Publications

A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies

2007 - F. Regazzoni, S. Badel, Thomas Eisenbarth, J. Großsch¨adl, Dipl.-Kfm. Axel Poschmann, Z. Toprak, M. Macchetti, L. Pozzi, Chris­tof Paar, Y. Leblebici, P. Ienne

in Proceedings of International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS IC 07), Samos, Greece, 16-19 July 2007. [pdf] [Bibtex]

Attacks on the KeeLoq Block Cipher and Authentication Systems

2007 - Andrey Bogdanov

3rd Conference on RFID Security 2007 (RFIDSec 2007), Malaga, ES, July 11-13, 2007. [Talk Slides] [Bibtex] [pdf]

A Lightweight Hardware Implementation of the Stream Cipher VEST-4

2007 - Timo Grendrullis, Timo Kasper, Chris­tof Paar

Western European Workshop on Research in Cryptology, WeWORC Workshop 2007, Bochum, Germany, July 4-6, 2007. [pdf]

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

2007 - Tim Güneysu, Chris­tof Paar, Sven Schäge

Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers [DOI] [BibTeX] [pdf]

Enabling Full-Size Public-Key Algorithms on 8-bit Sensor Nodes

2007 - Leif Uhsade, Dipl.-Kfm. Axel Poschmann, Chris­tof Paar

European Workshop on Security and Privacy in Ad hoc and Sensor Networks 2007 (ESAS 2007), Cambridge, UK July 2-3, 2007. [DOI] [pdf] [Bibtex]

On the Classification of 4-Bit S-boxes

2007 - Gregor Leander, Dipl.-Kfm. Axel Poschmann

International Workshop on the Arithmetic of Finite Fields (WAIFI), Madrid, ES, Juni 21-22, 2007. [pdf] [Bibtex]

An Efficient General Purpose Elliptic Curve Cryptography Module for Ubiquitous Sensor Networks

2007 - Leif Uhsadel, Dipl.-Kfm. Axel Poschmann, Chris­tof Paar

Software Performance Enhancement for Encryption and Decryption (SPEED 2007), Amsterdam, NL Juni 11-12, 2007 [pdf] [Bibtex]

Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers

2007 - Sören Rinne, Thomas Eisenbarth, Chris­tof Paar

Software Performance Enhancement for Encryption and Decryption (SPEED 2007), Amsterdam, NL Juni 11-12, 2007 [pdf] [Bibtex]

New Protection Mechanisms for Intellectual Property in Reconfigurable Logic

2007 - Tim Güneysu, Bodo Möller, Chris­tof Paar

IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA [DOI] [BibTeX] [pdf]

State of the Art: Embedding Security in Vehicles

2007 - André Weimerskirch, Marko Wolf, Thomas Wollinger

EURASIP Journal on Embedded Systems (EURASIP JES), Special Issue: Embedded Systems for Intelligent Vehicles, April, 2007.

An Embedded System for Practical Security Analysis of Contactless Smartcards

2007 - Timo Kasper, Dario Carluccio, Chris­tof Paar

Workshop in Information Security Theory and Practices 2007, Springer LNCS 4462, pp. 150-160, Heraklion, Crete, Greece, Mai 2007. [DOI] [pdf] [Bibtex]

New Lightweight Crypto Algorithms for RFID

2007 - G. Leander, Chris­tof Paar, Dipl.-Kfm. Axel Poschmann, Kai Schramm

IEEE International Symposium on Circuits and Systems - ISCAS 2007, New Orleans, Louisana, USA, Mai 27-30, 2007. [DOI] [pdf] [Bibtex]

New Lightweight DES Variants

2007 - G. Leander, Chris­tof Paar, Dipl.-Kfm. Axel Poschmann, Kai Schramm

Fast Software Encryption 2007 - FSE 2007, Luxembourg City, Luxembourg, März 26-28, 2007. [DOI] [pdf] [Bibtex]

Dynamic Code Update for the Efficient Usage of Security Components in WSNs

2007 - Dipl.-Kfm. Axel Poschmann, D. Westhoff, André Weimerskirch

Workshop on Mobile Ad-Hoc Networks 2007 (WMAN 2007), Bern, Schweiz, 01.03.07 - 02.03.07. [pdf] [Bibtex]

Software Implementation of eSTREAM Profile I Ciphers on embedded 8-bit AVR Microcontrollers

2007 - G. Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Chris­tof Paar

The State of the Art of Stream Ciphers - SASC 2007, Bochum, NRW, Germany, Januar 31- Februar 1, 2007 [pdf]

Embedded security in a pervasive world

2007 - Chris­tof Paar, André Weimerskirch

Elsevier Science’s Information Security Technical Report, vol 12, no 3, pp 155-161, 2007. [web] [pdf]
Page: