Peter Lipp
Ass.Prof. Dipl.-Ing. Dr.techn.Faculty & Group Leaders, Team Lipp

Teaching
I am member of the team teaching two undergraduate courses:
- Operating Systems (lecture: summer and winter term)
- Systems Programming (lecture: summer and winter term)
Service
As a group leader I have been responsible for IAIKs participation in several projects, on a national as well as on an European level. Examples are Credential, FutureID or OpenTC. Currently I am responsible for the LIGHTest-Project and for the upcoming KRAKEN-project in Stiftung SIC.
At Stiftung SIC I am responsible for the product development covering our world-renowned Java(C)-Crypto-toolkit-suite as well as application development (certificate authority software, mobile signatures).
Within ETSI TC ESI I have been editing the standard for signature creation and validation (https://www.etsi.org/deliver/etsi_ts/119100_119199/11910201/01.02.01_60/ts_11910201v010201p.pdf) and for the signature validation report (https://www.etsi.org/deliver/etsi_ts/119100_119199/11910202/01.02.01_60/ts_11910202v010201p.pdf).
Publications
4 Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Lipp, P. & Zefferer, T.
Selected Areas in Cryptography – SAC 2018, 257-277, (Lecture Notes in Computer Science; vol. 11349)
3 Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Lipp, P. & Zefferer, T.
Selected Areas in Cryptography – SAC 2018, 257-277, (Lecture Notes in Computer Science; vol. 11349)
2 Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Lipp, P. & Zefferer, T.
Selected Areas in Cryptography – SAC 2018, 257-277, (Lecture Notes in Computer Science; vol. 11349)
1 Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Lipp, P. & Zefferer, T.
Selected Areas in Cryptography – SAC 2018, 257-277, (Lecture Notes in Computer Science; vol. 11349)
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Lipp, P. & Zefferer, T.
Selected Areas in Cryptography – SAC 2018, 257-277, (Lecture Notes in Computer Science; vol. 11349)