Evaluation of SHA-3 Candidates for 8-bit Embedded Processors

2010 - Stefan Heyse, Ingo von Maurich, Alexander Wild, Cornel Reuber, Johannes Rave, Thomas Pöppelmann, Chris­tof Paar, Thomas Eisenbarth

2nd SHA-3 Candidate Conference, August 23-24, 2010, University of California, Santa Barbara, USA. [Paper]

Correlation-Enhanced Power Analysis Collision Attack

2010 - Amir Moradi, Oliver Mischke, Thomas Eisenbarth

Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings [BibTeX] [DOI] [pdf]

PRINTcipher: A Block Cipher for IC-Printing

2010 - Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings [DOI] [bib]

Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs

2010 - Andrey Bogdanov, Thomas Eisenbarth, Chris­tof Paar, M. Wienecke

Topics in Cryptology - CT-RSA 2010, LNCS, Springer-Verlag. [pdf]

Secure Location Verification - A Security Analysis of GPS Signal Authentication

2010 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Chris­tof Paar

DBSec 2010, Rome, Italy, June 21-23, 2010, to be published in Springer LNCS. [pdf]

A Pipelined Camellia Architecture for Compact Hardware Implementation

2010 - Elif Bilge Kavun, Tolga Yalcin

In Proceedings of the 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP’10), pages 305 - 308, IEEE, Rennes, France, July 7-9, 2010 [DOI]

A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree

2010 - Carl Bracken, Gregor Leander

Finite Fields and Their Applications Volume 16, Issue 4, July 2010, Pages 231–242 [DOI] [bib]

Side-channel based watermarks for integrated circuits

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. [pdf]

A Lightweight Implementation of KECCAK Hash Function for Radio-Frequency Identification Applications

2010 - Elif Bilge Kavun, Tolga Yalcin

Proceedings of the 6th Workshop on RFID Security (RFIDSec'11), Istanbul, Turkey, June 7-9, 2010 [DOI] [pdf]

Practical Power Analysis Attacks on Software Implementations of McEliece

2010 - Stefan Heyse, Amir Moradi, Chris­tof Paar

Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings [DOI] [BibTeX] [bib] [pdf]