Publications

Wie arbeiten Reverse Engineers?

2019 - Steffen Becker, Wiesen, Carina, Rummel, Nikol, Chris­tof Paar

Datenschutz und Datensichicherheit (2019) 43: 686. [DOI] [PDF]

Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed

2019 - Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 2, pp 256-292, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) **best paper award** [pdf] [doi]

Exploring the Effect of Device Aging on Static Power Analysis Attacks

2019 - Naghmeh Karimi, Thorben Moos, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 3, pp 233-256, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) [pdf] [doi]

Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments

2019 - Thorben Moos

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 3, pp 202-232, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) [pdf] [doi]

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

2019 - Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh

IACR Tran­sac­tions on Sym­me­tric Cryp­to­lo­gy, Vol. 2019, No. 1, pp 5-45, 2019. (presentation at FSE 2019, Paris, France, March 25–28, 2019) [pdf] [doi] [website]

Hardware Masking, Revisited

2018 - Thomas De Cnudde, Maik Ender, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 2, pp 123-148, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI]

Leakage Detection with the χ²-Test

2018 - Amir Moradi, Bastian Richter, Tobias Schneider, François-Xavier Standaert

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 1, pp 209-237, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI]

Spin Me Right Round - Rotational Symmetry for FPGA-Specific AES

2018 - Lauren De Meyer, Amir Moradi, Felix Wegener

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 3, pp 596-626, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI] [VHDL]

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

2018 - Max Hoffmann, Chris­tof Paar

IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925,Vol. 2018, No. 2, pp. 277–297 [pdf] [DOI]

Standard Lattice-Based Key Encapsulation on Embedded Devices

2018 - James Howe, Tobias Oder, Markus Krausz, Tim Güneysu

IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 3 [pdf]

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

2018 - Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Mathias Wilhelm, Tobias Weidlich, Russell Tessier, Chris­tof Paar

IEEE Transactions on Dependable and Secure Computing (to appear)

Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors

2018 - Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Chris­tof Paar

IEEE Transactions on Computers, Volume 67, Issue 3, pp. 307-321, 2018. [DOI]

Optical metrology for the investigation of buried technical structures

2018 - Lena Göring, Markus Finkeldey, Falk Schellenberg, Carsten Brenner, Martin R. Hofmann , Nils C. Gerhardt

tm-Technisches Messen, 2018, 85(2), 104-110.

Practical CCA2-Secure and Masked Ring-LWE Implementation

2018 - Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu

IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 1 [pdf]

Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs

2018 - Pawel Swierczynski, Georg T. Becker, Amir Moradi, Chris­tof Paar

IEEE Transactions on Computers, vol. 67, no. 3, pp. 348-360, 2018. [pdf] [DOI]

GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs

2018 - Alexander Wild, Amir Moradi, Tim Güneysu

IEEE Transactions on Computers, vol. 67, no. 3, pp. 375-387, 2018. [DOI]

IoT-Schlüsselmanagement

2017 - Heiko Koepke, Thorben Lenze, Mario Pietersz, Christian Zenger

Datenschutz und Datensicherheit 10/2017, vol. 41, pp. 617-622, Springer Gabler [DOI]

High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers

2017 - Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede

ACM Transactions on Embedded Computing Systems (TECS) TECS Volume 16 Issue 4, July 2017 Article No. 117, ACM New York, NY, USA. [ACM] [pdf]

Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds

2017 - Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens

IACR Transactions on Symmetric Cryptology - Issue 2-2017 [pdf] [DOI]

Backside imaging of a microcontroller with common-path digital holography

2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Nils C. Gerhardt, Martin R. Hofmann

Proc. SPIE. 10127, Practical Holography XXXI: Materials and Applications, 1012704. (February 15, 2017) doi: 10.1117/12.2250903

Multimodal backside imaging of a microcontroller using confocal laser scanning and optical-beam-induced current imaging

2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Carsten Brenner, Nils C. Gerhardt, Martin R. Hofmann

Proc. SPIE. 10110, Photonic Instrumentation Engineering IV, 101101F. (February 20, 2017) doi: 10.1117/12.2250912

Authenticated Key Establishment for Low-Resource Devices Exploiting Correlated Random Channels

2016 - Christian Zenger, Mario Pietersz, Jan Zimmer, Jan-Felix Posielek, Thorben Lenze, Chris­tof Paar

[pdf]

Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive

2016 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Chris­tof Paar

Journal of Cryptographic Engineering, Springer, June 2016. [DOI] [pdf]

Common-path depth-filtered digital holography for high resolution imaging of buried semiconductor structures

2016 - Markus Finkeldey, Falk Schellenberg, Nils C. Gerhardt, Chris­tof Paar, Martin R. Hofmann

Proc. SPIE 9771, Practical Holography XXX: Materials and Applications, 97710G (7 March 2016); doi: 10.1117/12.2212454 [DOI]

Leakage Assessment Methodology - Extended Version

2016 - Tobias Schneider, Amir Moradi

Journal of Cryptographic Engineering June 2016, Volume 6, Issue 2, pp 85–99 [DOI]

Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rai­ner Stein­wandt

IEEE Transactions on Information Forensics and Security, vol.PP, no.99, pp.1-1 DOI: 10.1109/TIFS.2015.2509944 [IEEEXplore] [pdf]

Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography

2015 - Pascal Sasdrich, Tim Güneysu

ACM Transactions on Reconfigurable Technology and Systems (TRETS) - Special Section on the 2014 International Symposium on Applied Reconfigurable Computing, Volume 9, Issue 1, November 2015, Article No. 3, ACM New York, NY, USA [Bibtex] [DOI] [pdf]

MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography

2015 - Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings [DOI]

Security Analysis of Quantization Schemes for Channel-based Key Extraction

2015 - Christian Zenger, Jan Zimmer, Chris­tof Paar

EAI Endorsed Transactions on Security and Safety, vol. 15, no. 6 [DOI] [PDF]

On the Pitfalls of using Arbiter-PUFs as Building Blocks

2015 - Georg T. Becker

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, TCAD, 34 (8):1-13, August 2015 [DOI] [pdf]

A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation

2015 - Andreas Gornik, Amir Moradi, Jürgen Oehm, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 34, No.8, pages 1308-1319, 2015. [pdf] [DOI]

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers

2015 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Chris­tof Paar, Ana Helena Sánchez, Peter Schwabe

Designs, Codes and Cryptography comprising the “Special Issue on Cryptography, Codes, Designs and Finite Fields: In Memory of Scott A. Vanstone”, Springer-Verlag. [link] [MSP430 SW for IAR]

Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport

2015 - Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Chris­tof Paar

ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 3, March 2015, Article No. 10 [link]

FPGA Trojans through Detecting and Weakening of Cryptographic Primitives

2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]

Implementing QC-MDPC McEliece Encryption

2015 - Ingo von Maurich, Tobias Oder, Tim Güneysu

ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on Embedded Platforms for Crypto and Regular Papers TECS, Volume 14 Issue 3, May 2015, Article No. 44, ACM New York, NY, USA. [PDF]

Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs

2014 - Pawel Swierczynski, Amir Moradi, David Oswald, Chris­tof Paar

ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 7 Issue 4, December 2014. [DOI] [pdf]

Microcontrollers as (In)Security Devices for Pervasive Computing Applications

2014 - Daehyun Strobel, David Oswald, Bastian Richter, Falk Schellenberg, Chris­tof Paar

Proceedings of the IEEE, vol. 102, no. 8, pp. 1157-1173, 2014 [PDF (Open Access)] [bib]

Stealthy dopant-level hardware Trojans: extended version

2014 - Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson

Journal of Cryptographic Engineering 4.1 (2014): 19-31 [DOI] [PDF] [BIB]

Large-Scale High-Resolution Computational Validation of Novel Complexity Models in Linear Cryptanalysis

2014 - Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalcin

In Journal of Computational and Applied Mathematics, volume 259, part B, pages 592-598, Elsevier, March 15, 2014 [DOI]

Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis

2014 - Tobias Schneider, Ingo von Maurich, Tim Güneysu, David Oswald

Journal of Signal Processing Systems, Springer, 2014. [DOI] [BibTeX]

An Experimental Security Analysis of Two Satphone Standards

2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz

ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]

Keccak und der SHA-2

2013 - Pawel Swierczynski, Gregor Leander, Chris­tof Paar

DuD - Da­ten­schutz und Da­ten­si­cher­heit Aus­ga­be 11/2013 [bib]

SPONGENT: The Design Space of Lightweight Cryptographic Hashing

2013 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede

IEEE Trans. Computers vol. 62, number 10, 2013 [bib]

One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores

2013 - Amir Moradi, Oliver Mischke, Chris­tof Paar

IEEE Transactions on Computers, vol. 62, no. 9, pp. 1786-1798, Sept. 2013. [DOI] [BibTeX] [pdf]

Bounds in Shallows and in Miseries

2013 - Céline Blondeau, Andrey Bogdanov, Gregor Leander

Advances in Cryptology – CRYPTO 2013 Lecture Notes in Computer Science Volume 8042, 2013, pp 204-221 [bib]

When Reverse-Engineering Meets Side-Channel Analysis–Digital Lockpicking in Practice

2013 - David Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Chris­tof Paar

Selected Areas in Cryptography -- SAC 2013, Springer Berlin Heidelberg, 2014, 571-588 [bib]

Wireless Devices and Cryptography: About Digital Pickpocketing, Open Sesame and Tracking Paranoia

2013 - Timo Kasper

it - Information Technology: Vol. 55, No. 3, pp. 123-128 [pdf] [bib]

A new construction of bent functions based on Z-bent functions

2013 - Sugata Gangopadhyay, Anand Joshi, Gregor Leander, Rajendra Kumar Sharma

Designs, Codes and Cryptography January 2013, Volume 66, Issue 1-3, pp 243-256 [bib]

Anonymität und Gesichtserkennung

2013 - Benedikt Driessen, Markus Dürmuth

digma, Zeitschrift für Datenrecht und Informationssicherheit, 2013.

Slender-Set Differential Cryptanalysis

2013 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen

Journal of Cryptology January 2013, Volume 26, Issue 1, pp 11-38 [bib]

Integral and Multidimensional Linear Distinguishers with Correlation Zero

2012 - Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang

Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings [bib]

Side Channels as Building Blocks

2012 - Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Chris­tof Paar, Wayne Burleson

Journal of Cryptographic Engineering, Volume 2, Number 3, pages 143-159, 2012, Springer. [DOI] [BibTeX] [pdf]

On the Distribution of Linear Biases: Three Instructive Examples

2012 - Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander

Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings [bib]

Detecting Software Theft in Embedded Systems: A Side-Channel Approach

2012 - Georg T. Becker, Daehyun Strobel, Chris­tof Paar, Wayne Burleson

IEEE Transactions on Information Forensics and Security, , vol.7, no.4, pp.1144,1154, Aug. 2012 [bib] [pdf]

IT-Sicherheit in der Elektromobilität

2012 - Chris­tof Paar, Marko Wolf, Ingo von Maurich

ATZelektronik, volume 7, issue 4, pp 274-279, Springer, 2012.

A new construction of highly nonlinear S-boxes

2012 - Peter Beelen, Gregor Leander

Cryptography and Communications Volume 4, Issue 1, pp 65-77 [bib]

Praktische Angriffe auf die Bitstromverschlüsselung von Xilinx FPGAs

2011 - Markus Kasper, Timo Kasper, Amir Moradi, Chris­tof Paar

Datenschutz und Datensicherheit - DuD - Ausgabe 11/2011 - http://www.dud.de/Ausgabe/2011-11.html [Dud Webseite] [pdf]

Seitenkanalanalyse kontaktloser SmartCards

2011 - Timo Kasper, David Oswald, Chris­tof Paar

Datenschutz und Datensicherheit - DuD - Ausgabe 11/2011 - http://www.dud.de/Ausgabe/2011-11.html [DuD Webseite] [pdf]

Switchings, extensions, and reductions in central digraphs

2011 - André Kündgen, Gregor Leander, Carsten Thomassen

Journal of Combinatorial Theory, Series A Volume 118, Issue 7, October 2011, Pages 2025–2034 [DOI] [bib]

Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods

2011 - Amir Moradi, Mario Kirschbaum, Thomas Eisenbarth, Chris­tof Paar

IEEE Transactions on Very Large Scale Integration Systems, Volume 20 , Issue 9, Pages 1578 - 1589, 2012. [DOI] [pdf]

Bounds on the degree of APN polynomials: the case of x^(-1) + g(x)

2011 - Gregor Leander, François Rodier

Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 207-222 [DOI] [bib]

Counting all bent functions in dimension eight 99270589265934370305785861242880

2011 - Philippe Langevin, Gregor Leander

Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 193-205 [DOI] [bib]

Side-Channel Resistant Crypto for less than 2,300 GE

2011 - Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling

Journal of Cryptology, Special Issue on Hardware and Security, Volume 24, Number 2, pages 322-345, April 2011. [DOI] [pdf] [bib]

Building a Side Channel Based Disassembler

2010 - Thomas Eisenbarth, Chris­tof Paar, Björn Weghenkel

Lecture Notes in Computer Science, 2010 [web] [bib]

A Versatile Framework for Implementation Attacks on Cryptographic and Embedded Devices

2010 - Timo Kasper, David Oswald, Chris­tof Paar

Lecture Notes in Computer Science, 2010 [web] [bib] [pdf]

DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs

2010 - S. Drimer, Tim Güneysu, Chris­tof Paar

ACM Transactions on Reconfigurable Technology and Systems (TRETS), Vol. 3. 2010.

A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree

2010 - Carl Bracken, Gregor Leander

Finite Fields and Their Applications Volume 16, Issue 4, July 2010, Pages 231–242 [DOI] [bib]

Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology

2009 - Francesco Regazzoni, Thomas Eisenbarth, Dipl.-Kfm. Axel Poschmann, Johann Großschädl, Frank Gurkaynak, Marco Macchetti, Zeynep Toprak, Laura Pozzi, Chris­tof Paar, Yusuf Leblebici, Paolo Ienne

Transactions on Computational Science IV, 2009. [bib] [pdf]

Single-chip detector for electron spin resonance spectroscopy

2008 - Tolga Yalcin, Giovanni Boero (EPFL)

Review of Scientific Instruments 79, 094105 (2008) [DOI] [pdf]

Sicherheit moderner Funktüröffnersysteme

2008 - Thomas Eisenbarth, Timo Kasper, Chris­tof Paar

Datenschutz und Datensicherheit - DuD Volume 32 Ausgabe 8 - August 2008 - http://www.springerlink.com/content/1614-0702/32/8/ - http://www.dud.de/ [Webseite] [pdf]

On the classification of APN functions up to dimension five

2008 - Marcus Brinkmann, Gregor Leander

Des. Codes Cryptogr. (2008) 49: 273. [DOI] [pdf]

Cryptanalysis with COPACOBANA

2008 - Tim Güneysu, Timo Kasper, Martin Novotny, Chris­tof Paar, Andy Rupp

IEEE Transactions on Computers, November 2008, vol. 57, no. 11, 2008. [pdf]

A Survey of Lightweight Cryptography Implementations

2007 - Thomas Eisenbarth, Sandeep Kumar, Chris­tof Paar, Dipl.-Kfm. Axel Poschmann, L. Uhsadel

IEEE Design & Test of Computers -- Special Issue on Secure ICs for Secure Embedded Computing vol 24, no 6, pp 522-533, November 2007. [web] [pdf] [bib]

A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain

2007 - S. Baktir, Sandeep Kumar, Chris­tof Paar, B. Sunar

Mobile Networks and Applications (MONET) Journal, Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing, vol 12, no 4, pp 259-270, September 2007. [web] [pdf]

State of the Art: Embedding Security in Vehicles

2007 - André Weimerskirch, Marko Wolf, Thomas Wollinger

EURASIP Journal on Embedded Systems (EURASIP JES), Special Issue: Embedded Systems for Intelligent Vehicles, April, 2007.

Embedded security in a pervasive world

2007 - Chris­tof Paar, André Weimerskirch

Elsevier Science’s Information Security Technical Report, vol 12, no 3, pp 155-161, 2007. [web] [pdf]

Optimum Digit Serial GF(2^m) Multipliers for Curve Based Cryptography

2006 - Sandeep Kumar, Thomas Wollinger, Chris­tof Paar

IEEE Transactions on Computers, Volume 55, Issue 10, pp. 1306-1311, October 2006. [pdf]

Efficient Hardware Implementation of Finite Fields with Applications to Cryptography

2006 - Jorge Guajardo Merchan, Tim Güneysu, Sandeep Kumar, Chris­tof Paar, Jan Pelzl

Acta Applicandae Mathematicae: An International Survey Journal on Applying Mathematics and Mathematical Applications, Volume 93, Numbers 1-3, pp. 75-118, September 2006. [DOI] [pdf]

Efficient Software-Implementation of Finite Fields with Applications to Cryptography

2006 - Jorge Guajardo Merchan, Sandeep Kumar, Chris­tof Paar, Jan Pelzl

Acta Applicandae Mathematicae: An International Survey Journal on Applying Mathematics and Mathematical Applications, Volume 93, Numbers 1-3, pp. 3-32, September 2006. [web] [pdf]

Area-Time Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method

2005 - Jan Pelzl, M. Simka, T. Kleinjung, J. Franke, C. Priplata, C. Stahlke, M. Drutarovsky, V. Fischer, Chris­tof Paar

IEE Proceedings on Information Security, Special Issue on Cryptographic Algorithms and Architectures for System-on-Chip, pp.67-78, vol. 152, No.1, October, 2005. [pdf]

Cantor versus Harley: Optimization and Analysis of Explicit Formulae for Hyperelliptic Curve Cryptosystem

2005 - Thomas Wollinger, Jan Pelzl, Chris­tof Paar

IEEE Transactions on Computers, Vol. 54, No. 7, pp. 861-872, July 2005. [pdf] [zip]

An Instruction-Level Distributed Processor for Symmetric-Key Cryptography

2005 - A. Elbirt, Chris­tof Paar

IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 5, pp. 468-480, May, 2005. [pdf]

Elliptic and hyperelliptic curves on embedded µP

2004 - Thomas Wollinger, Jan Pelzl, V. Wittelsberger, Chris­tof Paar, G. Saldamli, C. Koc

ACM Transactions in Embedded Computing Systems, Vol 3, No 3, pp 509-533, August 2004.

Security on FPGAs: State-of-the-art implementations and attacks

2004 - Thomas Wollinger, Jorge Guajardo Merchan, Chris­tof Paar

ACM Transactions in Embedded Computing Systems, Vol 3, No 3, pp 534-574, August 2004.

Embedded Security in Automobilanwendungen

2004 - Chris­tof Paar

(Embedded Security in Automotive Applications, in German), Elektronik Automotive, January, 2004. [pdf]

Security aspects of FPGAs in cryptographic applications

2004 - Thomas Wollinger, Chris­tof Paar

chapter in "New Algorithms, Architectures, and Applications for Reconfigurable Computing", Wolfgang Rosenstiel and Patrick Lysaght (eds.), Kluwer, 2004. [pdf]

Cryptography on FPGAs: State of the Art Implementations and Attacks

2003 - Thomas Wollinger, Jorge Guajardo Merchan, Chris­tof Paar

to appear in the special issue on Embedded Systems and Security of the ACM Transactions in Embedded Computing Systems (TECS), March, 2003. [pdf] [zip]

Elliptic & Hyperelliptic Curves on Embedded µP

2003 - Thomas Wollinger, Jan Pelzl, V. Wittelsberger, Chris­tof Paar, G. Saldamli, C. Koc

to appear in the special issue on Embedded Systems and Security of the ACM Transactions in Embedded Computing Systems (TECS), March, 2003. [pdf] [zip]

Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes

2002 - Jorge Guajardo Merchan, Chris­tof Paar

Designs, Codes and Cryptography, 25, pp. 207-216, 2002. [gz] [pdf]

An FPGA-Based Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists

2001 - A. Elbirt, W. Yip, B. Chetwynd, Chris­tof Paar

IEEE Transactions on VLSI, vol. 9, no. 4, pp. 545, August, 2001. [pdf] [gz]

High Radix Montgomery Modular Exponentiation on Reconfigurable Hardware

2001 - T. Blum, Chris­tof Paar

IEEE Transactions on Computers, vol 50, no. 7, pp. 759-764, July, 2001. [pdf] [gz]

Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography

2001 - D. Bailey, Chris­tof Paar

Journal of Cryptology, vol. 14, no. 3, pp. 153-176 , 2001. [pdf] [gz]

Squaring Architecture for GF(2^m) and its Applications in Cryptographic Systems

2000 - G. Orlando, Chris­tof Paar

Electronic Letters, vol. 36, no. 13, pp. 1116-1117, June, 2000. [pdf] [gz]

Algorithmenunabhängige Krypto-Hardware

1999 - Chris­tof Paar

(Algorithm Independent Crypto Hardware, in German), Datenschutz und Datensicherheit, vol. 23, no. 10, pp. 562-564, October, 1999.

DES auf FPGAs

1999 - J.-P. Kaps, Chris­tof Paar

(DES on FPGAs, in German) Datenschutz und Datensicherheit, vol. 23, no. 10, pp. 565-569, October, 1999.

Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents

1999 - Chris­tof Paar, P. Fleischmann, P. Soria-Rodriguez

IEEE Transactions on Computers, vol. 48, no. 10, pp. 1025-1034, October, 1999. [gz] [pdf]

Efficient Multiplier Architectures for Galois Fields GF((2^n)^4)

1998 - Chris­tof Paar, P. Fleischmann, P. Roelse

IEEE Transactions on Computers, vol. 47, no. 2, pp. 162-170, February 1998. [ps]

A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composite Fields

1996 - Chris­tof Paar

IEEE Transactions on Computers, vol. 45, no. 7, pp. 856-861, July, 1996. [ps]
Page: