Publications
Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
2014 - Amir Moradi
15th International Conference on Cryptology in India, Indocrypt 2014, New Delhi, December 14 - 17, 2014. [DOI] [pdf]A Hardware-Assisted Proof-of-Concept for Secure VoIP Clients on Untrusted Operating Systems
2014 - Maik Ender, Düppmann, Gerd, Alexander Wild, Thomas Pöppelmann, Tim Güneysu
2014 International Conference on Reconfigurable Computing and FPGAs (ReConFig 2014), Cancun, Mexico, December 8-10, 2014 [Paper]High-Speed Implementation of bcrypt Password Search using Special-Purpose Hardware
2014 - Ralf Zimmermann
ReConFig 2014, Cancun, Mexico, December 8th-10th 2014 [pdf]Remote IP Protection using Timing Channels
2014 - Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar
The 17th Annual International Conference on Information Security and Cryptology -- ICISC 2014, December 3 ~ 5, 2014, Seoul, Korea, to appear [pdf]Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms
2014 - Christian Zenger, Abhijit Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten, Christof Paar
1st International Conference on Cryptography and Information Security (BalkanCryptSec), 2014 [pdf]Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware
2014 - Stefan Heyse, Ralf Zimmermann, Christof Paar
Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 [DOI] [BibTeX] [pdf] [bib]Full-Size High-Security ECC Implementation on MSP430 Microcontrollers
2014 - Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar
Third International Conference on Cryptology and Information Security in Latin America, Latincrypt 2014, Florianópolis, Brazil, September 17 - 19, 2014. [DOI] [pdf] [code]Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
2014 - Amir Moradi, Vincent Immler
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]Side-Channel Leakage through Static Power – Should We Care about in Practice?
2014 - Amir Moradi
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]POSTER: Implementation and Evaluation of Channel-based Key Establishment Systems
2014 - Christian Zenger, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [pdf]Enabling SRAM-PUFs on Xilinx FPGAs
2014 - Alexander Wild, Tim Güneysu
24th International Conference on Field Programmable Logic and Applications Munich, Germany; September 2 - 4, 2014 [BibTeX] [DOI] [Paper]THOR - The hardware onion router
2014 - Tim Güneysu, Francesco Regazzoni, Pascal Sasdrich, Marcin Wójcik
24th International Conference on Field Programmable Logic and Applications Munich, Germany; September 2 - 4, 2014 [BibTex] [DOI]A Novel Key Generating Architecture for Wireless Low-Resource Devices
2014 - Christian Zenger, Jan-Felix Posielek, Gerhard Wunder, Christof Paar
ESORICS International Workshop on Secure Internet of Things 2014 (ESORICS-SIoT 2014), 16 pages [pdf]Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation
2014 - René Guillaume, Andreas Mueller , Christian Zenger, Christof Paar, Andreas Czylwik
18th International OFDM Workshop 2014, Essen, Germany [pdf]High-speed signatures from standard lattices
2014 - Özgür Dagdelen, Rachid El Bansarkhani, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Ana Helena Sánchez, Peter Schwabe
to appear in Latincrypt 2014 [PDF]Fault Sensitivity Analysis Meets Zero-Value Attack
2014 - Oliver Mischke, Amir Moradi, Tim Güneysu
Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2013. [PDF]Block Ciphers – Focus On The Linear Layer (feat. PRIDE)
2014 - Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalcin
In Proceedings of the 34th International Cryptology Conference 2014 (CRYPTO’14), volume 8616 of Lecture Notes in Computer Science, pages 57-76. Springer, Santa Barbara, CA, US, August 17-21, 2014 [DOI]Sweet Dreams and Nightmares: Security in the Internet of Things
2014 - Timo Kasper, David Oswald, Christof Paar
Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. [pdf]Proof-of-Concept: Using Homomorphic Cryptography to Provide for Privacy in Modern Vehicular Environments
2014 - Susanne Wetzel, Bernhard Borsch, Christof Paar, Thomas Pöppelmann
escar Embedded Security in Cars Conference, June 18-19, 2014, Detroid Metropolitan, Michigan, USA, extended abstract [Website]Detecting Hidden Leakages
2014 - Amir Moradi, Sylvain Guilley, Annelie Heuser
International Conference on Applied Cryptography and Network Security - ACNS 2014, Lausanne, Switzerland, June 10 - 13, 2014 (best-[student]-paper award). [DOI] [pdf]Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices
2014 - Tobias Oder, Thomas Pöppelmann, Tim Güneysu
The 51st Annual Design Automation Conference 2014, DAC '14, San Francisco, CA, USA, June 1-5, 2014 [Paper] [BibTeX] [DOI] [Code]Efficient Elliptic-Curve Cryptography using Curve25519 on Reconfigurable Devices
2014 - Pascal Sasdrich, Tim Güneysu
Reconfigurable Computing: Architectures, Tools, and Applications - 10th International Symposium, ARC 2014, Vilamoura, Portugal, April 14-16, 2014 [BibTeX] [DOI] [pdf]Statistics on Password Re-use and Adaptive Strength for Financial Accounts
2014 - Daniel V. Bailey, Markus Dürmuth, Christof Paar
Proceedings 9th International Conference on Security and Cryptography (SCN), 2014. [PDF]Typing passwords with voice recognition --or-- How to authenticate to Google Glass
2014 - Daniel Bailey, Markus Dürmuth, Christof Paar
Adventures in Authentication: WAY Workshop. 2014. [PDF]