Publication | Date of Publication | Type |
---|
Graph Similarity and its Applications to Hardware Security | 2020-10-02 | Paper |
Fast arithmetic for public-key algorithms in Galois fields with composite exponents | 2018-07-09 | Paper |
Efficient multiplier architectures for Galois fields GF(2/sup 4n/) | 2018-07-09 | Paper |
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors | 2018-06-27 | Paper |
Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs | 2018-06-27 | Paper |
The first thorough side-channel hardware Trojan | 2018-04-06 | Paper |
Cryptanalysis with COPACOBANA | 2017-08-08 | Paper |
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores | 2017-07-12 | Paper |
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers | 2015-10-26 | Paper |
When Reverse-Engineering Meets Side-Channel Analysis – Digital Lockpicking in Practice | 2015-10-01 | Paper |
Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms | 2015-09-21 | Paper |
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers | 2015-09-17 | Paper |
Remote IP Protection Using Timing Channels | 2015-09-11 | Paper |
Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware | 2015-01-14 | Paper |
Block Ciphers – Focus on the Linear Layer (feat. PRIDE) | 2014-08-07 | Paper |
A Performance Boost for Hash-Based Signatures | 2013-12-10 | Paper |
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System | 2013-09-02 | Paper |
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications | 2013-03-19 | Paper |
Lapin: An Efficient Authentication Protocol Based on Ring-LPN | 2013-01-08 | Paper |
Solving Binary Linear Equation Systems over the Rationals and Binaries | 2012-11-01 | Paper |
An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software | 2012-11-01 | Paper |
Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation | 2012-08-20 | Paper |
Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures | 2012-06-08 | Paper |
The Yin and Yang Sides of Embedded Security | 2011-12-16 | Paper |
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware | 2011-12-02 | Paper |
Pushing the Limits: A Very Compact and a Threshold Implementation of AES | 2011-05-27 | Paper |
Practical Power Analysis Attacks on Software Implementations of McEliece | 2010-06-17 | Paper |
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs | 2010-03-16 | Paper |
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves | 2010-03-09 | Paper |
Fast Software Encryption | 2010-01-05 | Paper |
Understanding Cryptography | 2009-12-01 | Paper |
MicroEliece: McEliece for Embedded Devices | 2009-11-10 | Paper |
Crypto Engineering: Some History and Some Case Studies | 2009-11-10 | Paper |
Performance of HECC Coprocessors Using Inversion-Free Formulae | 2009-02-10 | Paper |
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme | 2009-02-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3601147 | 2009-02-09 | Paper |
Efficient Hash Collision Search Strategies on Special-Purpose Hardware | 2009-01-22 | Paper |
Hash Functions and RFID Tags: Mind the Gap | 2009-01-09 | Paper |
Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents | 2008-11-06 | Paper |
New Lightweight DES Variants | 2008-09-16 | Paper |
Gaussian Mixture Models for Higher-Order Side Channel Analysis | 2008-09-16 | Paper |
PRESENT: An Ultra-Lightweight Block Cipher | 2008-09-16 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
Efficient software-implementation of finite fields with applications to cryptography | 2006-11-06 | Paper |
Efficient hardware implementation of finite fields with applications to cryptography | 2006-11-06 | Paper |
Selected Areas in Cryptography | 2005-12-27 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418534 | 2003-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797812 | 2003-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149771 | 2002-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724613 | 2002-09-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536205 | 2002-06-25 | Paper |
Itoh-Tsujii inversion in standard basis and its application in cryptography and codes | 2002-05-28 | Paper |
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. | 2001-11-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249352 | 2000-10-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364562 | 2000-06-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250820 | 1999-12-07 | Paper |
A new architecture for a parallel finite field multiplier with low complexity based on composite fields | 1996-01-01 | Paper |