Dr. Juliane Krämer

Kryptographie und Computeralgebra
Hochschulstraße 10
64289 Darmstadt
Germany

Raum: S2/02 B207

Tel.: 06151/16-20662
Fax: 06151/16-20665

E-Mail: jkraemer(a-t)cdc.informatik.tu-darmstadt.de

I am coordinator of the CROSSING project P1 Public-Key Encryption and Signature Schemes. Since October 2016, I am GI Junior Fellow

Research Interests

  • Side channel attacks
  • Fault attacks
  • Post-quantum cryptography, especially lattice-based cryptography
  • Pairing-based cryptography
  • Identity-based cryptography

Publications

  • Krämer (2017) Why Cryptography should not rely on physical attack complexity. it - Information Technology, de Gruyter (to appear)
  • Krämer (2016) Warum wir uns in der Kryptographie nicht auf die Komplexität physikalischer Angriffe verlassen sollten. In Ausgezeichnete Informatikdissertationen 2015 (GIDISS'15) 
  • Bindel, Buchmann, Krämer (2016) Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks. FDTC 2016, Santa Barbara, CA, USA
  • Buchmann, Büscher, Goepfert, Katzenbeisser, Krämer, Micciancio, Siim, van Vredendaal, Walter (2016) Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. ASIAPKC 2016, Xi'an, China
  • Kiss, Krämer, Rauzy, Seifert (2016) Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. COSADE 2016, Graz, Austria
  • Akleylek, Bindel, Buchmann, Krämer, Marson (2016) An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. AFRICACRYPT 2016, Fes, Marokko
  • Krämer (2016) Ein praktisch realisierter Fehlerangriff gegen eine bekannte Implementierung einer kryptographischen Paarung. SmartCard Workshop 2016, Darmstadt, Germany
  • Kiss, Stüber, Krämer (2015) On the Optimality of Differential Fault Analyses on CLEFIA. MACIS 2015, Berlin, Germany
  • Ganji, Krämer, Seifert, Tajik (2015) Lattice Basis Reduction Attack against Physically Unclonable Functions. CCS'15, Denver, Colorado, US
  • Blömer, Gomes da Silva, Günther, Krämer, Seifert (2014) A Practical Second‐Order Fault Attack against a Real‐World Pairing Implementation. FDTC 2014, Busan, Korea
  • Krämer (2014) Anwendungen von identitätsbasierter Kryptographie. SmartCard Workshop 2014, Darmstadt, Germany
  • Krämer, Kasper, Seifert (2014) The Role of Photons in Cryptanalysis. ASP-DAC 2014, Singapore
  • Schlösser, Nedospasov, Krämer, Orlic, Seifert (2013) Simple Photonic Emission Analysis of AES. Journal of Cryptographic Engineering, Springer-Verlag Krämer, Nedospasov, Schlösser, Seifert (2013) Differential Photonic Emission Analysis. COSADE 2013, Paris, France
  • Schlösser, Nedospasov, Krämer, Orlic, Seifert (2012) Simple Photonic Emission Analysis of AES. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Leuven, Belgium
  • Michéle, Krämer, Seifert (2012) Structure-Based RSA Fault Attacks. 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Hangzhou, China
  • Krämer, Nedospasov, Seifert (2011) Weaknesses in Current RSA Signature Schemes. Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea
  • Dörflinger, Voth, Krämer, Fromm (2010) My smartphone is a safe - The user's point of view regarding graded seurity levels and novel authentication methods. SECRYPT 2010 - International Conference on Security and Cryptography, Athens, Greece

Publications on eprint

  • Bindel, Buchmann, Krämer (2016) Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks. Cryptology ePrint Archive, Report 2016/415
  • Kiss, Krämer, Rauzy, Seifert (2016) Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. Cryptology ePrint Archive, Report 2016/238
  • Akleylek, Bindel, Buchmann, Krämer, Marson (2016) An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. Cryptology ePrint Archive, Report 2016/030
  • Krämer, Stüber, Kiss (2014) On the Optimality of Differential Fault Analyses on CLEFIA. Cryptology ePrint Archive, Report 2014/572
  • Blömer, Gomes da Silva, Günther, Krämer, Seifert (2014) A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. Cryptology ePrint Archive, Report 2014/543

Talks

  • upcoming: Post-Quantum-Kryptographie. November 2016, Real Estate CFO Summit, Berlin, Germany
  • Post-Quantum-Kryptographie. September 2016, INFORMATIK 2016, Klagenfurt, Austria
  • Ansprache als GI-Junior-Fellow 2016. September 2016, INFORMATIK 2016, Klagenfurt, Austria
  • Kryptographie - wie wir heute und morgen Informationen sicher übermitteln. September 2016, Webmontag Frankfurt #81, Frankfurt am Main, Germany
  • Why Cryptography Should Not Rely on Physical Attack Complexity. May 2016, GI-Dissertationspreis 2015, Schloss Dagstuhl, Germany
  • Why Cryptography Should Not Rely on Physical Attack Complexity. April 2016, CAST/GI Promotionspreis IT-Sicherheit 2015/16, Bonn, Germany
  • Practical Second-Order Fault Attacks against Pairings. February 2016, SmartCard-Workshop 2016, Darmstadt, Germany
  • The LWE Challenge, December 2015, 23. Kryptotag, Berlin, Germany
  • On the Optimality of Di fferential Fault Analyses on CLEFIA. November 2015, MACIS 2015, Berlin, Germany
  • Fault Attacks on Pairing-Based Cryptography. September 2015, ECC 2015, Bordeaux, France
  • The LWE Challenge. September 2015, ECC 2015 Rump Session, Bordeaux, France
  • Anwendungen von identitätsbasierter Kryptographie. February 2014, SmartCard-Workshop 2014, Darmstadt, Germany
  • The Role of Photons in Cryptanalysis. January 2014, ASP-DAC 2014, Singapore
  • Differential Photonic Emission Analysis, March 2013, COSADE 2013, Paris, France
  • Photonische Seitenkanal-Analyse, March 2013, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany
  • Photonische Seitenkanal-Analyse, August 2012, CAST-Workshop Mobile und Embedded Security, CAST e.V., Darmstadt, Germany
  • Photonic Side Channel Analysis for the rest of us, August 2012, CRYPTO 2012 Rump Session, Santa Barbara, CA, United States
  • Weaknesses in Current RSA Signature Schemes, February 2012, Telekom Innovation Laboratories at Ben-Gurion University,  Beer-Sheva, Israel
  • Weaknesses in Current RSA Signature Schemes, December 2011, ICISC, Seoul, Korea
  • Side Channels and Fault Attacks, April 2011, CrossFyre, Darmstadt, Germany
  • Erfolgreiche Faktorisierungsangriffe gegen RSA in der Praxis, November 2010, 13. Kryptotag, Darmstadt, Germany

Last update: November 1, 2016

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang