Christof Paar

From MaRDI portal
(Redirected from Person:204358)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
\texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
 
2024-12-13Paper
Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms
 
2024-06-11Paper
Graph Similarity and its Applications to Hardware Security
IEEE Transactions on Computers
2020-10-02Paper
Efficient multiplier architectures for Galois fields GF(2/sup 4n/)
IEEE Transactions on Computers
2018-07-09Paper
Fast arithmetic for public-key algorithms in Galois fields with composite exponents
IEEE Transactions on Computers
2018-07-09Paper
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors
IEEE Transactions on Computers
2018-06-27Paper
Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs
IEEE Transactions on Computers
2018-06-27Paper
The first thorough side-channel hardware Trojan
 
2018-04-06Paper
Cryptanalysis with COPACOBANA
IEEE Transactions on Computers
2017-08-08Paper
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
IEEE Transactions on Computers
2017-07-12Paper
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
Designs, Codes and Cryptography
2015-10-26Paper
When reverse-engineering meets side-channel analysis -- digital lockpicking in practice
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Preventing scaling of successful attacks: a cross-layer security architecture for resource-constrained platforms
Cryptography and Information Security in the Balkans
2015-09-21Paper
Full-size high-security ECC implementation on MSP430 microcontrollers
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Remote IP protection using timing channels
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Attacking code-based cryptosystems with information set decoding using special-purpose hardware
Post-Quantum Cryptography
2015-01-14Paper
Block ciphers -- focus on the linear layer (feat. PRIDE)
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
A performance boost for hash-based signatures
Lecture Notes in Computer Science
2013-12-10Paper
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Lapin: an efficient authentication protocol based on ring-LPN
Fast Software Encryption
2013-01-08Paper
Solving Binary Linear Equation Systems over the Rationals and Binaries
Arithmetic of Finite Fields
2012-11-01Paper
An efficient method for eliminating random delays in power traces of embedded software
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Side-channel analysis of cryptographic RFIDs with analog demodulation
RFID. Security and Privacy
2012-08-20Paper
Black-box side-channel attacks highlight the importance of countermeasures. An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism
Lecture Notes in Computer Science
2012-06-08Paper
The Yin and Yang Sides of Embedded Security
Lecture Notes in Computer Science
2011-12-16Paper
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware
Lecture Notes in Computer Science
2011-12-02Paper
Pushing the limits: a very compact and a threshold implementation of AES
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Practical power analysis attacks on software implementations of McEliece
Post-Quantum Cryptography
2010-06-17Paper
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
Lecture Notes in Computer Science
2010-03-09Paper
A new class of collision attacks and its application to DES.
Lecture Notes in Computer Science
2010-01-05Paper
Understanding Cryptography
 
2009-12-01Paper
MicroEliece: McEliece for Embedded Devices
Lecture Notes in Computer Science
2009-11-10Paper
Crypto Engineering: Some History and Some Case Studies
Lecture Notes in Computer Science
2009-11-10Paper
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
Lecture Notes in Computer Science
2009-02-10Paper
Performance of HECC Coprocessors Using Inversion-Free Formulae
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
Parallel computing with low-cost FPGAs: a framework for COPACOBANA
 
2009-02-09Paper
Efficient Hash Collision Search Strategies on Special-Purpose Hardware
Research in Cryptology
2009-01-22Paper
Hash Functions and RFID Tags: Mind the Gap
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
Smart Card Research and Advanced Applications
2008-11-06Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
New Lightweight DES Variants
Fast Software Encryption
2008-09-16Paper
Gaussian Mixture Models for Higher-Order Side Channel Analysis
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Efficient hardware implementation of finite fields with applications to cryptography
Acta Applicandae Mathematicae
2006-11-06Paper
Efficient software-implementation of finite fields with applications to cryptography
Acta Applicandae Mathematicae
2006-11-06Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 1962149 (Why is no real title available?)
 
2003-08-10Paper
scientific article; zbMATH DE number 1878342 (Why is no real title available?)
 
2003-03-09Paper
scientific article; zbMATH DE number 1808283 (Why is no real title available?)
 
2002-09-26Paper
scientific article; zbMATH DE number 1618062 (Why is no real title available?)
 
2002-09-01Paper
scientific article; zbMATH DE number 1759281 (Why is no real title available?)
 
2002-06-25Paper
Itoh-Tsujii inversion in standard basis and its application in cryptography and codes
Designs, Codes and Cryptography
2002-05-28Paper
Efficient arithmetic in finite field extensions with application in elliptic curve cryptography.
Journal of Cryptology
2001-11-07Paper
scientific article; zbMATH DE number 1302866 (Why is no real title available?)
 
2000-10-05Paper
scientific article; zbMATH DE number 1088245 (Why is no real title available?)
 
2000-06-14Paper
scientific article; zbMATH DE number 1304122 (Why is no real title available?)
 
1999-12-07Paper
A new architecture for a parallel finite field multiplier with low complexity based on composite fields
IEEE Transactions on Computers
1996-01-01Paper


Research outcomes over time


This page was built for person: Christof Paar