Breaking Elliptic Curve Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L.Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

IEEE Field Programmable Logic, 133-138, IEEE Computer Society, 2010.

Cloning Cryptographic RFID Cards for 25$

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

Presented at the 5th Benelux Workshop on Information and System Security, WisSec 2010, November 29-30, 2010, Nijmegen, the Netherlands.

Chameleon: A Versatile Emulator for Contactless Smartcards

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

13th International Conference on Information Security and Cryptology - ICISC 2010, Seoul, Korea, December 1-3, 2010, volume 6829 of LNCS, pages 189-206, Springer. [SourceForge] [BibTeX] [DOI] [pdf]

Combined Implementation Attack Resistant Exponentiation

2010 - Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald

Springer LNCS 6112, LATINCRYPT 2010, Puebla, Mexico. [pdf] [bib]

Evaluation of SHA-3 Candidates for 8-bit Embedded Processors

2010 - Stefan Heyse, Ingo von Maurich, Alexander Wild, Cornel Reuber, Johannes Rave, Thomas Pöppelmann, Chris­tof Paar, Thomas Eisenbarth

2nd SHA-3 Candidate Conference, August 23-24, 2010, University of California, Santa Barbara, USA. [Paper]

Correlation-Enhanced Power Analysis Collision Attack

2010 - Amir Moradi, Oliver Mischke, Thomas Eisenbarth

Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings [BibTeX] [DOI] [pdf]

PRINTcipher: A Block Cipher for IC-Printing

2010 - Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings [DOI] [bib]

Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs

2010 - Andrey Bogdanov, Thomas Eisenbarth, Chris­tof Paar, M. Wienecke

Topics in Cryptology - CT-RSA 2010, LNCS, Springer-Verlag. [pdf]

Secure Location Verification - A Security Analysis of GPS Signal Authentication

2010 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Chris­tof Paar

DBSec 2010, Rome, Italy, June 21-23, 2010, to be published in Springer LNCS. [pdf]

A Pipelined Camellia Architecture for Compact Hardware Implementation

2010 - Elif Bilge Kavun, Tolga Yalcin

In Proceedings of the 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP’10), pages 305 - 308, IEEE, Rennes, France, July 7-9, 2010 [DOI]

A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree

2010 - Carl Bracken, Gregor Leander

Finite Fields and Their Applications Volume 16, Issue 4, July 2010, Pages 231–242 [DOI] [bib]

Side-channel based watermarks for integrated circuits

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. [pdf]

A Lightweight Implementation of KECCAK Hash Function for Radio-Frequency Identification Applications

2010 - Elif Bilge Kavun, Tolga Yalcin

Proceedings of the 6th Workshop on RFID Security (RFIDSec'11), Istanbul, Turkey, June 7-9, 2010 [DOI] [pdf]

Practical Power Analysis Attacks on Software Implementations of McEliece

2010 - Stefan Heyse, Amir Moradi, Chris­tof Paar

Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings [DOI] [BibTeX] [bib] [pdf]

All You Can Eat or Breaking a Real-World Contactless Payment System

2010 - Timo Kasper, Michael Silbermann, Chris­tof Paar

Financial Cryptography and Data Security, 10 January 25-28, 2010, to be published in Springer LNCS. [pdf] [bib]

Lightweight Cryptography and DPA Countermeasures: A Survey

2010 - Amir Moradi, Axel Poschmann

First International Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010 (co-located with Financial Cryptography and Data Security - FC 2010), Tenerife, Canary Islands, Spain, Januar 25-28, 2010. [pdf]

Transforming Write Collisions in Block RAMs into Security Applications

2009 - Tim Güneysu, Chris­tof Paar

Proceedings of the 2009 International Conference on Field-Programmable Technology, FPT 2009, Sydney, Australia, December 9-11, 2009 [BibTeX] [DOI] [pdf]

A New Remote Keyless Entry System Resistant to Power Analysis Attacks

2009 - Amir Moradi, Timo Kasper

7th International Conference on Information, Communications and Signal Processing, ICICS 2009, Macau, China, Dezember 7-10, 2009. [pdf]

Lightweight Cryptography and RFID: Tackling the Hidden Overheads

2009 - Dipl.-Kfm. Axel Poschmann, Matt Robshaw, Frank Vater, Chris­tof Paar

7th International ConferenceInternational Conference on Information Security and Cryptology 2009 - ICISC 2009. LNCS, Springer-Verlag, to appear, Seoul, Korea, Dezember 2-4, 2009. [pdf]

Power Analysis of Single-Rail Storage Elements as used in MDPL

2009 - Amir Moradi, Thomas Eisenbarth, Dipl.-Kfm. Axel Poschmann, Chris­tof Paar

12th International Conference on Information Security and Cryptology - ICISC 2009, Seoul, Korea, December 2-4, 2009. [pdf]