default search action
Michael Gruber
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Michael Mildner, Michaela Brunner, Michael Gruber, Johanna Baehr, Georg Sigl:
Fault-Simulation-Based Flip-Flop Classification for Reverse Engineering. DDECS 2024: 53-56 - [c16]Matthias Probst, Manuel Brosch, Michael Gruber, Georg Sigl:
DOMREP II. HOST 2024: 112-121 - 2023
- [c15]Mathieu Gross, Jonas Krautter, Dennis Gnad, Michael Gruber, Georg Sigl, Mehdi B. Tahoori:
FPGANeedle: Precise Remote Fault Attacks from FPGA to CPU. ASP-DAC 2023: 358-364 - [c14]Tobias Holl, Katharina Bogad, Michael Gruber:
Whiteboxgrind - Automated Analysis of Whitebox Cryptography. COSADE 2023: 221-240 - 2022
- [j4]Jonas Ruchti, Michael Gruber, Michael Pehl:
When the Decoder Has to Look Twice: Glitching a PUF Error Correction. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 26-70 (2022) - [i3]Michael Gruber, Georg Sigl:
TOFU - Toggle Count Analysis made simple. IACR Cryptol. ePrint Arch. 2022: 129 (2022) - 2021
- [j3]Michael Gruber, Matthias Probst, Patrick Karl, Thomas Schamberger, Lars Tebelmann, Michael Tempelmeier, Georg Sigl:
DOMREP-An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection. IEEE Trans. Inf. Forensics Secur. 16: 4321-4335 (2021) - [c13]Michael Gruber, Patrick Karl, Georg Sigl:
Algebraic Fault Analysis of Subterranean 2.0. FDTC 2021: 45-55 - [c12]Patrick Karl, Michael Gruber:
A Survey on the Application of Fault Analysis on Lightweight Cryptography. NTMS 2021: 1-3 - [i2]Jonas Ruchti, Michael Gruber, Michael Pehl:
When the Decoder Has to Look Twice: Glitching a PUF Error Correction. IACR Cryptol. ePrint Arch. 2021: 958 (2021) - 2020
- [c11]Michael Gruber, Matthias Probst, Michael Tempelmeier:
Statistical Ineffective Fault Analysis of GIMLI. HOST 2020: 252-261 - [c10]Michaela Brunner, Michael Gruber, Michael Tempelmeier, Georg Sigl:
Logic Locking Induced Fault Attacks. ISVLSI 2020: 114-119
2010 – 2019
- 2019
- [c9]Michael Gruber, Bodo Selmke:
Differential Fault Attacks on KLEIN. COSADE 2019: 80-95 - [c8]Xin Wang, Teng Xiao, Michael Gruber, Christian Heipke:
Robustifying Relative Orientations With Respect to Repetitive Structures and Very Short Baselines for Global SfM. CVPR Workshops 2019: 2896-2904 - [c7]Michael Gruber, Matthias Probst, Michael Tempelmeier:
Persistent Fault Analysis of OCB, DEOXYS and COLM. FDTC 2019: 17-24 - [c6]Leon Sell, Michael Auer, Christoph Frädrich, Michael Gruber, Philemon Werli, Gordon Fraser:
An Empirical Evaluation of Search Algorithms for App Testing. ICTSS 2019: 123-139 - [i1]Michael Gruber, Matthias Probst, Michael Tempelmeier:
Statistical Ineffective Fault Analysis of GIMLI. CoRR abs/1911.03212 (2019) - 2017
- [c5]Oscar M. Guillen, Michael Gruber, Fabrizio De Santis:
Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go? COSADE 2017: 207-222 - 2015
- [j2]Thomas Baum, Eduardo Grande Garcia, Rainer Burgkart, Olga Gordijenko, Hans Liebl, Pia Jungmann, Michael Gruber, Tina Zahel, Ernst J. Rummeny, Simone Waldt, Jan S. Bauer:
Osteoporosis imaging: effects of bone preservation on MDCT-based trabecular bone microstructure parameters and finite element models. BMC Medical Imaging 15: 22 (2015)
2000 – 2009
- 2009
- [c4]Franz Leberl, Michael Gruber:
3D-models of the Human Habitat for the Internet. VISAPP (1) 2009: 7-15 - 2007
- [c3]Christian Böhm, Michael Gruber, Peter Kunath, Alexey Pryakhin, Matthias Schubert:
ProVeR: Probabilistic Video Retrieval using the Gauss-Tree. ICDE 2007: 1521-1522 - 2006
- [c2]Stefan Brecheisen, Hans-Peter Kriegel, Matthias Schubert, Michael Gruber:
VICO: Visualizing Connected Object Orderings. EDBT 2006: 1151-1154 - 2000
- [j1]Michael Kofler, Michael Gervautz, Michael Gruber:
R-trees for organizing and visualizing 3D GIS databases. Comput. Animat. Virtual Worlds 11(3): 129-143 (2000)
1990 – 1999
- 1998
- [c1]Michael Kofler, Michael Gervautz, Michael Gruber:
The Styria Flyover - LoD Management for Huge Textured Terrain Models. Computer Graphics International 1998: 444-454
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-20 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint