| Publication | Date of Publication | Type |
|---|
| Provable secure software masking in the real-world | 2023-12-12 | Paper |
| Higher-order masked Saber | 2023-07-25 | Paper |
| Security considerations in the design and implementation of a new DES chip | 2021-07-10 | Paper |
| HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA | 2020-10-02 | Paper |
| Fast Leakage Assessment | 2020-06-24 | Paper |
| The impact of error dependencies on Ring/Mod-LWE/LWR based schemes | 2020-02-25 | Paper |
| Decryption failure attacks on IND-CCA secure lattice-based schemes | 2020-01-28 | Paper |
| Lattice-based public-key cryptography in hardware | 2019-11-14 | Paper |
| Constant-Time Discrete Gaussian Sampling | 2018-12-04 | Paper |
| HEPCloud: An FPGA-based Multicore Processor for FV Somewhat Homomorphic Function Evaluation | 2018-12-04 | Paper |
| Ring-LWE: applications to cryptography and their efficient realization | 2018-10-26 | Paper |
| Hardware-Based Trusted Computing Architectures for Isolation and Attestation | 2018-06-27 | Paper |
| Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n) | 2018-06-12 | Paper |
| Hold your breath, PRIMATEs are lightweight | 2018-02-16 | Paper |
| Lightweight coprocessor for Koblitz curves: 283-bit ECC including scalar conversion with only 4300 gates | 2018-02-14 | Paper |
| Modular hardware architecture for somewhat homomorphic function evaluation | 2018-02-14 | Paper |
| Efficient ring-LWE encryption on 8-bit AVR processors | 2018-02-14 | Paper |
| A masked ring-LWE implementation | 2018-02-14 | Paper |
| Efficient fuzzy extraction of PUF-induced secrets: theory and applications | 2018-02-14 | Paper |
| Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things | 2017-08-25 | Paper |
| Elliptic-Curve-Based Security Processor for RFID | 2017-08-08 | Paper |
| Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods | 2017-07-27 | Paper |
| SPONGENT: The Design Space of Lightweight Cryptographic Hashing | 2017-07-12 | Paper |
| Efficient Hardware Implementation of Fp-Arithmetic for Pairing-Friendly Curves | 2017-07-12 | Paper |
| Novel RNS Parameter Selection for Fast Modular Multiplication | 2017-06-20 | Paper |
| BLAKE-512-Based 128-Bit CCA2 Secure Timing Attack Resistant McEliece Cryptoprocessor | 2017-06-20 | Paper |
| Efficient finite field multiplication for isogeny based post quantum cryptography | 2017-06-13 | Paper |
| A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates | 2016-06-22 | Paper |
| Additively homomorphic ring-LWE masking | 2016-04-26 | Paper |
| Chaskey: an efficient MAC algorithm for 32-bit microcontrollers | 2016-04-13 | Paper |
| Generic DPA attacks: curse or blessing? | 2016-03-10 | Paper |
| A note on the use of margins to compare distinguishers | 2016-03-10 | Paper |
| Single-cycle implementations of block ciphers | 2016-02-22 | Paper |
| Consolidating masking schemes | 2015-12-10 | Paper |
| High precision discrete Gaussian sampling on FPGAs | 2015-10-01 | Paper |
| Compact ring-LWE cryptoprocessor | 2015-07-21 | Paper |
| Secure lightweight entity authentication with strong PUFs: Mission impossible? | 2015-07-21 | Paper |
| Attacking PUF-based pattern matching key generators via helper data manipulation | 2014-03-28 | Paper |
| On the implementation of unified arithmetic on binary Huff curves | 2013-10-10 | Paper |
| A new model for error-tolerant side-channel cube attacks | 2013-10-10 | Paper |
| Faster pairing coprocessor architecture | 2013-04-04 | Paper |
| Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform | 2013-04-04 | Paper |
| Theory and practice of a leakage resilient masking scheme | 2013-03-19 | Paper |
| Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs | 2013-03-13 | Paper |
| Selecting time samples for multivariate DPA attacks | 2012-11-13 | Paper |
| Hierarchical ECC-based RFID authentication protocol | 2012-08-20 | Paper |
| An updated survey on secure ECC implementations: attacks, countermeasures and cost | 2012-06-08 | Paper |
| Power analysis of atmel cryptomemory -- recovering keys from secure eeproms | 2012-06-08 | Paper |
| A practical attack on KeeLoq | 2012-05-23 | Paper |
| FPGA implementation of pairings using residue number system and lazy reduction | 2011-10-07 | Paper |
| Speeding up bipartite modular multiplication | 2010-07-20 | Paper |
| Revisiting Higher-Order DPA Attacks: | 2010-03-16 | Paper |
| Faster $\mathbb{F}_p$ -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves | 2009-11-10 | Paper |
| Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security | 2009-11-10 | Paper |
| HECC Goes Embedded: An Area-Efficient Implementation of HECC | 2009-11-03 | Paper |
| Transforming signal processing applications into parallel implementations | 2009-09-01 | Paper |
| Modular Reduction in GF(2 n ) without Pre-computational Phase | 2008-08-19 | Paper |
| Fault Analysis Study of IDEA | 2008-04-24 | Paper |
| HW/SW co-design for public-key cryptosystems on the 8051 micro-controller | 2007-10-10 | Paper |
| Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems | 2007-10-10 | Paper |
| Efficient and secure fingerprint verification for embedded devices | 2006-08-28 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4797387 | 2003-04-03 | Paper |
| Domain specific tools and methods for application in Security processor design | 2003-02-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4026863 | 1993-02-21 | Paper |