


default search action
Michael Hamburg
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i24]Mike Hamburg, Eric Linstadt, Danny Moore, Thomas Vogelsang:
Unraveling codes: fast, robust, beyond-bound error correction for DRAM. CoRR abs/2401.10688 (2024) - 2023
- [c17]Steven C. Woo
, Wendy Elsasser
, Mike Hamburg
, Eric Linstadt
, Michael R. Miller
, Taeksang Song
, James Tringali
:
RAMPART: RowHammer Mitigation and Repair for Server Memory Systems. MEMSYS 2023: 4:1-4:15 - [i23]Steven C. Woo, Wendy Elsasser
, Mike Hamburg, Eric Linstadt, Michael R. Miller, Taeksang Song, James Tringali:
RAMPART: RowHammer Mitigation and Repair for Server Memory Systems. CoRR abs/2310.16354 (2023) - [i22]Henry de Valence, Jack Grigg, Mike Hamburg, Isis Lovecruft, George Tankersley, Filippo Valsorda:
The ristretto255 and decaf448 Groups. RFC 9496: 1-27 (2023) - 2021
- [j4]Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder
, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 88-113 (2021) - [c16]Mike Hamburg, Mike Tunstall
, Qinglai Xiao:
Improvements to RSA Key Generation and CRT on Embedded Devices. CT-RSA 2021: 633-656 - [i21]Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. IACR Cryptol. ePrint Arch. 2021: 956 (2021) - [i20]Mike Hamburg:
Computing the Jacobi symbol using Bernstein-Yang. IACR Cryptol. ePrint Arch. 2021: 1271 (2021) - 2020
- [j3]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. Commun. ACM 63(6): 46-56 (2020) - [j2]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre attacks: exploiting speculative execution. Commun. ACM 63(7): 93-101 (2020) - [j1]Mike Hamburg:
Faster Montgomery and double-add ladders for short Weierstrass curves. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 189-208 (2020) - [i19]Mike Hamburg:
Faster Montgomery and double-add ladders for short Weierstrass curves. IACR Cryptol. ePrint Arch. 2020: 437 (2020) - [i18]Mike Hamburg, Mike Tunstall, Qinglai Xiao:
Improvements to RSA key generation and CRT on embedded devices. IACR Cryptol. ePrint Arch. 2020: 1507 (2020) - [i17]Mike Hamburg:
Indifferentiable hashing from Elligator 2. IACR Cryptol. ePrint Arch. 2020: 1513 (2020)
2010 – 2019
- 2019
- [c15]Andris Ambainis, Mike Hamburg, Dominique Unruh:
Quantum Security Proofs Using Semi-classical Oracles. CRYPTO (2) 2019: 269-295 - [c14]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom
:
Spectre Attacks: Exploiting Speculative Execution. IEEE Symposium on Security and Privacy 2019: 1-19 - [c13]Nina Bindel
, Mike Hamburg, Kathrin Hövelmanns
, Andreas Hülsing
, Edoardo Persichetti
:
Tighter Proofs of CCA Security in the Quantum Random Oracle Model. TCC (2) 2019: 61-90 - [i16]Nina Bindel, Mike Hamburg, Andreas Hülsing, Edoardo Persichetti:
Tighter proofs of CCA security in the quantum random oracle model. IACR Cryptol. ePrint Arch. 2019: 590 (2019) - 2018
- [c12]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown: Reading Kernel Memory from User Space. USENIX Security Symposium 2018: 973-990 - [i15]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. CoRR abs/1801.01203 (2018) - [i14]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. CoRR abs/1801.01207 (2018) - [i13]Andris Ambainis, Mike Hamburg, Dominique Unruh:
Quantum security proofs using semi-classical oracles. IACR Cryptol. ePrint Arch. 2018: 904 (2018) - [i12]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. meltdownattack.com (2018) - [i11]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. meltdownattack.com (2018) - 2017
- [c11]Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. CHES 2017: 3-23 - [i10]Mike Hamburg:
The STROBE protocol framework. IACR Cryptol. ePrint Arch. 2017: 3 (2017) - [i9]Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson:
A Side-Channel Assisted Cryptanalytic Attack Against QcBits. IACR Cryptol. ePrint Arch. 2017: 596 (2017) - [i8]Mike Hamburg:
Cryptanalysis of 22 1/2 rounds of Gimli. IACR Cryptol. ePrint Arch. 2017: 743 (2017) - 2016
- [i7]Adam Langley, Mike Hamburg, Sean Turner:
Elliptic Curves for Security. RFC 7748: 1-22 (2016) - 2015
- [c10]Mike Hamburg:
Decaf: Eliminating Cofactors Through Point Compression. CRYPTO (1) 2015: 705-723 - [i6]Mike Hamburg:
Ed448-Goldilocks, a new elliptic curve. IACR Cryptol. ePrint Arch. 2015: 625 (2015) - [i5]Mike Hamburg:
Decaf: Eliminating cofactors through point compression. IACR Cryptol. ePrint Arch. 2015: 673 (2015) - 2014
- [i4]Mike Hamburg:
Twisting Edwards curves with isogenies. IACR Cryptol. ePrint Arch. 2014: 27 (2014) - 2013
- [c9]Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange:
Elligator: elliptic-curve points indistinguishable from uniform random strings. CCS 2013: 967-980 - 2012
- [i3]Mike Hamburg:
Fast and compact elliptic-curve cryptography. IACR Cryptol. ePrint Arch. 2012: 309 (2012) - 2011
- [b1]Michael Hamburg:
Spatial encryption. Stanford University, USA, 2011 - [c8]Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh:
Location Privacy via Private Proximity Testing. NDSS 2011 - [c7]Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh:
OpenConflict: Preventing Real Time Map Hacks in Online Games. IEEE Symposium on Security and Privacy 2011: 506-520 - [i2]Mike Hamburg:
Spatial Encryption. IACR Cryptol. ePrint Arch. 2011: 389 (2011) - 2010
- [c6]Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh:
The Case for Ubiquitous Transport-Level Encryption. USENIX Security Symposium 2010: 403-418
2000 – 2009
- 2009
- [c5]Emily Stark, Michael Hamburg, Dan Boneh:
Symmetric Cryptography in Javascript. ACSAC 2009: 373-381 - [c4]Mike Hamburg:
Accelerating AES with Vector Permute Instructions. CHES 2009: 18-32 - 2008
- [c3]Dan Boneh, Michael Hamburg:
Generalized Identity Based and Broadcast Encryption Schemes. ASIACRYPT 2008: 455-470 - [c2]Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky:
Circular-Secure Encryption from Decision Diffie-Hellman. CRYPTO 2008: 108-125 - 2007
- [c1]Dan Boneh, Craig Gentry, Michael Hamburg:
Space-Efficient Identity Based Encryption Without Pairings. FOCS 2007: 647-657 - [i1]Dan Boneh, Craig Gentry, Michael Hamburg:
Space-Efficient Identity Based Encryption Without Pairings. IACR Cryptol. ePrint Arch. 2007: 177 (2007)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint