptographic Algorithm Implementation on Embedded Platforms  [ pdf ]
PhD. Thesis, Royal Holloway, University of London, 2006.
Technical report RHUL–MA–20075 (Department of Mathematics, Royal Holloway, University of London, 2007),  
http://www.rhul.ac.uk/
mathematics/techreports.

Masters Thesis 

Differential Fault Analysis on Smartcards
MSc. in Secure Electronic Commerce, Royal Holloway, University of London, September, 2001.

Presentations/Other

[P11]
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
Roberto M. Avanzi, Simon Hoerder, Dan Page and Michael Tunstall
Presented at COSADE 2011
[P10]
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis  [ eprint ]
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy and William P. Marnane
[P9]Physical Security of Smart Cards  [ pdf ]
Michael Tunstall
Seminar at Limerick Institute of Technology, 2008.
[P8]Distinguishing Multiplications from Squaring Operations  [ pdf ]
Frederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan and William P. Marnane
Claude Shannon Institute Workshop on Coding and Cryptography, Cork, 2008.
[P7]All-or-Nothing Transforms as a Differential Power Analysis Countermeasure  [ pdf ]
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy and William P. Marnane
Poster presented at the rump session of  Cryptographic Hardware and Embedded Systems  CHES 2008.
[P6]Differential Power Analysis of the HMAC Algorithm  [ pdf ]
Robert P. McEvoy, Michael Tunstall, Claire Whelan, Neil Hanley, Colin C. Murphy and William P. Marnane
Poster presented at the rump session of  Cryptographic Hardware and Embedded Systems  CHES 2007.
[P5] Efficient Use of Random Delays  [ eprint  ]
Olivier Benoit and Michael Tunstall
[P4] Enhancing the Conditional Access Module Security in Light of Smart Card Sharing Attacks  [ presentation ]
Konstantinos Markantonakis, Michael Tunstall, and Keith Mayes
e-Smart, September 2006.
[P3] Attacks on Smart Cards  [ pdf ]
Presented as part of Royal Holloway's Smart Card course taken by students of the MSc. Information Security and MSc. Secure Electronic Commerce courses in 2006.
[P2] Explaining Differential Fault Analysis on DES  [ presentation ]
Christophe Clavier and Michael Tunstall
BCRI Workshop on Coding and Cryptography, Cork, 2006.
[P1] The Sorcerer's Apprentice Guide to Fault Attacks  [ presentation ] [ eprint ]
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and Claire Whelan
Workshop on Fault Diagnosis an Tolerance in Cryptography, in association with DSN 2004 
The International Conference on Dependable Systems and Networks, June 2004.