| Publication | Date of Publication | Type |
|---|
\texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits | 2024-12-13 | Paper |
Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms | 2024-06-11 | Paper |
Graph Similarity and its Applications to Hardware Security IEEE Transactions on Computers | 2020-10-02 | Paper |
Efficient multiplier architectures for Galois fields GF(2/sup 4n/) IEEE Transactions on Computers | 2018-07-09 | Paper |
Fast arithmetic for public-key algorithms in Galois fields with composite exponents IEEE Transactions on Computers | 2018-07-09 | Paper |
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors IEEE Transactions on Computers | 2018-06-27 | Paper |
Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs IEEE Transactions on Computers | 2018-06-27 | Paper |
The first thorough side-channel hardware Trojan | 2018-04-06 | Paper |
Cryptanalysis with COPACOBANA IEEE Transactions on Computers | 2017-08-08 | Paper |
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores IEEE Transactions on Computers | 2017-07-12 | Paper |
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers Designs, Codes and Cryptography | 2015-10-26 | Paper |
When reverse-engineering meets side-channel analysis -- digital lockpicking in practice Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Preventing scaling of successful attacks: a cross-layer security architecture for resource-constrained platforms Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
Full-size high-security ECC implementation on MSP430 microcontrollers Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
Remote IP protection using timing channels Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
Attacking code-based cryptosystems with information set decoding using special-purpose hardware Post-Quantum Cryptography | 2015-01-14 | Paper |
Block ciphers -- focus on the linear layer (feat. PRIDE) Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
A performance boost for hash-based signatures Lecture Notes in Computer Science | 2013-12-10 | Paper |
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Lapin: an efficient authentication protocol based on ring-LPN Fast Software Encryption | 2013-01-08 | Paper |
Solving Binary Linear Equation Systems over the Rationals and Binaries Arithmetic of Finite Fields | 2012-11-01 | Paper |
An efficient method for eliminating random delays in power traces of embedded software Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Side-channel analysis of cryptographic RFIDs with analog demodulation RFID. Security and Privacy | 2012-08-20 | Paper |
Black-box side-channel attacks highlight the importance of countermeasures. An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism Lecture Notes in Computer Science | 2012-06-08 | Paper |
The Yin and Yang Sides of Embedded Security Lecture Notes in Computer Science | 2011-12-16 | Paper |
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware Lecture Notes in Computer Science | 2011-12-02 | Paper |
Pushing the limits: a very compact and a threshold implementation of AES Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Practical power analysis attacks on software implementations of McEliece Post-Quantum Cryptography | 2010-06-17 | Paper |
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves Lecture Notes in Computer Science | 2010-03-09 | Paper |
A new class of collision attacks and its application to DES. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Understanding Cryptography | 2009-12-01 | Paper |
MicroEliece: McEliece for Embedded Devices Lecture Notes in Computer Science | 2009-11-10 | Paper |
Crypto Engineering: Some History and Some Case Studies Lecture Notes in Computer Science | 2009-11-10 | Paper |
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme Lecture Notes in Computer Science | 2009-02-10 | Paper |
Performance of HECC Coprocessors Using Inversion-Free Formulae Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
Parallel computing with low-cost FPGAs: a framework for COPACOBANA | 2009-02-09 | Paper |
Efficient Hash Collision Search Strategies on Special-Purpose Hardware Research in Cryptology | 2009-01-22 | Paper |
Hash Functions and RFID Tags: Mind the Gap Cryptographic Hardware and Embedded Systems – CHES 2008 | 2009-01-09 | Paper |
Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents Smart Card Research and Advanced Applications | 2008-11-06 | Paper |
PRESENT: An Ultra-Lightweight Block Cipher Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
New Lightweight DES Variants Fast Software Encryption | 2008-09-16 | Paper |
Gaussian Mixture Models for Higher-Order Side Channel Analysis Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Efficient hardware implementation of finite fields with applications to cryptography Acta Applicandae Mathematicae | 2006-11-06 | Paper |
Efficient software-implementation of finite fields with applications to cryptography Acta Applicandae Mathematicae | 2006-11-06 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
scientific article; zbMATH DE number 1962149 (Why is no real title available?) | 2003-08-10 | Paper |
scientific article; zbMATH DE number 1878342 (Why is no real title available?) | 2003-03-09 | Paper |
scientific article; zbMATH DE number 1808283 (Why is no real title available?) | 2002-09-26 | Paper |
scientific article; zbMATH DE number 1618062 (Why is no real title available?) | 2002-09-01 | Paper |
scientific article; zbMATH DE number 1759281 (Why is no real title available?) | 2002-06-25 | Paper |
Itoh-Tsujii inversion in standard basis and its application in cryptography and codes Designs, Codes and Cryptography | 2002-05-28 | Paper |
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. Journal of Cryptology | 2001-11-07 | Paper |
scientific article; zbMATH DE number 1302866 (Why is no real title available?) | 2000-10-05 | Paper |
scientific article; zbMATH DE number 1088245 (Why is no real title available?) | 2000-06-14 | Paper |
scientific article; zbMATH DE number 1304122 (Why is no real title available?) | 1999-12-07 | Paper |
A new architecture for a parallel finite field multiplier with low complexity based on composite fields IEEE Transactions on Computers | 1996-01-01 | Paper |