Veröffentlichungen

Pushing the Limits: A Very Compact and a Threshold Implementation of AES

2011 - Amir Moradi, Dipl.-Kfm. Axel Poschmann, San Ling, Chris­tof Paar, Huaxiong Wang

Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, vo­lu­me 6632 of LNCS, pages 69-88, Sprin­ger. [DOI] [bib] [pdf]

Bounds on the degree of APN polynomials: the case of x^(-1) + g(x)

2011 - Gregor Leander, François Rodier

Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 207-222 [DOI] [bib]

Counting all bent functions in dimension eight 99270589265934370305785861242880

2011 - Philippe Langevin, Gregor Leander

Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 193-205 [DOI] [bib]

Side-Channel Resistant Crypto for less than 2,300 GE

2011 - Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling

Journal of Cryptology, Special Issue on Hardware and Security, Volume 24, Number 2, pages 322-345, April 2011. [DOI] [pdf] [bib]

The future of high-speed cryptography: new computing platforms and new ciphers

2011 - Tim Güneysu, Stefan Heyse, Chris­tof Paar

Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, Lausanne, Switzerland, May 2-6, 2011 [pdf] [BibTex] [DOI]

Towards an Ultra Lightweight Crypto Processor

2011 - Begul Bilgin, Elif Bilge Kavun, Tolga Yalcin

Proceedings of the Workshop on Lightweight Security and Privacy (LightSec’11), Istanbul, Turkey, March 14-15, 2011 [DOI] [pdf]

Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes

2011 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen

18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [DOI] [bib]

Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations

2011 - Mohamed Ahmed Abdelraheem, Gregor Leander, Mohamed Ahmed Abdelraheem

18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [DOI] [bib]

The World Is Not Enough: Another Look on Second-Order DPA

2010 - François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard

ASIACRYPT 2010: 112-129 [bib]

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

2010 - Gallais, J., Großschädl, J., Hanley, N., Markus Kasper, Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S.

In L. Chen & M. Yung (Eds.), International Conference on Trusted Computing. Springer. [bib]