Research Group Leader

Picture: Ralf Werner

Dr. Juliane Krämer

Quantum and Physical attack resistant Cryptography

Contact

work +49 6151 16-20662

Work S2|20 119
Pankratiusstraße 2
64289 Darmstadt

Research interests

  • Post-quantum cryptography, especially lattice-based cryptography
  • Fault attacks
  • Side channel attacks

Ongoing

Sebastian Schuberth (Master)


Open

Oesch, Abu-Salma, Krämer, Wu, Diallo, Ruoti (2020): Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK. ACSAC 2020, ONLINE

Büscher, Demmler, Karvelas, Katzenbeisser, Krämer, Rathee, Schneider, Struck (2020): Secure Two-Party Computation in a Post-Quantum World. ACNS 2020, Rome, Italy


Alkim, Barreto, Bindel, Krämer, Longa, Ricardini (2020): The Lattice-Based Digital Signature Scheme qTESLA. ACNS 2020, Rome, Italy


Krämer, Struck (2020): Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions. COSADE 2020, Lugano, Switzerland


Krämer, Struck (2020): Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security. PQCrypto 2020, Paris, France


Krämer (2019): Post-Quantum Cryptography and its Application to the IoT – (Extended Abstract). Informatik Spektrum.


Burger, Bischof, Krämer (2019): p3Enum: A New Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver. ICCS 2019. Portugal


Burger, Bischof, Krämer (2019): A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions. HPCS 2019, Ireland.


Marzougui, Krämer (2019): Post-Quantum Cryptography in Embedded Systems. IWSMA 2019, UK


Krämer, Loiero (2019): Fault attacks on UOV and Rainbow. COSADE 2019, Darmstadt


Kannwischer, Genêt, Butin, Krämer, Buchmann (2018): Differential Power Analysis of XMSS and SPHINCS. COSADE 2018, Singapore


Liu, Krämer, Hu, Buchmann (2017): Quantum security analysis of a lattice-based oblivious transfer protocol. Frontiers of IT & EE


Bindel, Krämer, Schreiber (2017): Hampering fault attacks against lattice-based signature schemes: countermeasures and their efficiency (special session). CODES+ISSS 2017, Seoul, Korea


Bindel, Buchmann, Krämer, Mantel, Schickel, Weber (2017): Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics. FPS 2017, Nancy, France


Alkim, Bindel, Buchmann, Dagdelen, Eaton, Gutoski, Krämer, Pawlega (2017): Revisiting TESLA in the Quantum Random Oracle Model. PQCrypto 2017, Utrecht, the Netherlands


Krämer (2017): Why Cryptography should not rely on physical attack complexity. it – Information Technology, de Gruyter


Krämer (2016): Warum wir uns in der Kryptographie nicht auf die Komplexität physikalischer Angriffe verlassen sollten. In Ausgezeichnete Informatikdissertationen 2015 (GIDISS'15)


Bindel, Buchmann, Krämer (2016): Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks. FDTC 2016, Santa Barbara, CA, USA


Buchmann, Büscher, Goepfert, Katzenbeisser, Krämer, Micciancio, Siim, van Vredendaal, Walter (2016): Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. ASIAPKC 2016, Xi'an, China


Kiss, Krämer, Rauzy, Seifert (2016): Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. COSADE 2016, Graz, Austria


Akleylek, Bindel, Buchmann, Krämer, Marson (2016): An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. AFRICACRYPT 2016, Fes, Marokko


Krämer (2016): Ein praktisch realisierter Fehlerangriff gegen eine bekannte Implementierung einer kryptographischen Paarung. SmartCard Workshop 2016, Darmstadt, Germany


Kiss, Stüber, Krämer (2015): On the Optimality of Differential Fault Analyses on CLEFIA. MACIS 2015, Berlin, Germany


Ganji, Krämer, Seifert, Tajik (2015): Lattice Basis Reduction Attack against Physically Unclonable Functions. CCS'15, Denver, Colorado, US


Blömer, Gomes da Silva, Günther, Krämer, Seifert (2014): A Practical Second‐Order Fault Attack against a Real‐World Pairing Implementation. FDTC 2014, Busan, Korea


Krämer (2014): Anwendungen von identitätsbasierter Kryptographie. SmartCard Workshop 2014, Darmstadt, Germany


Krämer, Kasper, Seifert (2014): The Role of Photons in Cryptanalysis. ASP-DAC 2014, Singapore


Schlösser, Nedospasov, Krämer, Orlic, Seifert (2013): Simple Photonic Emission Analysis of AES. Journal of Cryptographic Engineering, Springer-Verlag


Krämer, Nedospasov, Schlösser, Seifert (2013): Differential Photonic Emission Analysis. COSADE 2013, Paris, France


Schlösser, Nedospasov, Krämer, Orlic, Seifert (2012): Simple Photonic Emission Analysis of AES. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Leuven, Belgium


Michéle, Krämer, Seifert (2012): Structure-Based RSA Fault Attacks. 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Hangzhou, China


Krämer, Nedospasov, Seifert (2011): Weaknesses in Current RSA Signature Schemes. Information Security and Cryptology – ICISC 2011 – 14th International Conference, Seoul, Korea


Dörflinger, Voth, Krämer, Fromm (2010): My smartphone is a safe – The user's point of view regarding graded seurity levels and novel authentication methods. SECRYPT 2010 – International Conference on Security and Cryptography, Athens, Greece


Büscher, Demmler, Karvelas, Katzenbeisser, Krämer, Rathee, Schneider, Struck (2020): Secure Two-Party Computation in a Post-Quantum World. ePrint Archive: Report 2020/411


Krämer, Struck (2020): Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions. ePrint Archive: Report 2020/280


Gagliardoni, Krämer, Struck (2020): Quantum Indistinguishability for Public Key Encryption. ePrint Archive: Report 2020/266


Krämer, Struck (2020): Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security. ePrint Archive: Report 2020/129


Alkim, Barreto, Bindel, Krämer, Longa, Ricardini (2019): The Lattice-Based Digital Signature Scheme qTESLA. ePrint Archive, Report 2019/085


Kannwischer, Genêt, Butin, Krämer, Buchmann (2018): Differential Power Analysis of XMSS and SPHINCS. Cryptology ePrint Archive, Report 2018/673


Buchmann, Büscher, Göpfert, Katzenbeisser, Krämer, Micciancio, Siim, van Vredendaal, Michael Walter (2017): Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. Cryptology ePrint Archive, Report 2017/606


Alkeilani Alkadri, Buchmann, El Bansarkhani, Krämer (2017): A Framework to Select Parameters for Lattice-Based Cryptography. Cryptology ePrint Archive, Report 2017/615


Bindel, Buchmann, Krämer, Heiko Mantel, Schickel, Weber (2017): Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics. Cryptology ePrint Archive, Report 2017/951


Bindel, Buchmann, Krämer (2016): Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks. Cryptology ePrint Archive, Report 2016/415


Kiss, Krämer, Rauzy, Seifert (2016): Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. Cryptology ePrint Archive, Report 2016/238


Akleylek, Bindel, Buchmann, Krämer, Marson (2016): An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. Cryptology ePrint Archive, Report 2016/030


Alkim, Bindel, Buchmann, Dagdelen, Eaton, Gutoski, Krämer, Pawlega (2015): Revisiting TESLA in the quantum random oracle model, ePrint Archive, Report 2015/755


Krämer, Stüber, Kiss (2014): On the Optimality of Differential Fault Analyses on CLEFIA. Cryptology ePrint Archive, Report 2014/572


Blömer, Gomes da Silva, Günther, Krämer, Seifert (2014): A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. Cryptology ePrint Archive, Report 2014/543

Physikalische Sicherheit von Post-Quantum-Kryptographie, September 2020, CAST-Workshop Quantentechnologie und Quantencomputer-resistente Sicherheit, CAST e.V., Darmstadt, Germany


Aktuelle Herausforderungen der Post-Quantum-Kryptographie, October 2019, #Digiforum Darmstadt (Quantencomputer – Gefahr für die Cyber-Sicherheit?), Darmstadt, Germany


Einführung in die Post-Quantum-Kryptographie, September 2019, INFORMATIK 2019, Track Sicherheit, Zuverlässigkeit, Korrektheit, Kassel, Germany


Why do we need Post-Quantum Cryptography?, Mai 2019, LeadersLikeHer meets Cyber Risk @ Deloitte, Berlin, Germany


Fault attacks on UOV and Rainbow, April 2019, COSADE 2019, Darmstadt, Germany


Post-Quantum-Kryptographie (für das Internet der Dinge). Februar 2019, Karlsruher Institut für Technologie, Karlsruhe, Germany


Post-Quantum-Kryptographie. November 2016, Real Estate CFO Summit, Berlin, Germany


Post-Quantum-Kryptographie. September 2016, INFORMATIK 2016, Klagenfurt, Austria


Ansprache als GI-Junior-Fellow 2016. September 2016, INFORMATIK 2016, Klagenfurt, Austria


Kryptographie – wie wir heute und morgen Informationen sicher übermitteln. September 2016, Webmontag Frankfurt #81, Frankfurt am Main, Germany


Why Cryptography Should Not Rely on Physical Attack Complexity. May 2016, GI-Dissertationspreis 2015, Schloss Dagstuhl, Germany


Why Cryptography Should Not Rely on Physical Attack Complexity. April 2016, CAST/GI Promotionspreis IT-Sicherheit 2015/16, Bonn, Germany


Practical Second-Order Fault Attacks against Pairings. February 2016, SmartCard-Workshop 2016, Darmstadt, Germany


The LWE Challenge, December 2015, 23. Kryptotag, Berlin, Germany


On the Optimality of Di?fferential Fault Analyses on CLEFIA. November 2015, MACIS 2015, Berlin, Germany


Fault Attacks on Pairing-Based Cryptography. September 2015, ECC 2015, Bordeaux, France


The LWE Challenge. September 2015, ECC 2015 Rump Session, Bordeaux, France


Anwendungen von identitätsbasierter Kryptographie. February 2014, SmartCard-Workshop 2014, Darmstadt, Germany


The Role of Photons in Cryptanalysis. January 2014, ASP-DAC 2014, Singapore


Differential Photonic Emission Analysis, March 2013, COSADE 2013, Paris, France


Photonische Seitenkanal-Analyse, March 2013, Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany


Photonische Seitenkanal-Analyse, August 2012, CAST-Workshop Mobile und Embedded Security, CAST e.V., Darmstadt, Germany


Photonic Side Channel Analysis for the rest of us, August 2012, CRYPTO 2012 Rump Session, Santa Barbara, CA, United States


Weaknesses in Current RSA Signature Schemes, February 2012, Telekom Innovation Laboratories at Ben-Gurion University, Beer-Sheva, Israel


Weaknesses in Current RSA Signature Schemes, December 2011, ICISC, Seoul, Korea


Side Channels and Fault Attacks, April 2011, CrossFyre, Darmstadt, Germany


Erfolgreiche Faktorisierungsangriffe gegen RSA in der Praxis, November 2010, 13. Kryptotag, Darmstadt, Germany