| Publication | Date of Publication | Type |
|---|
| \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits | 2024-12-13 | Paper |
| Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms | 2024-06-11 | Paper |
| Graph Similarity and its Applications to Hardware Security | 2020-10-02 | Paper |
| Efficient multiplier architectures for Galois fields GF(2/sup 4n/) | 2018-07-09 | Paper |
| Fast arithmetic for public-key algorithms in Galois fields with composite exponents | 2018-07-09 | Paper |
| Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors | 2018-06-27 | Paper |
| Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs | 2018-06-27 | Paper |
| The first thorough side-channel hardware Trojan | 2018-04-06 | Paper |
| Cryptanalysis with COPACOBANA | 2017-08-08 | Paper |
| One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores | 2017-07-12 | Paper |
| High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers | 2015-10-26 | Paper |
| When Reverse-Engineering Meets Side-Channel Analysis – Digital Lockpicking in Practice | 2015-10-01 | Paper |
| Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms | 2015-09-21 | Paper |
| Full-Size High-Security ECC Implementation on MSP430 Microcontrollers | 2015-09-17 | Paper |
| Remote IP Protection Using Timing Channels | 2015-09-11 | Paper |
| Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware | 2015-01-14 | Paper |
| Block Ciphers – Focus on the Linear Layer (feat. PRIDE) | 2014-08-07 | Paper |
| A Performance Boost for Hash-Based Signatures | 2013-12-10 | Paper |
| Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System | 2013-09-02 | Paper |
| PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications | 2013-03-19 | Paper |
| Lapin: An Efficient Authentication Protocol Based on Ring-LPN | 2013-01-08 | Paper |
| Solving Binary Linear Equation Systems over the Rationals and Binaries | 2012-11-01 | Paper |
| An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software | 2012-11-01 | Paper |
| Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation | 2012-08-20 | Paper |
| Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures | 2012-06-08 | Paper |
| The Yin and Yang Sides of Embedded Security | 2011-12-16 | Paper |
| An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware | 2011-12-02 | Paper |
| Pushing the Limits: A Very Compact and a Threshold Implementation of AES | 2011-05-27 | Paper |
| Practical Power Analysis Attacks on Software Implementations of McEliece | 2010-06-17 | Paper |
| Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs | 2010-03-16 | Paper |
| Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves | 2010-03-09 | Paper |
| Fast Software Encryption | 2010-01-05 | Paper |
| Understanding Cryptography | 2009-12-01 | Paper |
| MicroEliece: McEliece for Embedded Devices | 2009-11-10 | Paper |
| Crypto Engineering: Some History and Some Case Studies | 2009-11-10 | Paper |
| On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme | 2009-02-10 | Paper |
| Performance of HECC Coprocessors Using Inversion-Free Formulae | 2009-02-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3601147 | 2009-02-09 | Paper |
| Efficient Hash Collision Search Strategies on Special-Purpose Hardware | 2009-01-22 | Paper |
| Hash Functions and RFID Tags: Mind the Gap | 2009-01-09 | Paper |
| Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents | 2008-11-06 | Paper |
| PRESENT: An Ultra-Lightweight Block Cipher | 2008-09-16 | Paper |
| New Lightweight DES Variants | 2008-09-16 | Paper |
| Gaussian Mixture Models for Higher-Order Side Channel Analysis | 2008-09-16 | Paper |
| Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
| Efficient hardware implementation of finite fields with applications to cryptography | 2006-11-06 | Paper |
| Efficient software-implementation of finite fields with applications to cryptography | 2006-11-06 | Paper |
| Selected Areas in Cryptography | 2005-12-27 | Paper |
| Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
| Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418534 | 2003-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4797812 | 2003-03-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149771 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724613 | 2002-09-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536205 | 2002-06-25 | Paper |
| Itoh-Tsujii inversion in standard basis and its application in cryptography and codes | 2002-05-28 | Paper |
| Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. | 2001-11-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249352 | 2000-10-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364562 | 2000-06-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250820 | 1999-12-07 | Paper |
| A new architecture for a parallel finite field multiplier with low complexity based on composite fields | 1996-01-01 | Paper |