Publications

FPGA Trojans through Detecting and Weakening of Cryptographic Primitives

2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]

Implementing QC-MDPC McEliece Encryption

2015 - Ingo von Maurich, Tobias Oder, Tim Güneysu

ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on Embedded Platforms for Crypto and Regular Papers TECS, Volume 14 Issue 3, May 2015, Article No. 44, ACM New York, NY, USA. [PDF]

Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs

2014 - Pawel Swierczynski, Amir Moradi, David Oswald, Chris­tof Paar

ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 7 Issue 4, December 2014. [DOI] [pdf]

Microcontrollers as (In)Security Devices for Pervasive Computing Applications

2014 - Daehyun Strobel, David Oswald, Bastian Richter, Falk Schellenberg, Chris­tof Paar

Proceedings of the IEEE, vol. 102, no. 8, pp. 1157-1173, 2014 [PDF (Open Access)] [bib]

Stealthy dopant-level hardware Trojans: extended version

2014 - Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson

Journal of Cryptographic Engineering 4.1 (2014): 19-31 [DOI] [PDF] [BIB]

Large-Scale High-Resolution Computational Validation of Novel Complexity Models in Linear Cryptanalysis

2014 - Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalcin

In Journal of Computational and Applied Mathematics, volume 259, part B, pages 592-598, Elsevier, March 15, 2014 [DOI]

Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis

2014 - Tobias Schneider, Ingo von Maurich, Tim Güneysu, David Oswald

Journal of Signal Processing Systems, Springer, 2014. [DOI] [BibTeX]

An Experimental Security Analysis of Two Satphone Standards

2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz

ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]

Keccak und der SHA-2

2013 - Pawel Swierczynski, Gregor Leander, Chris­tof Paar

DuD - Da­ten­schutz und Da­ten­si­cher­heit Aus­ga­be 11/2013 [bib]

SPONGENT: The Design Space of Lightweight Cryptographic Hashing

2013 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede

IEEE Trans. Computers vol. 62, number 10, 2013 [bib]
Page: