Publications

THOR - The hardware onion router

2014 - Tim Güneysu, Francesco Regazzoni, Pascal Sasdrich, Marcin Wójcik

24th In­ter­na­tio­nal Con­fe­rence on Field Pro­gramma­ble Logic and Ap­p­li­ca­ti­ons Mu­nich, Ger­ma­ny; Sep­tem­ber 2 - 4, 2014 [BibTex] [DOI]

A Novel Key Generating Architecture for Wireless Low-Resource Devices

2014 - Christian Zenger, Jan-Felix Posielek, Gerhard Wunder, Chris­tof Paar

ESORICS International Workshop on Secure Internet of Things 2014 (ESORICS-SIoT 2014), 16 pages [pdf]

Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation

2014 - René Guillaume, Andreas Mueller , Christian Zenger, Chris­tof Paar, Andreas Czylwik

18th International OFDM Workshop 2014, Essen, Germany [pdf]

High-speed signatures from standard lattices

2014 - Özgür Dagdelen, Rachid El Bansarkhani, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Ana Helena Sánchez, Peter Schwabe

to appear in Latincrypt 2014 [PDF]

Fault Sensitivity Analysis Meets Zero-Value Attack

2014 - Oliver Mischke, Amir Moradi, Tim Güneysu

Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2013. [PDF]

Block Ciphers – Focus On The Linear Layer (feat. PRIDE)

2014 - Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Chris­tof Paar, Tolga Yalcin

In Proceedings of the 34th International Cryptology Conference 2014 (CRYPTO’14), volume 8616 of Lecture Notes in Computer Science, pages 57-76. Springer, Santa Barbara, CA, US, August 17-21, 2014 [DOI]

Microcontrollers as (In)Security Devices for Pervasive Computing Applications

2014 - Daehyun Strobel, David Oswald, Bastian Richter, Falk Schellenberg, Chris­tof Paar

Proceedings of the IEEE, vol. 102, no. 8, pp. 1157-1173, 2014 [PDF (Open Access)] [bib]

Differential Power Analysis of a McEliece Cryptosystem

2014 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt

Cryptology ePrint Archive, Report 2014/534. [pdf]

Sweet Dreams and Nightmares: Security in the Internet of Things

2014 - Timo Kasper, David Oswald, Chris­tof Paar

Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. [pdf]

Proof-of-Concept: Using Homomorphic Cryptography to Provide for Privacy in Modern Vehicular Environments

2014 - Susanne Wetzel, Bernhard Borsch, Chris­tof Paar, Thomas Pöppelmann

escar Embedded Security in Cars Conference, June 18-19, 2014, Detroid Metropolitan, Michigan, USA, extended abstract [Website]

Detecting Hidden Leakages

2014 - Amir Moradi, Sylvain Guilley, Annelie Heuser

International Conference on Applied Cryptography and Network Security - ACNS 2014, Lausanne, Switzerland, June 10 - 13, 2014 (best-[student]-paper award). [DOI] [pdf]

Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices

2014 - Tobias Oder, Thomas Pöppelmann, Tim Güneysu

The 51st Annual Design Automation Conference 2014, DAC '14, San Francisco, CA, USA, June 1-5, 2014 [Paper] [BibTeX] [DOI] [Code]

Efficient Elliptic-Curve Cryptography using Curve25519 on Recon figurable Devices

2014 - Pascal Sasdrich, Tim Güneysu

Reconfigurable Computing: Architectures, Tools, and Applications - 10th International Symposium, ARC 2014, Vilamoura, Portugal, April 14-16, 2014 [BibTeX] [DOI] [pdf]

Stealthy dopant-level hardware Trojans: extended version

2014 - Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson

Journal of Cryptographic Engineering 4.1 (2014): 19-31 [DOI] [PDF] [BIB]

Large-Scale High-Resolution Computational Validation of Novel Complexity Models in Linear Cryptanalysis

2014 - Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalcin

In Journal of Computational and Applied Mathematics, volume 259, part B, pages 592-598, Elsevier, March 15, 2014 [DOI]

Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis

2014 - Tobias Schneider, Ingo von Maurich, Tim Güneysu, David Oswald

Journal of Signal Processing Systems, Springer, 2014. [DOI] [BibTeX]

Statistics on Password Re-use and Adaptive Strength for Financial Accounts

2014 - Daniel V. Bailey, Markus Dürmuth, Chris­tof Paar

Proceedings 9th International Conference on Security and Cryptography (SCN), 2014. [PDF]

Typing passwords with voice recognition --or-- How to authenticate to Google Glass

2014 - Daniel Bailey, Markus Dürmuth, Chris­tof Paar

Adventures in Authentication: WAY Workshop. 2014. [PDF]

A Reconfigurable Architecture For Searching Optimal Software Code To Implement Block Cipher Permutation Matrices

2013 - Elif Bilge Kavun, Gregor Leander, Tolga Yalcin

In In­ter­na­tio­nal Con­fe­rence on Re­Con­Fi­gura­ble Com­pu­ting and FPGAs 2013 (Re­Con­Fig'13), IEEE Com­pu­ter So­cie­ty, Cancun, Me­xi­co, Dec. 9-11, 2013 [DOI]

A Performance Boost for Hash-based Signatures

2013 - Thomas Eisenbarth, Ingo von Maurich, Chris­tof Paar, Xin Ye

Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday [BibTeX] [DOI] [Paper]

Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure

2013 - Amir Moradi, Oliver Mischke

International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20 - 22, 2013. [DOI] [BibTeX] [pdf]

An Experimental Security Analysis of Two Satphone Standards

2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz

ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]

Keccak und der SHA-2

2013 - Pawel Swierczynski, Gregor Leander, Chris­tof Paar

DuD - Da­ten­schutz und Da­ten­si­cher­heit Aus­ga­be 11/2013 [bib]

Side-Channel Attacks on the Yubikey 2 One-Time Password Generator

2013 - David Oswald, Bastian Richter, Chris­tof Paar

RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. [bibtex] [pdf]

SPONGENT: The Design Space of Lightweight Cryptographic Hashing

2013 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede

IEEE Trans. Computers vol. 62, number 10, 2013 [bib]

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System

2013 - Daehyun Strobel, Benedikt Driessen, Gregor Leander, Timo Kasper, David Oswald, Falk Schellenberg, Chris­tof Paar

Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013 [bibtex]

One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores

2013 - Amir Moradi, Oliver Mischke, Chris­tof Paar

IEEE Transactions on Computers, vol. 62, no. 9, pp. 1786-1798, Sept. 2013. [DOI] [BibTeX] [pdf]

Stealthy Dopant-Level Hardware Trojans

2013 - Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 20 - 23, 2013 Extended version in Journal of Cryptographic Engineering, Springer, 2014 [pdf] [bib]

On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme

2013 - Amir Moradi, Oliver Mischke

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013. [DOI] [BibTeX] [pdf]

Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices

2013 - Stefan Heyse, Ingo von Maurich, Tim Güneysu

Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013 [BibTeX] [DOI] [Paper]

Bounds in Shallows and in Miseries

2013 - Céline Blondeau, Andrey Bogdanov, Gregor Leander

Advances in Cryptology – CRYPTO 2013 Lecture Notes in Computer Science Volume 8042, 2013, pp 204-221 [bib]

Faster Hash-based Signatures with Bounded Leakage

2013 - Thomas Eisenbarth, Ingo von Maurich, Xin Ye

Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 [BibTeX] [DOI] [Paper]

When Reverse-Engineering Meets Side-Channel Analysis–Digital Lockpicking in Practice

2013 - David Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Chris­tof Paar

Selected Areas in Cryptography -- SAC 2013, Springer Berlin Heidelberg, 2014, 571-588 [bib]

Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing

2013 - Timo Kasper, David Oswald, Christian Zenger, Chris­tof Paar

9th Workshop on RFID Security, RFIDsec 2013, July 9-11, 2013, Graz, Austria [pdf] [bib]

Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware

2013 - Alexander Wild, Tim Güneysu, Amir Moradi

Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013 [BibTeX] [DOI] [Paper]

Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation System

2013 - Gesine Hinterwälder, Christian Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Chris­tof Paar, Wayne P. Burleson

E. De Cristofaro and M. Wright (Eds.): PETS 2013, LNCS 7981, pp. 40–59, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

Wireless Devices and Cryptography: About Digital Pickpocketing, Open Sesame and Tracking Paranoia

2013 - Timo Kasper

it - Information Technology: Vol. 55, No. 3, pp. 123-128 [pdf] [bib]

Efficient Implementation of Cryptographic Primitives on the GA144 Multi-core Architecture

2013 - Tobias Schneider, Ingo von Maurich, Tim Güneysu

24th International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2013, Washington, DC, USA, June 5-7, 2013 [BibTeX] [DOI] [Paper]

Software Speed Records for Lattice-Based Signatures

2013 - Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Peter Schwabe

Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013 [Software] [BibTeX] [DOI] [Paper]

P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems

2013 - Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Chris­tof Paar

A.-R. Sadeghi (Eds.): Financial Cryptography and Data Security 2013, Volume 7859, pp 205-212, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

High-Performance Cryptanalysis on RIVYERA and COPACOBANA Computing Systems

2013 - Tim Güneysu, Timo Kasper, Martin Novotný, Chris­tof Paar, Lars Wienbrandt, Ralf Zimmermann

"High-Performance Computing Using FPGAs", Vanderbauwhede, Benkrid (Eds.), p. 335-366, February 2013, Springer Verlag, ISBN: 978-1-4614-1790-3 [DOI]

Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II - Facilitating Black-Box Analysis using Software Reverse-Engineering

2013 - Amir Moradi, David Oswald, Chris­tof Paar, Pawel Swierczynski

21st ACM/SIGDA International Symposium on Field-Programmable Gate Arrays- FPGA 2013, pages 91-100, February 11 - 13. ACM, 2013. [DOI] [pdf]

SHA-3 - Portierung auf einer ATmega163 Smartcard

2013 - Pawel Swierczynski, Chris­tof Paar

23. SMARTCARD-WORKSHOP, Tagungsband, Darmstadt, 6/7. Februar 2013.

Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms

2013 - Markus Dürmuth, Tim Güneysu, Markus Kasper, Chris­tof Paar, Tolga Yalcin, Ralf Zimmermann

Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 [DOI] [BibTeX] [pdf] [bib]

A new construction of bent functions based on Z-bent functions

2013 - Sugata Gangopadhyay, Anand Joshi, Gregor Leander, Rajendra Kumar Sharma

Designs, Codes and Cryptography January 2013, Volume 66, Issue 1-3, pp 243-256 [bib]

Achieving anonymity against major face recognition algorithms

2013 - Benedikt Driessen, Markus Dürmuth

Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013. [PDF]

Anonymität und Gesichtserkennung

2013 - Benedikt Driessen, Markus Dürmuth

digma, Zeitschrift für Datenrecht und Informationssicherheit, 2013.

Slender-Set Differential Cryptanalysis

2013 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen

Journal of Cryptology January 2013, Volume 26, Issue 1, pp 11-38 [bib]

IPSecco: A Lightweight and Reconfigurable IPSec Core

2012 - Benedikt Driessen, Tim Güneysu, Elif Bilge Kavun, Oliver Mischke, Chris­tof Paar, Thomas Pöppelmann

2012 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2012, Cancun, Mexico, December 5-7, 2012 [BibTeX] [DOI] [PDF]

Integral and Multidimensional Linear Distinguishers with Correlation Zero

2012 - Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang

Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings [bib]
Page: