Thomas Eisenbarth

6.4k total citations · 1 hit paper
88 papers, 2.2k citations indexed

About

Thomas Eisenbarth is a scholar working on Artificial Intelligence, Information Systems and Hardware and Architecture. According to data from OpenAlex, Thomas Eisenbarth has authored 88 papers receiving a total of 2.2k indexed citations (citations by other indexed papers that have themselves been cited), including 72 papers in Artificial Intelligence, 31 papers in Information Systems and 29 papers in Hardware and Architecture. Recurrent topics in Thomas Eisenbarth's work include Security and Verification in Computing (44 papers), Cryptographic Implementations and Security (34 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (27 papers). Thomas Eisenbarth is often cited by papers focused on Security and Verification in Computing (44 papers), Cryptographic Implementations and Security (34 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (27 papers). Thomas Eisenbarth collaborates with scholars based in Germany, United States and United Kingdom. Thomas Eisenbarth's co-authors include Rainer Koschke, Daniel Simon, Berk Sunar, Gorka Irazoqui, Christof Paar, Axel Pöschmann, Sandeep Kumar, Leif Uhsadel, Mehmet Sinan İnci and Daniel Moghimi and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and IEEE Transactions on Software Engineering.

In The Last Decade

Thomas Eisenbarth

82 papers receiving 2.0k citations

Hit Papers

Locating features in sour... 2003 2026 2010 2018 2003 100 200 300 400

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Thomas Eisenbarth 1.6k 947 584 534 517 88 2.2k
Dawu Gu 1.2k 0.8× 813 0.9× 550 0.9× 609 1.1× 568 1.1× 228 2.2k
Brendan Dolan-Gavitt 1.2k 0.8× 769 0.8× 504 0.9× 892 1.7× 224 0.4× 33 2.1k
Binyu Zang 1.5k 1.0× 1.7k 1.8× 1.8k 3.0× 928 1.7× 755 1.5× 131 3.1k
Galen Hunt 1.4k 0.9× 1.1k 1.1× 1.6k 2.7× 629 1.2× 847 1.6× 47 2.5k
Martin S. Beck 898 0.6× 1.1k 1.2× 1.8k 3.1× 279 0.5× 647 1.3× 8 2.7k
David Lie 1.2k 0.8× 1.1k 1.1× 828 1.4× 1.2k 2.3× 258 0.5× 66 2.3k
Aurélien Francillon 1.1k 0.7× 584 0.6× 637 1.1× 1.2k 2.3× 351 0.7× 55 1.8k
Paul Kocher 1.4k 0.9× 553 0.6× 705 1.2× 538 1.0× 765 1.5× 19 2.1k
Jonathan Walpole 1.4k 0.9× 725 0.8× 2.6k 4.5× 1.1k 2.1× 1.2k 2.3× 123 3.7k
Michael Carbin 796 0.5× 435 0.5× 611 1.0× 195 0.4× 825 1.6× 61 2.0k

Countries citing papers authored by Thomas Eisenbarth

Since Specialization
Citations

This map shows the geographic impact of Thomas Eisenbarth's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Thomas Eisenbarth with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Thomas Eisenbarth more than expected).

Fields of papers citing papers by Thomas Eisenbarth

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Thomas Eisenbarth. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Thomas Eisenbarth. The network helps show where Thomas Eisenbarth may publish in the future.

Co-authorship network of co-authors of Thomas Eisenbarth

This figure shows the co-authorship network connecting the top 25 collaborators of Thomas Eisenbarth. A scholar is included among the top collaborators of Thomas Eisenbarth based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Thomas Eisenbarth. Thomas Eisenbarth is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Buchty, Rainer, et al.. (2025). Lightweight Authenticated Integration and In-Field Secure Operation of System-in-Package. ACM Transactions on Design Automation of Electronic Systems. 30(5). 1–23.
3.
Eisenbarth, Thomas, et al.. (2024). Obelix: Mitigating Side-Channels Through Dynamic Obfuscation. ArXiv.org. 4182–4199. 7 indexed citations
4.
Eisenbarth, Thomas, et al.. (2024). Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2025(1). 420–449. 1 indexed citations
7.
Gülmezoğlu, Berk, et al.. (2023). Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs. 177–188. 5 indexed citations
8.
Eisenbarth, Thomas, et al.. (2023). SEV-Step A Single-Stepping Framework for AMD-SEV. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2024(1). 180–206. 7 indexed citations
9.
Chuengsatiansup, Chitchanok, et al.. (2023). TeeJam: Sub-Cache-Line Leakages Strike Back. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2024(1). 457–500. 2 indexed citations
10.
Eisenbarth, Thomas, et al.. (2022). A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP. 337–351. 27 indexed citations
11.
Eisenbarth, Thomas, et al.. (2021). Firmware Security Module. 5(2). 103–113. 5 indexed citations
12.
Moghimi, Daniel, Berk Sunar, Thomas Eisenbarth, & Nadia Heninger. (2019). TPM-FAIL: TPM meets Timing and Lattice Attacks. arXiv (Cornell University). 2057–2073. 4 indexed citations
13.
Irazoqui, Gorka, Mehmet Sinan İnci, Thomas Eisenbarth, & Berk Sunar. (2015). Know Thy Neighbor: Crypto Library Detection in Cloud. SHILAP Revista de lepidopterología. 2015(1). 25–40. 26 indexed citations
14.
Rohde, Sebastian, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, & Christof Paar. (2014). Efficient Hash-Based Signatures on Embedded Devices. 4 indexed citations
15.
Irazoqui, Gorka, Mehmet Sinan İnci, Thomas Eisenbarth, & Berk Sunar. (2014). Fine Grain Cross-VM Attacks on Xen and VMware. 737–744. 16 indexed citations
16.
Balasch, Josep, Barış Ege, Thomas Eisenbarth, et al.. (2012). Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. Lecture notes in computer science. 2012. 158–172. 2 indexed citations
17.
Bogdanov, Andrey, Thomas Eisenbarth, Andy Rupp, & Christopher Wolf. (2008). Time-Area Optimized Public-Key Engines: MQ -Cryptosystems as Replacement for Elliptic Curves?. Lecture notes in computer science. 2008. 349–61. 19 indexed citations
18.
Gierlichs, Benedikt, Lejla Batina, Christophe Clavier, et al.. (2008). Susceptibility of eSTREAM Candidates towards Side Channel Analysis. 20 indexed citations
19.
Bogdanov, Andrey, Thomas Eisenbarth, & Andy Rupp. (2007). A Hardware-Assisted Realtime Attack on A5/2 without Precomputations. Lecture notes in computer science. 4727. 394–412. 1 indexed citations
20.
Eisenbarth, Thomas, Rainer Koschke, & G Vogel. (2003). Static trace extraction. 128–137. 15 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026