Publications
Cryptographic Fault Diagnosis using VerFI
2020 - Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, USA, May 4-7, 2020. [pdf] [GitHub (ver 1)] [GitHub (ver 2 Beta)]A Comparison of χ²-Test and Mutual Information as Distinguisher for Side-Channel Analysis
2019 - Bastian Richter, David Knichel, Amir Moradi
18th Smart Card Research and Advanced Application Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019. [pdf]Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
2019 - Jonas Krautter, Dennis Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. [pdf]Automated Probe Repositioning for On-Die EM Measurements
2019 - Bastian Richter, Alexander Wild, Amir Moradi
International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. [pdf]Efficient Microcontroller Implementation of BIKE
2019 - Mario Bischof, Tobias Oder, Tim Güneysu
Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, to appear. [portable code] [embedded code] [pdf]Promoting the Acquisition of Hardware Reverse Engineering Skills
2019 - Wiesen, Carina, Steffen Becker, Nils Albartus, Christof Paar, Rummel, Nikol
2019 IEEE Frontiers in Education Conference (FIE), Cincinnati, OH, USA. 2019. (to be presented in October 2019 in Cincinnati, OH, USA) [PDF]Highway to HAL
2019 - Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar
CF'19 Proceedings of the 16th ACM International Conference on Computing Frontiers Pages 392-397 [DOI] [pdf]Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
2019 - Felix Wegener, Christian Baiker, Amir Moradi
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, Darmstadt, Germany, April 3-5, 2019. [pdf] [doi]Towards Cognitive Obfuscation - Impeding Hardware Reverse Engineering Based on Psychological Insights
2019 - Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar
ASPDAC '19 Proceedings of the 24th Asia and South Pacific Design Automation Conference Pages 104-111 (presentation at ASPDAC 2019, Tokyo, Japan, January 21–24, 2019) [PDF] [DOI]Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream
2019 - Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Knopp, Christof Paar
In Proceedings of the 24th Asia and South Pacific Design Automation Conference (ASPDAC '19). ACM, New York, NY, USA, 112-119. [DOI] [pdf]Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
2019 - Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
22nd edition of the International Conference on Practice and Theory of Public Key Cryptography, April 14-17, 2019, Beijing, China, to appear [pdf]Towards Practical Microcontroller Implementation of the Signature Scheme Falcon
2019 - Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu
The Tenth International Conference on Post-Quantum Cryptography, Chongqing University, Chongqing, May 8-10, 2019, to appear [pdf]Enclosure-PUF: Tamper Proofing Commodity Hardware and other Applications
2018 - Christian Zenger, Christof Paar, Lars Steinschulte, Johannes Tobisch, David Holin
35. Chaos Communication Congress (35c3), Leipzig, Germany, 2018. [Conference page] [Video]Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights
2018 - Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar
2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Wollongong, NSW, 2018, pp. 438-445. (presented in December 2018 in Wollongong, NSW, Australia) [PDF] [DOI]Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(2^8) Multiplication
2018 - Felix Wegener, Amir Moradi
17th Smart Card Research and Advanced Application Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018. [pdf]Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
2018 - Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori
International Conference On Computer Aided Design, ICCAD 2018, San Diego, CA, USA, November 5-8, 2018. [pdf]Evaluation of Lattice-Based Signature Schemes in Embedded Systems
2018 - Tim Güneysu, Markus Krausz, Tobias Oder, Julian Speith
25th IEEE International Conference on Electronics Circuits and Systems, Bordeaux, France, 9-12 December 2018 [pdf]An Exploratory Analysis of Microcode as a Building Block for System Defenses
2018 - Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
ACM Conference on Computer and Communications Security (CCS), Toronto, October 2018 [GitHub] [PDF]On the Difficulty of FSM-based Hardware Obfuscation
2018 - Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Russell Tessier, Christof Paar
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 3, pp 293-330, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [PDF] [DOI]A Lattice-based AKE on ARM Cortex-M4
2018 - Julian Speith, Tobias Oder, Tim Güneysu
BalkanCryptSec 2018, Iasi, Romania, September 20-21, 2018. [Source Code] [pdf]Physical Protection of Lattice-Based Cryptography: Challenges and Solutions
2018 - Ayesha Khalid, Tobias Oder, Felipe Valencia, Máire O'Neill, Tim Güneysu, Francesco Regazzoni
ACM Great Lakes Symposium on VLSI 2018: 365-370SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing
2018 - Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Christof Paar, Daniel Holcomb
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, McLean, VA, USA, April 30 - May 4, 2018 (short paper, best poster award). [arXiv]Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking
2018 - Pascal Sasdrich, Michael Hutter
9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018.Threshold Implementation in Software - Case Study of PRESENT
2018 - Pascal Sasdrich, Rene Bock, Amir Moradi
9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. [pdf]A First-Order SCA Resistant AES without Fresh Randomness
2018 - Felix Wegener, Amir Moradi
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. [pdf]An Inside Job: Remote Power Analysis Attacks on FPGAs
2018 - Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori
Design, Automation & Test in Europe Conference & Exhibition, DATE 2018, Dresden, Germany, March 18 - 23 , 2018 (best paper candidate). [pdf]IoT-Security and Product Piracy: Smart Key Management versus Secure Hardware
2018 - Christian Zenger, Mario Pietersz
embedded world 2018, Nuremberg, Germany, February 27th - March 1st, 2018The First Thorough Side-Channel Hardware Trojan
2017 - Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, Hong Kong, China, December 3 - 7, 2017. [pdf] [DOI] [slides]BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
2017 - Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp
ACM CCS 2017 on Oct. 30–Nov. 3, 2017, Dallas, TX, USA [pdf]Implementing a Real-Time Capable WPLS Testbed for Independent Performance and Security Analyses
2017 - Christian Zenger, Mario Pietersz, Jeremy Brauer, Falk-Peter Dreßler, Daniel Theis, Christof Paar
Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, October 29th - November 1st, 2017New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth–Sahai Proofs
2017 - Gottfried Herold, Max Hoffmann, Michael Klooß, Carla Ràfols, Andy Rupp
ACM CCS 2017 on Oct. 30–Nov. 3, 2017, Dallas, TX, USA [pdf]Differential Cryptanalysis of 18-Round PRIDE
2017 - Virginie Lallemand, Shahram Rasoolzadeh
International Conference on Cryptology in India (Indocrypt 2017), Chennai, December 10-13, 2017. [pdf] [DOI]Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
2017 - Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2017, Taipei, Taiwan, September 25 – 28, 2017. [pdf] [DOI] [slides]Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs
2017 - Tobias Oder, Tim Güneysu
Latincrypt 2017, La Habana, Cuba, September 20-22, 2017 [VHDL] [pdf]Reverse Engineering x86 Processor Microcode
2017 - Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz
USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]A look at the dark side of hardware reverse engineering - a case study
2017 - Sebastian Wallat, Marc Fyrbiak, Moritz Schlögel, Christof Paar
IEEE 2nd International Verification and Security Workshop, IVSW 2017, Thessaloniki, Greece, July 3-5, 2017. [DOI] [pdf]Hardware reverse engineering: Overview and open challenges
2017 - Marc Fyrbiak, Sebastian Strauß, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, Christof Paar
IEEE 2nd International Verification and Security Workshop, IVSW 2017, Thessaloniki, Greece, July 3-5, 2017. [DOI] [PDF]Cryptography for Next Generation TLS: Implementing the RFC 7748 Elliptic Curve448 Cryptosystem in Hardware
2017 - Pascal Sasdrich, Tim Güneysu
54. Design Automation Conference, DAC 2017, Austin, TX, USA, June 18-22 2017. [DOI] [pdf]On the Easiness of Turning Higher-Order Leakages into First-Order
2017 - Thorben Moos, Amir Moradi
8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, Paris, France, April 13-14, 2017. [pdf] [DOI]SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
2017 - Maik Ender, Alexander Wild, Amir Moradi
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, Paris, France, April 13-14, 2017. [pdf] [DOI]SPARX - A Side-Channel Protected Processor for ARX-based Cryptography
2017 - Florian Bache, Tobias Schneider, Amir Moradi, Tim Güneysu
Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27 - 31 , 2017. [DOI]Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
2017 - Thorben Moos, Amir Moradi, Bastian Richter
Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27 - 31 , 2017 (best paper candidate). [pdf] [DOI] [Amplifier Design]Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things
2017 - Tim Güneysu, Tobias Oder
18th International Symposium on Quality Electronic Design, ISQED 2017, Santa Clara, CA, USA, 14-15 March 2017 [IEEE] [PDF]Backside imaging of a microcontroller with common-path digital holography
2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Nils C. Gerhardt, Martin R. Hofmann
10127-3, SPIE Photonics West, San Francisco, California, USA (2017)Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
2017 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
RSA Conference Cryptographers’ Track, CT-RSA 2017, San Francisco, February 14-17 2017. [pdf] [DOI]Lattice-Based Cryptography: from Reconfigurable Hardware to ASIC
2016 - Tobias Oder, Tim Güneysu, Felipe Valencia, Ayesha Khalid, Maire O’Neill, Francesco Regazzoni
The 15th International Symposium on Integrated Circuits, ISIC 2016, Singapore, 12 – 14 Dec 2016 [PDF]Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
2016 - Amir Moradi, Tobias Schneider
International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, Hanoi, Vietnam, December 4 - 8, 2016. [pdf] [DOI]The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions
2016 - Christian Zenger, Hendrik Vogt, Jan Zimmer, Aydin Sezgin, Christof Paar
IEEE GLOBECOM 2016 Workshops, Washington D.C., USA, December 4-8 2016. [arXiv] [pdf]Relay-Verhinderung und Schlüssel-Diversifizierung mittels Wireless Physical-Layer Security
2016 - Christian Zenger, Mario Pietersz, Christof Paar
Innosecure 2017, Nuremberg, Germany, November 30th - December 1st 2016Moments-Correlating DPA
2016 - Amir Moradi, François-Xavier Standaert
Theory of Implementation Security (TIs) Workshop (of ACM CCS 2016), Vienna, Austria, October 24, 2016. [pdf] [DOI]Side-Channel Attacks on Fingerprint Matching Algorithms
2016 - Markus Dürmuth, David Oswald, Niklas Pastewka
To appear at the 6th International Workshop on Trustworthy Embedded Devices (TrustED 2016) [PDF]A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
2016 - Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
Cryptographic Hardware and Embedded Systems, CHES 2016, Santa Barbara, CA, August 17 - 19, 2016 [PDF]Strong 8-bit Sboxes with Efficient Masking in Hardware
2016 - Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2016, Santa Barbara, California, USA, August 17 - 19, 2016. [pdf] [DOI]DROWN: Breaking TLS using SSLv2
2016 - Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt
USENIX Security 2016 [Website and paper] [Pwnie Awards] [Facebook Prize]ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
2016 - Tobias Schneider, Amir Moradi, Tim Güneysu
International Cryptology Conference - CRYPTO 2016, Santa Barbara, California, USA, August 14 - 18, 2016. [pdf] [DOI]The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
2016 - Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
International Cryptology Conference - CRYPTO 2016, Santa Barbara, California, USA, August 14 - 18, 2016. [pdf] [DOI] [Skinny website]Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
2016 - Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu
23nd International Conference on Selected Areas in Cryptography, SAC 2016, St. John's, NL, Canada, August 10–12, 2016. [pdf] [DOI]Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet
2016 - Christian Zenger, Jan Zimmer, Mario Pietersz, Benedikt Driessen, Christof Paar
In Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2016, Darmstadt, Germany, July 18-22, 2016. (Cooperation with PHYSEC GmbH (DE)) [pdf]A Grain in the Silicon: SCA-Protected AES in Less than 30 Slices
2016 - Pascal Sasdrich, Tim Güneysu
27th Annual IEEE International Conference on Application-specific Systems, Architectures and Processors, ASAP 2016, London, United Kingdom, July 6-8 2016, to appear [DOI] [pdf]High-Performance and Lightweight Lattice-Based Public-Key Encryption
2016 - Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann
2nd International Workshop on IoT Privacy, Trust, and Security 2016, IoTPTS 2016, Xi'an, China, May 30, 2016. [DOI] [Code] [Paper]Large Laser Spots and Fault Sensitivity Analysis
2016 - Falk Schellenberg, Markus Finkeldey, Nils C. Gerhardt, Martin R. Hofmann , Amir Moradi, Christof Paar
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016 (best student-paper award). [DOI] [pdf]Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
2016 - Amir Moradi, Tobias Schneider
7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, Gray, Austria, April 14-15, 2016 [pdf] [DOI]Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
2016 - Tobias Schneider, Amir Moradi, Tim Güneysu
7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, Gray, Austria, April 14-15, 2016 [pdf] [DOI]Preventing Relay Attacks and Providing Perfect Forward Secrecy using PHYSEC on 8-bit µC
2016 - Christian Zenger, Mario Pietersz, Christof Paar
In IEEE International Conference on Communication, ICC 2016, Kuala Lumpur, Malaysia, 23-27 May 2016, Workshop Proceedings, pages 110–115. IEEE, 2016. [Conference Homepage] [PDF]Common-path depth-filtered digital holography for high resolution imaging of buried semiconductor structures
2016 - Markus Finkeldey, Falk Schellenberg, Nils C. Gerhardt, Christof Paar, Martin R. Hofmann
9771-16, SPIE Photonics West, San Francisco, California, USA (2016)White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
2016 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
23rd International Conference on Fast Software Encryption, FSE 2016, Bochum, Germany, March 20-23 2016 [pdf]On the Problems of Realizing Reliable and Efficient Ring Oscillator PUFs on FPGAs
2016 - Alexander Wild, Georg T. Becker, Tim Güneysu
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016 [PDF]Finding the AES Bits in the Haystack: Reverse Enginering and SCA Using Voltage Contrast
2015 - Christian Kison, Jürgen Frinken, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 [Springer]got HW crypto? On the (in)security of a Self-Encrypting Drive series
2015 - Gunnar Alendal, Christian Kison, modg
Hardware Security Conference and Training, Hardwear.io 2015, The Hague, Netherlands, Oct 1-2, 2015 [pdf]Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
2015 - Amir Moradi, Alexander Wild
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 (best paper candidate). [pdf] [DOI]Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
2015 - Tobias Schneider, Amir Moradi
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]On the Complexity Reduction of Laser Fault Injection Campaigns using OBIC Measurements
2015 - Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schäpers, Nils C. Gerhardt, Martin R. Hofmann , Christof Paar
Fault Diagnosis and Tolerance in Cryptography - FDTC 2015, Saint Malo, France, September 13, 2015. [DOI] [pdf]The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
2015 - Georg T. Becker
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 [PDF]Exploiting the Physical Environment for Securing the Internet of Things
2015 - Christian Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar
New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8–11, 2015 [pdf]Bringing PHY-based Key Generation into the Field: An Evaluation for Practical Scenarios
2015 - Rene Guillaume, Fredrik Winzer, Christian Zenger, Christof Paar, Andreas Czylwik
82nd Vehicular Technology Conference, VTC 2015, Boston, USA, 6-9 September, 2015 [PDF]Affine Equivalence and its Application to Tightening Threshold Implementations
2015 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015 [pdf]Masking Large Keys in Hardware: A Masked Implementation of McEliece
2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
22nd Conference on Selected Areas in Cryptography (SAC 2015), Sackville, New Brunswick, Canada, August 12-14, 2015, to appear. [eprint]On-line Entropy Estimation for Secure Information Reconciliation
2015 - Christian Zenger, Jan Zimmer, Jan-Felix Posielek, Christof Paar
Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]Security Analysis of Quantization Schemes for Channel-based Key Extraction
2015 - Christian Zenger, Jan Zimmer, Christof Paar
Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]Development of a Layout-Level Hardware Obfuscation Tool
2015 - Shweta Malik, Georg T. Becker, Christof Paar, Wayne P. Burleson
IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015 (Invited Paper), Montpellier, France, July 2015 [PDF]On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation
2015 - Johannes Tobisch, Georg T. Becker
11th Workshop on RFID Security (RFIDSec 2015), New York, USA, June 23-24, 2015 [pdf]Security Evaluation and Enhancement of Bistable Ring PUFs
2015 - Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson
Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers & Lecture Notes in Computer Science, vol. 9440, page 3-16, Springer, 2015 [DOI] [ePrint]Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
2015 - Tobias Schneider, Amir Moradi, Tim Güneysu
International Conference on Applied Cryptography and Network Security - ACNS 2015, New York, USA, 2–5 June 2015. [pdf] [DOI]Differential Power Analysis of a McEliece Cryptosystem
2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
13th International Conference on Applied Cryptography and Network Security (ACNS), New York, USA, 2–5 June 2015. [Springer] [pdf]High-Performance Ideal Lattice-Based Cryptography on ATxmega 8-bit Microcontrollers
2015 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu
Latincrypt 2015, Bienvenido, Guadalajara, Mexico, August 23-26, 2015 [Preprint] [Source Code]Virtual Proofs of Reality and their Physical Implementation
2015 - Ulrich Rührmair, J.L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson
2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 [DOI]Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
2015 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [pdf]Efficient E-cash with Attributes on MULTOS Smartcards
2015 - Gesine Hinterwälder, Felix Riek, Christof Paar
11th Workshop on RFID Security - RFIDsec 2015 (to appear) [pdf]Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
2015 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
CT-RSA 2015, San Francisco, CA, USA, April 20-24, 2015. [eprint report]Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
2015 - Alexander Wild, Amir Moradi, Tim Güneysu
6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015. [pdf] [DOI]Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
2015 - Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu
6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015 [pdf]Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
2015 - Amir Moradi, Gesine Hinterwälder
6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015 (best paper award). [pdf] [DOI]Protecting against Cryptographic Trojans in FPGAs
2015 - Pawel Swierczynski, Marc Fyrbiak, Christof Paar, Christophe Huriaux, Russell Tessier
In the Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, Vancouver, British Columbia, May 2015. [pdf]SCANDALee: A Side-ChANnel-based DisAssembLer using Local Electromagnetic Emanations
2015 - Daehyun Strobel, Florian Bache, David Oswald, Falk Schellenberg, Christof Paar
Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9 - 13 , 2015. [pdf]Side-Channel Attacks from Static Power: When Should we Care?
2015 - Santos Merino Del Pozo, François-Xavier Standaert, Dina Kamel, Amir Moradi
Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9 - 13 , 2015. [pdf] [DOI]Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation
2015 - Georg T. Becker, Alexander Wild, Tim Güneysu
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [beckerPufIBS]Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
2014 - Amir Moradi
15th International Conference on Cryptology in India, Indocrypt 2014, New Delhi, December 14 - 17, 2014. [DOI] [pdf]A Hardware-Assisted Proof-of-Concept for Secure VoIP Clients on Untrusted Operating Systems
2014 - Maik Ender, Düppmann, Gerd, Alexander Wild, Thomas Pöppelmann, Tim Güneysu
2014 International Conference on Reconfigurable Computing and FPGAs (ReConFig 2014), Cancun, Mexico, December 8-10, 2014 [Paper]High-Speed Implementation of bcrypt Password Search using Special-Purpose Hardware
2014 - Ralf Zimmermann
ReConFig 2014, Cancun, Mexico, December 8th-10th 2014 [pdf]Remote IP Protection using Timing Channels
2014 - Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar
The 17th Annual International Conference on Information Security and Cryptology -- ICISC 2014, December 3 ~ 5, 2014, Seoul, Korea, to appear [pdf]Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms
2014 - Christian Zenger, Abhijit Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten, Christof Paar
1st International Conference on Cryptography and Information Security (BalkanCryptSec), 2014 [pdf]Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware
2014 - Stefan Heyse, Ralf Zimmermann, Christof Paar
Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 [DOI] [BibTeX] [pdf] [bib]Full-Size High-Security ECC Implementation on MSP430 Microcontrollers
2014 - Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar
Third International Conference on Cryptology and Information Security in Latin America, Latincrypt 2014, Florianópolis, Brazil, September 17 - 19, 2014. [DOI] [pdf] [code]Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
2014 - Amir Moradi, Vincent Immler
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]Side-Channel Leakage through Static Power – Should We Care about in Practice?
2014 - Amir Moradi
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]POSTER: Implementation and Evaluation of Channel-based Key Establishment Systems
2014 - Christian Zenger, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [pdf]Enabling SRAM-PUFs on Xilinx FPGAs
2014 - Alexander Wild, Tim Güneysu
24th International Conference on Field Programmable Logic and Applications Munich, Germany; September 2 - 4, 2014 [BibTeX] [DOI] [Paper]THOR - The hardware onion router
2014 - Tim Güneysu, Francesco Regazzoni, Pascal Sasdrich, Marcin Wójcik
24th International Conference on Field Programmable Logic and Applications Munich, Germany; September 2 - 4, 2014 [BibTex] [DOI]A Novel Key Generating Architecture for Wireless Low-Resource Devices
2014 - Christian Zenger, Jan-Felix Posielek, Gerhard Wunder, Christof Paar
ESORICS International Workshop on Secure Internet of Things 2014 (ESORICS-SIoT 2014), 16 pages [pdf]Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation
2014 - René Guillaume, Andreas Mueller , Christian Zenger, Christof Paar, Andreas Czylwik
18th International OFDM Workshop 2014, Essen, Germany [pdf]High-speed signatures from standard lattices
2014 - Özgür Dagdelen, Rachid El Bansarkhani, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Ana Helena Sánchez, Peter Schwabe
to appear in Latincrypt 2014 [PDF]Fault Sensitivity Analysis Meets Zero-Value Attack
2014 - Oliver Mischke, Amir Moradi, Tim Güneysu
Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2013. [PDF]Block Ciphers – Focus On The Linear Layer (feat. PRIDE)
2014 - Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalcin
In Proceedings of the 34th International Cryptology Conference 2014 (CRYPTO’14), volume 8616 of Lecture Notes in Computer Science, pages 57-76. Springer, Santa Barbara, CA, US, August 17-21, 2014 [DOI]Sweet Dreams and Nightmares: Security in the Internet of Things
2014 - Timo Kasper, David Oswald, Christof Paar
Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. [pdf]Proof-of-Concept: Using Homomorphic Cryptography to Provide for Privacy in Modern Vehicular Environments
2014 - Susanne Wetzel, Bernhard Borsch, Christof Paar, Thomas Pöppelmann
escar Embedded Security in Cars Conference, June 18-19, 2014, Detroid Metropolitan, Michigan, USA, extended abstract [Website]Detecting Hidden Leakages
2014 - Amir Moradi, Sylvain Guilley, Annelie Heuser
International Conference on Applied Cryptography and Network Security - ACNS 2014, Lausanne, Switzerland, June 10 - 13, 2014 (best-[student]-paper award). [DOI] [pdf]Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices
2014 - Tobias Oder, Thomas Pöppelmann, Tim Güneysu
The 51st Annual Design Automation Conference 2014, DAC '14, San Francisco, CA, USA, June 1-5, 2014 [Paper] [BibTeX] [DOI] [Code]Efficient Elliptic-Curve Cryptography using Curve25519 on Reconfigurable Devices
2014 - Pascal Sasdrich, Tim Güneysu
Reconfigurable Computing: Architectures, Tools, and Applications - 10th International Symposium, ARC 2014, Vilamoura, Portugal, April 14-16, 2014 [BibTeX] [DOI] [pdf]Statistics on Password Re-use and Adaptive Strength for Financial Accounts
2014 - Daniel V. Bailey, Markus Dürmuth, Christof Paar
Proceedings 9th International Conference on Security and Cryptography (SCN), 2014. [PDF]Typing passwords with voice recognition --or-- How to authenticate to Google Glass
2014 - Daniel Bailey, Markus Dürmuth, Christof Paar
Adventures in Authentication: WAY Workshop. 2014. [PDF]A Reconfigurable Architecture For Searching Optimal Software Code To Implement Block Cipher Permutation Matrices
2013 - Elif Bilge Kavun, Gregor Leander, Tolga Yalcin
In International Conference on ReConFigurable Computing and FPGAs 2013 (ReConFig'13), IEEE Computer Society, Cancun, Mexico, Dec. 9-11, 2013 [DOI]Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure
2013 - Amir Moradi, Oliver Mischke
International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20 - 22, 2013. [DOI] [BibTeX] [pdf]Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
2013 - David Oswald, Bastian Richter, Christof Paar
RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. [bibtex] [pdf]Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
2013 - Daehyun Strobel, Benedikt Driessen, Gregor Leander, Timo Kasper, David Oswald, Falk Schellenberg, Christof Paar
Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013 [bibtex]Stealthy Dopant-Level Hardware Trojans
2013 - Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013 Extended version in Journal of Cryptographic Engineering, Springer, 2014 [pdf] [bib]On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme
2013 - Amir Moradi, Oliver Mischke
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013. [DOI] [BibTeX] [pdf]Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
2013 - Stefan Heyse, Ingo von Maurich, Tim Güneysu
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013 [BibTeX] [DOI] [Paper]Faster Hash-based Signatures with Bounded Leakage
2013 - Thomas Eisenbarth, Ingo von Maurich, Xin Ye
Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 [BibTeX] [DOI] [Paper]Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing
2013 - Timo Kasper, David Oswald, Christian Zenger, Christof Paar
9th Workshop on RFID Security, RFIDsec 2013, July 9-11, 2013, Graz, Austria [pdf] [bib]Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware
2013 - Alexander Wild, Tim Güneysu, Amir Moradi
Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013 [BibTeX] [DOI] [Paper]Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation System
2013 - Gesine Hinterwälder, Christian Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson
E. De Cristofaro and M. Wright (Eds.): PETS 2013, LNCS 7981, pp. 40–59, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]Efficient Implementation of Cryptographic Primitives on the GA144 Multi-core Architecture
2013 - Tobias Schneider, Ingo von Maurich, Tim Güneysu
24th International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2013, Washington, DC, USA, June 5-7, 2013 [BibTeX] [DOI] [Paper]Software Speed Records for Lattice-Based Signatures
2013 - Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Peter Schwabe
Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013 [Software] [BibTeX] [DOI] [Paper]P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems
2013 - Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Christof Paar
A.-R. Sadeghi (Eds.): Financial Cryptography and Data Security 2013, Volume 7859, pp 205-212, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II - Facilitating Black-Box Analysis using Software Reverse-Engineering
2013 - Amir Moradi, David Oswald, Christof Paar, Pawel Swierczynski
21st ACM/SIGDA International Symposium on Field-Programmable Gate Arrays- FPGA 2013, pages 91-100, February 11 - 13. ACM, 2013. [DOI] [pdf]SHA-3 - Portierung auf einer ATmega163 Smartcard
2013 - Pawel Swierczynski, Christof Paar
23. SMARTCARD-WORKSHOP, Tagungsband, Darmstadt, 6/7. Februar 2013.Achieving anonymity against major face recognition algorithms
2013 - Benedikt Driessen, Markus Dürmuth
Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013. [PDF]IPSecco: A Lightweight and Reconfigurable IPSec Core
2012 - Benedikt Driessen, Tim Güneysu, Elif Bilge Kavun, Oliver Mischke, Christof Paar, Thomas Pöppelmann
2012 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2012, Cancun, Mexico, December 5-7, 2012 [BibTeX] [DOI] [PDF]PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications (Extended Abstract)
2012 - Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalcin
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012 [DOI] [BibTeX]Improving Side-Channel Analysis with Optimal Linear Transforms
2012 - David Oswald, Christof Paar
CARDIS 2012 [pdf] [bibtex]Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
2012 - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, Francois Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, Francois-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loic Van Oldeneel Tot Oldenzeel, Ingo von Maurich
Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012 [Full Version] [Block Cipher Version] [BibTeX] [DOI]How Far Should Theory be from Practice? – Evaluation of a Countermeasure
2012 - Amir Moradi, Oliver Mischke
Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012 [DOI] [BibTeX] [pdf]An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
2012 - Martin R. Albrecht, Gregor Leander
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers [bib]Solving Binary Linear Equation Systems over the Rationals and Binaries
2012 - Benedikt Driessen, Christof Paar
International Workshop on the Arithmetic of Finite Fields (Bochum) 2012 [Waifi 2012] [pdf] [bib]Pay as you Go
2012 - Foteini Baldimtsi, Gesine Hinterwälder, Andy Rupp, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson
5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012) Held in conjunction with the 12th Privacy Enhancing Technologies Symposium July 13, 2012, Vigo, Spain [pdf]Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
2012 - Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, Francois Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, Francois-Xavier Standaert, Loic van Oldeneel tot Oldenzeel
Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 [BibTeX] [DOI] [Full Version] [Hash Funct. Version]Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems
2012 - Gesine Hinterwälder, Christof Paar, Wayne P. Burleson
J.-H. Hoepman, I. Verbauwhede (Eds.): RFIDSec 2012, Volume 7739, pp 109-122, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]Glitch-Free Implementation of Masking in Modern FPGAs
2012 - Amir Moradi, Oliver Mischke
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012 [DOI] [BibTeX] [pdf] [verilog]Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards
2012 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2012 - **Best Paper Award** [More Info] [PDF]Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
2012 - Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
Advances in Cryptology – EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings [bib]Statistical Tools Flavor Side-Channel Collision Attacks
2012 - Amir Moradi
Advances in Cryptology - EUROCRYPT 2012 - 31th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, United Kingdom, April 15-19, 2012, pages 428-445. [DOI] [pdf]Experimentally Verifying a Complex Algebraic Attack on the Grain-128 Cipher Using Dedicated Reconfigurable Hardware
2012 - Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
SHARCS 2012 (http://2012.sharcs.org/index.html), 17-18 March 2012, Washington DC, USA [SHARCS 2012 website] [pdf]Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures – An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism
2012 - Amir Moradi, Markus Kasper, Christof Paar
Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference, San Francisco, CA, USA, February 27- March 2, 2012, pages 1-18. [DOI] [pdf]An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
2011 - Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011 [DOI] [BibTeX] [pdf] [bib]An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software
2011 - Daehyun Strobel, Christof Paar
Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011RAM-Based Ultra-Lightweight FPGA Implementation of PRESENT
2011 - Elif Bilge Kavun, Tolga Yalcin
In International Conference on ReConFigurable Computing and FPGAs 2011 (ReConFig'11), IEEE Computer Society, Cancun, Mexico, Nov. 30-Dec. 2, 2011 [DOI]Security of Wireless Embedded Devices in the Real World
2011 - Timo Kasper, David Oswald, Christof Paar
Information Security Solutions (ISSE) 2011 - Securing Electronic Business Processes (November 22-23 2011, Prague, Czech Republic) [pdf] [bib]Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild
2011 - Timo Kasper, David Oswald, Christof Paar
19th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) [pdf] [bib]On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
2011 - Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar
18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, IL, USA, October 17-21, 2011, pages 111-124. [DOI] [pdf] [slides] [bib]Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge
2011 - Georg T. Becker, Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, Wayne Burelson
29th IEEE International Conference on Computer Design (Invited Paper), ICCD 2011, Amherst, USA, October 2011 [PDF]Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World
2011 - David Oswald, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, Nara, Japan, September 28-October 1, 2011, pages 207-222 [pdf] [extended version]Generic Side-Channel Countermeasures for Reconfigurable Devices
2011 - Tim Güneysu, Amir Moradi
Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011 [BibTex] [DOI] [pdf] [PROMs]On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting
2011 - Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama
Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011 [BibTeX] [DOI] [pdf]spongent: A Lightweight Hash Function
2011 - Andrey Bogdanov, Miroslav Kneževi?, Gregor Leander, Deniz Toz, Kerem Var?c?, Ingrid Verbauwhede
13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings [DOI] [bib]Memory Encryption in Smart Cards
2011 - Baris Ege, Elif Bilge Kavun, Tolga Yalcin
10th Smart Card Research and Advanced Application Conference (CARDIS 2011), Leuven, Belgium, Sept. 14-16, 2011 [DOI] [pdf]A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
2011 - Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner
31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings [DOI] [bib]Sec2 – Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage
2011 - Christopher Meyer, Juraj Somorovsky, Jörg Schwenk, Benedikt Driessen, Thang Tran, Christian Wietfeld
In Proceedings of the DACH Security 2011, Oldenburg, Germany [Paper] [Slides]Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
2011 - Timo Kasper, David Oswald, Christof Paar
7th Workshop on RFID Security and Privacy 2011, RFIDSec 2011, Amherst, USA, June 26–28, 2011 [pdf] [bib]7th Workshop on RFID Security and Privacy (RFIDsec)
2011 - A. Juels, K. Fu, Christof Paar
Lecture Notes in Computer Science 7055, Springer, Amherst, MA, USA, June 26-27, 2011.Practical Evaluation of DPA Countermeasures on Reconfigurable Hardware
2011 - Amir Moradi, Oliver Mischke, Christof Paar
HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA [BibTeX] [DOI] [pdf]Side-channel Watermarks for Embedded Software
2011 - Georg T. Becker, Wayne Burleson, Christof Paar
9th IEEE NEWCAS Conference (Invited Paper), NEWCAS 2011, Bordeaux, France, June 2011 [pdf]On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN
2011 - Gregor Leander
30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings [DOI] [bib]Pushing the Limits: A Very Compact and a Threshold Implementation of AES
2011 - Amir Moradi, Dipl.-Kfm. Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang
Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, volume 6632 of LNCS, pages 69-88, Springer. [DOI] [bib] [pdf]The future of high-speed cryptography: new computing platforms and new ciphers
2011 - Tim Güneysu, Stefan Heyse, Christof Paar
Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, Lausanne, Switzerland, May 2-6, 2011 [pdf] [BibTex] [DOI]Towards an Ultra Lightweight Crypto Processor
2011 - Begul Bilgin, Elif Bilge Kavun, Tolga Yalcin
Proceedings of the Workshop on Lightweight Security and Privacy (LightSec’11), Istanbul, Turkey, March 14-15, 2011 [DOI] [pdf]Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
2011 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen
18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [DOI] [bib]Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
2011 - Mohamed Ahmed Abdelraheem, Gregor Leander, Mohamed Ahmed Abdelraheem
18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [DOI] [bib]The World Is Not Enough: Another Look on Second-Order DPA
2010 - François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
ASIACRYPT 2010: 112-129 [bib]Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
2010 - Gallais, J., Großschädl, J., Hanley, N., Markus Kasper, Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S.
In L. Chen & M. Yung (Eds.), International Conference on Trusted Computing. Springer. [bib]Side-channel based watermarks for IP Protection
2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar
COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design [bib]Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware
2010 - J. Fan, D. V. Bailey, L. Batina, Tim Güneysu, Christof Paar, I. Verbauwhede
International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI]High-Performance Integer Factoring with Reconfigurable Devices
2010 - Ralf Zimmermann, Tim Güneysu, Christof Paar
International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI] [pdf] [bib]Breaking Elliptic Curve Cryptosystems using Reconfigurable Hardware
2010 - J. Fan, D. V. Bailey, L.Batina, Tim Güneysu, Christof Paar, I. Verbauwhede
IEEE Field Programmable Logic, 133-138, IEEE Computer Society, 2010.Cloning Cryptographic RFID Cards for 25$
2010 - Timo Kasper, Ingo von Maurich, David Oswald, Christof Paar
Presented at the 5th Benelux Workshop on Information and System Security, WisSec 2010, November 29-30, 2010, Nijmegen, the Netherlands.Chameleon: A Versatile Emulator for Contactless Smartcards
2010 - Timo Kasper, Ingo von Maurich, David Oswald, Christof Paar
13th International Conference on Information Security and Cryptology - ICISC 2010, Seoul, Korea, December 1-3, 2010, volume 6829 of LNCS, pages 189-206, Springer. [SourceForge] [BibTeX] [DOI] [pdf]Combined Implementation Attack Resistant Exponentiation
2010 - Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald
Springer LNCS 6112, LATINCRYPT 2010, Puebla, Mexico. [pdf] [bib]Evaluation of SHA-3 Candidates for 8-bit Embedded Processors
2010 - Stefan Heyse, Ingo von Maurich, Alexander Wild, Cornel Reuber, Johannes Rave, Thomas Pöppelmann, Christof Paar, Thomas Eisenbarth
2nd SHA-3 Candidate Conference, August 23-24, 2010, University of California, Santa Barbara, USA. [Paper]Correlation-Enhanced Power Analysis Collision Attack
2010 - Amir Moradi, Oliver Mischke, Thomas Eisenbarth
Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings [BibTeX] [DOI] [pdf]PRINTcipher: A Block Cipher for IC-Printing
2010 - Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw
12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings [DOI] [bib]Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
2010 - Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, M. Wienecke
Topics in Cryptology - CT-RSA 2010, LNCS, Springer-Verlag. [pdf]Secure Location Verification - A Security Analysis of GPS Signal Authentication
2010 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar
DBSec 2010, Rome, Italy, June 21-23, 2010, to be published in Springer LNCS. [pdf]A Pipelined Camellia Architecture for Compact Hardware Implementation
2010 - Elif Bilge Kavun, Tolga Yalcin
In Proceedings of the 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP’10), pages 305 - 308, IEEE, Rennes, France, July 7-9, 2010 [DOI]Side-channel based watermarks for integrated circuits
2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. [pdf]A Lightweight Implementation of KECCAK Hash Function for Radio-Frequency Identification Applications
2010 - Elif Bilge Kavun, Tolga Yalcin
Proceedings of the 6th Workshop on RFID Security (RFIDSec'11), Istanbul, Turkey, June 7-9, 2010 [DOI] [pdf]Practical Power Analysis Attacks on Software Implementations of McEliece
2010 - Stefan Heyse, Amir Moradi, Christof Paar
Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings [DOI] [BibTeX] [bib] [pdf]All You Can Eat or Breaking a Real-World Contactless Payment System
2010 - Timo Kasper, Michael Silbermann, Christof Paar
Financial Cryptography and Data Security, 10 January 25-28, 2010, to be published in Springer LNCS. [pdf] [bib]Lightweight Cryptography and DPA Countermeasures: A Survey
2010 - Amir Moradi, Axel Poschmann
First International Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010 (co-located with Financial Cryptography and Data Security - FC 2010), Tenerife, Canary Islands, Spain, Januar 25-28, 2010. [pdf]Transforming Write Collisions in Block RAMs into Security Applications
2009 - Tim Güneysu, Christof Paar
Proceedings of the 2009 International Conference on Field-Programmable Technology, FPT 2009, Sydney, Australia, December 9-11, 2009 [BibTeX] [DOI] [pdf]A New Remote Keyless Entry System Resistant to Power Analysis Attacks
2009 - Amir Moradi, Timo Kasper
7th International Conference on Information, Communications and Signal Processing, ICICS 2009, Macau, China, Dezember 7-10, 2009. [pdf]Lightweight Cryptography and RFID: Tackling the Hidden Overheads
2009 - Dipl.-Kfm. Axel Poschmann, Matt Robshaw, Frank Vater, Christof Paar
7th International ConferenceInternational Conference on Information Security and Cryptology 2009 - ICISC 2009. LNCS, Springer-Verlag, to appear, Seoul, Korea, Dezember 2-4, 2009. [pdf]Power Analysis of Single-Rail Storage Elements as used in MDPL
2009 - Amir Moradi, Thomas Eisenbarth, Dipl.-Kfm. Axel Poschmann, Christof Paar
12th International Conference on Information Security and Cryptology - ICISC 2009, Seoul, Korea, December 2-4, 2009. [pdf]MOLES: Malicious Off-chip Leakage Enabled by Side-channels
2009 - Lang Lin, Wayne Burleson, Christof Paar
ACM/IEEE International Conference on Computer-Aided Design (ICCAD), pp. 117-122, San Jose, 2009.Efficient Authentication Mechanisms for Navigation Systems – a Radio-Navigation Case Study
2009 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Di Qiu, Christof Paar, Per Enge
Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2009) pp. 901 - 912, September 22-25 2009, Savannah, GA. [pdf]Cryptanalysis of KeeLoq with COPACOBANA
2009 - Martin Novotny, Timo Kasper
Special-purpose Hardware for Attacking Cryptographic Systems 2009, SHARCS 2009, Lausanne, Switzerland. September 9-10, 2009. [pdf] [bib]Three Years of Evolution: Cryptanalysis with COPACOBANA Special-purpose Hardware for Attacking Cryptographic Systems 2009
2009 - Tim Güneysu, Gerd Pfeiffer, Christof Paar, Manfred Schimmler
SHARCS 2009, Lausanne, Switzerland. September 9-10, 2009. [pdf]Crypto Engineering: Some History and Some Case Studies
2009 - Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems 2009, CHES 2009, Lausanne, Switzerland. September 6-9, 2009. [pdf]KeeLoq and Side-Channel Analysis --- Evolution of an Attack
2009 - Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, Amir Moradi
6th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009.Lausanne, Switzerland, September 6, 2009. [pdf]MicroEliece: McEliece for Embedded Devices
2009 - Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009 [DOI] [BibTeX] [pdf]Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
2009 - Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne Burleson
Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009 [DOI] [BibTeX] [pdf] [Talk Slides]A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
2009 - Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh
10th International Workshop on Information Security Applications, WISA 2009, Busan, Korea. August 25-27, 2009. [pdf]EM Side-Channel Attacks on Commercial Contactless Smartcards using Low-Cost Equipment
2009 - Timo Kasper, David Oswald, Christof Paar
10th International Workshop on Information Security Applications, WISA 2009, Busan, Korea. August 25-27, 2009. [pdf] [bib]Secure IP-Block Distribution for Hardware Devices
2009 - Jorge Guajardo Merchan, Tim Güneysu, Sandeep Kumar, Christof Paar
IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009 [BibTeX] [DOI] [pdf]One-touch Financial Transaction Authentication
2009 - Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar
SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, Juli 7-10, 2009. [pdf] [bib]New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs
2009 - Timo Kasper, David Oswald, Christof Paar
Workshop on RFID Security 2009, RFIDSec 2009, Leuven, Belgium, 30. Juni - 2.Juli, 2009. [pdf] [bib]Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
2009 - Markus Kasper, Timo Kasper, Amir Moradi, Christof Paar
2nd International Conference on Cryptology in Africa, Progress in Cryptology - AFRICACRYPT 2009, Gammarth, Tunisia, 21-25 Juni, 2009. [DOI] [pdf] [bib]Green Car Security: IT-Sicherheit und Elektromobilität
2009 - Christof Paar, Jan Pelzl, Andy Rupp, Kai Schramm, André Weimerskirch
DACH Security 2009, Ruhr-Universität Bochum, Bochum, Germany, Mai, 19-20, 2009. [pdf]Cryptography is Feasible on 4-Bit Microcontrollers - A Proof of Concept
2009 - Markus Vogt, Dipl.-Kfm. Axel Poschmann, Christof Paar
International IEEE Conference on RFID, Orlando, Florida, USA, April, 27 - 28, 2009. [pdf] [bib]Design Space Exploration of PRESENT Implementations for FPGAs
2009 - Mohamad Sbeiti, Michael Silbermann, Dipl.-Kfm. Axel Poschmann, Christof Paar
Proceedings of the 5th Southern Programmable Logic Conference -- SPL'09, Sao Carlos, Brazil, April 1 - 3, 2009. [pdf] [bib]Securing Green Cars: IT Security in Next-Generation Electric Vehicle Systems
2009 - Christof Paar, Andy Rupp, Kai Schramm, André Weimerskirch, Wayne Burleson
Accepted at the 2009 Annual Meeting and Exposition of the Intelligent Transportation Society of America. [pdf]Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
2008 - Andy Rupp, G. Leander, E. Bangerter, A. Dent, Ahmad-Reza Sadeghi
In 14th International Conference on the Theory and Application of Cryptology and Information Security —- ASIACRYPT 2008 (to appear). Melbourne, Australia, Dezember 7-11, 2008.Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
2008 - Andrey Bogdanov, Ilya Kizhvatov, Andrey Pyshkin
Progress in Cryptology - INDOCRYPT 2008, Kharagpur, India, December 2008. [pdf]Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
2008 - Bodo Möller, Andy Rupp
In 6th Conference on Security and Cryptography for Networks — SCN 2008. Amalfi, Italien, September 10-12, 2008.Enhancing COPACOBANA for Advanced Applications in Cryptography and Cryptanalysis
2008 - Tim Güneysu, Christof Paar, Gerd Pfeiffer, Manfred Schimmler
FPL 2008, International Conference on Field Programmable Logic and Applications, Heidelberg, Germany, 8-10 September 2008 [DOI] [BibTeX] [pdf]Fast Hash-Based Signatures on Constrained Devices
2008 - Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, Christof Paar
Proceedings of the 8th Smart Card Research and Advanced Application IFIP Conference -- CARDIS 2008. September 8-11, 2008. [DOI] [pdf] [bib]Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
2008 - Carsten Rolfes, Dipl.-Kfm. Axel Poschmann, Gregor Leander, Christof Paar
Proceedings of the 8th Smart Card Research and Advanced Application IFIP Conference -- CARDIS 2008. September 8-11, 2008. [Implementations] [pdf] [bib]On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
2008 - Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
28th International Cryptology Conference -- CRYPTO 2008. Santa Barbara, California, USA. August 17-21, 2008. [DOI] [pdf] [bib] [Slides]A Real-World Attack Breaking A5/1 within Hours
2008 - Timo Gendrullis, Martin Novotny, Andy Rupp
Workshop on Cryptographic Hardware and Embedded Systems -- CHES 2008. Washington DC, USA, August 10-13, 2008. [pdf]Hash Functions and RFID Tags: Mind the Gap
2008 - Andrey Bogdanov, Gregor Leander, Christof Paar, Dipl.-Kfm. Axel Poschmann, Matthew Robshaw, Yannick Seurin
10. International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2008, Washington, USA. August 10 - 13, 2008. [DOI] [pdf] [bib]Multiple-Differential Side-Channel Collision Attacks on AES
2008 - Andrey Bogdanov
10. International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2008, Washington, USA. August 10 - 13, 2008. [pdf]Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
2008 - Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf
Workshop on Cryptographic Hardware and Embedded Systems -- CHES 2008 (Best Paper Award). Washington DC, USA, August 10-13, 2008. [DOI] [pdf] [bib]Ultra High Performance ECC over NIST Primes on Commercial FPGAs
2008 - Tim Güneysu, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings [BibTeX] [DOI] [pdf]Fast Multivariate Signature Generation in Hardware: The Case of Rainbow
2008 - S. Balasubramanian, Andrey Bogdanov, Andy Rupp, J. Ding, H. W. Carter, Christof Paar
In 19th IEEE International Conference on Application-specific Systems, Architectures and Processors — ASAP 2008, Leuven, Belgium, Juli 2-4, 2008.On Black-Box Ring Extraction and Integer Factorization
2008 - K. Altmann, T. Jager, Andy Rupp
In 35th International Colloquium on Automata, Languages and Programming — ICALP 2008. Reykjavik, Iceland, Juli 6-13, 2008.Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers
2008 - Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Christof Paar
3rd International Symposium on Industrial Embedded Systems -- SIES 2008. Montpellier - Le Grande Motte, France. Juni 11-13, 2008. [DOI] [pdf] [bib]Securing Peer-to-peer Distributions for Mobile Devices
2008 - N.Asokan, André Osterhues, Ahmad-Reza Sadeghi, Christian Stüble, Marko Wolf
4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia. Proceedings, LNCS, Springer-Verlag. April 21 - 23, 2008.DSPs, BRAMs and a Pinch of Logic: New recipes for AES on FPGAs
2008 - Saar Drimer, Tim Güneysu, Christof Paar
16th IEEE International Symposium on Field-Programmable Custom Computing Machines, FCCM 2008, 14-15 April 2008, Stanford, Palo Alto, California, USA [BibTeX] [DOI] [pdf]Security Requirements Engineering in the Automotive Domain: On Specification Procedures and Implementational Aspects
2008 - Christof Paar, Marko Wolf
SICHERHEIT 2008: Sicherheit — Schutz und Zuverlässigkeit, 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., Saarbrücken, Germany. Proceedings, LNI, April 2 - 4, 2008.Comparison of Innovative Signature Algorithms for WSNs
2008 - Benedikt Driessen, Dipl.-Kfm. Axel Poschmann, Christof Paar
First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, Virginia, USA. Proceedings, ACM Press. 31.03 - 02.04 2008. [pdf] [Talk Slides] [Bibtex]An Interoperable Security Architecture for Vehicular Software Protection
2008 - Michael Scheibel, Christian Stüble, Marko Wolf
International Workshop on Interoperable Vehicles (IOV 2008), ETH Zurich, Switzerland. Proceedings. March 26, 2008.Security for 1000 Gate Equivalents
2008 - Carsten Rolfes, Dipl.-Kfm. Axel Poschmann, Christof Paar
Secure Component and System Identification, SECSI 2008, Berlin, Germany. März, 17-18 2008. [Talk Slides] [Bibtex] [pdf]Susceptibility of eSTREAM Candidates towards Side Channel Analysis
2008 - Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi, Elisabeth Oswald
The State of the Art of Stream Ciphers, SASC 2008, Lausanne, Switzerland. Februar, 13-14 2008. [pdf] [Bibtex]Breaking Legacy Banking Standards with Special-Purpose Hardware
2008 - Tim Güneysu, Christof Paar
Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008 [DOI] [BibTeX] [pdf]Sufficient Conditions for Intractability in the Generic Model: Providing Lower Bounds for Generalized DL and DH Problems
2008 - Ahmad-Reza Sadeghi, Andy Rupp, Endre Bangerter, Alexander W. Dent, Gregor Leander
Accepted for ASIACRYPT 2008.Dynamic Intellectual Property Protection for Reconfigurable Devices
2007 - Tim Güneysu, Bodo Möller, Christof Paar
2007 International Conference on Field-Programmable Technology, ICFPT 2007, Kitakyushu, Japan, December 12-14, 2007 [DOI] [IEEE] [BibTeX] [pdf]E-Passport: Cracking Basic Access Control Keys
2007 - Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar
On the move, OTM2007, Vilamoura, Algarve, Portugal, November 25-30, 2007. [DOI] [pdf] [Bibtex]Reconfigurable Trusted Computing in Hardware
2007 - Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf, Thomas Eisenbarth, Tim Güneysu, Christof Paar
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 [DOI] [BibTeX] [pdf]Enabling Fairer Digital Rights Management with Trusted Computing
2007 - N. Asokan, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, Christian Stüble, Marko Wolf
10th Information Security Conference (ISC 2007), Valparaiso, Chile. Proceedings, LNCS, Springer-Verlag. October 9 - 12, 2007.Anmerkungen zur Gültigkeit von Zertifikaten
2007 - Bodo Möller
INFORMATIK 2007 -- Informatik trifft Logistik, Workshop: "Kryptologie in Theorie und Praxis", 37. Jahrestagung der Gesellschaft für Informatik e. V. (GI), Lecture Notes in Informatics (LNI) P-110, Bremen, Germany, September 27, 2007. [pdf]Cryptanalytic Time-Memory Tradeoffs on COPACOBANA
2007 - Tim Güneysu, Andy Rupp, S. Spitz
INFORMATIK 2007: Informatik trifft Logistik. Band 2. Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 24.-27. September 2007 in Bremen [BibTeX] [pdf]Hardware Optimierte Lightweight Block-Chiffren für RFID- und Sensor-Systeme
2007 - Dipl.-Kfm. Axel Poschmann, Christof Paar
INFORMATIK 2007 -- Informatik trifft Logistik, Workshop: "Kryptologie in Theorie und Praxis", 37. Jahrestagung der Gesellschaft für Informatik e. V. (GI), Lecture Notes in Informatics (LNI) P-110, Bremen, Germany, September 27, 2007. [pdf] [Bibtex]Power Attacks Resistance of Cryptographic S-boxes with added Error Detection Circuits
2007 - F. Regazzoni, Thomas Eisenbarth, J. Großsch¨adl, L. Breveglieri, P. Ienne, I. Koren, Christof Paar
In Proceedings of the 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT’07), Rome, Italy, September 26-28, 2007. [pdf] [Bibtex]Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods
2007 - Kerstin Lemke-Rust, Christof Paar
12th European Symposium On Research In Computer Security (ESORICS 2007), Dresden, Germany, September 24 - 26, 2007. [pdf]Gaussian Mixture Models for Higher-Order Side Channel Analysis
2007 - Kerstin Lemke-Rust, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2007, 9. International Workshop, Vienna, Austria, Proceedings. LNCS, Springer-Verlag, September 10 - 13, 2007. [pdf]Collision Attacks on AES-based MAC: Alpha-MAC
2007 - A. Biryukov, Andrey Bogdanov, D. Khovratovich, Timo Kasper
Cryptographic Hardware and Embedded Systems - CHES 2007, 9. International Workshop, Vienna, Austria, Proceedings. LNCS, Springer-Verlag, September 10 - 13, 2007. [pdf] [Bibtex]A Hardware-Assisted Realtime Attack on A5/2 without Precomputations
2007 - Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
Cryptographic Hardware and Embedded Systems - CHES 2007, 9. International Workshop, Vienna, Austria, Proceedings. LNCS, Springer-Verlag, September 10 - 13, 2007. [pdf] [Bibtex]PRESENT: An Ultra-Lightweight Block Cipher
2007 - Andrey Bogdanov, L.R. Knudsen, G. Leander, Christof Paar, Dipl.-Kfm. Axel Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe
Cryptographic Hardware and Embedded Systems - CHES 2007, 9. International Workshop, Vienna, Austria, Proceedings. LNCS, Springer-Verlag, September 10 - 13, 2007. [Implementations] [Talk Slides] [Bibtex] [pdf]E-Passport: Cracking Basic Access Control Keys with Copacobana
2007 - Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar
Special-purpose Hardware for Attacking Cryptographic Systems, SHARCS Workshop 2007, Vienna, Austria, September 9-10, 2007. [pdf] [Talk Slides]Efficient Hash Collision Search Strategies on Special-Purpose Hardware
2007 - Tim Güneysu, Christof Paar, S. Schäge
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers [DOI] [BibTeX] [pdf]Parallel Computing with Low-Cost FPGAs: A Framework for COPACOBANA
2007 - Tim Güneysu, Christof Paar, Jan Pelzl, G. Pfeiffer, M. Schimmler, C. Schleiffer
Parallel Computing: Architectures, Algorithms and Applications, ParCo 2007, Forschungszentrum Jülich and RWTH Aachen University, Germany, 4-7 September 2007 [BibTeX] [pdf]Improved Side-Channel Collision Attacks on AES
2007 - Andrey Bogdanov
The 14th Annual Workshop on Selected Areas in Cryptography (SAC 2007), Ottawa, Ontario, Canada, August 16-17, 2007. [pdf] [Bibtex] [Talk Slides]A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies
2007 - F. Regazzoni, S. Badel, Thomas Eisenbarth, J. Großsch¨adl, Dipl.-Kfm. Axel Poschmann, Z. Toprak, M. Macchetti, L. Pozzi, Christof Paar, Y. Leblebici, P. Ienne
in Proceedings of International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS IC 07), Samos, Greece, 16-19 July 2007. [pdf] [Bibtex]Attacks on the KeeLoq Block Cipher and Authentication Systems
2007 - Andrey Bogdanov
3rd Conference on RFID Security 2007 (RFIDSec 2007), Malaga, ES, July 11-13, 2007. [Talk Slides] [Bibtex] [pdf]A Lightweight Hardware Implementation of the Stream Cipher VEST-4
2007 - Timo Grendrullis, Timo Kasper, Christof Paar
Western European Workshop on Research in Cryptology, WeWORC Workshop 2007, Bochum, Germany, July 4-6, 2007. [pdf]Efficient Hash Collision Search Strategies on Special-Purpose Hardware
2007 - Tim Güneysu, Christof Paar, Sven Schäge
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers [DOI] [BibTeX] [pdf]Enabling Full-Size Public-Key Algorithms on 8-bit Sensor Nodes
2007 - Leif Uhsade, Dipl.-Kfm. Axel Poschmann, Christof Paar
European Workshop on Security and Privacy in Ad hoc and Sensor Networks 2007 (ESAS 2007), Cambridge, UK July 2-3, 2007. [DOI] [pdf] [Bibtex]On the Classification of 4-Bit S-boxes
2007 - Gregor Leander, Dipl.-Kfm. Axel Poschmann
International Workshop on the Arithmetic of Finite Fields (WAIFI), Madrid, ES, Juni 21-22, 2007. [pdf] [Bibtex]An Efficient General Purpose Elliptic Curve Cryptography Module for Ubiquitous Sensor Networks
2007 - Leif Uhsadel, Dipl.-Kfm. Axel Poschmann, Christof Paar
Software Performance Enhancement for Encryption and Decryption (SPEED 2007), Amsterdam, NL Juni 11-12, 2007 [pdf] [Bibtex]Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers
2007 - Sören Rinne, Thomas Eisenbarth, Christof Paar
Software Performance Enhancement for Encryption and Decryption (SPEED 2007), Amsterdam, NL Juni 11-12, 2007 [pdf] [Bibtex]New Protection Mechanisms for Intellectual Property in Reconfigurable Logic
2007 - Tim Güneysu, Bodo Möller, Christof Paar
IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA [DOI] [BibTeX] [pdf]An Embedded System for Practical Security Analysis of Contactless Smartcards
2007 - Timo Kasper, Dario Carluccio, Christof Paar
Workshop in Information Security Theory and Practices 2007, Springer LNCS 4462, pp. 150-160, Heraklion, Crete, Greece, Mai 2007. [DOI] [pdf] [Bibtex]New Lightweight Crypto Algorithms for RFID
2007 - G. Leander, Christof Paar, Dipl.-Kfm. Axel Poschmann, Kai Schramm
IEEE International Symposium on Circuits and Systems - ISCAS 2007, New Orleans, Louisana, USA, Mai 27-30, 2007. [DOI] [pdf] [Bibtex]New Lightweight DES Variants
2007 - G. Leander, Christof Paar, Dipl.-Kfm. Axel Poschmann, Kai Schramm
Fast Software Encryption 2007 - FSE 2007, Luxembourg City, Luxembourg, März 26-28, 2007. [DOI] [pdf] [Bibtex]Dynamic Code Update for the Efficient Usage of Security Components in WSNs
2007 - Dipl.-Kfm. Axel Poschmann, D. Westhoff, André Weimerskirch
Workshop on Mobile Ad-Hoc Networks 2007 (WMAN 2007), Bern, Schweiz, 01.03.07 - 02.03.07. [pdf] [Bibtex]Software Implementation of eSTREAM Profile I Ciphers on embedded 8-bit AVR Microcontrollers
2007 - G. Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Christof Paar
The State of the Art of Stream Ciphers - SASC 2007, Bochum, NRW, Germany, Januar 31- Februar 1, 2007 [pdf]On the Equivalence of RSA and Factoring regarding Generic Ring Algorithms
2006 - G. Leander, Andy Rupp
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, Dezember 3-7, 2006. [pdf]A Simpler Sieving Device: Combining ECM and TWIRL
2006 - W. Geiselmann, F. Januszewski, H. Koepfer, Jan Pelzl, R. Steinwandt
International Conference on Information Security and Cryptology - ICISC 2006, Busan, Korea, Proceedings. LNCS, Springer-Verlag, November 30 - December 1, 2006. [pdf]Play it once again, Sam — Enforcing Stateful Licenses on Open Platforms
2006 - Ahmad-Reza Sadeghi, Michael Scheibel, Christian Stüble, Marko Wolf
2nd Workshop on Advances in Trusted Computing (WATC 2006 Fall), IBM Tokyo Research Labs, Tokio, Japan, November 30 – December 1, 2006.Security Architectures for Software Updates and Content Protection
2006 - Ulrich Huber, Ahmad-Reza Sadeghi, Marko Wolf
Automotive — Safety & Security 2006, Stuttgart, Germany. Proceedings. October 11 - 13, 2006.Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker
2006 - Sandeep Kumar, Christof Paar, Jan Pelzl, G. Pfeiffer, M. Schimmler
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, Proceedings. LNCS, Springer-Verlag, Oktober 10 - 13, 2006. [pdf]Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
2006 - Stefan Mangard, Kai Schramm
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, Oktober 10 - 13, 2006. [pdf]Templates vs. Stochastic Methods
2006 - Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, Oktober 10 - 13, 2006. [pdf]E-Passport: The Global Traceability or How to Feel Like an UPS Package
2006 - Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi
7th International Workshop on Information Security Applications (WISA 2006), Jeju Island, Korea, August 28-30, 2006. [pdf]A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications
2006 - Dipl.-Kfm. Axel Poschmann, Gregor Leander, Kai Schramm, Christof Paar
Workshop on RFID Security 2006, Graz, Austria, Juli 2006. [pdf]E-Passport: The Global Traceability or How to Feel Like an UPS Package
2006 - Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi
Workshop on RFID Security 2006, Graz, Austria, Juli 2006. [pdf]Are standards compliant elliptic curve cryptosystems feasible on RFID?
2006 - Sandeep Kumar, Christof Paar
Workshop on RFID Security 2006, Graz, Austria, Juli 2006. [pdf]A Configuration Concept for a Massive Parallel FPGA Architecture
2006 - Sandeep Kumar, Christof Paar, Jan Pelzl, G. Pfeiffer, M. Schimmler
International Conference on Computer Design - CDES'06, Las Vegas,USA, Juni 26-29, 2006. [pdf]A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2)
2006 - Andrey Bogdanov, M. Mertens, Christof Paar, Jan Pelzl, Andy Rupp
IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2006, Napa, CA, USA, April 24-26, 2006. [pdf]COPACOBANA - A Cost-Optimized Special-Purpose Hardware for Code-Breaking
2006 - Sandeep Kumar, Christof Paar, Jan Pelzl, G. Pfeiffer, M. Schimmler
poster summary, IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2006, Napa, CA,USA, April 24-26, 2006. [pdf]On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware
2006 - Tim Güneysu, Christof Paar, Jan Pelzl
2nd Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2006, Cologne, Germany, April 3-4, 2006,. [pdf]How to Break DES for Euro 8,980
2006 - Sandeep Kumar, Christof Paar, Jan Pelzl, G. Pfeiffer, Andy Rupp, M. Schimmler
2nd Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2006, Cologne, Germany, April 3-4, 2006. [pdf]SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2)0
2006 - Andrey Bogdanov, M. Mertens, Christof Paar, Jan Pelzl, Andy Rupp
2nd Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2006, Cologne, Germany, April 3-4, 2006. [pdf]Seitenkanal-Analysen: Stand der Forschung in der Methodik
2006 - Kerstin Lemke-Rust, Christof Paar
D-A-CH Security 2006, Universität Düsseldorf, 28.-29. März 2006. [pdf]Provably Secure Password-Based Authentication in TLS
2006 - M. Abdalla, E. Bresson, O. Chevassut, Bodo Möller, D. Pointcheval
2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS'06),Taipei, Taiwan, März 21-24, 2006. [pdf]Higher Order Masking of the AES. CT-RSA 2006, The Cryptographers' Track
2006 - Kai Schramm, Christof Paar
at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings. Lecture Notes in Computer Science 3860, Springer 2006. [postscript]Testing Framework for eSTREAM Profile II Candidates
2006 - L. Batina, Sandeep Kumar, J. Lano, Kerstin Lemke-Rust, N. Mentens, Christof Paar, B. Preneel, K. Sakiyama, I. Verbauwhede
SASC 2006 - Stream Ciphers Revisited, Leuven, Belgium, February 2-3, 2006 [pdf]Cryptographic Component Identification: Enabler for Secure Vehicles
2005 - Katrin Höper, Christof Paar, André Weimerskirch, Marko Wolf
62nd IEEE Semiannual Vehicular Technology Conference (VTC Fall 2005), Dallas, Texas, USA. Proceedings, IEEE Press. September 25 - 28, 2005.A Stochastic Model for Differential Side Channel Cryptanalysis
2005 - Werner Schindler, Kerstin Lemke-Rust, Christof Paar
Cryptographic Hardware and Embedded Systems - - CHES 2005, 7th International Workshop, Edinburgh, UK. August 29 - September 1, 2005. [pdf]Templates as Master Keys
2005 - Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
Cryptographic Hardware and Embedded Systems - - CHES 2005, 7th International Workshop, Edinburgh, UK. August 29 - September 1, 2005. [postscript]SHARK - A Realizable Hardware Architecture for Factoring 1024-bit Composites with the GNFS
2005 - J. Franke, T. Kleinjung, Christof Paar, Jan Pelzl, C. Priplata, C. Stahlke
Cryptographic Hardware and Embedded Systems - - CHES 2005, 7th International Workshop, Edinburgh, UK, Proceedings. LNCS 3659, Springer-Verlag, August 29 - September 1, 2005. [pdf]Efficient Hardware Architectures for Modular Multiplication on FPGAs
2005 - D. Amanor, V. Bunimov, Christof Paar, Jan Pelzl
International Conference on Field Programmable Logic, Reconfigurable Computing and Applications, FPL 2005, Tampere, Finland, August 24-28, 2005. [pdf]An Efficient Masking Scheme for AES Software Implementations
2005 - Elisabeth Oswald, Kai Schramm
Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3786. [postscript]CMOS Circular Geometry VCOs for Microwave Magnetic Field Generation
2005 - Tolga Yalcin, Volkan Sahin (Maxim Semiconductors), Giovanni Boero (EPFL), Radivoje Popovic (EPFL)
Radio Frequency integrated Circuits (RFIC) Symposium, 2005. Digest of Papers. 2005 IEEE [DOI] [pdf]Hardware Factorization Based Elliptic Curve Method
2005 - M. Simka, Jan Pelzl, T. Kleinjung, J. Franke, C. Priplata, C. Stahlke, M. Drutarovsky, V. Fischer, Christof Paar
IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2005, Napa, CA, USA, April 17-20, 2005. [pdf]An Open Approach for Designing Secure Electronic Immobilizers
2005 - Kerstin Lemke-Rust, Ahmad-Reza Sadeghi, Christian Stüble
Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. [pdf]Digital Rights Management Systeme (DRMS) als Enabling Technology im Automobil
2005 - Christof Paar, André Weimerskirch, Marko Wolf
Sicherheit 2005, Regensburg, Germany. Proceedings, LNI. April 5 - 9, 2005.Performance of HECC Coprocessors Using Inversionfree Formulae
2005 - Thomas Wollinger, G. Bertoni, L. Breveglieri, Christof Paar
International Workshop on Information Security & Hiding (ISH '05) part of the International Conference on Computational Science and its Applications (ICCSA 2005), Singapore, May 9-12, 2005. [pdf] [postscript]An Efficient Hardware Architecture for Factoring large Numbers with the Elliptic Curve Method
2005 - J. Franke, T. Kleinjung, Christof Paar, Jan Pelzl, C. Priplata, M. Simka, C. Stahlke
1st Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2005, Paris, France, February 24-25, 2005. [pdf]SHARK - A Realizable Hardware Architecture for Factoring 1024-bit Composites with the GNFS
2005 - J. Franke, T. Kleinjung, Christof Paar, Jan Pelzl, C. Priplata, C. Stahlke
1st Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2005, Paris, France, February 24-25, 2005. [pdf]Optimal Tower Fields for Hyperelliptic Curve Cryptosystems
2004 - Selcuk Baktir, Jan Pelzl, Thomas Wollinger, Berk Sunar, Christof Paar
38th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, USA, November 7-10, 2004. [pdf] [gzipped postscript]Some Thoughts about Implementation Properties of Stream Ciphers
2004 - Sandeep Kumar, Kerstin Lemke-Rust, Christof Paar
SASC - State of the Art of Stream Ciphers Workshop, Brugge, Belgium, October 14-15, 2004. [pdf]Security in Automotive Bus Systems
2004 - Christof Paar, André Weimerskirch, Marko Wolf
Automotive — Safety & Security 2004, Stuttgart, Germany. Proceedings. October 6 - 7, 2004.Architectural Support for Arithmetic in Optimal Extension Fields
2004 - Johann Großschädl, Sandeep Kumar, Christof Paar
IEEE 15th International Conference on Application-specific Systems, Architectures and Processors (ASAP) 2004, Galveston, Texas, September 27-29, 2004. [pdf]Reconfigurable Instruction Set Extension for enabling ECC on an 8-bit Processor
2004 - Sandeep Kumar, Christof Paar
International Conference on Field-Programmable Logic and Applications (FPL) 2004, Antwerp, Belgium, August 30 - September 1, 2004. [pdf]A Collision-Attack on AES Combining Side Channel- and Differential-Attack
2004 - Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August, 2004. [pdf]DPA on n-bit sized Boolean and Arithmetic Operations and its Application to IDEA, RC6 and the HMAC-Construction
2004 - Kerstin Lemke, Kai Schramm, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 2004 [pdf]Hyperelliptic Curve Coprocessors on a FPGA
2004 - H. Kim, Thomas Wollinger, Y. Choi, K. Chung, Christof Paar
Workshop on Information Security Applications - WISA, Jeju Island, Korea, August 23-25, 2004. [postscript]Case Study: Compiler Comparison for an Embedded Cryptographical Application
2004 - E. Barteska, Christof Paar, Jan Pelzl, V. Wittelsberger, Thomas Wollinger
The 2004 International Conference on Embedded Systems and Applications - ESA 2004, Las Vegas, Nevada, USA, June 21-24, 2004 [pdf] [postscript]Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
2004 - G. Bertoni, L. Breveglieri, Thomas Wollinger, Christof Paar
International Conference on Information Technology: Coding and Computing - ITCC, Las Vegas, Nevada, USA, April 5-7, 2004. [pdf] [postscript]High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
2004 - Jan Pelzl, Thomas Wollinger, Christof Paar
International Conference on Information Technology: Coding and Computing - ITCC, Las Vegas, Nevada, USA, April 5-7, 2004. [pdf] [postscript]Eingebettete Sicherheit: State-of-the-art
2004 - Christof Paar, Jan Pelzl, Kai Schramm, André Weimerskirch, Thomas Wollinger
D-A-CH Security 2004, University of Basel, March 30-31, 2004. [pdf] [postscript]Authentikation in Ad-hoc und Sensornetzwerken
2004 - André Weimerskirch
GUUG-Frühjahrsfachgespräch 2004, Ruhr-Universität Bochum, Germany, 9-12 March, 2004. [pdf] [postscript]Embedded End-to-End Wireless Security with ECDH Key Exchange
2003 - Sandeep Kumar, Marco Girimondo, André Weimerskirch, Christof Paar, Arun Patel, Arvinderpal S.Wander
46th IEEE Midwest Symposium On Circuits and Systems, Cairo , Egypt, December 27-30, 2003. [pdf]Identity Certified Authentication for Ad-hoc Networks
2003 - André Weimerskirch, D. Westhoff
2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), October 31, 2003. [pdf] [gzipped postscript]Eingebettete Sicherheit und Kryptographie im Automobil: Eine Einführung
2003 - Christof Paar, Thomas Wollinger
(Embedded Security and Cryptography in Automobiles: An Introduction, in German), Informatik 2003, Workshop: Automotive SW Engineering & Concepts, 33. Annual Meeting of the GI, Frankfurt/M., September 29 - October 2, 2003. [pdf] [gzipped postscript]Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
2003 - Jan Pelzl, Thomas Wollinger, Jorge Guajardo Merchan, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems - CHES, September 7-10, 2003. [pdf] [gzipped postscript]How Secure Are FPGAs in Cryptographic Applications? (Long Version)
2003 - Thomas Wollinger, Christof Paar
IACR, http://eprint.iacr.org, cryptology, ePrint archive: Report 2003/119, Juni 5, 2003. [web] [pdf] [gzipped postscript]Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications
2003 - G. Bertoni, Jorge Guajardo Merchan, Sandeep Kumar, G. Orlando, Christof Paar, Thomas Wollinger
In Marc Joye (Ed.): The Cryptographers' Track at the RSA Conference - CT-RSA 2003, volume LNCS 2612, pp. 158-175, San Francisco, CA, USA, April 13-17, 2003. [pdf] [gzipped postscript]A New Class of Collision Attacks and its Application to DES
2003 - K. Schramm, Thomas Wollinger, Christof Paar
In proceedings of Fast Software Encryption 2003 (FSE), pp. 217-230, Lund, Sweden, February 24-26, 2003. [pdf] [gzipped postscript]Cryptography in Embedded Systems: An Overview
2003 - Thomas Wollinger, Jorge Guajardo Merchan, Christof Paar
(Invited Paper), In proceedings of the Embedded World 2003 Exhibition and Conference, pp.735-744, Design & Elektronik, Nuernberg, Germany, February 18-20, 2003. [pdf] [gzipped postscript]Hardware Architectures proposed for Cryptosystems Based on Hyperelliptic Curves
2002 - Thomas Wollinger, Christof Paar
9th IEEE International Conference on Electronics, Circuits and Systems - ICECS 2002, Dubrovnik, Croatia, September 15-18, 2002. [pdf] [gzipped postscript]Area Efficient GF(p) Architectures for GF(pm) Multipliers
2002 - Jorge Guajardo Merchan, Thomas Wollinger, Christof Paar
In proceedings of the 45th IEEE International Midwest Symposium on Circuits and Systems - MWSCAS 2002, Tulsa, Oklahoma, August 4-7, 2002. [pdf] [gzipped postscript]Algorithmic Self-Assembly of DNA Tiles and its Application to Cryptanalysis
2002 - O. Pelletier, André Weimerskirch
To be presented at the Genetic and Evoluationary Computation Conference 2002 (GECCO 2002), New York, July 9-13, 2002. City, USA. [pdf] [gzipped postscript]Elliptic Curve Cryptography on a Palm OS Device
2001 - André Weimerskirch, Christof Paar, S. Chang Shantz
Presented at The 6th Australasian Conference on Information Security and Privacy (ACISP 2001), Sydney, Australia, July 11-13 2001. [pdf] [gzipped postscript]A Distributed Light-Weight Authentication Model for Ad-hoc Networks
2001 - André Weimerskirch, G. Thonet
Presented at The 4th International Conference on Information Security and Cryptology (ICISC 2001), Seoul, South Korea, December 6-7, 2001. [pdf] [gzipped postscript]A scalable GF(p) elliptic curve processor architecture for programmable hardware"
2001 - G. Orlando, Christof Paar
Cryptographic Hardware and Embedded Systems, CHES 2001, Paris, France, May 14-16, 2001. [pdf]Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP430x33x Family of Microcontrollers
2001 - Jorge Guajardo Merchan, R. Bluemel, U. Krieger, Christof Paar
Presented at the International Workshop on Practice and Theory in Public Key Cryptography (PKC 2001), Cheju Island, Korea, February 13-15, 2001. [pdf] [gzipped postscript]Elliptic Curve Cryptography on Smart Cards Without Coprocessors
2000 - A. Woodbury, D. Bailey, Christof Paar
Presented at the Fourth Smart Card Research and Advanced Applications (CARDIS 2000) Conference, Bristol, UK, September 20-22, 2000. [pdf] [pdf]A high-performance reconfigurable elliptic curve processor for GF(2m)
2000 - G. Orlando, Christof Paar
Cryptographic Hardware and Embedded Systems, CHES 2000, Worcester MA, USA, August 17-18, 2000. [pdf] [gzipped postscript]An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists
2000 - A. J. Elbirt, W. Yip, B. Chetwynd, Christof Paar
The Third Advanced Encryption Standard (AES3) Candidate Conference, New York, USA, April 13-14, 2000. [pdf] [gzipped postscript]How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP
2000 - Thomas Wollinger, M. Wang, Jorge Guajardo Merchan, Christof Paar
The Third Advanced Encryption Standard (AES3) Candidate Conference, New York, USA, April 13-14, 2000. [pdf] [gzipped postscript]An FPGA Implementation and Performance Evaluation of the Serpent Block Cipher
2000 - A. Elbirt, Christof Paar
Eighth ACM International Symposium on Field-Programmable Gate Arrays, Monterey, California, February 10-11, 2000. [pdf] [gzipped postscript]A low-power system-on-chip for telecommunications: single chip digital FM receiver/demodulator IP
1999 - Tolga Yalcin, Neslin Ismailoglu (TUBITAK)
Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on [DOI] [pdf]An Algorithm-Agile Cryptographic Co-processor Based on FPGAs
1999 - Christof Paar, B. Chetwynd, T. Connor, S. Y. Deng, S. Marchant
The SPIE's Symposium on Voice, Video, and Data Communications, Boston, MA, September 19-22, 1999 [pdf] [gzipped postscript]Towards an FPGA Architecture Optimized for Public-Key Algorithms
1999 - A. Elbirt, Christof Paar
The SPIE's Symposium on Voice, Video, and Data Communications, Boston, MA. September 19-22, 1999. [pdf]Low-power design of a digital FM demodulator based on zero-cross detection at IF
1999 - Tolga Yalcin, Neslin Ismailoglu (TUBITAK)
Vehicular Technology Conference, 1999. VTC 1999 - Fall. IEEE VTS 50th [DOI] [pdf]Design of a fully-static differential low-power CMOS flip-flop
1999 - Tolga Yalcin, Neslin Ismailoglu (TUBITAK)
[DOI] [pdf]Cryptography in Modern Communication Systems (Extended Abstract)
1999 - Daniel V. Bailey, William Cammack, Jorge Guajardo Merchan, Christof Paar
Invited presentation at TI DSPS FEST '99, Houston, Texas, USA, 1999 [pdf] [gzipped postscript]A Super-Serial Galois Field Multiplier for FPGAs and its Application to Public-Key Algorithms
1999 - G. Orlando, Christof Paar
Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 99), Napa Valley, CA, April 21-23, 1999. [ps]Montgomery Modular Multiplication on Reconfigurable Hardware"
1999 - T. Blum, Christof Paar
14th IEEE Symposium on Computer Arithmetic (ARITH-14), Adelaide, Australia, April 14-16, 1999. [ps]Low-power design of a 64-tap, 4-bit digital matched filter using systolic array architecture and CVSL circuit techniques in CMOS
1998 - Tolga Yalcin, Neslin Ismailoglu (TUBITAK)
Signals, Systems & Computers, 1998. Conference Record of the Thirty-Second Asilomar Conference on [DOI] [pdf]Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms
1998 - D. Bailey, Christof Paar
CRYPTO '98, Santa Barbara, CA, USA, August 23-27, 1998 [ps] [pdf]Fast Inversion in Composite Galois Fields GF((2n)m)
1998 - Jorge Guajardo Merchan, Christof Paar
1998 IEEE International Symposium on Information Theory, MIT, Cambridge, MA, USA, August 16-21, 1998. [ps]Fast DES Implementation for FPGAs and its Application to a Universal Key-Search Machine
1998 - J.-P. Kaps, Christof Paar
5th Annual Workshop on Selected Areas in Cryptography (SAC '98), Queen's University, Kingston, Ontario, Canada, August 17-18, 1998. [ps]Efficient Algorithms for Elliptic Curve Cryptosytems
1997 - Jorge Guajardo Merchan, Christof Paar
CRYPTO '97, Santa Barbara, CA, USA, August 17-21, 1997. [ps]On Efficient Inversion in Tower Fields of Characteristic Two
1997 - J.L. Fan, Christof Paar
1997 IEEE International Symposium on Information Theory, Ulm, Germany, June 29 - July 4, 1997. [ps]Optimized Arithmetic for Reed-Solomon Encoders
1997 - Christof Paar
1997 IEEE International Symposium on Information Theory, Ulm, Germany, June 29 - July 4, 1997. [ps]Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2n)m)
1997 - Christof Paar, P. Soria-Rodriguez
EUROCRYPT '97, Konstanz, Germany, May 11-15, 1997. [ps]Comparison of Arithmetic Architectures for Reed-Solomon Decoders in Reconfigurable Hardware
1997 - Christof Paar, M. Rosner
Fifth Annual IEEE Symposium on Field-Programmable Custom Computing Machines "FCCM '97", Nappa Valley, CA, USA, April 16-18, 1997. [web] [ps]Securing ATM
1997 - G. Haskins, Christof Paar, S. Dempsey
1997 RSA Data Security Conference, San Francisco, CA, USA, January 28-31, 1997. [web]Recent Developments in Digital Wireless Network Security
1996 - G. Pierce, Christof Paar
Massachusetts Telecommunication Council and UMass Technical Conference on Telecommunications, Lowell, March, 1996. [ps]Some Remarks on Efficient Inversion in Finite Fields
1995 - Christof Paar
1995 IEEE International Symposium on Information Theory, Whistler, B.C. Canada, September, 1995. [ps]A Comparitive VLSI Synthesis of Finite Field Multipliers
1995 - Christof Paar, N. Lange
3rd International Symposium on Communication Theory and its Applications, Lake District, UK, July, 1995. [ps]Implementation of a Reprogrammable Reed-Solomon Decoder over GF(216) on a Digital Signal Processor with External Arithmetic Unit
1994 - Christof Paar, O. Hooijen
Fourth International European Space Agency (ESA) Workshop on Digital Signal Processing Techniques Applied to Space Communications, King's College, London, September, 1994. [ps]Low Complexity Parallel Multipliers for Galois Fields GF((2n)4) Based on Special Types of Primitive Polynomials
1994 - Christof Paar
1994 IEEE International Symposium on Information Theory, Trondheim, Norway, June, 1994