Publication | Date of Publication | Type |
---|
Provable secure software masking in the real-world | 2023-12-12 | Paper |
Higher-order masked Saber | 2023-07-25 | Paper |
Security Considerations in the Design and Implementation of a new DES chip | 2021-07-10 | Paper |
HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA | 2020-10-02 | Paper |
Fast Leakage Assessment | 2020-06-24 | Paper |
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes | 2020-02-25 | Paper |
Decryption failure attacks on IND-CCA secure lattice-based schemes | 2020-01-28 | Paper |
Lattice-Based Public-Key Cryptography in Hardware | 2019-11-14 | Paper |
Constant-Time Discrete Gaussian Sampling | 2018-12-04 | Paper |
HEPCloud: An FPGA-based Multicore Processor for FV Somewhat Homomorphic Function Evaluation | 2018-12-04 | Paper |
Ring-LWE: applications to cryptography and their efficient realization | 2018-10-26 | Paper |
Hardware-Based Trusted Computing Architectures for Isolation and Attestation | 2018-06-27 | Paper |
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n) | 2018-06-12 | Paper |
Hold your breath, PRIMATEs are lightweight | 2018-02-16 | Paper |
Lightweight coprocessor for Koblitz curves: 283-bit ECC including scalar conversion with only 4300 gates | 2018-02-14 | Paper |
Modular hardware architecture for somewhat homomorphic function evaluation | 2018-02-14 | Paper |
Efficient ring-LWE encryption on 8-bit AVR processors | 2018-02-14 | Paper |
A masked ring-LWE implementation | 2018-02-14 | Paper |
Efficient fuzzy extraction of PUF-induced secrets: theory and applications | 2018-02-14 | Paper |
Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things | 2017-08-25 | Paper |
Elliptic-Curve-Based Security Processor for RFID | 2017-08-08 | Paper |
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods | 2017-07-27 | Paper |
SPONGENT: The Design Space of Lightweight Cryptographic Hashing | 2017-07-12 | Paper |
Efficient Hardware Implementation of Fp-Arithmetic for Pairing-Friendly Curves | 2017-07-12 | Paper |
Novel RNS Parameter Selection for Fast Modular Multiplication | 2017-06-20 | Paper |
BLAKE-512-Based 128-Bit CCA2 Secure Timing Attack Resistant McEliece Cryptoprocessor | 2017-06-20 | Paper |
Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography | 2017-06-13 | Paper |
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates | 2016-06-22 | Paper |
Additively Homomorphic Ring-LWE Masking | 2016-04-26 | Paper |
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers | 2016-04-13 | Paper |
A Note on the Use of Margins to Compare Distinguishers | 2016-03-10 | Paper |
Generic DPA Attacks: Curse or Blessing? | 2016-03-10 | Paper |
Single-Cycle Implementations of Block Ciphers | 2016-02-22 | Paper |
Consolidating Masking Schemes | 2015-12-10 | Paper |
High Precision Discrete Gaussian Sampling on FPGAs | 2015-10-01 | Paper |
Compact Ring-LWE Cryptoprocessor | 2015-07-21 | Paper |
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? | 2015-07-21 | Paper |
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation | 2014-03-28 | Paper |
On the Implementation of Unified Arithmetic on Binary Huff Curves | 2013-10-10 | Paper |
A New Model for Error-Tolerant Side-Channel Cube Attacks | 2013-10-10 | Paper |
Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform | 2013-04-04 | Paper |
Faster Pairing Coprocessor Architecture | 2013-04-04 | Paper |
Theory and Practice of a Leakage Resilient Masking Scheme | 2013-03-19 | Paper |
Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs | 2013-03-13 | Paper |
Selecting Time Samples for Multivariate DPA Attacks | 2012-11-13 | Paper |
Hierarchical ECC-Based RFID Authentication Protocol | 2012-08-20 | Paper |
An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost | 2012-06-08 | Paper |
Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs | 2012-06-08 | Paper |
A practical attack on KeeLoq | 2012-05-23 | Paper |
FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction | 2011-10-07 | Paper |
Speeding Up Bipartite Modular Multiplication | 2010-07-20 | Paper |
Revisiting Higher-Order DPA Attacks: | 2010-03-16 | Paper |
Faster $\mathbb{F}_p$ -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves | 2009-11-10 | Paper |
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security | 2009-11-10 | Paper |
HECC Goes Embedded: An Area-Efficient Implementation of HECC | 2009-11-03 | Paper |
Transforming signal processing applications into parallel implementations | 2009-09-01 | Paper |
Modular Reduction in GF(2 n ) without Pre-computational Phase | 2008-08-19 | Paper |
Fault Analysis Study of IDEA | 2008-04-24 | Paper |
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller | 2007-10-10 | Paper |
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems | 2007-10-10 | Paper |
Efficient and secure fingerprint verification for embedded devices | 2006-08-28 | Paper |
Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797387 | 2003-04-03 | Paper |
Domain specific tools and methods for application in Security processor design | 2003-02-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4026863 | 1993-02-21 | Paper |