Christof Paar

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
\texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
 
2024-12-13Paper
Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms
 
2024-06-11Paper
Graph Similarity and its Applications to Hardware Security
IEEE Transactions on Computers
2020-10-02Paper
Efficient multiplier architectures for Galois fields GF(2/sup 4n/)
IEEE Transactions on Computers
2018-07-09Paper
Fast arithmetic for public-key algorithms in Galois fields with composite exponents
IEEE Transactions on Computers
2018-07-09Paper
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors
IEEE Transactions on Computers
2018-06-27Paper
Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs
IEEE Transactions on Computers
2018-06-27Paper
The first thorough side-channel hardware Trojan
 
2018-04-06Paper
Cryptanalysis with COPACOBANA
IEEE Transactions on Computers
2017-08-08Paper
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
IEEE Transactions on Computers
2017-07-12Paper
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
Designs, Codes and Cryptography
2015-10-26Paper
When reverse-engineering meets side-channel analysis -- digital lockpicking in practice
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Preventing scaling of successful attacks: a cross-layer security architecture for resource-constrained platforms
Cryptography and Information Security in the Balkans
2015-09-21Paper
Full-size high-security ECC implementation on MSP430 microcontrollers
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Remote IP protection using timing channels
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Attacking code-based cryptosystems with information set decoding using special-purpose hardware
Post-Quantum Cryptography
2015-01-14Paper
Block ciphers -- focus on the linear layer (feat. PRIDE)
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
A performance boost for hash-based signatures
Lecture Notes in Computer Science
2013-12-10Paper
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Lapin: an efficient authentication protocol based on ring-LPN
Fast Software Encryption
2013-01-08Paper
Solving Binary Linear Equation Systems over the Rationals and Binaries
Arithmetic of Finite Fields
2012-11-01Paper
An efficient method for eliminating random delays in power traces of embedded software
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Side-channel analysis of cryptographic RFIDs with analog demodulation
RFID. Security and Privacy
2012-08-20Paper
Black-box side-channel attacks highlight the importance of countermeasures. An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism
Lecture Notes in Computer Science
2012-06-08Paper
The Yin and Yang Sides of Embedded Security
Lecture Notes in Computer Science
2011-12-16Paper
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware
Lecture Notes in Computer Science
2011-12-02Paper
Pushing the limits: a very compact and a threshold implementation of AES
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Practical power analysis attacks on software implementations of McEliece
Post-Quantum Cryptography
2010-06-17Paper
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
Lecture Notes in Computer Science
2010-03-09Paper
A new class of collision attacks and its application to DES.
Lecture Notes in Computer Science
2010-01-05Paper
Understanding Cryptography
 
2009-12-01Paper
MicroEliece: McEliece for Embedded Devices
Lecture Notes in Computer Science
2009-11-10Paper
Crypto Engineering: Some History and Some Case Studies
Lecture Notes in Computer Science
2009-11-10Paper
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
Lecture Notes in Computer Science
2009-02-10Paper
Performance of HECC Coprocessors Using Inversion-Free Formulae
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
Parallel computing with low-cost FPGAs: a framework for COPACOBANA
 
2009-02-09Paper
Efficient Hash Collision Search Strategies on Special-Purpose Hardware
Research in Cryptology
2009-01-22Paper
Hash Functions and RFID Tags: Mind the Gap
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
Smart Card Research and Advanced Applications
2008-11-06Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
New Lightweight DES Variants
Fast Software Encryption
2008-09-16Paper
Gaussian Mixture Models for Higher-Order Side Channel Analysis
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Efficient hardware implementation of finite fields with applications to cryptography
Acta Applicandae Mathematicae
2006-11-06Paper
Efficient software-implementation of finite fields with applications to cryptography
Acta Applicandae Mathematicae
2006-11-06Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 1962149 (Why is no real title available?)
 
2003-08-10Paper
scientific article; zbMATH DE number 1878342 (Why is no real title available?)
 
2003-03-09Paper
scientific article; zbMATH DE number 1808283 (Why is no real title available?)
 
2002-09-26Paper
scientific article; zbMATH DE number 1618062 (Why is no real title available?)
 
2002-09-01Paper
scientific article; zbMATH DE number 1759281 (Why is no real title available?)
 
2002-06-25Paper
Itoh-Tsujii inversion in standard basis and its application in cryptography and codes
Designs, Codes and Cryptography
2002-05-28Paper
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography.
Journal of Cryptology
2001-11-07Paper
scientific article; zbMATH DE number 1302866 (Why is no real title available?)
 
2000-10-05Paper
scientific article; zbMATH DE number 1088245 (Why is no real title available?)
 
2000-06-14Paper
scientific article; zbMATH DE number 1304122 (Why is no real title available?)
 
1999-12-07Paper
A new architecture for a parallel finite field multiplier with low complexity based on composite fields
IEEE Transactions on Computers
1996-01-01Paper


Research outcomes over time


This page was built for person: Christof Paar