Publications
Finding the AES Bits in the Haystack: Reverse Enginering and SCA Using Voltage Contrast
2015 - Christian Kison, Jürgen Frinken, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 [Springer]got HW crypto? On the (in)security of a Self-Encrypting Drive series
2015 - Gunnar Alendal, Christian Kison, modg
Hardware Security Conference and Training, Hardwear.io 2015, The Hague, Netherlands, Oct 1-2, 2015 [pdf]Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
2015 - Amir Moradi, Alexander Wild
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 (best paper candidate). [pdf] [DOI]Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
2015 - Tobias Schneider, Amir Moradi
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]On the Complexity Reduction of Laser Fault Injection Campaigns using OBIC Measurements
2015 - Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schäpers, Nils C. Gerhardt, Martin R. Hofmann , Christof Paar
Fault Diagnosis and Tolerance in Cryptography - FDTC 2015, Saint Malo, France, September 13, 2015. [DOI] [pdf]The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
2015 - Georg T. Becker
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 [PDF]Exploiting the Physical Environment for Securing the Internet of Things
2015 - Christian Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar
New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8–11, 2015 [pdf]Bringing PHY-based Key Generation into the Field: An Evaluation for Practical Scenarios
2015 - Rene Guillaume, Fredrik Winzer, Christian Zenger, Christof Paar, Andreas Czylwik
82nd Vehicular Technology Conference, VTC 2015, Boston, USA, 6-9 September, 2015 [PDF]Affine Equivalence and its Application to Tightening Threshold Implementations
2015 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015 [pdf]Masking Large Keys in Hardware: A Masked Implementation of McEliece
2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
22nd Conference on Selected Areas in Cryptography (SAC 2015), Sackville, New Brunswick, Canada, August 12-14, 2015, to appear. [eprint]