Publications
A Reconfigurable Architecture For Searching Optimal Software Code To Implement Block Cipher Permutation Matrices
2013 - Elif Bilge Kavun, Gregor Leander, Tolga Yalcin
In International Conference on ReConFigurable Computing and FPGAs 2013 (ReConFig'13), IEEE Computer Society, Cancun, Mexico, Dec. 9-11, 2013 [DOI]A Performance Boost for Hash-based Signatures
2013 - Thomas Eisenbarth, Ingo von Maurich, Christof Paar, Xin Ye
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday [BibTeX] [DOI] [Paper]Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure
2013 - Amir Moradi, Oliver Mischke
International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20 - 22, 2013. [DOI] [BibTeX] [pdf]An Experimental Security Analysis of Two Satphone Standards
2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]Keccak und der SHA-2
2013 - Pawel Swierczynski, Gregor Leander, Christof Paar
DuD - Datenschutz und Datensicherheit Ausgabe 11/2013 [bib]Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
2013 - David Oswald, Bastian Richter, Christof Paar
RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. [bibtex] [pdf]SPONGENT: The Design Space of Lightweight Cryptographic Hashing
2013 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
IEEE Trans. Computers vol. 62, number 10, 2013 [bib]Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
2013 - Daehyun Strobel, Benedikt Driessen, Gregor Leander, Timo Kasper, David Oswald, Falk Schellenberg, Christof Paar
Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013 [bibtex]One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores
2013 - Amir Moradi, Oliver Mischke, Christof Paar
IEEE Transactions on Computers, vol. 62, no. 9, pp. 1786-1798, Sept. 2013. [DOI] [BibTeX] [pdf]Stealthy Dopant-Level Hardware Trojans
2013 - Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013 Extended version in Journal of Cryptographic Engineering, Springer, 2014 [pdf] [bib]