| Publication | Date of Publication | Type |
|---|
| Quantitative fault injection analysis | 2024-09-13 | Paper |
| Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms | 2024-06-11 | Paper |
| Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware | 2024-04-26 | Paper |
| Finding and evaluating parameters for BGV | 2024-02-02 | Paper |
| Secure Implementation of Lattice-Based Encryption Schemes | 2024-01-23 | Paper |
| A holistic approach towards side-channel secure fixed-weight polynomial sampling | 2023-11-16 | Paper |
| Efficiently masking polynomial inversion at arbitrary order | 2023-07-07 | Paper |
| Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices | 2022-08-05 | Paper |
| Deep neural network attribution methods for leakage analysis and symmetric key recovery | 2020-07-21 | Paper |
| Implementing the NewHope-simple key exchange on low-cost FPGAs | 2020-03-02 | Paper |
| Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto | 2020-01-28 | Paper |
| Profiled power analysis attacks using convolutional neural networks with domain knowledge | 2019-02-20 | Paper |
| GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs | 2018-06-27 | Paper |
| White-Box Cryptography in the Gray Box | 2018-05-09 | Paper |
| CAKE: CODE-based algorithm for key encapsulation | 2018-04-20 | Paper |
| Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms | 2018-02-16 | Paper |
| Strong 8-bit sboxes with efficient masking in hardware | 2018-02-14 | Paper |
| Cryptanalysis with COPACOBANA | 2017-08-08 | Paper |
| Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA | 2017-05-19 | Paper |
| Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware | 2017-05-16 | Paper |
| Hiding Higher-Order Side-Channel Leakage | 2017-04-12 | Paper |
| ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks | 2016-10-27 | Paper |
| Affine Equivalence and Its Application to Tightening Threshold Implementations | 2016-05-19 | Paper |
| IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter | 2016-04-26 | Paper |
| Arithmetic Addition over Boolean Masking | 2016-03-10 | Paper |
| Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware | 2015-10-01 | Paper |
| High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers | 2015-09-17 | Paper |
| High-Speed Signatures from Standard Lattices | 2015-09-17 | Paper |
| Enhanced Lattice-Based Signatures on Reconfigurable Hardware | 2015-07-21 | Paper |
| Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices | 2015-01-14 | Paper |
| Embedded Syndrome-Based Hashing | 2014-08-20 | Paper |
| Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices | 2013-10-10 | Paper |
| Software Speed Records for Lattice-Based Signatures | 2013-06-14 | Paper |
| PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications | 2013-03-19 | Paper |
| Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems | 2012-11-13 | Paper |
| Full Lattice Basis Reduction on Graphics Cards | 2012-10-16 | Paper |
| Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware | 2012-09-21 | Paper |
| Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices | 2012-07-23 | Paper |
| An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware | 2011-12-02 | Paper |
| Generic Side-Channel Countermeasures for Reconfigurable Devices | 2011-10-07 | Paper |
| MicroEliece: McEliece for Embedded Devices | 2009-11-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3601147 | 2009-02-09 | Paper |
| Efficient Hash Collision Search Strategies on Special-Purpose Hardware | 2009-01-22 | Paper |
| Exploiting the Power of GPUs for Asymmetric Cryptography | 2009-01-09 | Paper |
| Efficient hardware implementation of finite fields with applications to cryptography | 2006-11-06 | Paper |