Refine
Departments, institutes and facilities
- Fachbereich Informatik (59)
- Fachbereich Angewandte Naturwissenschaften (32)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (32)
- Fachbereich Ingenieurwissenschaften und Kommunikation (25)
- Institut für Cyber Security & Privacy (ICSP) (20)
- Fachbereich Wirtschaftswissenschaften (17)
- Institut für funktionale Gen-Analytik (IFGA) (16)
- Institute of Visual Computing (IVC) (13)
- Institut für Verbraucherinformatik (IVI) (11)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (6)
Document Type
- Conference Object (79)
- Article (70)
- Part of a Book (10)
- Conference Proceedings (3)
- Book (monograph, edited volume) (2)
- Doctoral Thesis (2)
- Bachelor Thesis (1)
- Contribution to a Periodical (1)
- Research Data (1)
- Master's Thesis (1)
Year of publication
- 2016 (174) (remove)
Language
- English (174) (remove)
Keywords
- Dielectric analysis (2)
- Fas (2)
- IEEE802.11 (2)
- Intelligent Transport System (2)
- Large, high-resolution displays (2)
- Lignin (2)
- Long-Distance WiFi (2)
- Numerical optimization (2)
- Single Instruction Multiple Data (SIMD) (2)
- SpMV (2)
- Sparse Matrix Vector multiply (SpMV) (2)
- User Experience (2)
- Vehicular Ad hoc Networks (2)
- WiLD (2)
- citizen participation (2)
- dielectric analysis (2)
- food systems (2)
- intrinsics (2)
- reaction kinetics (2)
- regional food production (2)
- social empirical research (2)
- sustainable transition (2)
- urban green spaces (2)
- 31P NMR (1)
- 3D user interface (1)
- 5-Oxoprolinase (1)
- 5-oxoprolinuria (1)
- API usability (1)
- ARM Cortex M3 Processor (1)
- Access regulation (1)
- Actuators (1)
- Adaptive Media Streaming (1)
- Adaptive optics (1)
- Advanced Driver Assistance Systems (1)
- Africa (1)
- Age estimation (1)
- Agile software development (1)
- Aminoacylase 1 (1)
- Analytics (1)
- Antibiotics resistance (1)
- Aspartic acid racemization (1)
- Aspartoacylase (1)
- Autoimmune disease (1)
- Automation (1)
- Autonomy (1)
- B-cell lymphoma (1)
- BCL2 (1)
- Beech wood (1)
- Benchmarking (1)
- Biobased polymeric material (1)
- Biomass (1)
- Biometrics of chips (1)
- Blocking (1)
- Business Models (1)
- CD30+ cells (1)
- CIK cells (1)
- CIK-Zellen (1)
- CUDA (1)
- Camphorquinone (1)
- Canavan disease (1)
- Cannabinoids (1)
- Case study (1)
- Ceramic matrix composite (1)
- Chaetocin (1)
- Chemical resource (1)
- Code Generation (1)
- Collaboration and e-Services (1)
- Collaborative design (1)
- Compensation schemes (1)
- Consumer Online Behaviour (1)
- Cooperative Awareness Message (1)
- Corporate Social Responsibility (1)
- Country Risks (1)
- Crisis management (1)
- Culture (1)
- Data Compression (1)
- Data Reduction (1)
- Data Tiles (1)
- Depth Of Cure (1)
- Destination marketing (1)
- Difference-coding (1)
- Dimethacrylate (1)
- Directional Antenna (1)
- Disclosive ethics (1)
- Distributed rendering (1)
- Domain-Specific Modeling Languages, (1)
- Drug resistance (1)
- Dystonia (1)
- E-Business (1)
- E-Learning (1)
- ELSI (1)
- EPHB2 (1)
- Elliptic Curve Cryptography (1)
- Elution (1)
- Embedded software (1)
- Empirical study (1)
- Endosomes (1)
- Enterprise Engineering (1)
- Enterprise Information Systems (1)
- Enterprise Resource Planning (1)
- Entlohnungssysteme (1)
- Epithelial-mesenchymal transition (1)
- Ethnographic Research (1)
- Evaluation (1)
- Exergame (1)
- Exergames (1)
- Experiment (1)
- FGR (1)
- FOXA1 (1)
- Factory instrumentation (1)
- Failure analysis (1)
- Fall prevention (1)
- Fault analysis (1)
- Fault-channel watermarks (1)
- Field Study (1)
- Field programmable gate arrays (1)
- Filler content (1)
- Fog (1)
- Force (1)
- Force field (1)
- Fourier-transform infrared spectroscopy (1)
- Framing (1)
- Free space optics (1)
- Friction (1)
- GC/MS (1)
- GPU (1)
- Game design (1)
- Gas chromatography/mass spectrometry (GC/MS) (1)
- Glutathione synthetase (1)
- Gradient-boosting (1)
- Grasping (1)
- HDAC inhibitor (1)
- HEB mixer (1)
- HPC (1)
- Hand Tracking (1)
- Heart Rate Prediction (1)
- High-performance computing (1)
- Histograms (1)
- ICT (1)
- IP protection (1)
- ISM: kinematics and dynamics (1)
- ISM: molecules (1)
- Industrial applications (1)
- Industry 4.0 (1)
- Instance-based learning (1)
- Integral backstepping technique (1)
- Intel Xeon Phi (1)
- Interaction (1)
- Internationalization (1)
- Ion viscosity (1)
- Irradiance Distribution (1)
- Issue tracking systems (1)
- Java (1)
- KNN (1)
- Kinetics (1)
- LEF1 (1)
- Language Engineering (1)
- Laser-Beam Profiler (1)
- Lattice Boltzmann (1)
- Light Curing Units (1)
- Lighting simulation (1)
- Linear quadratic regulator (1)
- Linear regression (1)
- Liquid-liquid extraction (LLE) (1)
- Living Lab (1)
- Longley-Rice (1)
- Lymphoproliferative disorder (1)
- Lysosomes (1)
- Lügenverhalten (1)
- MAC (1)
- MAPO (1)
- MPV17 monoclonal antibody (1)
- MYB (1)
- Machine Learning (1)
- Manipulation tasks (1)
- Market segmentation (1)
- Membrane protein (1)
- Method of lines (1)
- Method validation (1)
- Methodology (1)
- Mining Software Repositories (1)
- Mitochondria (1)
- Mitochondrial DNA depletion syndrome (1)
- Mobile robotics (1)
- Model Fitting (1)
- Model-Driven Engineering (1)
- Model-free control (1)
- Modular software packages (1)
- Molecular dynamics (1)
- Molecular modeling (1)
- Motion Capture (1)
- Movement disorder (1)
- Multi-drug efflux (1)
- Multiphase flow (1)
- Musical Performance (1)
- N-acylated amino acids (1)
- NFKB (1)
- Na+/K+ ATPase (1)
- Natural Language Processing (1)
- Navigation interface (1)
- Network simulation (1)
- Nonlinear control quadrotor uav (1)
- Nvidia graphic processors (1)
- OSGi (1)
- Object detection (1)
- Object recognition (1)
- Older adults (1)
- Open-source (1)
- OpenACC (1)
- OpenFlow (1)
- OpenMP (1)
- OpenMP, unrolling (1)
- Organosolv (1)
- Organosolv process (1)
- Outer membrane channel (1)
- Performance (1)
- Performance Simulation (1)
- Performance prediction (1)
- Peroxisomes (1)
- Photoinitiator (1)
- Photopolymerization (1)
- Poly(acrylonitrile-co-1,3-butadiene-co-styrene)/polyamide 6 (ABS/PA 6) blends (1)
- Predictive Models (1)
- Privacy (1)
- Propagation (1)
- Pseudonym Concept (1)
- Public Key Infrastructure (1)
- Push-based Streaming (1)
- Pyroglutamic aciduria (1)
- Pyrolysis (1)
- Pyrolysis-GC/FID (1)
- Pyrolysis-GC/MS (1)
- Pyrolysis–GC/MS (1)
- Q measurement (1)
- QPSK (1)
- Qualitative study (1)
- Quantification (1)
- RCE (1)
- ROW methods (1)
- Receivers (1)
- Resin based composite (1)
- Resin composite (1)
- Rheology (1)
- Risk Analysis (1)
- River alarm systems (1)
- RoboCup industrial (1)
- Robotics (1)
- Robustness (1)
- Rule-based production systems (1)
- SAHA (1)
- SDN (1)
- SDWN (1)
- SGN-35 (1)
- SOS calls (1)
- Sandbox (1)
- ScalarMultiplication (1)
- Scanning electron microscopy (SEM) (1)
- Scenarios (1)
- Sclera (1)
- Security APIs (1)
- Self-driving (1)
- Serbian tourism (1)
- Service Design (1)
- Shan-Chen model (1)
- Shear viscosity (1)
- Side Channel Countermeasures (1)
- Silicon biometrics (1)
- Single Lens Reflex Camera (1)
- Size effect (1)
- Smart factory (1)
- Software Feature Request Detection (1)
- Software Security (1)
- Sparse Matrix Vector Multiplication (1)
- Spurious velocity (1)
- Strategic Planning (1)
- Strong Physical Unclonable Functions (PUFs) (1)
- Sustainability (1)
- Symmetry detector (1)
- Targeting (1)
- Technology acceptance (1)
- Text detection (1)
- Text recognition (1)
- Token (1)
- Tourist behavior (1)
- Traceability (1)
- Traffic sign detection (1)
- Traffic sign recognition (1)
- Training Model (1)
- Training Optimization (1)
- Transcriptional enhancer (1)
- Trapped radicals (1)
- Two-Ray (1)
- Ubiquity (1)
- Unconjugated THC-COOH (1)
- Unity (1)
- Usability (1)
- Usable Security (1)
- User centered design (1)
- User feedback (1)
- VR (1)
- Vector Intrinsics (1)
- Vehicle-to-Infrastructure Communication (1)
- Vehicle-to-Vehicle Com- munication (1)
- Vehicle-to-Vehicle Communication (1)
- Visible light curing resin (1)
- WDS (1)
- Water supply networks (1)
- Water supply systems (1)
- Watermarking (1)
- Web (1)
- Web Content Analysis (1)
- Web Mining (1)
- WebSocket (1)
- Weibull (1)
- WiFi (1)
- Wicked Problems (1)
- Wind Fields (1)
- Wind Flow Visualization (1)
- X-ray photoelectron spectroscopy (1)
- Zambia (1)
- Zielvorgaben (1)
- Zytokin-induzierte Killerzellen (1)
- agriculture (1)
- airway (1)
- antibody deficiency (1)
- antibody–drug conjugate (1)
- apoptosis (1)
- autoimmune lymphoproliferative syndrome (1)
- autoinflammatory disease (1)
- autonomous sensor system (1)
- autophagy (1)
- bass-shaker (1)
- biomolecules (1)
- breast cancer (1)
- brute force methods (1)
- chaetocin (1)
- clear cell renal cell carcinoma (1)
- collaboration (1)
- computer-supported collaborative work (1)
- conceptual culture model (1)
- conditioned media (1)
- confocal fluorescence microscopy (1)
- coverage (1)
- crisis exercise (1)
- cryogenics (1)
- cuSPARSE (1)
- curing behavior (1)
- cytokine-induced killer (CIK) cells (1)
- cytokine-induced killer cells (1)
- design science research (1)
- developing countries (1)
- dielektrická analýza (1)
- distribuce záření (1)
- emergency response (1)
- energy harvesting (1)
- engage exchange model (1)
- epithelial sodium channels (1)
- erp4students (1)
- failure criterion (1)
- fall prevention (1)
- fall risk (1)
- far-infrared astronomy (1)
- flame tube (1)
- force sensing (1)
- fotokompozit (1)
- gaming (1)
- gasotransmitter (1)
- generator (1)
- goals (1)
- hardness testing (1)
- heat-transfer method (1)
- heterodyne (1)
- human-centric lighting (1)
- hydrogen sulfide (1)
- hypoxia (1)
- iPad (1)
- immunodeficiency (1)
- individual differences (1)
- individuelle Unterschiede (1)
- instrumentation: spectrographs (1)
- investment casting (1)
- ion viscosity (1)
- kinetika vytvrzování (1)
- klarzelliges Nierenzellkarzinom (1)
- leaning (1)
- light distribution (1)
- long-term study (1)
- low-income country (1)
- lying (1)
- lymphoma (1)
- mesenchymal stem cells (1)
- micro-benchmarks (1)
- mobile computing (1)
- molecule-surface interactions (1)
- mood (1)
- nanocrystalline diamond (1)
- neuro-cognitive performance (1)
- older adults (1)
- optimization of telecommunications systems (1)
- outbreak management (1)
- pensions (1)
- peripheral vision (1)
- photo-polymerization (1)
- physical activity (1)
- political economy (1)
- prefrontal cortex (1)
- qualitative research (1)
- resin for 3D-printing (1)
- risk communication (1)
- robots (1)
- run-time adaptation (1)
- rural areas (1)
- self-assembled monolayers (1)
- sensor fusion (1)
- server processors (1)
- short-term memory (1)
- single-nucleotide polymorphisms in DNA (1)
- slip detection (1)
- social media analysis (1)
- socio economic impact (1)
- spectral rendering (1)
- stars: formation (1)
- structure prediction (1)
- submillimeter-wave technology (1)
- superconducting devices (1)
- surface textures (1)
- surfaces (1)
- synthetic sapphire (1)
- tactile sensing (1)
- teams (1)
- techniques: spectroscopic (1)
- territoriality (1)
- thermogravimetric analysis (1)
- thread mapping (1)
- tvrdost (1)
- unrolling (1)
- validity (1)
- vector units (1)
- vibration (1)
- vibration energy (1)
- viscoelastic properties (1)
- visibility (1)
- visible light curing resin based composites (1)
- viskoelastické vlastnosti (1)
- vytvrzování světlem (1)
- wavelength (1)
- weakest link (1)
- whole-body interface (1)
- wireless communication (1)
- wmSDN (1)
- workday breaks (1)
- workspace awareness (1)
- γ-glutamyl cycle (1)
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
(2016)
Temperature Dependency of Morphological Structure of Thermoplastic Polyurethane using WAXS and SAXS
(2016)
Polyurethanes achieved an exceptional position among the most important organic polymers due to their highly specific technological application areas. Polyurethanes represent a polyaddition product of isocyanate and diols. In terms of their enormous industrial importance, the chemistry of isocyanates has been extensively studied.
Recessive mutations in the MPV17 gene cause mitochondrial DNA depletion syndrome, a fatal infantile genetic liver disease in humans. Loss of function in mice leads to glomerulosclerosis and sensineural deafness accompanied with mitochondrial DNA depletion. Mutations in the yeast homolog Sym1, and in the zebra fish homolog tra cause interesting, but not obviously related phenotypes, although the human gene can complement the yeast Sym1 mutation. The MPV17 protein is a hydrophobic membrane protein of 176 amino acids and unknown function. Initially localised in murine peroxisomes, it was later reported to be a mitochondrial inner membrane protein in humans and in yeast. To resolve this contradiction we tested two new mouse monoclonal antibodies directed against the human MPV17 protein in Western blots and immunohistochemistry on human U2OS cells. One of these monoclonal antibodies showed specific reactivity to a protein of 20 kD absent in MPV17 negative mouse cells. Immunofluorescence studies revealed colocalisation with peroxisomal, endosomal and lysosomal markers, but not with mitochondria. This data reveal a novel connection between a possible peroxisomal/endosomal/lysosomal function and mitochondrial DNA depletion.
Background: Falls are common in older adults and can result in serious injuries. Due to demographic changes, falls and related healthcare costs are likely to increase over the next years. Participation and motivation of older adults in fall prevention measures remain a challenge. The iStoppFalls project developed an information and communication technology (ICT)-based system for older adults to use at home in order to reduce common fall risk factors such as impaired balance and muscle weakness. The system aims at increasing older adults’ motivation to participate in ICT-based fall prevention measures. This article reports on usability, user-experience and user-acceptance aspects affecting the use of the iStoppFalls system by older adults.
Methods: In the course of a 16-week international multicenter study, 153 community-dwelling older adults aged 65+ participated in the iStoppFalls randomized controlled trial, of which half used the system in their home to exercise and assess their risk of falling. During the study, 60 participants completed questionnaires regarding the usability, user experience and user acceptance of the iStoppFalls system. Usability was measured with the System Usability Scale (SUS). For user experience the Physical Activity Enjoyment Scale (PACES) was applied. User acceptance was assessed with the Dynamic Acceptance Model for the Re-evaluation of Technologies (DART). To collect more detailed data on usability, user experience and user acceptance, additional qualitative interviews and observations were conducted with participants.
Results: Participants evaluated the usability of the system with an overall score of 62 (Standard Deviation, SD 15.58) out of 100, which suggests good usability. Most users enjoyed the iStoppFalls games and assessments, as shown by the overall PACES score of 31 (SD 8.03). With a score of 0.87 (SD 0.26), user acceptance results showed that participants accepted the iStoppFalls system for use in their own home. Interview data suggested that certain factors such as motivation, complexity or graphical design were different for gender and age.
Conclusions: The results suggest that the iStoppFalls system has good usability, user experience and user acceptance. It will be important to take these along with factors such as motivation, gender and age into consideration when designing and further developing ICT-based fall prevention systems.
With the rising interest in vehicular communication systems many proposals for secure vehicle-to-vehicle commu- nication were made in recent years. Also, several standard- ization activities concerning the security and privacy measures in these communication systems were initiated in Europe and in US. Here, we discuss some limitations for secure vehicle- to-infrastructure communication in the existing standards of the European Telecommunications Standards Institute. Next, a vulnerability analysis for roadside stations on one side and security and privacy requirements for roadside stations on the other side are given. Afterwards, a proposal for a multi-domain public key architecture for intelligent transport systems, which considers the necessities of road infrastructure authorities and vehicle manufacturers, is introduced. The domains of the public key infrastructure are cryptographically linked based on local trust lists. In addition, a crypto agility concept is suggested, which takes adaptation of key length and cryptographic algorithms during PKI operation into account.
A deployment of the Vehicle-to-Vehicle communication technology according to ETSI is in preparation in Europe. Currently, a Public Key Infrastructure policy for Intelligent Transport Systems in Europe is in discussion to enable V2V communication. This policy set aside two classes of keys and certificates for ITS vehicle stations: long term authentication keys and pseudonymous keys and certificates. We show that from our point of view the periodic sent Cooperative Awareness Messages with extensive data have technical limitations and together with the pseudonym concept cause privacy problems.
We propose an artificial slime mould model (ASMM) inspired by the plasmodium of Physarum polucephalum (P. polucephalum). ASMM consists of plural slimes, and each slime shares energy via a tube with neighboring slimes. Outer slimes sense their environment and conform to it. Outer slimes periodically transmit information about their surrounding environment via a contraction wave to inner slimes. Thus, ASMM shows how slimes can sense a better environment even if that environment is not adjacent to the slimes. The slimes subsequently can move in the direction of an attractant.
Wireless sensor networks are widely used in a variety of fields including industrial environments. In case of a clustered network the location of cluster head affects the reliability of the network operation. Finding of the optimum location of the cluster head, therefore, is critical for the design of a network. This paper discusses the optimisation approach, based on the brute force algorithm, in the context of topology optimisation of a cluster structure centralised wireless sensor network. Two examples are given to verify the approach that demonstrate the implementation of the brute force algorithm to find an optimum location of the cluster head.
Cognitive robotics aims at understanding biological processes, though it has also the potential to improve future robotics systems. Here we show how a biologically inspired model of motor control with neural fields can be augmented with additional components such that it is able to solve a basic robotics task, that of obstacle avoidance. While obstacle avoidance is a well researched area, the focus here is on the extensibility of a biologically inspired framework. This work demonstrates how easily the biological inspired system can be used to adapt to new tasks. This flexibility is thought to be a major hallmark of biological agents.
The work at hand outlines a recording setup for capturing hand and finger movements of musicians. The focus is on a series of baseline experiments on the detectability of coloured markers under different lighting conditions. With the goal of capturing and recording hand and finger movements of musicians in mind, requirements for such a system and existing approaches are analysed and compared. The results of the experiments and the analysis of related work show that the envisioned setup is suited for the expected scenario.
Within qualitative interviews we examine attitudes towards driverless cars in order to investigate new mobility services and explore the impact of such services on everyday mobility. We identified three main issues that we would like to discuss in the workshop: (I) Designing beyond a driver-centric approach; (II) Developing mobility services for cars which drive themselves; and (III) Exploring self-driving practices.
Design of an Active Multispectral SWIR Camera System for Skin Detection and Face Verification
(2016)
Biometric face recognition is becoming more frequently used in different application scenarios. However, spoofing attacks with facial disguises are still a serious problem for state of the art face recognition algorithms. This work proposes an approach to face verification based on spectral signatures of material surfaces in the short wave infrared (SWIR) range. They allow distinguishing authentic human skin reliably from other materials, independent of the skin type. We present the design of an active SWIR imaging system that acquires four-band multispectral image stacks in real-time. The system uses pulsed small band illumination, which allows for fast image acquisition and high spectral resolution and renders it widely independent of ambient light. After extracting the spectral signatures from the acquired images, detected faces can be verified or rejected by classifying the material as "skin" or "no-skin". The approach is extensively evaluated with respect to both acquisition and classification performance. In addition, we present a database containing RGB and multispectral SWIR face images, as well as spectrometer measurements of a variety of subjects, which is used to evaluate our approach and will be made available to the research community by the time this work is published.
Scientists and engineers are using a distributed system Remote Component Environment (RCE) to design and simulate complex systems like airplanes, ships and satellites. During the simulation, RCE executes local and remote code. Remote code is classified as untrusted code. The execution of remote code comprises potential security risks for the host system of RCE. Additionally, RCE provides full access to system resources. The objective of this thesis is to implement a sandbox prototype to reduce the vulnerability of RCE during the execution of remote code.
This paper presents methods for the reduction and compression of meteorological data for web-based wind flow visualizations, which are tailored to the flow visualization technique. Flow data sets represent a large amount of data and are therefore not well suited for mobile networks with low data throughput rates and high latency. Using the mechanisms introduced in this paper, an efficient transfer of thinned out and compressed data can be achieved, while keeping the accuracy of the visualized information almost at the same quality level as for the original data.
Supported by their large size and high resolution, display walls suit well for different collaboration types. However, in order to foster instead of impede collaboration processes, interaction techniques need to be carefully designed, taking into regard the possibilities and limitations of the display size, and their effects on human perception and performance. In this paper we investigate the impact of visual distractors (which, for instance, might be caused by other collaborators' input) in peripheral vision on short-term memory and attention. The distractors occur frequently when multiple users collaborate in large wall display systems and may draw attention away from the main task, as such potentially affecting performance and cognitive load. Yet, the effect of these distractors is hardly understood. Gaining a better understanding thus may provide valuable input for designing more effective user interfaces. In this article, we report on two interrelated studies that investigated the effect of distractors. Depending on when the distractor is inserted in the task performance sequence, as well as the location of the distractor, user performance can be disturbed: we will show that distractors may not affect short term memory, but do have an effect on attention. We will closely look into the effects, and identify future directions to design more effective interfaces.
Effects of Workspace Awareness and Territoriality in Environments with Large, Shared Displays
(2016)
Synchronous cooperative work of multiple collaborators in large, high-resolution display systems comprises such psychological phenomena like workspace awareness and human territoriality. The phenomena and interplay between them can cause a significant impact on human-human and human-environment interaction. In a non-digital environment humans rely on their own physical abilities, utilities, and social protocols to control those phenomena (e.g. close eyes, or use earplugs to reduce workspace awareness; rotate oneself towards collaborators to increase workspace awareness). Digital environments, on the other hand, provide us with a possibility to ease, automate, and unify control processes, thus taking off that burden from users. Yet, we have to understand first, what effects workspace awareness and territoriality have within a collaborative environment. The aim of this doctoral thesis is to investigate effects of workspace awareness and territoriality on users and interaction processes in mixed-focus scenarios of various collaborative settings.
The design of future materials for biotechnological applications via deposition of molecules on surfaces will require not only exquisite control of the deposition procedure, but of equal importance will be our ability to predict the shapes and stability of individual molecules on various surfaces. Furthermore, one will need to be able to predict the structure patterns generated during the self-organization of whole layers of (bio)molecules on the surface. In this review, we present an overview over the current state of the art regarding the prediction and clarification of structures of biomolecules on surfaces using theoretical and computational methods.
This paper presents implementation results of several side channel countermeasures for protecting the scalar multiplication of ECC (Elliptic Curve Cryptography) implemented on an ARM Cortex M3 processor that is used in security sensitive wireless sensor nodes. Our implementation was done for the ECC curves P-256, brainpool256r1, and Ed25519. Investigated countermeasures include Double-And-Add Always, Montgomery Ladder, Scalar Randomization, Randomized Scalar Splitting, Coordinate Randomization, and Randomized Sliding Window. Practical side channel tests for SEMA (Simple Electromagnetic Analysis) and MESD (Multiple Exponent, Single Data) are included. Though more advanced side channel attacks are not evaluated, yet, our results show that an appropriate level of resistance against the most relevant attacks can be reached.
Fault-Channel Watermarks
(2016)