Publications
New First-Order Secure AES Performance Records
2021 - Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 2. [pdf]Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness
2021 - Aein Rezaei Shahmirzadi, Amir Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 1, pp. 305-342. [pdf] [DOI]Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model
2021 - Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert
42nd IEEE Symposium on Security & Privacy (Oakland), San Francisco, USA, May 23-27, 2021. [pdf]Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents
2021 - Christine Utz, Steffen Becker, Theodor Schnitzler, Florian Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth
ACM CHI Conference on Human Factors in Computing Systems 2021 [arXiv Preprint]On the Impact of Aging on Power Analysis Attacks Targeting Power-Equalized Cryptographic Circuits
2021 - Md Toufiq Hasan Anik, Bijan Fadaeinia, Amir Moradi, Naghmeh Karimi
26th Asia and South Pacific Design Automation Conference, ASP-DAC 2021, January 18-21, 2021SILVER - Statistical Independence and Leakage Verification
2020 - David Knichel, Pascal Sasdrich, Amir Moradi
26th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, December 6-10, 2020. [pdf] [GitHub] [DOI]Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging
2020 - Max Hoffmann, Christof Paar
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2021, No. 1, to appear.Clock Glitch versus SIFA
2020 - Aein Rezaei Shahmirzadi, Amir Moradi
33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2020, ESA-ESRIN, Frascati, Italy, October 19-21, 2020. [DOI]ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries
2020 - Max Hoffmann, Falk Schellenberg, Christof Paar
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1058-1073, 2021 [Article] [Code @ Github] [Paper Results] [DOI]SPFA – SFA On Multiple Persistent Faults
2020 - Susanne Engels, Falk Schellenberg, Christof Paar
FTDC '20 (available soon)PRINCEv2 - More Security for (Almost) No Overhead
2020 - Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer
Selected Areas in Cryptography (SAC) 2020. [pdf]DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
2020 - Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, No. 3, pp 309-336, 2020. (presentation at virtual CHES 2020) [PDF] [DOI]Confocal Laser Scanning Holographic Microscopy of buried structures
2020 - Lena Schnitzler, Krisztian Neutsch, Falk Schellenberg, Martin R. Hofmann , Nils C. Gerhardt
Applied Optics, 2021, 60(4), A8-A14. doi: 10.1364/AO.403687Concurrent Error Detection Revisited – Hardware Protection against Fault and Side-Channel Attacks
2020 - Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache, Tim Güneysu
The 15th International Conference on Availability, Reliability and Security (ARES 2020), August 25 - August 28, 2020, University College Dublin, Dublin, Ireland [pdf]The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs
2020 - Maik Ender, Amir Moradi, Christof Paar
29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, August 12-14, 2020. **Distinguished Paper Award** [pdf]An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes
2020 - Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), Conference Paper [PDF]Hardware Penetration Testing Knocks Your SoCs Off
2020 - Mark Fischer, Fabian Langer, Johannes Mono, Clemens Nasenberg, Nils Albartus
IEEE Design & Test [PDF] [DOI]Impeccable Circuits II
2020 - Aein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi
57th Annual Design Automation Conference 2020, DAC 2020, San Francisco, CA, USA, July 19-23, 2020. [pdf] [DOI]Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
2020 - Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp
Proceedings on Privacy Enhancing Technologies, PETS 2020 [pdf]P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
2020 - Valerie Fetzer, Max Hoffmann, Matthias Nagel, Andy Rupp, Rebecca Schwerdt
Proceedings on Privacy Enhancing Technologies, PETS 2020 [pdf]Unrolled Cryptography on Silicon - A Physical Security Analysis
2020 - Thorben Moos
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, No. 4, pp. 416–442. [pdf] [doi]Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption
2020 - Bastian Richter, Amir Moradi
IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020, Limassol, CYPRUS, July 6-8, 2020. [pdf] [doi]Akzeptanz von Corona-Apps in Deutschland vor der Einführung der Corona-Warn-App
2020 - Steffen Becker, Martin Degeling, Markus Dürmuth, Florian Farke, Leonie Schaewitz, Theodor Schnitzler, Christine Utz
Vorabveröffentlichung (Preprint), Juni 2020 [PDF (Deutsch)]The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs
2020 - David Knichel, Thorben Moos, Amir Moradi
25th IEEE European Test Symposium, Tallin, Estonia, May 25-29, 2020 [pdf] [doi]Electromagnetic Enclosure PUF for Tamper Proofing Commodity Hardware and other Applications
2020 - Johannes Tobisch, Christian Zenger, Christof Paar
TRUDEVICE 2020: 9th Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, Grenoble, France, March 13, 2020 [pdf]On the Precise Phase Recovery for Physical-Layer Authentication in Dynamic Channels
2020 - Hendrik Vogt, Chu Li, Aydin Sezgin, Christian Zenger
2019 IEEE International Workshop on Information Forensics and Security (WIFS), 9-12 Dec. 2019, Delft, Netherlands [pdf]Template attacks on nano-scale CMOS devices
2020 - Bastian Richter, Amir Moradi
Journal of Cryptographic Engineering, Volume 10, pages 275–285, 2020. [DOI] [pdf]Cryptographic Fault Diagnosis using VerFI
2020 - Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, USA, May 4-7, 2020. [pdf] [GitHub (ver 1)] [GitHub (ver 2 Beta)] [DOI]Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations
2020 - Samaneh Ghandali, Thorben Moos, Amir Moradi, Christof Paar
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Volume 28, Issue 6, 2020. [pdf] [doi]TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions
2020 - Anita Aghaie, Amir Moradi
IEEE Transactions on Information Forensics and Security, Volume 15, Pages 3470 - 3481, 2020. [pdf] [doi]3-Phase Adiabatic Logic and its Sound SCA Evaluation
2020 - Bijan Fadaeinia, Amir Moradi
IEEE Transactions on Emerging Topics in Computing, 2020. [DOI]Spin Me Right Round Rotational Symmetry for FPGA-Specific AES: Extended Version
2020 - Felix Wegener, Lauren De Meyer, Amir Moradi
Journal of Cryptology volume 33, pages 1114–1155, 2020. [DOI]Remote Electrical-level Security Threats to Multi-Tenant FPGAs
2020 - Dennis R.E. Gnad, Falk Schellenberg, Jonas Krautter, Amir Moradi, Mehdi B. Tahoori
IEEE Design & Test, Volume 37, Issue 2, April 2020. [DOI]Low-Latency Hardware Masking with Application to AES
2020 - Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2020, Issue 2 [pdf]Graph Similarity and Its Applications to Hardware Security
2019 - Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
IEEE Transactions on Computers [DOI] [pdf]A Comparison of χ²-Test and Mutual Information as Distinguisher for Side-Channel Analysis
2019 - Bastian Richter, David Knichel, Amir Moradi
18th Smart Card Research and Advanced Application Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019. [pdf]Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited
2019 - Max Hoffmann, Michael Klooß, Andy Rupp
ACM Conference on Computer and Communications Security, CCS 2019 [pdf]Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
2019 - Jonas Krautter, Dennis Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. [pdf]Automated Probe Repositioning for On-Die EM Measurements
2019 - Bastian Richter, Alexander Wild, Amir Moradi
International Conference On Computer Aided Design, ICCAD 2019, Westminster, Colorado, USA, November 4-7, 2019. [pdf]Impeccable Circuits
2019 - Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider
IEEE Transactions on Computers, 2019. [DOI] [pdf] [HDL code]Static Power Side-Channel Analysis - An Investigation of Measurement Factors
2019 - Thorben Moos, Amir Moradi, Bastian Richter
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019. [DOI] [pdf]Efficient Microcontroller Implementation of BIKE
2019 - Mario Bischof, Tobias Oder, Tim Güneysu
Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, to appear. [portable code] [embedded code] [pdf]Promoting the Acquisition of Hardware Reverse Engineering Skills
2019 - Wiesen, Carina, Steffen Becker, Nils Albartus, Christof Paar, Rummel, Nikol
2019 IEEE Frontiers in Education Conference (FIE), Cincinnati, OH, USA. 2019. [PDF]Wie arbeiten Reverse Engineers?
2019 - Steffen Becker, Wiesen, Carina, Rummel, Nikol, Christof Paar
Datenschutz und Datensichicherheit (2019) 43: 686. [DOI] [PDF]Exploring the Effect of Device Aging on Static Power Analysis Attacks
2019 - Naghmeh Karimi, Thorben Moos, Amir Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 3, pp 233-256, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) [pdf] [doi]Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed
2019 - Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 2, pp 256-292, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) **best paper award** [pdf] [doi]Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments
2019 - Thorben Moos
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 3, pp 202-232, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) [pdf] [doi]Highway to HAL
2019 - Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar
CF'19 Proceedings of the 16th ACM International Conference on Computing Frontiers Pages 392-397 [DOI] [pdf]Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
2019 - Felix Wegener, Christian Baiker, Amir Moradi
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, Darmstadt, Germany, April 3-5, 2019. [pdf] [doi]CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
2019 - Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
IACR Transactions on Symmetric Cryptology, Vol. 2019, No. 1, pp 5-45, 2019. (presentation at FSE 2019, Paris, France, March 25–28, 2019) [pdf] [doi] [website]Towards Cognitive Obfuscation - Impeding Hardware Reverse Engineering Based on Psychological Insights
2019 - Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar
ASPDAC '19 Proceedings of the 24th Asia and South Pacific Design Automation Conference Pages 104-111 (presentation at ASPDAC 2019, Tokyo, Japan, January 21–24, 2019) [PDF] [DOI]Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream
2019 - Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Knopp, Christof Paar
In Proceedings of the 24th Asia and South Pacific Design Automation Conference (ASPDAC '19). ACM, New York, NY, USA, 112-119. [DOI] [pdf]Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
2019 - Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
22nd edition of the International Conference on Practice and Theory of Public Key Cryptography, April 14-17, 2019, Beijing, China, to appear [pdf]Towards Practical Microcontroller Implementation of the Signature Scheme Falcon
2019 - Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu
The Tenth International Conference on Post-Quantum Cryptography, Chongqing University, Chongqing, May 8-10, 2019, to appear [pdf]Enclosure-PUF: Tamper Proofing Commodity Hardware and other Applications
2018 - Christian Zenger, Christof Paar, Lars Steinschulte, Johannes Tobisch, David Holin
35. Chaos Communication Congress (35c3), Leipzig, Germany, 2018. [Conference page] [Video]Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights
2018 - Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar
2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Wollongong, NSW, 2018, pp. 438-445. (presented in December 2018 in Wollongong, NSW, Australia) [PDF] [DOI]Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(2^8) Multiplication
2018 - Felix Wegener, Amir Moradi
17th Smart Card Research and Advanced Application Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018. [pdf]Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
2018 - Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori
International Conference On Computer Aided Design, ICCAD 2018, San Diego, CA, USA, November 5-8, 2018. [pdf]Evaluation of Lattice-Based Signature Schemes in Embedded Systems
2018 - Tim Güneysu, Markus Krausz, Tobias Oder, Julian Speith
25th IEEE International Conference on Electronics Circuits and Systems, Bordeaux, France, 9-12 December 2018 [pdf]An Exploratory Analysis of Microcode as a Building Block for System Defenses
2018 - Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
ACM Conference on Computer and Communications Security (CCS), Toronto, October 2018 [GitHub] [PDF]Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection
2018 - Pascal Sasdrich, Tim Güneysu
Journal of Hardware and Systems Security, December 2018, Volume 2, Issue 4, pp 297–313 [pdf]Hardware Masking, Revisited
2018 - Thomas De Cnudde, Maik Ender, Amir Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 2, pp 123-148, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI]Leakage Detection with the χ²-Test
2018 - Amir Moradi, Bastian Richter, Tobias Schneider, François-Xavier Standaert
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 1, pp 209-237, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI]Spin Me Right Round - Rotational Symmetry for FPGA-Specific AES
2018 - Lauren De Meyer, Amir Moradi, Felix Wegener
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 3, pp 596-626, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI] [VHDL]Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
2018 - Max Hoffmann, Christof Paar
IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925,Vol. 2018, No. 2, pp. 277–297 [pdf] [DOI]Commercial Vehicles vs. Automotive Cybersecurity: Commonalities and Differences
2018 - André Weimerskirch, Steffen Becker, Bill Hass
Commercial Vehicles vs. Automotive Cybersecurity: Commonalities and Differences. Gloria D'Anna (Ed.), Cybersecurity for Commercial Vehicles (pp. 47-64). Warrendale, PA: SAE International. [Website] [website]On the Difficulty of FSM-based Hardware Obfuscation
2018 - Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Russell Tessier, Christof Paar
IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 3, pp 293-330, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [PDF] [DOI]A Lattice-based AKE on ARM Cortex-M4
2018 - Julian Speith, Tobias Oder, Tim Güneysu
BalkanCryptSec 2018, Iasi, Romania, September 20-21, 2018. [Source Code] [pdf]Standard Lattice-Based Key Encapsulation on Embedded Devices
2018 - James Howe, Tobias Oder, Markus Krausz, Tim Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 3 [pdf]Physical Protection of Lattice-Based Cryptography: Challenges and Solutions
2018 - Ayesha Khalid, Tobias Oder, Felipe Valencia, Máire O'Neill, Tim Güneysu, Francesco Regazzoni
ACM Great Lakes Symposium on VLSI 2018: 365-370SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing
2018 - Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Christof Paar, Daniel Holcomb
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, McLean, VA, USA, April 30 - May 4, 2018 (short paper, best poster award). [arXiv]Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking
2018 - Pascal Sasdrich, Michael Hutter
9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018.Threshold Implementation in Software - Case Study of PRESENT
2018 - Pascal Sasdrich, Rene Bock, Amir Moradi
9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. [pdf]A First-Order SCA Resistant AES without Fresh Randomness
2018 - Felix Wegener, Amir Moradi
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. [pdf]An Inside Job: Remote Power Analysis Attacks on FPGAs
2018 - Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori
Design, Automation & Test in Europe Conference & Exhibition, DATE 2018, Dresden, Germany, March 18 - 23 , 2018 (best paper candidate). [pdf]HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
2018 - Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Mathias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
IEEE Transactions on Dependable and Secure Computing (to appear)Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors
2018 - Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Christof Paar
IEEE Transactions on Computers, Volume 67, Issue 3, pp. 307-321, 2018. [DOI]IoT-Security and Product Piracy: Smart Key Management versus Secure Hardware
2018 - Christian Zenger, Mario Pietersz
embedded world 2018, Nuremberg, Germany, February 27th - March 1st, 2018Optical metrology for the investigation of buried technical structures
2018 - Lena Göring, Markus Finkeldey, Falk Schellenberg, Carsten Brenner, Martin R. Hofmann , Nils C. Gerhardt
tm-Technisches Messen, 2018, 85(2), 104-110.Practical CCA2-Secure and Masked Ring-LWE Implementation
2018 - Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 1 [pdf]Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs
2018 - Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar
IEEE Transactions on Computers, vol. 67, no. 3, pp. 348-360, 2018. [pdf] [DOI]GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs
2018 - Alexander Wild, Amir Moradi, Tim Güneysu
IEEE Transactions on Computers, vol. 67, no. 3, pp. 375-387, 2018. [DOI]The First Thorough Side-Channel Hardware Trojan
2017 - Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, Hong Kong, China, December 3 - 7, 2017. [pdf] [DOI] [slides]BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
2017 - Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp
ACM CCS 2017 on Oct. 30–Nov. 3, 2017, Dallas, TX, USA [pdf]Implementing a Real-Time Capable WPLS Testbed for Independent Performance and Security Analyses
2017 - Christian Zenger, Mario Pietersz, Jeremy Brauer, Falk-Peter Dreßler, Daniel Theis, Christof Paar
Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, October 29th - November 1st, 2017New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth–Sahai Proofs
2017 - Gottfried Herold, Max Hoffmann, Michael Klooß, Carla Ràfols, Andy Rupp
ACM CCS 2017 on Oct. 30–Nov. 3, 2017, Dallas, TX, USA [pdf]Differential Cryptanalysis of 18-Round PRIDE
2017 - Virginie Lallemand, Shahram Rasoolzadeh
International Conference on Cryptology in India (Indocrypt 2017), Chennai, December 10-13, 2017. [pdf] [DOI]Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
2017 - Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2017, Taipei, Taiwan, September 25 – 28, 2017. [pdf] [DOI] [slides]Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs
2017 - Tobias Oder, Tim Güneysu
Latincrypt 2017, La Habana, Cuba, September 20-22, 2017 [VHDL] [pdf]IoT-Schlüsselmanagement
2017 - Heiko Koepke, Thorben Lenze, Mario Pietersz, Christian Zenger
Datenschutz und Datensicherheit 10/2017, vol. 41, pp. 617-622, Springer Gabler [DOI]Reverse Engineering x86 Processor Microcode
2017 - Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz
USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]A look at the dark side of hardware reverse engineering - a case study
2017 - Sebastian Wallat, Marc Fyrbiak, Moritz Schlögel, Christof Paar
IEEE 2nd International Verification and Security Workshop, IVSW 2017, Thessaloniki, Greece, July 3-5, 2017. [DOI] [pdf]Hardware reverse engineering: Overview and open challenges
2017 - Marc Fyrbiak, Sebastian Strauß, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, Christof Paar
IEEE 2nd International Verification and Security Workshop, IVSW 2017, Thessaloniki, Greece, July 3-5, 2017. [DOI] [PDF]High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers
2017 - Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
ACM Transactions on Embedded Computing Systems (TECS) TECS Volume 16 Issue 4, July 2017 Article No. 117, ACM New York, NY, USA. [ACM] [pdf]Cryptography for Next Generation TLS: Implementing the RFC 7748 Elliptic Curve448 Cryptosystem in Hardware
2017 - Pascal Sasdrich, Tim Güneysu
54. Design Automation Conference, DAC 2017, Austin, TX, USA, June 18-22 2017. [DOI] [pdf]Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
2017 - Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens
IACR Transactions on Symmetric Cryptology - Issue 2-2017 [pdf] [DOI]On the Easiness of Turning Higher-Order Leakages into First-Order
2017 - Thorben Moos, Amir Moradi
8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, Paris, France, April 13-14, 2017. [pdf] [DOI]SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
2017 - Maik Ender, Alexander Wild, Amir Moradi
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, Paris, France, April 13-14, 2017. [pdf] [DOI]Hardware Obfuscation: Techniques and Open Challenges
2017 - Georg T. Becker, Marc Fyrbiak, Christian Kison
Foundations of Hardware IP Protection, Springer International Publishing, 105—123, 2017 [pdf]SPARX - A Side-Channel Protected Processor for ARX-based Cryptography
2017 - Florian Bache, Tobias Schneider, Amir Moradi, Tim Güneysu
Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27 - 31 , 2017. [DOI] [pdf]Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip
2017 - Thorben Moos, Amir Moradi, Bastian Richter
Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27 - 31 , 2017 (best paper candidate). [pdf] [DOI] [Amplifier Design]Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things
2017 - Tim Güneysu, Tobias Oder
18th International Symposium on Quality Electronic Design, ISQED 2017, Santa Clara, CA, USA, 14-15 March 2017 [IEEE] [PDF]Backside imaging of a microcontroller with common-path digital holography
2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Nils C. Gerhardt, Martin R. Hofmann
Proc. SPIE. 10127, Practical Holography XXXI: Materials and Applications, 1012704. (February 15, 2017) doi: 10.1117/12.2250903Backside imaging of a microcontroller with common-path digital holography
2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Nils C. Gerhardt, Martin R. Hofmann
10127-3, SPIE Photonics West, San Francisco, California, USA (2017)Multimodal backside imaging of a microcontroller using confocal laser scanning and optical-beam-induced current imaging
2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Carsten Brenner, Nils C. Gerhardt, Martin R. Hofmann
Proc. SPIE. 10110, Photonic Instrumentation Engineering IV, 101101F. (February 20, 2017) doi: 10.1117/12.2250912Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware
2017 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
RSA Conference Cryptographers’ Track, CT-RSA 2017, San Francisco, February 14-17 2017. [pdf] [DOI]Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques
2017 - Vijayakumar, Arunkumar, Patil, Vinay C., Holcomb, Daniel E., Christof Paar, Kundu, Sandip
IEEE Transactions on Information Forensics and Security, volume: 12, Issue: 1, Pages: 64 - 77, Jan. 2017. [DOI] [PDF]Lattice-Based Cryptography: from Reconfigurable Hardware to ASIC
2016 - Tobias Oder, Tim Güneysu, Felipe Valencia, Ayesha Khalid, Maire O’Neill, Francesco Regazzoni
The 15th International Symposium on Integrated Circuits, ISIC 2016, Singapore, 12 – 14 Dec 2016 [PDF]Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
2016 - Amir Moradi, Tobias Schneider
International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, Hanoi, Vietnam, December 4 - 8, 2016. [pdf] [DOI]The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions
2016 - Christian Zenger, Hendrik Vogt, Jan Zimmer, Aydin Sezgin, Christof Paar
IEEE GLOBECOM 2016 Workshops, Washington D.C., USA, December 4-8 2016. [arXiv] [pdf]Relay-Verhinderung und Schlüssel-Diversifizierung mittels Wireless Physical-Layer Security
2016 - Christian Zenger, Mario Pietersz, Christof Paar
Innosecure 2017, Nuremberg, Germany, November 30th - December 1st 2016Moments-Correlating DPA
2016 - Amir Moradi, François-Xavier Standaert
Theory of Implementation Security (TIs) Workshop (of ACM CCS 2016), Vienna, Austria, October 24, 2016. [pdf] [DOI]Side-Channel Attacks on Fingerprint Matching Algorithms
2016 - Markus Dürmuth, David Oswald, Niklas Pastewka
To appear at the 6th International Workshop on Trustworthy Embedded Devices (TrustED 2016) [PDF]A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
2016 - Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, Christof Paar
Cryptographic Hardware and Embedded Systems, CHES 2016, Santa Barbara, CA, August 17 - 19, 2016 [PDF]Strong 8-bit Sboxes with Efficient Masking in Hardware
2016 - Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2016, Santa Barbara, California, USA, August 17 - 19, 2016. [pdf] [DOI]DROWN: Breaking TLS using SSLv2
2016 - Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt
USENIX Security 2016 [Website and paper] [Pwnie Awards] [Facebook Prize]ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
2016 - Tobias Schneider, Amir Moradi, Tim Güneysu
International Cryptology Conference - CRYPTO 2016, Santa Barbara, California, USA, August 14 - 18, 2016. [pdf] [DOI]The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
2016 - Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
International Cryptology Conference - CRYPTO 2016, Santa Barbara, California, USA, August 14 - 18, 2016. [pdf] [DOI] [Skinny website]Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms
2016 - Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu
23nd International Conference on Selected Areas in Cryptography, SAC 2016, St. John's, NL, Canada, August 10–12, 2016. [pdf] [DOI]Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet
2016 - Christian Zenger, Jan Zimmer, Mario Pietersz, Benedikt Driessen, Christof Paar
In Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2016, Darmstadt, Germany, July 18-22, 2016. (Cooperation with PHYSEC GmbH (DE)) [pdf]A Grain in the Silicon: SCA-Protected AES in Less than 30 Slices
2016 - Pascal Sasdrich, Tim Güneysu
27th Annual IEEE International Conference on Application-specific Systems, Architectures and Processors, ASAP 2016, London, United Kingdom, July 6-8 2016, to appear [DOI] [pdf]Authenticated Key Establishment for Low-Resource Devices Exploiting Correlated Random Channels
2016 - Christian Zenger, Mario Pietersz, Jan Zimmer, Jan-Felix Posielek, Thorben Lenze, Christof Paar
[pdf]High-Performance and Lightweight Lattice-Based Public-Key Encryption
2016 - Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann
2nd International Workshop on IoT Privacy, Trust, and Security 2016, IoTPTS 2016, Xi'an, China, May 30, 2016. [DOI] [Code] [Paper]Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
2016 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
Journal of Cryptographic Engineering, Springer, June 2016. [DOI] [pdf]Large Laser Spots and Fault Sensitivity Analysis
2016 - Falk Schellenberg, Markus Finkeldey, Nils C. Gerhardt, Martin R. Hofmann , Amir Moradi, Christof Paar
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016 (best student-paper award). [DOI] [pdf]Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
2016 - Amir Moradi, Tobias Schneider
7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, Gray, Austria, April 14-15, 2016 [pdf] [DOI]Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
2016 - Tobias Schneider, Amir Moradi, Tim Güneysu
7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, Gray, Austria, April 14-15, 2016 [pdf] [DOI]Preventing Relay Attacks and Providing Perfect Forward Secrecy using PHYSEC on 8-bit µC
2016 - Christian Zenger, Mario Pietersz, Christof Paar
In IEEE International Conference on Communication, ICC 2016, Kuala Lumpur, Malaysia, 23-27 May 2016, Workshop Proceedings, pages 110–115. IEEE, 2016. [Conference Homepage] [PDF]Common-path depth-filtered digital holography for high resolution imaging of buried semiconductor structures
2016 - Markus Finkeldey, Falk Schellenberg, Nils C. Gerhardt, Christof Paar, Martin R. Hofmann
9771-16, SPIE Photonics West, San Francisco, California, USA (2016)White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
2016 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
23rd International Conference on Fast Software Encryption, FSE 2016, Bochum, Germany, March 20-23 2016 [pdf]On the Problems of Realizing Reliable and Efficient Ring Oscillator PUFs on FPGAs
2016 - Alexander Wild, Georg T. Becker, Tim Güneysu
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016 [PDF]Common-path depth-filtered digital holography for high resolution imaging of buried semiconductor structures
2016 - Markus Finkeldey, Falk Schellenberg, Nils C. Gerhardt, Christof Paar, Martin R. Hofmann
Proc. SPIE 9771, Practical Holography XXX: Materials and Applications, 97710G (7 March 2016); doi: 10.1117/12.2212454 [DOI]Leakage Assessment Methodology - Extended Version
2016 - Tobias Schneider, Amir Moradi
Journal of Cryptographic Engineering June 2016, Volume 6, Issue 2, pp 85–99 [DOI]Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem
2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
IEEE Transactions on Information Forensics and Security, vol.PP, no.99, pp.1-1 DOI: 10.1109/TIFS.2015.2509944 [IEEEXplore] [pdf]Finding the AES Bits in the Haystack: Reverse Enginering and SCA Using Voltage Contrast
2015 - Christian Kison, Jürgen Frinken, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 [Springer]Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography
2015 - Pascal Sasdrich, Tim Güneysu
ACM Transactions on Reconfigurable Technology and Systems (TRETS) - Special Section on the 2014 International Symposium on Applied Reconfigurable Computing, Volume 9, Issue 1, November 2015, Article No. 3, ACM New York, NY, USA [Bibtex] [DOI] [pdf]got HW crypto? On the (in)security of a Self-Encrypting Drive series
2015 - Gunnar Alendal, Christian Kison, modg
Hardware Security Conference and Training, Hardwear.io 2015, The Hague, Netherlands, Oct 1-2, 2015 [pdf]Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
2015 - Amir Moradi, Alexander Wild
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 (best paper candidate). [pdf] [DOI]Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
2015 - Tobias Schneider, Amir Moradi
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]On the Complexity Reduction of Laser Fault Injection Campaigns using OBIC Measurements
2015 - Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schäpers, Nils C. Gerhardt, Martin R. Hofmann , Christof Paar
Fault Diagnosis and Tolerance in Cryptography - FDTC 2015, Saint Malo, France, September 13, 2015. [DOI] [pdf]The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
2015 - Georg T. Becker
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 [PDF]Exploiting the Physical Environment for Securing the Internet of Things
2015 - Christian Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar
New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8–11, 2015 [pdf]Bringing PHY-based Key Generation into the Field: An Evaluation for Practical Scenarios
2015 - Rene Guillaume, Fredrik Winzer, Christian Zenger, Christof Paar, Andreas Czylwik
82nd Vehicular Technology Conference, VTC 2015, Boston, USA, 6-9 September, 2015 [PDF]MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography
2015 - Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann
Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings [DOI]Affine Equivalence and its Application to Tightening Threshold Implementations
2015 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015 [pdf]Masking Large Keys in Hardware: A Masked Implementation of McEliece
2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
22nd Conference on Selected Areas in Cryptography (SAC 2015), Sackville, New Brunswick, Canada, August 12-14, 2015, to appear. [eprint]Security Analysis of Quantization Schemes for Channel-based Key Extraction
2015 - Christian Zenger, Jan Zimmer, Christof Paar
EAI Endorsed Transactions on Security and Safety, vol. 15, no. 6 [DOI] [PDF]On-line Entropy Estimation for Secure Information Reconciliation
2015 - Christian Zenger, Jan Zimmer, Jan-Felix Posielek, Christof Paar
Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]Security Analysis of Quantization Schemes for Channel-based Key Extraction
2015 - Christian Zenger, Jan Zimmer, Christof Paar
Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]Development of a Layout-Level Hardware Obfuscation Tool
2015 - Shweta Malik, Georg T. Becker, Christof Paar, Wayne P. Burleson
IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015 (Invited Paper), Montpellier, France, July 2015 [PDF]On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation
2015 - Johannes Tobisch, Georg T. Becker
11th Workshop on RFID Security (RFIDSec 2015), New York, USA, June 23-24, 2015 [pdf]Security Evaluation and Enhancement of Bistable Ring PUFs
2015 - Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson
Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers & Lecture Notes in Computer Science, vol. 9440, page 3-16, Springer, 2015 [DOI] [ePrint]Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
2015 - Tobias Schneider, Amir Moradi, Tim Güneysu
International Conference on Applied Cryptography and Network Security - ACNS 2015, New York, USA, 2–5 June 2015. [pdf] [DOI]Differential Power Analysis of a McEliece Cryptosystem
2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
13th International Conference on Applied Cryptography and Network Security (ACNS), New York, USA, 2–5 June 2015. [Springer] [pdf]High-Performance Ideal Lattice-Based Cryptography on ATxmega 8-bit Microcontrollers
2015 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu
Latincrypt 2015, Bienvenido, Guadalajara, Mexico, August 23-26, 2015 [Preprint] [Source Code]Virtual Proofs of Reality and their Physical Implementation
2015 - Ulrich Rührmair, J.L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson
2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 [DOI]Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
2015 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [pdf]Efficient E-cash with Attributes on MULTOS Smartcards
2015 - Gesine Hinterwälder, Felix Riek, Christof Paar
11th Workshop on RFID Security - RFIDsec 2015 (to appear) [pdf]On the Pitfalls of using Arbiter-PUFs as Building Blocks
2015 - Georg T. Becker
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, TCAD, 34 (8):1-13, August 2015 [DOI] [pdf]Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
2015 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
CT-RSA 2015, San Francisco, CA, USA, April 20-24, 2015. [eprint report]A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation
2015 - Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 34, No.8, pages 1308-1319, 2015. [pdf] [DOI]High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
2015 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe
Designs, Codes and Cryptography comprising the “Special Issue on Cryptography, Codes, Designs and Finite Fields: In Memory of Scott A. Vanstone”, Springer-Verlag. [link] [MSP430 SW for IAR]Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
2015 - Alexander Wild, Amir Moradi, Tim Güneysu
6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015. [pdf] [DOI]Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives
2015 - Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu
6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015 [pdf]Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
2015 - Amir Moradi, Gesine Hinterwälder
6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015 (best paper award). [pdf] [DOI]Protecting against Cryptographic Trojans in FPGAs
2015 - Pawel Swierczynski, Marc Fyrbiak, Christof Paar, Christophe Huriaux, Russell Tessier
In the Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, Vancouver, British Columbia, May 2015. [pdf]SCANDALee: A Side-ChANnel-based DisAssembLer using Local Electromagnetic Emanations
2015 - Daehyun Strobel, Florian Bache, David Oswald, Falk Schellenberg, Christof Paar
Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9 - 13 , 2015. [pdf]Side-Channel Attacks from Static Power: When Should we Care?
2015 - Santos Merino Del Pozo, François-Xavier Standaert, Dina Kamel, Amir Moradi
Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9 - 13 , 2015. [pdf] [DOI]Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation
2015 - Georg T. Becker, Alexander Wild, Tim Güneysu
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [beckerPufIBS]Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport
2015 - Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Christof Paar
ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 3, March 2015, Article No. 10 [link]FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]Implementing QC-MDPC McEliece Encryption
2015 - Ingo von Maurich, Tobias Oder, Tim Güneysu
ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on Embedded Platforms for Crypto and Regular Papers TECS, Volume 14 Issue 3, May 2015, Article No. 44, ACM New York, NY, USA. [PDF]Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
2014 - Amir Moradi
15th International Conference on Cryptology in India, Indocrypt 2014, New Delhi, December 14 - 17, 2014. [DOI] [pdf]A Hardware-Assisted Proof-of-Concept for Secure VoIP Clients on Untrusted Operating Systems
2014 - Maik Ender, Düppmann, Gerd, Alexander Wild, Thomas Pöppelmann, Tim Güneysu
2014 International Conference on Reconfigurable Computing and FPGAs (ReConFig 2014), Cancun, Mexico, December 8-10, 2014 [Paper]High-Speed Implementation of bcrypt Password Search using Special-Purpose Hardware
2014 - Ralf Zimmermann
ReConFig 2014, Cancun, Mexico, December 8th-10th 2014 [pdf]Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs
2014 - Pawel Swierczynski, Amir Moradi, David Oswald, Christof Paar
ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 7 Issue 4, December 2014. [DOI] [pdf]Remote IP Protection using Timing Channels
2014 - Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar
The 17th Annual International Conference on Information Security and Cryptology -- ICISC 2014, December 3 ~ 5, 2014, Seoul, Korea, to appear [pdf]Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms
2014 - Christian Zenger, Abhijit Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten, Christof Paar
1st International Conference on Cryptography and Information Security (BalkanCryptSec), 2014 [pdf]Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware
2014 - Stefan Heyse, Ralf Zimmermann, Christof Paar
Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 [DOI] [BibTeX] [pdf] [bib]Full-Size High-Security ECC Implementation on MSP430 Microcontrollers
2014 - Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar
Third International Conference on Cryptology and Information Security in Latin America, Latincrypt 2014, Florianópolis, Brazil, September 17 - 19, 2014. [DOI] [pdf] [code]Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
2014 - Amir Moradi, Vincent Immler
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]Side-Channel Leakage through Static Power – Should We Care about in Practice?
2014 - Amir Moradi
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]POSTER: Implementation and Evaluation of Channel-based Key Establishment Systems
2014 - Christian Zenger, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [pdf]Enabling SRAM-PUFs on Xilinx FPGAs
2014 - Alexander Wild, Tim Güneysu
24th International Conference on Field Programmable Logic and Applications Munich, Germany; September 2 - 4, 2014 [BibTeX] [DOI] [Paper]THOR - The hardware onion router
2014 - Tim Güneysu, Francesco Regazzoni, Pascal Sasdrich, Marcin Wójcik
24th International Conference on Field Programmable Logic and Applications Munich, Germany; September 2 - 4, 2014 [BibTex] [DOI]A Novel Key Generating Architecture for Wireless Low-Resource Devices
2014 - Christian Zenger, Jan-Felix Posielek, Gerhard Wunder, Christof Paar
ESORICS International Workshop on Secure Internet of Things 2014 (ESORICS-SIoT 2014), 16 pages [pdf]Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation
2014 - René Guillaume, Andreas Mueller , Christian Zenger, Christof Paar, Andreas Czylwik
18th International OFDM Workshop 2014, Essen, Germany [pdf]High-speed signatures from standard lattices
2014 - Özgür Dagdelen, Rachid El Bansarkhani, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Ana Helena Sánchez, Peter Schwabe
to appear in Latincrypt 2014 [PDF]Fault Sensitivity Analysis Meets Zero-Value Attack
2014 - Oliver Mischke, Amir Moradi, Tim Güneysu
Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2013. [PDF]Block Ciphers – Focus On The Linear Layer (feat. PRIDE)
2014 - Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalcin
In Proceedings of the 34th International Cryptology Conference 2014 (CRYPTO’14), volume 8616 of Lecture Notes in Computer Science, pages 57-76. Springer, Santa Barbara, CA, US, August 17-21, 2014 [DOI]Microcontrollers as (In)Security Devices for Pervasive Computing Applications
2014 - Daehyun Strobel, David Oswald, Bastian Richter, Falk Schellenberg, Christof Paar
Proceedings of the IEEE, vol. 102, no. 8, pp. 1157-1173, 2014 [PDF (Open Access)] [bib]Differential Power Analysis of a McEliece Cryptosystem
2014 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
Cryptology ePrint Archive, Report 2014/534. [pdf]Sweet Dreams and Nightmares: Security in the Internet of Things
2014 - Timo Kasper, David Oswald, Christof Paar
Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. [pdf]Proof-of-Concept: Using Homomorphic Cryptography to Provide for Privacy in Modern Vehicular Environments
2014 - Susanne Wetzel, Bernhard Borsch, Christof Paar, Thomas Pöppelmann
escar Embedded Security in Cars Conference, June 18-19, 2014, Detroid Metropolitan, Michigan, USA, extended abstract [Website]Detecting Hidden Leakages
2014 - Amir Moradi, Sylvain Guilley, Annelie Heuser
International Conference on Applied Cryptography and Network Security - ACNS 2014, Lausanne, Switzerland, June 10 - 13, 2014 (best-[student]-paper award). [DOI] [pdf]Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices
2014 - Tobias Oder, Thomas Pöppelmann, Tim Güneysu
The 51st Annual Design Automation Conference 2014, DAC '14, San Francisco, CA, USA, June 1-5, 2014 [Paper] [BibTeX] [DOI] [Code]Efficient Elliptic-Curve Cryptography using Curve25519 on Reconfigurable Devices
2014 - Pascal Sasdrich, Tim Güneysu
Reconfigurable Computing: Architectures, Tools, and Applications - 10th International Symposium, ARC 2014, Vilamoura, Portugal, April 14-16, 2014 [BibTeX] [DOI] [pdf]Stealthy dopant-level hardware Trojans: extended version
2014 - Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
Journal of Cryptographic Engineering 4.1 (2014): 19-31 [DOI] [PDF] [BIB]Large-Scale High-Resolution Computational Validation of Novel Complexity Models in Linear Cryptanalysis
2014 - Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalcin
In Journal of Computational and Applied Mathematics, volume 259, part B, pages 592-598, Elsevier, March 15, 2014 [DOI]Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis
2014 - Tobias Schneider, Ingo von Maurich, Tim Güneysu, David Oswald
Journal of Signal Processing Systems, Springer, 2014. [DOI] [BibTeX]Statistics on Password Re-use and Adaptive Strength for Financial Accounts
2014 - Daniel V. Bailey, Markus Dürmuth, Christof Paar
Proceedings 9th International Conference on Security and Cryptography (SCN), 2014. [PDF]Typing passwords with voice recognition --or-- How to authenticate to Google Glass
2014 - Daniel Bailey, Markus Dürmuth, Christof Paar
Adventures in Authentication: WAY Workshop. 2014. [PDF]A Reconfigurable Architecture For Searching Optimal Software Code To Implement Block Cipher Permutation Matrices
2013 - Elif Bilge Kavun, Gregor Leander, Tolga Yalcin
In International Conference on ReConFigurable Computing and FPGAs 2013 (ReConFig'13), IEEE Computer Society, Cancun, Mexico, Dec. 9-11, 2013 [DOI]A Performance Boost for Hash-based Signatures
2013 - Thomas Eisenbarth, Ingo von Maurich, Christof Paar, Xin Ye
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday [BibTeX] [DOI] [Paper]Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure
2013 - Amir Moradi, Oliver Mischke
International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20 - 22, 2013. [DOI] [BibTeX] [pdf]An Experimental Security Analysis of Two Satphone Standards
2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]Keccak und der SHA-2
2013 - Pawel Swierczynski, Gregor Leander, Christof Paar
DuD - Datenschutz und Datensicherheit Ausgabe 11/2013 [bib]Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
2013 - David Oswald, Bastian Richter, Christof Paar
RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. [bibtex] [pdf]SPONGENT: The Design Space of Lightweight Cryptographic Hashing
2013 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
IEEE Trans. Computers vol. 62, number 10, 2013 [bib]Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
2013 - Daehyun Strobel, Benedikt Driessen, Gregor Leander, Timo Kasper, David Oswald, Falk Schellenberg, Christof Paar
Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013 [bibtex]One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
2013 - Amir Moradi, Oliver Mischke, Christof Paar
IEEE Transactions on Computers, vol. 62, no. 9, pp. 1786-1798, Sept. 2013. [DOI] [BibTeX] [pdf]Stealthy Dopant-Level Hardware Trojans
2013 - Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013 Extended version in Journal of Cryptographic Engineering, Springer, 2014 [pdf] [bib]On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme
2013 - Amir Moradi, Oliver Mischke
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013. [DOI] [BibTeX] [pdf]Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
2013 - Stefan Heyse, Ingo von Maurich, Tim Güneysu
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013 [BibTeX] [DOI] [Paper]Bounds in Shallows and in Miseries
2013 - Céline Blondeau, Andrey Bogdanov, Gregor Leander
Advances in Cryptology – CRYPTO 2013 Lecture Notes in Computer Science Volume 8042, 2013, pp 204-221 [bib]Faster Hash-based Signatures with Bounded Leakage
2013 - Thomas Eisenbarth, Ingo von Maurich, Xin Ye
Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 [BibTeX] [DOI] [Paper]When Reverse-Engineering Meets Side-Channel Analysis–Digital Lockpicking in Practice
2013 - David Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Christof Paar
Selected Areas in Cryptography -- SAC 2013, Springer Berlin Heidelberg, 2014, 571-588 [bib]Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing
2013 - Timo Kasper, David Oswald, Christian Zenger, Christof Paar
9th Workshop on RFID Security, RFIDsec 2013, July 9-11, 2013, Graz, Austria [pdf] [bib]Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware
2013 - Alexander Wild, Tim Güneysu, Amir Moradi
Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013 [BibTeX] [DOI] [Paper]Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation System
2013 - Gesine Hinterwälder, Christian Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson
E. De Cristofaro and M. Wright (Eds.): PETS 2013, LNCS 7981, pp. 40–59, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]Wireless Devices and Cryptography: About Digital Pickpocketing, Open Sesame and Tracking Paranoia
2013 - Timo Kasper
it - Information Technology: Vol. 55, No. 3, pp. 123-128 [pdf] [bib]Efficient Implementation of Cryptographic Primitives on the GA144 Multi-core Architecture
2013 - Tobias Schneider, Ingo von Maurich, Tim Güneysu
24th International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2013, Washington, DC, USA, June 5-7, 2013 [BibTeX] [DOI] [Paper]Software Speed Records for Lattice-Based Signatures
2013 - Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Peter Schwabe
Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013 [Software] [BibTeX] [DOI] [Paper]P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems
2013 - Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Christof Paar
A.-R. Sadeghi (Eds.): Financial Cryptography and Data Security 2013, Volume 7859, pp 205-212, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]High-Performance Cryptanalysis on RIVYERA and COPACOBANA Computing Systems
2013 - Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Lars Wienbrandt, Ralf Zimmermann
"High-Performance Computing Using FPGAs", Vanderbauwhede, Benkrid (Eds.), p. 335-366, February 2013, Springer Verlag, ISBN: 978-1-4614-1790-3 [DOI]Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II - Facilitating Black-Box Analysis using Software Reverse-Engineering
2013 - Amir Moradi, David Oswald, Christof Paar, Pawel Swierczynski
21st ACM/SIGDA International Symposium on Field-Programmable Gate Arrays- FPGA 2013, pages 91-100, February 11 - 13. ACM, 2013. [DOI] [pdf]SHA-3 - Portierung auf einer ATmega163 Smartcard
2013 - Pawel Swierczynski, Christof Paar
23. SMARTCARD-WORKSHOP, Tagungsband, Darmstadt, 6/7. Februar 2013.Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms
2013 - Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalcin, Ralf Zimmermann
Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 [DOI] [BibTeX] [pdf] [bib]A new construction of bent functions based on Z-bent functions
2013 - Sugata Gangopadhyay, Anand Joshi, Gregor Leander, Rajendra Kumar Sharma
Designs, Codes and Cryptography January 2013, Volume 66, Issue 1-3, pp 243-256 [bib]Achieving anonymity against major face recognition algorithms
2013 - Benedikt Driessen, Markus Dürmuth
Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013. [PDF]Anonymität und Gesichtserkennung
2013 - Benedikt Driessen, Markus Dürmuth
digma, Zeitschrift für Datenrecht und Informationssicherheit, 2013.Slender-Set Differential Cryptanalysis
2013 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen
Journal of Cryptology January 2013, Volume 26, Issue 1, pp 11-38 [bib]IPSecco: A Lightweight and Reconfigurable IPSec Core
2012 - Benedikt Driessen, Tim Güneysu, Elif Bilge Kavun, Oliver Mischke, Christof Paar, Thomas Pöppelmann
2012 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2012, Cancun, Mexico, December 5-7, 2012 [BibTeX] [DOI] [PDF]Integral and Multidimensional Linear Distinguishers with Correlation Zero
2012 - Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang
Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings [bib]PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications (Extended Abstract)
2012 - Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalcin
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012 [DOI] [BibTeX]Improving Side-Channel Analysis with Optimal Linear Transforms
2012 - David Oswald, Christof Paar
CARDIS 2012 [pdf] [bibtex]Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
2012 - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, Francois Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, Francois-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loic Van Oldeneel Tot Oldenzeel, Ingo von Maurich
Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012 [Full Version] [Block Cipher Version] [BibTeX] [DOI]Side Channels as Building Blocks
2012 - Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne Burleson
Journal of Cryptographic Engineering, Volume 2, Number 3, pages 143-159, 2012, Springer. [DOI] [BibTeX] [pdf]How Far Should Theory be from Practice? – Evaluation of a Countermeasure
2012 - Amir Moradi, Oliver Mischke
Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012 [DOI] [BibTeX] [pdf]On the Distribution of Linear Biases: Three Instructive Examples
2012 - Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander
Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings [bib]An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
2012 - Martin R. Albrecht, Gregor Leander
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers [bib]Detecting Software Theft in Embedded Systems: A Side-Channel Approach
2012 - Georg T. Becker, Daehyun Strobel, Christof Paar, Wayne Burleson
IEEE Transactions on Information Forensics and Security, , vol.7, no.4, pp.1144,1154, Aug. 2012 [bib] [pdf]IT-Sicherheit in der Elektromobilität
2012 - Christof Paar, Marko Wolf, Ingo von Maurich
ATZelektronik, volume 7, issue 4, pp 274-279, Springer, 2012.Solving Binary Linear Equation Systems over the Rationals and Binaries
2012 - Benedikt Driessen, Christof Paar
International Workshop on the Arithmetic of Finite Fields (Bochum) 2012 [Waifi 2012] [pdf] [bib]Pay as you Go
2012 - Foteini Baldimtsi, Gesine Hinterwälder, Andy Rupp, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson
5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012) Held in conjunction with the 12th Privacy Enhancing Technologies Symposium July 13, 2012, Vigo, Spain [pdf]Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
2012 - Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, Francois Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, Francois-Xavier Standaert, Loic van Oldeneel tot Oldenzeel
Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 [BibTeX] [DOI] [Full Version] [Hash Funct. Version]Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems
2012 - Gesine Hinterwälder, Christof Paar, Wayne P. Burleson
J.-H. Hoepman, I. Verbauwhede (Eds.): RFIDSec 2012, Volume 7739, pp 109-122, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]Glitch-Free Implementation of Masking in Modern FPGAs
2012 - Amir Moradi, Oliver Mischke
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012 [DOI] [BibTeX] [pdf] [verilog]Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards
2012 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2012 - **Best Paper Award** [More Info] [PDF]Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
2012 - Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
Advances in Cryptology – EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings [bib]Statistical Tools Flavor Side-Channel Collision Attacks
2012 - Amir Moradi
Advances in Cryptology - EUROCRYPT 2012 - 31th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, United Kingdom, April 15-19, 2012, pages 428-445. [DOI] [pdf]Experimentally Verifying a Complex Algebraic Attack on the Grain-128 Cipher Using Dedicated Reconfigurable Hardware
2012 - Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
SHARCS 2012 (http://2012.sharcs.org/index.html), 17-18 March 2012, Washington DC, USA [SHARCS 2012 website] [pdf]A new construction of highly nonlinear S-boxes
2012 - Peter Beelen, Gregor Leander
Cryptography and Communications Volume 4, Issue 1, pp 65-77 [bib]Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures – An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism
2012 - Amir Moradi, Markus Kasper, Christof Paar
Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference, San Francisco, CA, USA, February 27- March 2, 2012, pages 1-18. [DOI] [pdf]An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
2011 - Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011 [DOI] [BibTeX] [pdf] [bib]An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software
2011 - Daehyun Strobel, Christof Paar
Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011RAM-Based Ultra-Lightweight FPGA Implementation of PRESENT
2011 - Elif Bilge Kavun, Tolga Yalcin
In International Conference on ReConFigurable Computing and FPGAs 2011 (ReConFig'11), IEEE Computer Society, Cancun, Mexico, Nov. 30-Dec. 2, 2011 [DOI]Security of Wireless Embedded Devices in the Real World
2011 - Timo Kasper, David Oswald, Christof Paar
Information Security Solutions (ISSE) 2011 - Securing Electronic Business Processes (November 22-23 2011, Prague, Czech Republic) [pdf] [bib]Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild
2011 - Timo Kasper, David Oswald, Christof Paar
19th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) [pdf] [bib]Praktische Angriffe auf die Bitstromverschlüsselung von Xilinx FPGAs
2011 - Markus Kasper, Timo Kasper, Amir Moradi, Christof Paar
Datenschutz und Datensicherheit - DuD - Ausgabe 11/2011 - http://www.dud.de/Ausgabe/2011-11.html [Dud Webseite] [pdf]Seitenkanalanalyse kontaktloser SmartCards
2011 - Timo Kasper, David Oswald, Christof Paar
Datenschutz und Datensicherheit - DuD - Ausgabe 11/2011 - http://www.dud.de/Ausgabe/2011-11.html [DuD Webseite] [pdf]On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
2011 - Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar
18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, IL, USA, October 17-21, 2011, pages 111-124. [DOI] [pdf] [slides] [bib]Switchings, extensions, and reductions in central digraphs
2011 - André Kündgen, Gregor Leander, Carsten Thomassen
Journal of Combinatorial Theory, Series A Volume 118, Issue 7, October 2011, Pages 2025–2034 [DOI] [bib]Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge
2011 - Georg T. Becker, Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, Wayne Burelson
29th IEEE International Conference on Computer Design (Invited Paper), ICCD 2011, Amherst, USA, October 2011 [PDF]Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World
2011 - David Oswald, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, Nara, Japan, September 28-October 1, 2011, pages 207-222 [pdf] [extended version]Generic Side-Channel Countermeasures for Reconfigurable Devices
2011 - Tim Güneysu, Amir Moradi
Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011 [BibTex] [DOI] [pdf] [PROMs]On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting
2011 - Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama
Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011 [BibTeX] [DOI] [pdf]spongent: A Lightweight Hash Function
2011 - Andrey Bogdanov, Miroslav Kneževi?, Gregor Leander, Deniz Toz, Kerem Var?c?, Ingrid Verbauwhede
13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings [DOI] [bib]Memory Encryption in Smart Cards
2011 - Baris Ege, Elif Bilge Kavun, Tolga Yalcin
10th Smart Card Research and Advanced Application Conference (CARDIS 2011), Leuven, Belgium, Sept. 14-16, 2011 [DOI] [pdf]A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
2011 - Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner
31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings [DOI] [bib]Sec2 – Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage
2011 - Christopher Meyer, Juraj Somorovsky, Jörg Schwenk, Benedikt Driessen, Thang Tran, Christian Wietfeld
In Proceedings of the DACH Security 2011, Oldenburg, Germany [Paper] [Slides]Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods
2011 - Amir Moradi, Mario Kirschbaum, Thomas Eisenbarth, Christof Paar
IEEE Transactions on Very Large Scale Integration Systems, Volume 20 , Issue 9, Pages 1578 - 1589, 2012. [DOI] [pdf]Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
2011 - Timo Kasper, David Oswald, Christof Paar
7th Workshop on RFID Security and Privacy 2011, RFIDSec 2011, Amherst, USA, June 26–28, 2011 [pdf] [bib]7th Workshop on RFID Security and Privacy (RFIDsec)
2011 - A. Juels, K. Fu, Christof Paar
Lecture Notes in Computer Science 7055, Springer, Amherst, MA, USA, June 26-27, 2011.Practical Evaluation of DPA Countermeasures on Reconfigurable Hardware
2011 - Amir Moradi, Oliver Mischke, Christof Paar
HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA [BibTeX] [DOI] [pdf]Side-channel Watermarks for Embedded Software
2011 - Georg T. Becker, Wayne Burleson, Christof Paar
9th IEEE NEWCAS Conference (Invited Paper), NEWCAS 2011, Bordeaux, France, June 2011 [pdf]On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN
2011 - Gregor Leander
30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings [DOI] [bib]Pushing the Limits: A Very Compact and a Threshold Implementation of AES
2011 - Amir Moradi, Dipl.-Kfm. Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang
Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, volume 6632 of LNCS, pages 69-88, Springer. [DOI] [bib] [pdf]Bounds on the degree of APN polynomials: the case of x^(-1) + g(x)
2011 - Gregor Leander, François Rodier
Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 207-222 [DOI] [bib]Counting all bent functions in dimension eight 99270589265934370305785861242880
2011 - Philippe Langevin, Gregor Leander
Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 193-205 [DOI] [bib]Side-Channel Resistant Crypto for less than 2,300 GE
2011 - Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling
Journal of Cryptology, Special Issue on Hardware and Security, Volume 24, Number 2, pages 322-345, April 2011. [DOI] [pdf] [bib]The future of high-speed cryptography: new computing platforms and new ciphers
2011 - Tim Güneysu, Stefan Heyse, Christof Paar
Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, Lausanne, Switzerland, May 2-6, 2011 [pdf] [BibTex] [DOI]Towards an Ultra Lightweight Crypto Processor
2011 - Begul Bilgin, Elif Bilge Kavun, Tolga Yalcin
Proceedings of the Workshop on Lightweight Security and Privacy (LightSec’11), Istanbul, Turkey, March 14-15, 2011 [DOI] [pdf]Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
2011 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen
18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [DOI] [bib]Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
2011 - Mohamed Ahmed Abdelraheem, Gregor Leander, Mohamed Ahmed Abdelraheem
18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [DOI] [bib]The World Is Not Enough: Another Look on Second-Order DPA
2010 - François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
ASIACRYPT 2010: 112-129 [bib]Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
2010 - Gallais, J., Großschädl, J., Hanley, N., Markus Kasper, Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S.
In L. Chen & M. Yung (Eds.), International Conference on Trusted Computing. Springer. [bib]Side-channel based watermarks for IP Protection
2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar
COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design [bib]"Modular Integer Arithmetic for Public Key Cryptography". I. Verbauwhede ed. in "Secure Integrated Circuits and Systems"
2010 - Tim Güneysu, Christof Paar
Springer US, ISBN: 978-0-387-71827-9, 2010.Building a Side Channel Based Disassembler
2010 - Thomas Eisenbarth, Christof Paar, Björn Weghenkel
Lecture Notes in Computer Science, 2010 [web] [bib]A Versatile Framework for Implementation Attacks on Cryptographic and Embedded Devices
2010 - Timo Kasper, David Oswald, Christof Paar
Lecture Notes in Computer Science, 2010 [web] [bib] [pdf]DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs
2010 - S. Drimer, Tim Güneysu, Christof Paar
ACM Transactions on Reconfigurable Technology and Systems (TRETS), Vol. 3. 2010.Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware
2010 - J. Fan, D. V. Bailey, L. Batina, Tim Güneysu, Christof Paar, I. Verbauwhede
International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI]High-Performance Integer Factoring with Reconfigurable Devices
2010 - Ralf Zimmermann, Tim Güneysu, Christof Paar
International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI] [pdf] [bib]Breaking Elliptic Curve Cryptosystems using Reconfigurable Hardware
2010 - J. Fan, D. V. Bailey, L.Batina, Tim Güneysu, Christof Paar, I. Verbauwhede
IEEE Field Programmable Logic, 133-138, IEEE Computer Society, 2010.Cloning Cryptographic RFID Cards for 25$
2010 - Timo Kasper, Ingo von Maurich, David Oswald, Christof Paar
Presented at the 5th Benelux Workshop on Information and System Security, WisSec 2010, November 29-30, 2010, Nijmegen, the Netherlands.Chameleon: A Versatile Emulator for Contactless Smartcards
2010 - Timo Kasper, Ingo von Maurich, David Oswald, Christof Paar
13th International Conference on Information Security and Cryptology - ICISC 2010, Seoul, Korea, December 1-3, 2010, volume 6829 of LNCS, pages 189-206, Springer. [SourceForge] [BibTeX] [DOI] [pdf]Combined Implementation Attack Resistant Exponentiation
2010 - Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald
Springer LNCS 6112, LATINCRYPT 2010, Puebla, Mexico. [pdf] [bib]Evaluation of SHA-3 Candidates for 8-bit Embedded Processors
2010 - Stefan Heyse, Ingo von Maurich, Alexander Wild, Cornel Reuber, Johannes Rave, Thomas Pöppelmann, Christof Paar, Thomas Eisenbarth
2nd SHA-3 Candidate Conference, August 23-24, 2010, University of California, Santa Barbara, USA. [Paper]Correlation-Enhanced Power Analysis Collision Attack
2010 - Amir Moradi, Oliver Mischke, Thomas Eisenbarth
Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings [BibTeX] [DOI] [pdf]PRINTcipher: A Block Cipher for IC-Printing
2010 - Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw
12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings [DOI] [bib]Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
2010 - Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, M. Wienecke
Topics in Cryptology - CT-RSA 2010, LNCS, Springer-Verlag. [pdf]Secure Location Verification - A Security Analysis of GPS Signal Authentication
2010 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar
DBSec 2010, Rome, Italy, June 21-23, 2010, to be published in Springer LNCS. [pdf]A Pipelined Camellia Architecture for Compact Hardware Implementation
2010 - Elif Bilge Kavun, Tolga Yalcin
In Proceedings of the 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP’10), pages 305 - 308, IEEE, Rennes, France, July 7-9, 2010 [DOI]A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree
2010 - Carl Bracken, Gregor Leander
Finite Fields and Their Applications Volume 16, Issue 4, July 2010, Pages 231–242 [DOI] [bib]Side-channel based watermarks for integrated circuits
2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Christof Paar
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. [pdf]A Lightweight Implementation of KECCAK Hash Function for Radio-Frequency Identification Applications
2010 - Elif Bilge Kavun, Tolga Yalcin
Proceedings of the 6th Workshop on RFID Security (RFIDSec'11), Istanbul, Turkey, June 7-9, 2010 [DOI] [pdf]Practical Power Analysis Attacks on Software Implementations of McEliece
2010 - Stefan Heyse, Amir Moradi, Christof Paar
Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings [DOI] [BibTeX] [bib] [pdf]All You Can Eat or Breaking a Real-World Contactless Payment System
2010 - Timo Kasper, Michael Silbermann, Christof Paar
Financial Cryptography and Data Security, 10 January 25-28, 2010, to be published in Springer LNCS. [pdf] [bib]Lightweight Cryptography and DPA Countermeasures: A Survey
2010 - Amir Moradi, Axel Poschmann
First International Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010 (co-located with Financial Cryptography and Data Security - FC 2010), Tenerife, Canary Islands, Spain, Januar 25-28, 2010. [pdf]Transforming Write Collisions in Block RAMs into Security Applications
2009 - Tim Güneysu, Christof Paar
Proceedings of the 2009 International Conference on Field-Programmable Technology, FPT 2009, Sydney, Australia, December 9-11, 2009 [BibTeX] [DOI] [pdf]A New Remote Keyless Entry System Resistant to Power Analysis Attacks
2009 - Amir Moradi, Timo Kasper
7th International Conference on Information, Communications and Signal Processing, ICICS 2009, Macau, China, Dezember 7-10, 2009. [pdf]Lightweight Cryptography and RFID: Tackling the Hidden Overheads
2009 - Dipl.-Kfm. Axel Poschmann, Matt Robshaw, Frank Vater, Christof Paar
7th International ConferenceInternational Conference on Information Security and Cryptology 2009 - ICISC 2009. LNCS, Springer-Verlag, to appear, Seoul, Korea, Dezember 2-4, 2009. [pdf]Power Analysis of Single-Rail Storage Elements as used in MDPL
2009 - Amir Moradi, Thomas Eisenbarth, Dipl.-Kfm. Axel Poschmann, Christof Paar
12th International Conference on Information Security and Cryptology - ICISC 2009, Seoul, Korea, December 2-4, 2009. [pdf]MOLES: Malicious Off-chip Leakage Enabled by Side-channels
2009 - Lang Lin, Wayne Burleson, Christof Paar
ACM/IEEE International Conference on Computer-Aided Design (ICCAD), pp. 117-122, San Jose, 2009.Efficient Authentication Mechanisms for Navigation Systems – a Radio-Navigation Case Study
2009 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Di Qiu, Christof Paar, Per Enge
Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2009) pp. 901 - 912, September 22-25 2009, Savannah, GA. [pdf]Cryptanalysis of KeeLoq with COPACOBANA
2009 - Martin Novotny, Timo Kasper
Special-purpose Hardware for Attacking Cryptographic Systems 2009, SHARCS 2009, Lausanne, Switzerland. September 9-10, 2009. [pdf] [bib]Three Years of Evolution: Cryptanalysis with COPACOBANA Special-purpose Hardware for Attacking Cryptographic Systems 2009
2009 - Tim Güneysu, Gerd Pfeiffer, Christof Paar, Manfred Schimmler
SHARCS 2009, Lausanne, Switzerland. September 9-10, 2009. [pdf]Crypto Engineering: Some History and Some Case Studies
2009 - Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems 2009, CHES 2009, Lausanne, Switzerland. September 6-9, 2009. [pdf]KeeLoq and Side-Channel Analysis --- Evolution of an Attack
2009 - Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, Amir Moradi
6th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009.Lausanne, Switzerland, September 6, 2009. [pdf]MicroEliece: McEliece for Embedded Devices
2009 - Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009 [DOI] [BibTeX] [pdf]Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
2009 - Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne Burleson
Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009 [DOI] [BibTeX] [pdf] [Talk Slides]A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
2009 - Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh
10th International Workshop on Information Security Applications, WISA 2009, Busan, Korea. August 25-27, 2009. [pdf]EM Side-Channel Attacks on Commercial Contactless Smartcards using Low-Cost Equipment
2009 - Timo Kasper, David Oswald, Christof Paar
10th International Workshop on Information Security Applications, WISA 2009, Busan, Korea. August 25-27, 2009. [pdf] [bib]Secure IP-Block Distribution for Hardware Devices
2009 - Jorge Guajardo Merchan, Tim Güneysu, Sandeep Kumar, Christof Paar
IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009 [BibTeX] [DOI] [pdf]One-touch Financial Transaction Authentication
2009 - Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar
SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, Juli 7-10, 2009. [pdf] [bib]New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs
2009 - Timo Kasper, David Oswald, Christof Paar
Workshop on RFID Security 2009, RFIDSec 2009, Leuven, Belgium, 30. Juni - 2.Juli, 2009. [pdf] [bib]Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
2009 - Markus Kasper, Timo Kasper, Amir Moradi, Christof Paar
2nd International Conference on Cryptology in Africa, Progress in Cryptology - AFRICACRYPT 2009, Gammarth, Tunisia, 21-25 Juni, 2009. [DOI] [pdf] [bib]Green Car Security: IT-Sicherheit und Elektromobilität
2009 - Christof Paar, Jan Pelzl, Andy Rupp, Kai Schramm, André Weimerskirch
DACH Security 2009, Ruhr-Universität Bochum, Bochum, Germany, Mai, 19-20, 2009. [pdf]Cryptography is Feasible on 4-Bit Microcontrollers - A Proof of Concept
2009 - Markus Vogt, Dipl.-Kfm. Axel Poschmann, Christof Paar
International IEEE Conference on RFID, Orlando, Florida, USA, April, 27 - 28, 2009. [pdf] [bib]Design Space Exploration of PRESENT Implementations for FPGAs
2009 - Mohamad Sbeiti, Michael Silbermann, Dipl.-Kfm. Axel Poschmann, Christof Paar
Proceedings of the 5th Southern Programmable Logic Conference -- SPL'09, Sao Carlos, Brazil, April 1 - 3, 2009. [pdf] [bib]Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology
2009 - Francesco Regazzoni, Thomas Eisenbarth, Dipl.-Kfm. Axel Poschmann, Johann Großschädl, Frank Gurkaynak, Marco Macchetti, Zeynep Toprak, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne
Transactions on Computational Science IV, 2009. [bib] [pdf]Securing Green Cars: IT Security in Next-Generation Electric Vehicle Systems
2009 - Christof Paar, Andy Rupp, Kai Schramm, André Weimerskirch, Wayne Burleson
Accepted at the 2009 Annual Meeting and Exposition of the Intelligent Transportation Society of America. [pdf]Understanding Cryptography: A Textbook for Students and Practitioners
2009 - Christof Paar, Jan Pelzl
Springer Monograph Series, 2009. [web]Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
2008 - Andy Rupp, G. Leander, E. Bangerter, A. Dent, Ahmad-Reza Sadeghi
In 14th International Conference on the Theory and Application of Cryptology and Information Security —- ASIACRYPT 2008 (to appear). Melbourne, Australia, Dezember 7-11, 2008.Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
2008 - Andrey Bogdanov, Ilya Kizhvatov, Andrey Pyshkin
Progress in Cryptology - INDOCRYPT 2008, Kharagpur, India, December 2008. [pdf]Single-chip detector for electron spin resonance spectroscopy
2008 - Tolga Yalcin, Giovanni Boero (EPFL)
Review of Scientific Instruments 79, 094105 (2008) [DOI] [pdf]Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
2008 - Bodo Möller, Andy Rupp
In 6th Conference on Security and Cryptography for Networks — SCN 2008. Amalfi, Italien, September 10-12, 2008.Enhancing COPACOBANA for Advanced Applications in Cryptography and Cryptanalysis
2008 - Tim Güneysu, Christof Paar, Gerd Pfeiffer, Manfred Schimmler
FPL 2008, International Conference on Field Programmable Logic and Applications, Heidelberg, Germany, 8-10 September 2008 [DOI] [BibTeX] [pdf]Fast Hash-Based Signatures on Constrained Devices
2008 - Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, Christof Paar
Proceedings of the 8th Smart Card Research and Advanced Application IFIP Conference -- CARDIS 2008. September 8-11, 2008. [DOI] [pdf] [bib]Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
2008 - Carsten Rolfes, Dipl.-Kfm. Axel Poschmann, Gregor Leander, Christof Paar
Proceedings of the 8th Smart Card Research and Advanced Application IFIP Conference -- CARDIS 2008. September 8-11, 2008. [Implementations] [pdf] [bib]On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
2008 - Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
28th International Cryptology Conference -- CRYPTO 2008. Santa Barbara, California, USA. August 17-21, 2008. [DOI] [pdf] [bib] [Slides]A Real-World Attack Breaking A5/1 within Hours
2008 - Timo Gendrullis, Martin Novotny, Andy Rupp
Workshop on Cryptographic Hardware and Embedded Systems -- CHES 2008. Washington DC, USA, August 10-13, 2008. [pdf]Hash Functions and RFID Tags: Mind the Gap
2008 - Andrey Bogdanov, Gregor Leander, Christof Paar, Dipl.-Kfm. Axel Poschmann, Matthew Robshaw, Yannick Seurin
10. International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2008, Washington, USA. August 10 - 13, 2008. [DOI] [pdf] [bib]Multiple-Differential Side-Channel Collision Attacks on AES
2008 - Andrey Bogdanov
10. International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2008, Washington, USA. August 10 - 13, 2008. [pdf]Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
2008 - Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf
Workshop on Cryptographic Hardware and Embedded Systems -- CHES 2008 (Best Paper Award). Washington DC, USA, August 10-13, 2008. [DOI] [pdf] [bib]Ultra High Performance ECC over NIST Primes on Commercial FPGAs
2008 - Tim Güneysu, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings [BibTeX] [DOI] [pdf]Sicherheit moderner Funktüröffnersysteme
2008 - Thomas Eisenbarth, Timo Kasper, Christof Paar
Datenschutz und Datensicherheit - DuD Volume 32 Ausgabe 8 - August 2008 - http://www.springerlink.com/content/1614-0702/32/8/ - http://www.dud.de/ [Webseite] [pdf]Fast Multivariate Signature Generation in Hardware: The Case of Rainbow
2008 - S. Balasubramanian, Andrey Bogdanov, Andy Rupp, J. Ding, H. W. Carter, Christof Paar
In 19th IEEE International Conference on Application-specific Systems, Architectures and Processors — ASAP 2008, Leuven, Belgium, Juli 2-4, 2008.On Black-Box Ring Extraction and Integer Factorization
2008 - K. Altmann, T. Jager, Andy Rupp
In 35th International Colloquium on Automata, Languages and Programming — ICALP 2008. Reykjavik, Iceland, Juli 6-13, 2008.Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers
2008 - Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Christof Paar
3rd International Symposium on Industrial Embedded Systems -- SIES 2008. Montpellier - Le Grande Motte, France. Juni 11-13, 2008. [DOI] [pdf] [bib]Protecting Multiple Cores in a Single FPGA Design 8/2008
2008 - Saar Drimer, Tim Güneysu, Markus G. Kuhn, Christof Paar
Technical Report/Draft, written 5/2008, available on-line. [web]Securing Peer-to-peer Distributions for Mobile Devices
2008 - N.Asokan, André Osterhues, Ahmad-Reza Sadeghi, Christian Stüble, Marko Wolf
4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia. Proceedings, LNCS, Springer-Verlag. April 21 - 23, 2008.DSPs, BRAMs and a Pinch of Logic: New recipes for AES on FPGAs
2008 - Saar Drimer, Tim Güneysu, Christof Paar
16th IEEE International Symposium on Field-Programmable Custom Computing Machines, FCCM 2008, 14-15 April 2008, Stanford, Palo Alto, California, USA [BibTeX] [DOI] [pdf]Security Requirements Engineering in the Automotive Domain: On Specification Procedures and Implementational Aspects
2008 - Christof Paar, Marko Wolf
SICHERHEIT 2008: Sicherheit — Schutz und Zuverlässigkeit, 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., Saarbrücken, Germany. Proceedings, LNI, April 2 - 4, 2008.Comparison of Innovative Signature Algorithms for WSNs
2008 - Benedikt Driessen, Dipl.-Kfm. Axel Poschmann, Christof Paar
First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, Virginia, USA. Proceedings, ACM Press. 31.03 - 02.04 2008. [pdf] [Talk Slides] [Bibtex]An Interoperable Security Architecture for Vehicular Software Protection
2008 - Michael Scheibel, Christian Stüble, Marko Wolf
International Workshop on Interoperable Vehicles (IOV 2008), ETH Zurich, Switzerland. Proceedings. March 26, 2008.Security for 1000 Gate Equivalents
2008 - Carsten Rolfes, Dipl.-Kfm. Axel Poschmann, Christof Paar
Secure Component and System Identification, SECSI 2008, Berlin, Germany. März, 17-18 2008. [Talk Slides] [Bibtex] [pdf]On the classification of APN functions up to dimension five
2008 - Marcus Brinkmann, Gregor Leander
Des. Codes Cryptogr. (2008) 49: 273. [DOI] [pdf]Susceptibility of eSTREAM Candidates towards Side Channel Analysis
2008 - Benedikt Gierlichs, Lejla Batina, Christophe Clavier, Thomas Eisenbarth, Aline Gouget, Helena Handschuh, Timo Kasper, Kerstin Lemke-Rust, Stefan Mangard, Amir Moradi, Elisabeth Oswald
The State of the Art of Stream Ciphers, SASC 2008, Lausanne, Switzerland. Februar, 13-14 2008. [pdf] [Bibtex]Breaking Legacy Banking Standards with Special-Purpose Hardware
2008 - Tim Güneysu, Christof Paar
Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008 [DOI] [BibTeX] [pdf]Cryptanalysis with COPACOBANA
2008 - Tim Güneysu, Timo Kasper, Martin Novotny, Christof Paar, Andy Rupp
IEEE Transactions on Computers, November 2008, vol. 57, no. 11, 2008. [pdf]Sufficient Conditions for Intractability in the Generic Model: Providing Lower Bounds for Generalized DL and DH Problems
2008 - Ahmad-Reza Sadeghi, Andy Rupp, Endre Bangerter, Alexander W. Dent, Gregor Leander
Accepted for ASIACRYPT 2008.Dynamic Intellectual Property Protection for Reconfigurable Devices
2007 - Tim Güneysu, Bodo Möller, Christof Paar
2007 International Conference on Field-Programmable Technology, ICFPT 2007, Kitakyushu, Japan, December 12-14, 2007 [DOI] [IEEE] [BibTeX] [pdf]E-Passport: Cracking Basic Access Control Keys
2007 - Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar
On the move, OTM2007, Vilamoura, Algarve, Portugal, November 25-30, 2007. [DOI] [pdf] [Bibtex]Magnetic Resonance Spectrometer Suitable For Integration On A Single Chip
2007 - Tolga Yalcin, Giovanni Boero (EPFL)
International Patent, Nr. PCT/CH 2006/000247 [DOI] [pdf]Reconfigurable Trusted Computing in Hardware
2007 - Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf, Thomas Eisenbarth, Tim Güneysu, Christof Paar
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 [DOI] [BibTeX] [pdf]A Survey of Lightweight Cryptography Implementations
2007 - Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Dipl.-Kfm. Axel Poschmann, L. Uhsadel
IEEE Design & Test of Computers -- Special Issue on Secure ICs for Secure Embedded Computing vol 24, no 6, pp 522-533, November 2007. [web] [pdf] [bib]Enabling Fairer Digital Rights Management with Trusted Computing
2007 - N. Asokan, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, Christian Stüble, Marko Wolf
10th Information Security Conference (ISC 2007), Valparaiso, Chile. Proceedings, LNCS, Springer-Verlag. October 9 - 12, 2007.Anmerkungen zur Gültigkeit von Zertifikaten
2007 - Bodo Möller
INFORMATIK 2007 -- Informatik trifft Logistik, Workshop: "Kryptologie in Theorie und Praxis", 37. Jahrestagung der Gesellschaft für Informatik e. V. (GI), Lecture Notes in Informatics (LNI) P-110, Bremen, Germany, September 27, 2007. [pdf]Cryptanalytic Time-Memory Tradeoffs on COPACOBANA
2007 - Tim Güneysu, Andy Rupp, S. Spitz
INFORMATIK 2007: Informatik trifft Logistik. Band 2. Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 24.-27. September 2007 in Bremen [BibTeX] [pdf]Hardware Optimierte Lightweight Block-Chiffren für RFID- und Sensor-Systeme
2007 - Dipl.-Kfm. Axel Poschmann, Christof Paar
INFORMATIK 2007 -- Informatik trifft Logistik, Workshop: "Kryptologie in Theorie und Praxis", 37. Jahrestagung der Gesellschaft für Informatik e. V. (GI), Lecture Notes in Informatics (LNI) P-110, Bremen, Germany, September 27, 2007. [pdf] [Bibtex]Power Attacks Resistance of Cryptographic S-boxes with added Error Detection Circuits
2007 - F. Regazzoni, Thomas Eisenbarth, J. Großsch¨adl, L. Breveglieri, P. Ienne, I. Koren, Christof Paar
In Proceedings of the 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT’07), Rome, Italy, September 26-28, 2007. [pdf] [Bibtex]Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods
2007 - Kerstin Lemke-Rust, Christof Paar
12th European Symposium On Research In Computer Security (ESORICS 2007), Dresden, Germany, September 24 - 26, 2007. [pdf]Gaussian Mixture Models for Higher-Order Side Channel Analysis
2007 - Kerstin Lemke-Rust, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2007, 9. International Workshop, Vienna, Austria, Proceedings. LNCS, Springer-Verlag, September 10 - 13, 2007. [pdf]Collision Attacks on AES-based MAC: Alpha-MAC
2007 - A. Biryukov, Andrey Bogdanov, D. Khovratovich, Timo Kasper
Cryptographic Hardware and Embedded Systems - CHES 2007, 9. International Workshop, Vienna, Austria, Proceedings. LNCS, Springer-Verlag, September 10 - 13, 2007. [pdf] [Bibtex]A Hardware-Assisted Realtime Attack on A5/2 without Precomputations
2007 - Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
Cryptographic Hardware and Embedded Systems - CHES 2007, 9. International Workshop, Vienna, Austria, Proceedings. LNCS, Springer-Verlag, September 10 - 13, 2007. [pdf] [Bibtex]PRESENT: An Ultra-Lightweight Block Cipher
2007 - Andrey Bogdanov, L.R. Knudsen, G. Leander, Christof Paar, Dipl.-Kfm. Axel Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe
Cryptographic Hardware and Embedded Systems - CHES 2007, 9. International Workshop, Vienna, Austria, Proceedings. LNCS, Springer-Verlag, September 10 - 13, 2007. [Implementations] [Talk Slides] [Bibtex] [pdf]E-Passport: Cracking Basic Access Control Keys with Copacobana
2007 - Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar
Special-purpose Hardware for Attacking Cryptographic Systems, SHARCS Workshop 2007, Vienna, Austria, September 9-10, 2007. [pdf] [Talk Slides]Efficient Hash Collision Search Strategies on Special-Purpose Hardware
2007 - Tim Güneysu, Christof Paar, S. Schäge
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers [DOI] [BibTeX] [pdf]Parallel Computing with Low-Cost FPGAs: A Framework for COPACOBANA
2007 - Tim Güneysu, Christof Paar, Jan Pelzl, G. Pfeiffer, M. Schimmler, C. Schleiffer
Parallel Computing: Architectures, Algorithms and Applications, ParCo 2007, Forschungszentrum Jülich and RWTH Aachen University, Germany, 4-7 September 2007 [BibTeX] [pdf]A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain
2007 - S. Baktir, Sandeep Kumar, Christof Paar, B. Sunar
Mobile Networks and Applications (MONET) Journal, Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing, vol 12, no 4, pp 259-270, September 2007. [web] [pdf]Improved Side-Channel Collision Attacks on AES
2007 - Andrey Bogdanov
The 14th Annual Workshop on Selected Areas in Cryptography (SAC 2007), Ottawa, Ontario, Canada, August 16-17, 2007. [pdf] [Bibtex] [Talk Slides]A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies
2007 - F. Regazzoni, S. Badel, Thomas Eisenbarth, J. Großsch¨adl, Dipl.-Kfm. Axel Poschmann, Z. Toprak, M. Macchetti, L. Pozzi, Christof Paar, Y. Leblebici, P. Ienne
in Proceedings of International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS IC 07), Samos, Greece, 16-19 July 2007. [pdf] [Bibtex]Attacks on the KeeLoq Block Cipher and Authentication Systems
2007 - Andrey Bogdanov
3rd Conference on RFID Security 2007 (RFIDSec 2007), Malaga, ES, July 11-13, 2007. [Talk Slides] [Bibtex] [pdf]A Lightweight Hardware Implementation of the Stream Cipher VEST-4
2007 - Timo Grendrullis, Timo Kasper, Christof Paar
Western European Workshop on Research in Cryptology, WeWORC Workshop 2007, Bochum, Germany, July 4-6, 2007. [pdf]Efficient Hash Collision Search Strategies on Special-Purpose Hardware
2007 - Tim Güneysu, Christof Paar, Sven Schäge
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers [DOI] [BibTeX] [pdf]Enabling Full-Size Public-Key Algorithms on 8-bit Sensor Nodes
2007 - Leif Uhsade, Dipl.-Kfm. Axel Poschmann, Christof Paar
European Workshop on Security and Privacy in Ad hoc and Sensor Networks 2007 (ESAS 2007), Cambridge, UK July 2-3, 2007. [DOI] [pdf] [Bibtex]On the Classification of 4-Bit S-boxes
2007 - Gregor Leander, Dipl.-Kfm. Axel Poschmann
International Workshop on the Arithmetic of Finite Fields (WAIFI), Madrid, ES, Juni 21-22, 2007. [pdf] [Bibtex]An Efficient General Purpose Elliptic Curve Cryptography Module for Ubiquitous Sensor Networks
2007 - Leif Uhsadel, Dipl.-Kfm. Axel Poschmann, Christof Paar
Software Performance Enhancement for Encryption and Decryption (SPEED 2007), Amsterdam, NL Juni 11-12, 2007 [pdf] [Bibtex]Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers
2007 - Sören Rinne, Thomas Eisenbarth, Christof Paar
Software Performance Enhancement for Encryption and Decryption (SPEED 2007), Amsterdam, NL Juni 11-12, 2007 [pdf] [Bibtex]New Protection Mechanisms for Intellectual Property in Reconfigurable Logic
2007 - Tim Güneysu, Bodo Möller, Christof Paar
IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA [DOI] [BibTeX] [pdf]State of the Art: Embedding Security in Vehicles
2007 - André Weimerskirch, Marko Wolf, Thomas Wollinger
EURASIP Journal on Embedded Systems (EURASIP JES), Special Issue: Embedded Systems for Intelligent Vehicles, April, 2007.An Embedded System for Practical Security Analysis of Contactless Smartcards
2007 - Timo Kasper, Dario Carluccio, Christof Paar
Workshop in Information Security Theory and Practices 2007, Springer LNCS 4462, pp. 150-160, Heraklion, Crete, Greece, Mai 2007. [DOI] [pdf] [Bibtex]New Lightweight Crypto Algorithms for RFID
2007 - G. Leander, Christof Paar, Dipl.-Kfm. Axel Poschmann, Kai Schramm
IEEE International Symposium on Circuits and Systems - ISCAS 2007, New Orleans, Louisana, USA, Mai 27-30, 2007. [DOI] [pdf] [Bibtex]New Lightweight DES Variants
2007 - G. Leander, Christof Paar, Dipl.-Kfm. Axel Poschmann, Kai Schramm
Fast Software Encryption 2007 - FSE 2007, Luxembourg City, Luxembourg, März 26-28, 2007. [DOI] [pdf] [Bibtex]Dynamic Code Update for the Efficient Usage of Security Components in WSNs
2007 - Dipl.-Kfm. Axel Poschmann, D. Westhoff, André Weimerskirch
Workshop on Mobile Ad-Hoc Networks 2007 (WMAN 2007), Bern, Schweiz, 01.03.07 - 02.03.07. [pdf] [Bibtex]Software Implementation of eSTREAM Profile I Ciphers on embedded 8-bit AVR Microcontrollers
2007 - G. Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Christof Paar
The State of the Art of Stream Ciphers - SASC 2007, Bochum, NRW, Germany, Januar 31- Februar 1, 2007 [pdf]Embedded security in a pervasive world
2007 - Christof Paar, André Weimerskirch
Elsevier Science’s Information Security Technical Report, vol 12, no 3, pp 155-161, 2007. [web] [pdf]On the Equivalence of RSA and Factoring regarding Generic Ring Algorithms
2006 - G. Leander, Andy Rupp
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, Dezember 3-7, 2006. [pdf]A Compact Implementation of Edon80
2006 - Markus Kasper, Sandeep Kumar, Kerstin Lemke-Rust, Christof Paar
The eSTREAM Project - eSTREAM Phase 3 [pdf] [bib]A Simpler Sieving Device: Combining ECM and TWIRL
2006 - W. Geiselmann, F. Januszewski, H. Koepfer, Jan Pelzl, R. Steinwandt
International Conference on Information Security and Cryptology - ICISC 2006, Busan, Korea, Proceedings. LNCS, Springer-Verlag, November 30 - December 1, 2006. [pdf]Play it once again, Sam — Enforcing Stateful Licenses on Open Platforms
2006 - Ahmad-Reza Sadeghi, Michael Scheibel, Christian Stüble, Marko Wolf
2nd Workshop on Advances in Trusted Computing (WATC 2006 Fall), IBM Tokyo Research Labs, Tokio, Japan, November 30 – December 1, 2006.Security Architectures for Software Updates and Content Protection
2006 - Ulrich Huber, Ahmad-Reza Sadeghi, Marko Wolf
Automotive — Safety & Security 2006, Stuttgart, Germany. Proceedings. October 11 - 13, 2006.Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker
2006 - Sandeep Kumar, Christof Paar, Jan Pelzl, G. Pfeiffer, M. Schimmler
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, Proceedings. LNCS, Springer-Verlag, Oktober 10 - 13, 2006. [pdf]Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
2006 - Stefan Mangard, Kai Schramm
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, Oktober 10 - 13, 2006. [pdf]Templates vs. Stochastic Methods
2006 - Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, Oktober 10 - 13, 2006. [pdf]Optimum Digit Serial GF(2^m) Multipliers for Curve Based Cryptography
2006 - Sandeep Kumar, Thomas Wollinger, Christof Paar
IEEE Transactions on Computers, Volume 55, Issue 10, pp. 1306-1311, October 2006. [pdf]Efficient Hardware Implementation of Finite Fields with Applications to Cryptography
2006 - Jorge Guajardo Merchan, Tim Güneysu, Sandeep Kumar, Christof Paar, Jan Pelzl
Acta Applicandae Mathematicae: An International Survey Journal on Applying Mathematics and Mathematical Applications, Volume 93, Numbers 1-3, pp. 75-118, September 2006. [DOI] [pdf]Efficient Software-Implementation of Finite Fields with Applications to Cryptography
2006 - Jorge Guajardo Merchan, Sandeep Kumar, Christof Paar, Jan Pelzl
Acta Applicandae Mathematicae: An International Survey Journal on Applying Mathematics and Mathematical Applications, Volume 93, Numbers 1-3, pp. 3-32, September 2006. [web] [pdf]E-Passport: The Global Traceability or How to Feel Like an UPS Package
2006 - Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi
7th International Workshop on Information Security Applications (WISA 2006), Jeju Island, Korea, August 28-30, 2006. [pdf]A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications
2006 - Dipl.-Kfm. Axel Poschmann, Gregor Leander, Kai Schramm, Christof Paar
Workshop on RFID Security 2006, Graz, Austria, Juli 2006. [pdf]E-Passport: The Global Traceability or How to Feel Like an UPS Package
2006 - Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi
Workshop on RFID Security 2006, Graz, Austria, Juli 2006. [pdf]Are standards compliant elliptic curve cryptosystems feasible on RFID?
2006 - Sandeep Kumar, Christof Paar
Workshop on RFID Security 2006, Graz, Austria, Juli 2006. [pdf]A Configuration Concept for a Massive Parallel FPGA Architecture
2006 - Sandeep Kumar, Christof Paar, Jan Pelzl, G. Pfeiffer, M. Schimmler
International Conference on Computer Design - CDES'06, Las Vegas,USA, Juni 26-29, 2006. [pdf]A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2)
2006 - Andrey Bogdanov, M. Mertens, Christof Paar, Jan Pelzl, Andy Rupp
IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2006, Napa, CA, USA, April 24-26, 2006. [pdf]COPACOBANA - A Cost-Optimized Special-Purpose Hardware for Code-Breaking
2006 - Sandeep Kumar, Christof Paar, Jan Pelzl, G. Pfeiffer, M. Schimmler
poster summary, IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2006, Napa, CA,USA, April 24-26, 2006. [pdf]On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware
2006 - Tim Güneysu, Christof Paar, Jan Pelzl
2nd Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2006, Cologne, Germany, April 3-4, 2006,. [pdf]How to Break DES for Euro 8,980
2006 - Sandeep Kumar, Christof Paar, Jan Pelzl, G. Pfeiffer, Andy Rupp, M. Schimmler
2nd Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2006, Cologne, Germany, April 3-4, 2006. [pdf]SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2)0
2006 - Andrey Bogdanov, M. Mertens, Christof Paar, Jan Pelzl, Andy Rupp
2nd Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2006, Cologne, Germany, April 3-4, 2006. [pdf]Seitenkanal-Analysen: Stand der Forschung in der Methodik
2006 - Kerstin Lemke-Rust, Christof Paar
D-A-CH Security 2006, Universität Düsseldorf, 28.-29. März 2006. [pdf]Provably Secure Password-Based Authentication in TLS
2006 - M. Abdalla, E. Bresson, O. Chevassut, Bodo Möller, D. Pointcheval
2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS'06),Taipei, Taiwan, März 21-24, 2006. [pdf]Higher Order Masking of the AES. CT-RSA 2006, The Cryptographers' Track
2006 - Kai Schramm, Christof Paar
at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings. Lecture Notes in Computer Science 3860, Springer 2006. [postscript]Testing Framework for eSTREAM Profile II Candidates
2006 - L. Batina, Sandeep Kumar, J. Lano, Kerstin Lemke-Rust, N. Mentens, Christof Paar, B. Preneel, K. Sakiyama, I. Verbauwhede
SASC 2006 - Stream Ciphers Revisited, Leuven, Belgium, February 2-3, 2006 [pdf]Embedded Security in Cars
2006 - Kerstin Lemke-Rust, Christof Paar, Marko Wolf
Springer Monograph Series, 2006. [web]Generalizations of the Karatsuba Algorithm for Efficient Implementations
2006 - André Weimerskirch, Christof Paar
Cryptology ePrint Archive: Report 2006/224. [pdf]Area-Time Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method
2005 - Jan Pelzl, M. Simka, T. Kleinjung, J. Franke, C. Priplata, C. Stahlke, M. Drutarovsky, V. Fischer, Christof Paar
IEE Proceedings on Information Security, Special Issue on Cryptographic Algorithms and Architectures for System-on-Chip, pp.67-78, vol. 152, No.1, October, 2005. [pdf]Cryptographic Component Identification: Enabler for Secure Vehicles
2005 - Katrin Höper, Christof Paar, André Weimerskirch, Marko Wolf
62nd IEEE Semiannual Vehicular Technology Conference (VTC Fall 2005), Dallas, Texas, USA. Proceedings, IEEE Press. September 25 - 28, 2005.A Stochastic Model for Differential Side Channel Cryptanalysis
2005 - Werner Schindler, Kerstin Lemke-Rust, Christof Paar
Cryptographic Hardware and Embedded Systems - - CHES 2005, 7th International Workshop, Edinburgh, UK. August 29 - September 1, 2005. [pdf]Templates as Master Keys
2005 - Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
Cryptographic Hardware and Embedded Systems - - CHES 2005, 7th International Workshop, Edinburgh, UK. August 29 - September 1, 2005. [postscript]SHARK - A Realizable Hardware Architecture for Factoring 1024-bit Composites with the GNFS
2005 - J. Franke, T. Kleinjung, Christof Paar, Jan Pelzl, C. Priplata, C. Stahlke
Cryptographic Hardware and Embedded Systems - - CHES 2005, 7th International Workshop, Edinburgh, UK, Proceedings. LNCS 3659, Springer-Verlag, August 29 - September 1, 2005. [pdf]Efficient Hardware Architectures for Modular Multiplication on FPGAs
2005 - D. Amanor, V. Bunimov, Christof Paar, Jan Pelzl
International Conference on Field Programmable Logic, Reconfigurable Computing and Applications, FPL 2005, Tampere, Finland, August 24-28, 2005. [pdf]An Efficient Masking Scheme for AES Software Implementations
2005 - Elisabeth Oswald, Kai Schramm
Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3786. [postscript]Cantor versus Harley: Optimization and Analysis of Explicit Formulae for Hyperelliptic Curve Cryptosystem
2005 - Thomas Wollinger, Jan Pelzl, Christof Paar
IEEE Transactions on Computers, Vol. 54, No. 7, pp. 861-872, July 2005. [pdf] [zip]CMOS Circular Geometry VCOs for Microwave Magnetic Field Generation
2005 - Tolga Yalcin, Volkan Sahin (Maxim Semiconductors), Giovanni Boero (EPFL), Radivoje Popovic (EPFL)
Radio Frequency integrated Circuits (RFIC) Symposium, 2005. Digest of Papers. 2005 IEEE [DOI] [pdf]An Instruction-Level Distributed Processor for Symmetric-Key Cryptography
2005 - A. Elbirt, Christof Paar
IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 5, pp. 468-480, May, 2005. [pdf]Hardware Factorization Based Elliptic Curve Method
2005 - M. Simka, Jan Pelzl, T. Kleinjung, J. Franke, C. Priplata, C. Stahlke, M. Drutarovsky, V. Fischer, Christof Paar
IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2005, Napa, CA, USA, April 17-20, 2005. [pdf]An Open Approach for Designing Secure Electronic Immobilizers
2005 - Kerstin Lemke-Rust, Ahmad-Reza Sadeghi, Christian Stüble
Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. [pdf]Digital Rights Management Systeme (DRMS) als Enabling Technology im Automobil
2005 - Christof Paar, André Weimerskirch, Marko Wolf
Sicherheit 2005, Regensburg, Germany. Proceedings, LNI. April 5 - 9, 2005.Performance of HECC Coprocessors Using Inversionfree Formulae
2005 - Thomas Wollinger, G. Bertoni, L. Breveglieri, Christof Paar
International Workshop on Information Security & Hiding (ISH '05) part of the International Conference on Computational Science and its Applications (ICCSA 2005), Singapore, May 9-12, 2005. [pdf] [postscript]An Efficient Hardware Architecture for Factoring large Numbers with the Elliptic Curve Method
2005 - J. Franke, T. Kleinjung, Christof Paar, Jan Pelzl, C. Priplata, M. Simka, C. Stahlke
1st Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2005, Paris, France, February 24-25, 2005. [pdf]SHARK - A Realizable Hardware Architecture for Factoring 1024-bit Composites with the GNFS
2005 - J. Franke, T. Kleinjung, Christof Paar, Jan Pelzl, C. Priplata, C. Stahlke
1st Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2005, Paris, France, February 24-25, 2005. [pdf]Encyclopedia of Cryptography and Security
2005 - Christof Paar
Advisory Board Member of the "Encyclopedia of Cryptography and Security", responsible for cryptographic implementation entries, Kluwer-Springer, 2005.IEE Proceedings on Computer & Digital Techniques
2005 - M. McLoone, Christof Paar, R. Woods (Eds.)
Special Issue on Cryptographic Algorithms and Architectures for System-on-Chip, 2005.Optimal Tower Fields for Hyperelliptic Curve Cryptosystems
2004 - Selcuk Baktir, Jan Pelzl, Thomas Wollinger, Berk Sunar, Christof Paar
38th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, USA, November 7-10, 2004. [pdf] [gzipped postscript]Some Thoughts about Implementation Properties of Stream Ciphers
2004 - Sandeep Kumar, Kerstin Lemke-Rust, Christof Paar
SASC - State of the Art of Stream Ciphers Workshop, Brugge, Belgium, October 14-15, 2004. [pdf]Security in Automotive Bus Systems
2004 - Christof Paar, André Weimerskirch, Marko Wolf
Automotive — Safety & Security 2004, Stuttgart, Germany. Proceedings. October 6 - 7, 2004.Architectural Support for Arithmetic in Optimal Extension Fields
2004 - Johann Großschädl, Sandeep Kumar, Christof Paar
IEEE 15th International Conference on Application-specific Systems, Architectures and Processors (ASAP) 2004, Galveston, Texas, September 27-29, 2004. [pdf]Reconfigurable Instruction Set Extension for enabling ECC on an 8-bit Processor
2004 - Sandeep Kumar, Christof Paar
International Conference on Field-Programmable Logic and Applications (FPL) 2004, Antwerp, Belgium, August 30 - September 1, 2004. [pdf]A Collision-Attack on AES Combining Side Channel- and Differential-Attack
2004 - Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August, 2004. [pdf]DPA on n-bit sized Boolean and Arithmetic Operations and its Application to IDEA, RC6 and the HMAC-Construction
2004 - Kerstin Lemke, Kai Schramm, Christof Paar
Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 2004 [pdf]Hyperelliptic Curve Coprocessors on a FPGA
2004 - H. Kim, Thomas Wollinger, Y. Choi, K. Chung, Christof Paar
Workshop on Information Security Applications - WISA, Jeju Island, Korea, August 23-25, 2004. [postscript]Elliptic and hyperelliptic curves on embedded µP
2004 - Thomas Wollinger, Jan Pelzl, V. Wittelsberger, Christof Paar, G. Saldamli, C. Koc
ACM Transactions in Embedded Computing Systems, Vol 3, No 3, pp 509-533, August 2004.Security on FPGAs: State-of-the-art implementations and attacks
2004 - Thomas Wollinger, Jorge Guajardo Merchan, Christof Paar
ACM Transactions in Embedded Computing Systems, Vol 3, No 3, pp 534-574, August 2004.Case Study: Compiler Comparison for an Embedded Cryptographical Application
2004 - E. Barteska, Christof Paar, Jan Pelzl, V. Wittelsberger, Thomas Wollinger
The 2004 International Conference on Embedded Systems and Applications - ESA 2004, Las Vegas, Nevada, USA, June 21-24, 2004 [pdf] [postscript]Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
2004 - G. Bertoni, L. Breveglieri, Thomas Wollinger, Christof Paar
International Conference on Information Technology: Coding and Computing - ITCC, Las Vegas, Nevada, USA, April 5-7, 2004. [pdf] [postscript]High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
2004 - Jan Pelzl, Thomas Wollinger, Christof Paar
International Conference on Information Technology: Coding and Computing - ITCC, Las Vegas, Nevada, USA, April 5-7, 2004. [pdf] [postscript]Eingebettete Sicherheit: State-of-the-art
2004 - Christof Paar, Jan Pelzl, Kai Schramm, André Weimerskirch, Thomas Wollinger
D-A-CH Security 2004, University of Basel, March 30-31, 2004. [pdf] [postscript]Authentikation in Ad-hoc und Sensornetzwerken
2004 - André Weimerskirch
GUUG-Frühjahrsfachgespräch 2004, Ruhr-Universität Bochum, Germany, 9-12 March, 2004. [pdf] [postscript]Embedded Security in Automobilanwendungen
2004 - Christof Paar
(Embedded Security in Automotive Applications, in German), Elektronik Automotive, January, 2004. [pdf]European Workshop on Security in Ad-hoc and Sensor Networks (ESAS 2004)
2004 - C. Castelluccia, H. Hartenstein, Christof Paar, D. Westhoff (Eds.)
Lecture Notes in Computer Science Heidelberg 3313, Heidelberg, Germany, 2004.Security aspects of FPGAs in cryptographic applications
2004 - Thomas Wollinger, Christof Paar
chapter in "New Algorithms, Architectures, and Applications for Reconfigurable Computing", Wolfgang Rosenstiel and Patrick Lysaght (eds.), Kluwer, 2004. [pdf]Embedded End-to-End Wireless Security with ECDH Key Exchange
2003 - Sandeep Kumar, Marco Girimondo, André Weimerskirch, Christof Paar, Arun Patel, Arvinderpal S.Wander
46th IEEE Midwest Symposium On Circuits and Systems, Cairo , Egypt, December 27-30, 2003. [pdf]Identity Certified Authentication for Ad-hoc Networks
2003 - André Weimerskirch, D. Westhoff
2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), October 31, 2003. [pdf] [gzipped postscript]Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003)
2003 - C. Walter, C. Koc, Christof Paar
Lecture Notes in Computer Science 2779, Springer Verlag, Cologne, Germany, September 08-10, 2003. [web]Eingebettete Sicherheit und Kryptographie im Automobil: Eine Einführung
2003 - Christof Paar, Thomas Wollinger
(Embedded Security and Cryptography in Automobiles: An Introduction, in German), Informatik 2003, Workshop: Automotive SW Engineering & Concepts, 33. Annual Meeting of the GI, Frankfurt/M., September 29 - October 2, 2003. [pdf] [gzipped postscript]Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
2003 - Jan Pelzl, Thomas Wollinger, Jorge Guajardo Merchan, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems - CHES, September 7-10, 2003. [pdf] [gzipped postscript]How Secure Are FPGAs in Cryptographic Applications? (Long Version)
2003 - Thomas Wollinger, Christof Paar
IACR, http://eprint.iacr.org, cryptology, ePrint archive: Report 2003/119, Juni 5, 2003. [web] [pdf] [gzipped postscript]Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications
2003 - G. Bertoni, Jorge Guajardo Merchan, Sandeep Kumar, G. Orlando, Christof Paar, Thomas Wollinger
In Marc Joye (Ed.): The Cryptographers' Track at the RSA Conference - CT-RSA 2003, volume LNCS 2612, pp. 158-175, San Francisco, CA, USA, April 13-17, 2003. [pdf] [gzipped postscript]IEEE Transactions on Computers
2003 - C. Koc, Christof Paar
Special issue on cryptographic hardware and embedded systems, April, 2003.Cryptography on FPGAs: State of the Art Implementations and Attacks
2003 - Thomas Wollinger, Jorge Guajardo Merchan, Christof Paar
to appear in the special issue on Embedded Systems and Security of the ACM Transactions in Embedded Computing Systems (TECS), March, 2003. [pdf] [zip]Elliptic & Hyperelliptic Curves on Embedded µP
2003 - Thomas Wollinger, Jan Pelzl, V. Wittelsberger, Christof Paar, G. Saldamli, C. Koc
to appear in the special issue on Embedded Systems and Security of the ACM Transactions in Embedded Computing Systems (TECS), March, 2003. [pdf] [zip]A New Class of Collision Attacks and its Application to DES
2003 - K. Schramm, Thomas Wollinger, Christof Paar
In proceedings of Fast Software Encryption 2003 (FSE), pp. 217-230, Lund, Sweden, February 24-26, 2003. [pdf] [gzipped postscript]Cryptography in Embedded Systems: An Overview
2003 - Thomas Wollinger, Jorge Guajardo Merchan, Christof Paar
(Invited Paper), In proceedings of the Embedded World 2003 Exhibition and Conference, pp.735-744, Design & Elektronik, Nuernberg, Germany, February 18-20, 2003. [pdf] [gzipped postscript]Hardware Architectures proposed for Cryptosystems Based on Hyperelliptic Curves
2002 - Thomas Wollinger, Christof Paar
9th IEEE International Conference on Electronics, Circuits and Systems - ICECS 2002, Dubrovnik, Croatia, September 15-18, 2002. [pdf] [gzipped postscript]Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002)
2002 - B. Kaliski, C. Koc, Christof Paar
Lecture Notes in Computer Science 2523, Springer Verlag, San Francisco Bay (Redwood City), USA, August 13-15, 2002. [web]Area Efficient GF(p) Architectures for GF(pm) Multipliers
2002 - Jorge Guajardo Merchan, Thomas Wollinger, Christof Paar
In proceedings of the 45th IEEE International Midwest Symposium on Circuits and Systems - MWSCAS 2002, Tulsa, Oklahoma, August 4-7, 2002. [pdf] [gzipped postscript]Algorithmic Self-Assembly of DNA Tiles and its Application to Cryptanalysis
2002 - O. Pelletier, André Weimerskirch
To be presented at the Genetic and Evoluationary Computation Conference 2002 (GECCO 2002), New York, July 9-13, 2002. City, USA. [pdf] [gzipped postscript]Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
2002 - Jorge Guajardo Merchan, Christof Paar
Designs, Codes and Cryptography, 25, pp. 207-216, 2002. [gz] [pdf]An FPGA-Based Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists
2001 - A. Elbirt, W. Yip, B. Chetwynd, Christof Paar
IEEE Transactions on VLSI, vol. 9, no. 4, pp. 545, August, 2001. [pdf] [gz]Elliptic Curve Cryptography on a Palm OS Device
2001 - André Weimerskirch, Christof Paar, S. Chang Shantz
Presented at The 6th Australasian Conference on Information Security and Privacy (ACISP 2001), Sydney, Australia, July 11-13 2001. [pdf] [gzipped postscript]A Distributed Light-Weight Authentication Model for Ad-hoc Networks
2001 - André Weimerskirch, G. Thonet
Presented at The 4th International Conference on Information Security and Cryptology (ICISC 2001), Seoul, South Korea, December 6-7, 2001. [pdf] [gzipped postscript]High Radix Montgomery Modular Exponentiation on Reconfigurable Hardware
2001 - T. Blum, Christof Paar
IEEE Transactions on Computers, vol 50, no. 7, pp. 759-764, July, 2001. [pdf] [gz]A scalable GF(p) elliptic curve processor architecture for programmable hardware"
2001 - G. Orlando, Christof Paar
Cryptographic Hardware and Embedded Systems, CHES 2001, Paris, France, May 14-16, 2001. [pdf]Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES 2001)
2001 - C. Koc, D. Naccache, Christof Paar
Lecture Notes in Computer Science 2162, Springer Verlag, Paris, France, May 14-16, 2001. [web]Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP430x33x Family of Microcontrollers
2001 - Jorge Guajardo Merchan, R. Bluemel, U. Krieger, Christof Paar
Presented at the International Workshop on Practice and Theory in Public Key Cryptography (PKC 2001), Cheju Island, Korea, February 13-15, 2001. [pdf] [gzipped postscript]Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography
2001 - D. Bailey, Christof Paar
Journal of Cryptology, vol. 14, no. 3, pp. 153-176 , 2001. [pdf] [gz]Elliptic Curve Cryptography on Smart Cards Without Coprocessors
2000 - A. Woodbury, D. Bailey, Christof Paar
Presented at the Fourth Smart Card Research and Advanced Applications (CARDIS 2000) Conference, Bristol, UK, September 20-22, 2000. [pdf] [pdf]A high-performance reconfigurable elliptic curve processor for GF(2m)
2000 - G. Orlando, Christof Paar
Cryptographic Hardware and Embedded Systems, CHES 2000, Worcester MA, USA, August 17-18, 2000. [pdf] [gzipped postscript]Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000)
2000 - C. Koc, Christof Paar
Lecture Notes in Computer Science 1965, Springer Verlag, Worcester Polytechnic Institute, Worcester, USA, August 17-18, 2000. [web]Squaring Architecture for GF(2^m) and its Applications in Cryptographic Systems
2000 - G. Orlando, Christof Paar
Electronic Letters, vol. 36, no. 13, pp. 1116-1117, June, 2000. [pdf] [gz]An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists
2000 - A. J. Elbirt, W. Yip, B. Chetwynd, Christof Paar
The Third Advanced Encryption Standard (AES3) Candidate Conference, New York, USA, April 13-14, 2000. [pdf] [gzipped postscript]How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP
2000 - Thomas Wollinger, M. Wang, Jorge Guajardo Merchan, Christof Paar
The Third Advanced Encryption Standard (AES3) Candidate Conference, New York, USA, April 13-14, 2000. [pdf] [gzipped postscript]An FPGA Implementation and Performance Evaluation of the Serpent Block Cipher
2000 - A. Elbirt, Christof Paar
Eighth ACM International Symposium on Field-Programmable Gate Arrays, Monterey, California, February 10-11, 2000. [pdf] [gzipped postscript]A low-power system-on-chip for telecommunications: single chip digital FM receiver/demodulator IP
1999 - Tolga Yalcin, Neslin Ismailoglu (TUBITAK)
Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on [DOI] [pdf]Algorithmenunabhängige Krypto-Hardware
1999 - Christof Paar
(Algorithm Independent Crypto Hardware, in German), Datenschutz und Datensicherheit, vol. 23, no. 10, pp. 562-564, October, 1999.DES auf FPGAs
1999 - J.-P. Kaps, Christof Paar
(DES on FPGAs, in German) Datenschutz und Datensicherheit, vol. 23, no. 10, pp. 565-569, October, 1999.Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents
1999 - Christof Paar, P. Fleischmann, P. Soria-Rodriguez
IEEE Transactions on Computers, vol. 48, no. 10, pp. 1025-1034, October, 1999. [gz] [pdf]An Algorithm-Agile Cryptographic Co-processor Based on FPGAs
1999 - Christof Paar, B. Chetwynd, T. Connor, S. Y. Deng, S. Marchant
The SPIE's Symposium on Voice, Video, and Data Communications, Boston, MA, September 19-22, 1999 [pdf] [gzipped postscript]Towards an FPGA Architecture Optimized for Public-Key Algorithms
1999 - A. Elbirt, Christof Paar
The SPIE's Symposium on Voice, Video, and Data Communications, Boston, MA. September 19-22, 1999. [pdf]Low-power design of a digital FM demodulator based on zero-cross detection at IF
1999 - Tolga Yalcin, Neslin Ismailoglu (TUBITAK)
Vehicular Technology Conference, 1999. VTC 1999 - Fall. IEEE VTS 50th [DOI] [pdf]Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES ’99)
1999 - C. Koc, Christof Paar
"", Lecture Notes in Computer Science 1717, Springer Verlag, Worcester Polytechnic Institute, Worcester, USA, August 12-13, 1999. [web]Design of a fully-static differential low-power CMOS flip-flop
1999 - Tolga Yalcin, Neslin Ismailoglu (TUBITAK)
[DOI] [pdf]Cryptography in Modern Communication Systems (Extended Abstract)
1999 - Daniel V. Bailey, William Cammack, Jorge Guajardo Merchan, Christof Paar
Invited presentation at TI DSPS FEST '99, Houston, Texas, USA, 1999 [pdf] [gzipped postscript]A Super-Serial Galois Field Multiplier for FPGAs and its Application to Public-Key Algorithms
1999 - G. Orlando, Christof Paar
Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 99), Napa Valley, CA, April 21-23, 1999. [ps]Montgomery Modular Multiplication on Reconfigurable Hardware"
1999 - T. Blum, Christof Paar
14th IEEE Symposium on Computer Arithmetic (ARITH-14), Adelaide, Australia, April 14-16, 1999. [ps]Low-power design of a 64-tap, 4-bit digital matched filter using systolic array architecture and CVSL circuit techniques in CMOS
1998 - Tolga Yalcin, Neslin Ismailoglu (TUBITAK)
Signals, Systems & Computers, 1998. Conference Record of the Thirty-Second Asilomar Conference on [DOI] [pdf]Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms
1998 - D. Bailey, Christof Paar
CRYPTO '98, Santa Barbara, CA, USA, August 23-27, 1998 [ps] [pdf]Fast Inversion in Composite Galois Fields GF((2n)m)
1998 - Jorge Guajardo Merchan, Christof Paar
1998 IEEE International Symposium on Information Theory, MIT, Cambridge, MA, USA, August 16-21, 1998. [ps]Fast DES Implementation for FPGAs and its Application to a Universal Key-Search Machine
1998 - J.-P. Kaps, Christof Paar
5th Annual Workshop on Selected Areas in Cryptography (SAC '98), Queen's University, Kingston, Ontario, Canada, August 17-18, 1998. [ps]Efficient Multiplier Architectures for Galois Fields GF((2^n)^4)
1998 - Christof Paar, P. Fleischmann, P. Roelse
IEEE Transactions on Computers, vol. 47, no. 2, pp. 162-170, February 1998. [ps]Efficient Algorithms for Elliptic Curve Cryptosytems
1997 - Jorge Guajardo Merchan, Christof Paar
CRYPTO '97, Santa Barbara, CA, USA, August 17-21, 1997. [ps]On Efficient Inversion in Tower Fields of Characteristic Two
1997 - J.L. Fan, Christof Paar
1997 IEEE International Symposium on Information Theory, Ulm, Germany, June 29 - July 4, 1997. [ps]Optimized Arithmetic for Reed-Solomon Encoders
1997 - Christof Paar
1997 IEEE International Symposium on Information Theory, Ulm, Germany, June 29 - July 4, 1997. [ps]Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2n)m)
1997 - Christof Paar, P. Soria-Rodriguez
EUROCRYPT '97, Konstanz, Germany, May 11-15, 1997. [ps]Comparison of Arithmetic Architectures for Reed-Solomon Decoders in Reconfigurable Hardware
1997 - Christof Paar, M. Rosner
Fifth Annual IEEE Symposium on Field-Programmable Custom Computing Machines "FCCM '97", Nappa Valley, CA, USA, April 16-18, 1997. [web] [ps]Securing ATM
1997 - G. Haskins, Christof Paar, S. Dempsey
1997 RSA Data Security Conference, San Francisco, CA, USA, January 28-31, 1997. [web]A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composite Fields
1996 - Christof Paar
IEEE Transactions on Computers, vol. 45, no. 7, pp. 856-861, July, 1996. [ps]Recent Developments in Digital Wireless Network Security
1996 - G. Pierce, Christof Paar
Massachusetts Telecommunication Council and UMass Technical Conference on Telecommunications, Lowell, March, 1996. [ps]Some Remarks on Efficient Inversion in Finite Fields
1995 - Christof Paar
1995 IEEE International Symposium on Information Theory, Whistler, B.C. Canada, September, 1995. [ps]A Comparitive VLSI Synthesis of Finite Field Multipliers
1995 - Christof Paar, N. Lange
3rd International Symposium on Communication Theory and its Applications, Lake District, UK, July, 1995. [ps]Implementation of a Reprogrammable Reed-Solomon Decoder over GF(216) on a Digital Signal Processor with External Arithmetic Unit
1994 - Christof Paar, O. Hooijen
Fourth International European Space Agency (ESA) Workshop on Digital Signal Processing Techniques Applied to Space Communications, King's College, London, September, 1994. [ps]Low Complexity Parallel Multipliers for Galois Fields GF((2n)4) Based on Special Types of Primitive Polynomials
1994 - Christof Paar
1994 IEEE International Symposium on Information Theory, Trondheim, Norway, June, 1994