Tim Güneysu

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Quantitative fault injection analysis2024-09-13Paper
Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms2024-06-11Paper
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware2024-04-26Paper
Finding and evaluating parameters for BGV
Progress in Cryptology - AFRICACRYPT 2023
2024-02-02Paper
Secure Implementation of Lattice-Based Encryption Schemes
Advanced Boolean Techniques
2024-01-23Paper
A holistic approach towards side-channel secure fixed-weight polynomial sampling
Lecture Notes in Computer Science
2023-11-16Paper
Efficiently masking polynomial inversion at arbitrary order
Post-Quantum Cryptography
2023-07-07Paper
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
IEEE Transactions on Computers
2022-08-05Paper
Deep neural network attribution methods for leakage analysis and symmetric key recovery2020-07-21Paper
Implementing the NewHope-simple key exchange on low-cost FPGAs2020-03-02Paper
Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto2020-01-28Paper
Profiled power analysis attacks using convolutional neural networks with domain knowledge2019-02-20Paper
GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs
IEEE Transactions on Computers
2018-06-27Paper
White-box cryptography in the gray box
Fast Software Encryption
2018-05-09Paper
CAKE: CODE-based algorithm for key encapsulation2018-04-20Paper
Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms2018-02-16Paper
Strong 8-bit sboxes with efficient masking in hardware2018-02-14Paper
Cryptanalysis with COPACOBANA
IEEE Transactions on Computers
2017-08-08Paper
Secure and private, yet lightweight, authentication for the IoT via PUF and CBKA
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware
IEEE Transactions on Computers
2017-05-16Paper
Hiding higher-order side-channel leakage. Randomizing cryptographic implementations in reconfigurable hardware
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Affine equivalence and its application to tightening threshold implementations
Lecture Notes in Computer Science
2016-05-19Paper
IND-CCA secure hybrid encryption from QC-MDPC Niederreiter
Post-Quantum Cryptography
2016-04-26Paper
Arithmetic Addition over Boolean Masking
Applied Cryptography and Network Security
2016-03-10Paper
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
High-speed signatures from standard lattices
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Enhanced lattice-based signatures on reconfigurable hardware
Advanced Information Systems Engineering
2015-07-21Paper
Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices
Post-Quantum Cryptography
2015-01-14Paper
Embedded syndrome-based hashing
Lecture Notes in Computer Science
2014-08-20Paper
Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
Software speed records for lattice-based signatures
Post-Quantum Cryptography
2013-06-14Paper
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Full Lattice Basis Reduction on Graphics Cards
Research in Cryptology
2012-10-16Paper
Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware
Lecture Notes in Computer Science
2011-12-02Paper
Generic Side-Channel Countermeasures for Reconfigurable Devices
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
MicroEliece: McEliece for Embedded Devices
Lecture Notes in Computer Science
2009-11-10Paper
Parallel computing with low-cost FPGAs: a framework for COPACOBANA2009-02-09Paper
Efficient Hash Collision Search Strategies on Special-Purpose Hardware
Research in Cryptology
2009-01-22Paper
Exploiting the Power of GPUs for Asymmetric Cryptography
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
Efficient hardware implementation of finite fields with applications to cryptography
Acta Applicandae Mathematicae
2006-11-06Paper


Research outcomes over time


This page was built for person: Tim Güneysu