| Publication | Date of Publication | Type |
|---|
Provable secure software masking in the real-world Constructive Side-Channel Analysis and Secure Design | 2023-12-12 | Paper |
Higher-order masked Saber Lecture Notes in Computer Science | 2023-07-25 | Paper |
Security considerations in the design and implementation of a new DES chip Advances in cryptology -- EUROCRYPT '87. Workshop on the theory and application of cryptographic techniques, Amsterdam, Netherlands, April 13--15, 1987. Proceedings | 2021-07-10 | Paper |
HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA IEEE Transactions on Computers | 2020-10-02 | Paper |
Fast Leakage Assessment Lecture Notes in Computer Science | 2020-06-24 | Paper |
| The impact of error dependencies on Ring/Mod-LWE/LWR based schemes | 2020-02-25 | Paper |
| Decryption failure attacks on IND-CCA secure lattice-based schemes | 2020-01-28 | Paper |
Lattice-based public-key cryptography in hardware Computer Architecture and Design Methodologies | 2019-11-14 | Paper |
Constant-Time Discrete Gaussian Sampling IEEE Transactions on Computers | 2018-12-04 | Paper |
HEPCloud: An FPGA-based Multicore Processor for FV Somewhat Homomorphic Function Evaluation IEEE Transactions on Computers | 2018-12-04 | Paper |
| Ring-LWE: applications to cryptography and their efficient realization | 2018-10-26 | Paper |
Hardware-Based Trusted Computing Architectures for Isolation and Attestation IEEE Transactions on Computers | 2018-06-27 | Paper |
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n) IEEE Transactions on Computers | 2018-06-12 | Paper |
| Hold your breath, PRIMATEs are lightweight | 2018-02-16 | Paper |
| Lightweight coprocessor for Koblitz curves: 283-bit ECC including scalar conversion with only 4300 gates | 2018-02-14 | Paper |
| Modular hardware architecture for somewhat homomorphic function evaluation | 2018-02-14 | Paper |
| Efficient ring-LWE encryption on 8-bit AVR processors | 2018-02-14 | Paper |
| A masked ring-LWE implementation | 2018-02-14 | Paper |
| Efficient fuzzy extraction of PUF-induced secrets: theory and applications | 2018-02-14 | Paper |
Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things IEEE Transactions on Computers | 2017-08-25 | Paper |
Elliptic-Curve-Based Security Processor for RFID IEEE Transactions on Computers | 2017-08-08 | Paper |
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods IEEE Transactions on Computers | 2017-07-27 | Paper |
SPONGENT: The Design Space of Lightweight Cryptographic Hashing IEEE Transactions on Computers | 2017-07-12 | Paper |
Efficient Hardware Implementation of Fp-Arithmetic for Pairing-Friendly Curves IEEE Transactions on Computers | 2017-07-12 | Paper |
Novel RNS Parameter Selection for Fast Modular Multiplication IEEE Transactions on Computers | 2017-06-20 | Paper |
BLAKE-512-Based 128-Bit CCA2 Secure Timing Attack Resistant McEliece Cryptoprocessor IEEE Transactions on Computers | 2017-06-20 | Paper |
Efficient finite field multiplication for isogeny based post quantum cryptography Arithmetic of Finite Fields | 2017-06-13 | Paper |
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates Progress in Cryptology – AFRICACRYPT 2016 | 2016-06-22 | Paper |
Additively homomorphic ring-LWE masking Post-Quantum Cryptography | 2016-04-26 | Paper |
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Generic DPA attacks: curse or blessing? Constructive Side-Channel Analysis and Secure Design | 2016-03-10 | Paper |
A note on the use of margins to compare distinguishers Constructive Side-Channel Analysis and Secure Design | 2016-03-10 | Paper |
Single-cycle implementations of block ciphers Lecture Notes in Computer Science | 2016-02-22 | Paper |
Consolidating masking schemes Lecture Notes in Computer Science | 2015-12-10 | Paper |
High precision discrete Gaussian sampling on FPGAs Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Compact ring-LWE cryptoprocessor Advanced Information Systems Engineering | 2015-07-21 | Paper |
Secure lightweight entity authentication with strong PUFs: Mission impossible? Advanced Information Systems Engineering | 2015-07-21 | Paper |
Attacking PUF-based pattern matching key generators via helper data manipulation Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
On the implementation of unified arithmetic on binary Huff curves Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
A new model for error-tolerant side-channel cube attacks Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Faster pairing coprocessor architecture Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Theory and practice of a leakage resilient masking scheme Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs Security, Privacy, and Applied Cryptography Engineering | 2013-03-13 | Paper |
Selecting time samples for multivariate DPA attacks Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Hierarchical ECC-based RFID authentication protocol RFID. Security and Privacy | 2012-08-20 | Paper |
An updated survey on secure ECC implementations: attacks, countermeasures and cost Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Power analysis of atmel cryptomemory -- recovering keys from secure eeproms Lecture Notes in Computer Science | 2012-06-08 | Paper |
A practical attack on KeeLoq Journal of Cryptology | 2012-05-23 | Paper |
FPGA implementation of pairings using residue number system and lazy reduction Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
Speeding up bipartite modular multiplication Arithmetic of Finite Fields | 2010-07-20 | Paper |
Revisiting Higher-Order DPA Attacks: Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Faster $\mathbb{F}_p$ -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves Lecture Notes in Computer Science | 2009-11-10 | Paper |
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security Lecture Notes in Computer Science | 2009-11-10 | Paper |
HECC Goes Embedded: An Area-Efficient Implementation of HECC Selected Areas in Cryptography | 2009-11-03 | Paper |
Transforming signal processing applications into parallel implementations EURASIP Journal on Advances in Signal Processing | 2009-09-01 | Paper |
Modular Reduction in GF(2 n ) without Pre-computational Phase Arithmetic of Finite Fields | 2008-08-19 | Paper |
Fault Analysis Study of IDEA Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller Computers and Electrical Engineering | 2007-10-10 | Paper |
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems Computers and Electrical Engineering | 2007-10-10 | Paper |
Efficient and secure fingerprint verification for embedded devices EURASIP Journal on Applied Signal Processing | 2006-08-28 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
| scientific article; zbMATH DE number 1882019 (Why is no real title available?) | 2003-04-03 | Paper |
Domain specific tools and methods for application in Security processor design Design Automation for Embedded Systems | 2003-02-17 | Paper |
| scientific article; zbMATH DE number 125182 (Why is no real title available?) | 1993-02-21 | Paper |