Publications

Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rai­ner Stein­wandt

IEEE Transactions on Information Forensics and Security, vol.PP, no.99, pp.1-1 DOI: 10.1109/TIFS.2015.2509944 [IEEEXplore] [pdf]

Finding the AES Bits in the Haystack: Reverse Enginering and SCA Using Voltage Contrast

2015 - Christian Kison, Jürgen Frinken, Chris­tof Paar

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 - 16, 2015 [Springer]

Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography

2015 - Pascal Sasdrich, Tim Güneysu

ACM Transactions on Reconfigurable Technology and Systems (TRETS) - Special Section on the 2014 International Symposium on Applied Reconfigurable Computing, Volume 9, Issue 1, November 2015, Article No. 3, ACM New York, NY, USA [Bibtex] [DOI] [pdf]

got HW crypto? On the (in)security of a Self-Encrypting Drive series

2015 - Gunnar Alendal, Christian Kison, modg

Hardware Security Conference and Training, Hardwear.io 2015, The Hague, Netherlands, Oct 1-2, 2015 [pdf]

Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?

2015 - Amir Moradi, Alexander Wild

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 (best paper can­di­da­te). [pdf] [DOI]

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations

2015 - Tobias Schneider, Amir Moradi

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]

On the Complexity Reduction of Laser Fault Injection Campaigns using OBIC Measurements

2015 - Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schäpers, Nils C. Gerhardt, Martin R. Hofmann , Chris­tof Paar

Fault Diagnosis and Tolerance in Cryptography - FDTC 2015, Saint Malo, France, September 13, 2015. [DOI] [pdf]

The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs

2015 - Georg T. Becker

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 - 16, 2015 [PDF]

Exploiting the Physical Environment for Securing the Internet of Things

2015 - Christian Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Chris­tof Paar

New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8–11, 2015 [pdf]

Bringing PHY-based Key Generation into the Field: An Evaluation for Practical Scenarios

2015 - Rene Guillaume, Fredrik Winzer, Christian Zenger, Chris­tof Paar, Andreas Czylwik

82nd Vehicular Technology Conference, VTC 2015, Boston, USA, 6-9 September, 2015 [PDF]

MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography

2015 - Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings [DOI]

Affine Equivalence and its Application to Tightening Threshold Implementations

2015 - Pascal Sasdrich, Amir Moradi, Tim Güneysu

22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015 [pdf]

Masking Large Keys in Hardware: A Masked Implementation of McEliece

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt

22nd Conference on Selected Areas in Cryptography (SAC 2015), Sackville, New Brunswick, Canada, August 12-14, 2015, to ap­pe­ar. [eprint]

Security Analysis of Quantization Schemes for Channel-based Key Extraction

2015 - Christian Zenger, Jan Zimmer, Chris­tof Paar

EAI Endorsed Transactions on Security and Safety, vol. 15, no. 6 [DOI] [PDF]

Advances in Side-Channel Security

2015 - Amir Moradi

Habilitation Thesis [pdf] [URN]

On-line Entropy Estimation for Secure Information Reconciliation

2015 - Christian Zenger, Jan Zimmer, Jan-Felix Posielek, Chris­tof Paar

Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]

Security Analysis of Quantization Schemes for Channel-based Key Extraction

2015 - Christian Zenger, Jan Zimmer, Chris­tof Paar

Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]

Development of a Layout-Level Hardware Obfuscation Tool

2015 - Shweta Malik, Georg T. Becker, Chris­tof Paar, Wayne P. Burleson

IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015 (Invited Paper), Montpellier, France, July 2015 [PDF]

On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation

2015 - Johannes Tobisch, Georg T. Becker

11th Workshop on RFID Security (RFIDSec 2015), New York, USA, June 23-24, 2015 [pdf]

Security Evaluation and Enhancement of Bistable Ring PUFs

2015 - Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson

Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers & Lecture Notes in Computer Science, vol. 9440, page 3-16, Springer, 2015 [DOI] [ePrint]

Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware

2015 - Tobias Schneider, Amir Moradi, Tim Güneysu

In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty - ACNS 2015, New York, USA, 2–5 June 2015. [pdf] [DOI]

Differential Power Analysis of a McEliece Cryptosystem

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt

13th International Conference on Applied Cryptography and Network Security (ACNS), New York, USA, 2–5 June 2015. [Springer] [pdf]

High-Performance Ideal Lattice-Based Cryptography on ATxmega 8-bit Microcontrollers

2015 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu

Latincrypt 2015, Bienvenido, Guadalajara, Mexico, August 23-26, 2015 [Preprint] [Source Code]

Virtual Proofs of Reality and their Physical Implementation

2015 - Ulrich Rührmair, J.L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson

2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 [DOI]

Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs

2015 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu

IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [pdf]

Efficient E-cash with Attributes on MULTOS Smartcards

2015 - Gesine Hinterwälder, Felix Riek, Chris­tof Paar

11th Workshop on RFID Security - RFIDsec 2015 (to appear) [pdf]

On the Pitfalls of using Arbiter-PUFs as Building Blocks

2015 - Georg T. Becker

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, TCAD, 34 (8):1-13, August 2015 [DOI] [pdf]

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

2015 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger

CT-RSA 2015, San Francisco, CA, USA, April 20-24, 2015. [eprint report]

A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation

2015 - Andreas Gornik, Amir Moradi, Jürgen Oehm, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 34, No.8, pages 1308-1319, 2015. [pdf] [DOI]

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers

2015 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Chris­tof Paar, Ana Helena Sánchez, Peter Schwabe

Designs, Codes and Cryptography comprising the “Special Issue on Cryptography, Codes, Designs and Finite Fields: In Memory of Scott A. Vanstone”, Springer-Verlag. [link] [MSP430 SW for IAR]

Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs

2015 - Alexander Wild, Amir Moradi, Tim Güneysu

6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015. [pdf] [DOI]

Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives

2015 - Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu

6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015 [pdf]

Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs

2015 - Amir Moradi, Gesine Hinterwälder

6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015 (best pa­per award). [pdf] [DOI]

Protecting against Cryptographic Trojans in FPGAs

2015 - Pawel Swierczynski, Marc Fyrbiak, Chris­tof Paar, Christophe Huriaux, Russell Tessier

In the Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, Vancouver, British Columbia, May 2015. [pdf]

SCANDALee: A Side-ChANnel-based DisAssembLer using Local Electromagnetic Emanations

2015 - Daehyun Strobel, Florian Bache, David Oswald, Falk Schellenberg, Chris­tof Paar

De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2015, Gre­no­ble, Fran­ce, March 9 - 13 , 2015. [pdf]

Side-Channel Attacks from Static Power: When Should we Care?

2015 - Santos Merino Del Pozo, François-Xavier Standaert, Dina Kamel, Amir Moradi

Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9 - 13 , 2015. [pdf] [DOI]

Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation

2015 - Georg T. Becker, Alexander Wild, Tim Güneysu

IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [beckerPufIBS]

Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport

2015 - Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Chris­tof Paar

ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 3, March 2015, Article No. 10 [link]

FPGA Trojans through Detecting and Weakening of Cryptographic Primitives

2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]

Implementing QC-MDPC McEliece Encryption

2015 - Ingo von Maurich, Tobias Oder, Tim Güneysu

ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on Embedded Platforms for Crypto and Regular Papers TECS, Volume 14 Issue 3, May 2015, Article No. 44, ACM New York, NY, USA. [PDF]
Page: