Veröffentlichungen

Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed

2019 - Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 2, pp 256-292, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) [pdf]

Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak

2019 - Felix Wegener, Christian Baiker, Amir Moradi

In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2019, Darmstadt, Germany, April 3-5, 2019. [pdf]

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

2019 - Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh

IACR Tran­sac­tions on Sym­me­tric Cryp­to­lo­gy, Vol. 2019, No. 1, pp ???-???, 2019. (presentation at FSE 2019, Paris, France, March 25–28, 2019) [pdf]

Towards Cognitive Obfuscation - Impeding Hardware Reverse Engineering Based on Psychological Insights

2019 - Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Chris­tof Paar

ASPDAC '19 Proceedings of the 24th Asia and South Pacific Design Automation Conference Pages 104-111 (presentation at ASPDAC 2019, Tokyo, Japan, January 21–24, 2019) [PDF] [DOI]

Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream

2019 - Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Knopp, Chris­tof Paar

In Proceedings of the 24th Asia and South Pacific Design Automation Conference (ASPDAC '19). ACM, New York, NY, USA, 112-119. [DOI]

Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto

2019 - Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu

22nd edition of the International Conference on Practice and Theory of Public Key Cryptography, April 14-17, 2019, Beijing, China, to appear [pdf]

Towards Practical Microcontroller Implementation of the Signature Scheme Falcon

2019 - Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu

The Tenth International Conference on Post-Quantum Cryptography, Chongqing University, Chongqing, May 8-10, 2019, to appear [pdf]

Enclosure-PUF: Tamper Proofing Commodity Hardware and other Applications

2018 - Christian Zenger, Chris­tof Paar, Lars Steinschulte, Johannes Tobisch, David Holin

35. Chaos Communication Congress (35c3), Leipzig, Germany, 2018. [Conference page] [Video]

Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights

2018 - Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Chris­tof Paar

2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Wollongong, NSW, 2018, pp. 438-445. (presented in December 2018 in Wollongong, NSW, Australia) [PDF] [DOI]

Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(2^8) Multiplication

2018 - Felix Wegener, Amir Moradi

17th Smart Card Research and Advanced Application Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018. [pdf]

Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level

2018 - Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori

International Conference On Computer Aided Design, ICCAD 2018, San Diego, CA, USA, November 5-8, 2018. [pdf]

Evaluation of Lattice-Based Signature Schemes in Embedded Systems

2018 - Tim Güneysu, Markus Krausz, Tobias Oder, Julian Speith

25th IEEE International Conference on Electronics Circuits and Systems, Bordeaux, France, 9-12 December 2018 [pdf]

An Exploratory Analysis of Microcode as a Building Block for System Defenses

2018 - Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Chris­tof Paar, Thorsten Holz

ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), Toronto, October 2018 [PDF]

Hardware Masking, Revisited

2018 - Thomas De Cnudde, Maik Ender, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 2, pp 123-148, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI]

Leakage Detection with the χ²-Test

2018 - Amir Moradi, Bastian Richter, Tobias Schneider, François-Xavier Standaert

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 1, pp 209-237, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI]

Spin Me Right Round - Rotational Symmetry for FPGA-Specific AES

2018 - Lauren De Meyer, Amir Moradi, Felix Wegener

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 3, pp 596-626, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI] [VHDL]

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

2018 - Max Hoffmann, Chris­tof Paar

IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925,Vol. 2018, No. 2, pp. 277–297 [pdf] [DOI]

Commercial Vehicles vs. Automotive Cybersecurity: Commonalities and Differences

2018 - André Weimerskirch, Steffen Becker, Bill Hass

Commercial Vehicles vs. Automotive Cybersecurity: Commonalities and Differences. Gloria D'Anna (Ed.), Cybersecurity for Commercial Vehicles (pp. 47-64). Warrendale, PA: SAE International. [Website] [website]

On the Difficulty of FSM-based Hardware Obfuscation

2018 - Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Russell Tessier, Chris­tof Paar

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 3, pp 293-330, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [PDF] [DOI]

A Lattice-based AKE on ARM Cortex-M4

2018 - Julian Speith, Tobias Oder, Tim Güneysu

BalkanCryptSec 2018, Iasi, Romania, Sep­tem­ber 20-21, 2018. [Source Code] [pdf]

Standard Lattice-Based Key Encapsulation on Embedded Devices

2018 - James Howe, Tobias Oder, Markus Krausz, Tim Güneysu

IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 3 [pdf]

Physical Protection of Lattice-Based Cryptography: Challenges and Solutions

2018 - Ayesha Khalid, Tobias Oder, Felipe Valencia, Máire O'Neill, Tim Güneysu, Francesco Regazzoni

ACM Great Lakes Symposium on VLSI 2018: 365-370

SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing

2018 - Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Chris­tof Paar, Daniel Holcomb

IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, McLean, VA, USA, April 30 - May 4, 2018 (short paper, best poster award). [arXiv]

Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking

2018 - Pascal Sasdrich, Michael Hutter

9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018.

Threshold Implementation in Software - Case Study of PRESENT

2018 - Pascal Sasdrich, Rene Bock, Amir Moradi

9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, Singapore, April 23-24, 2018. [pdf]

A First-Order SCA Resistant AES without Fresh Randomness

2018 - Felix Wegener, Amir Moradi

In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2018, Singapore, April 23-24, 2018. [pdf]

An Inside Job: Remote Power Analysis Attacks on FPGAs

2018 - Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, Mehdi B. Tahoori

De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2018, Dresden, Germany, March 18 - 23 , 2018 (best paper candidate). [pdf]

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

2018 - Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Mathias Wilhelm, Tobias Weidlich, Russell Tessier, Chris­tof Paar

IEEE Transactions on Dependable and Secure Computing (to appear)

Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors

2018 - Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Chris­tof Paar

IEEE Transactions on Computers, Volume 67, Issue 3, pp. 307-321, 2018. [DOI]

IoT-Security and Product Piracy: Smart Key Management versus Secure Hardware

2018 - Christian Zenger, Mario Pietersz

embedded world 2018, Nuremberg, Germany, February 27th - March 1st, 2018

Optical metrology for the investigation of buried technical structures

2018 - Lena Göring, Markus Finkeldey, Falk Schellenberg, Carsten Brenner, Martin R. Hofmann , Nils C. Gerhardt

tm-Technisches Messen, 2018, 85(2), 104-110.

Practical CCA2-Secure and Masked Ring-LWE Implementation

2018 - Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu

IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 1 [pdf]

Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs

2018 - Pawel Swierczynski, Georg T. Becker, Amir Moradi, Chris­tof Paar

IEEE Transactions on Computers, vol. 67, no. 3, pp. 348-360, 2018. [pdf] [DOI]

GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs

2018 - Alexander Wild, Amir Moradi, Tim Güneysu

IEEE Transactions on Computers, vol. 67, no. 3, pp. 375-387, 2018. [DOI]

The First Thorough Side-Channel Hardware Trojan

2017 - Maik Ender, Samaneh Ghandali, Amir Moradi, Chris­tof Paar

In­ter­na­tio­nal Con­fe­rence on the Theo­ry and Ap­p­li­ca­ti­ons of Cryp­to­lo­gy and In­for­ma­ti­on Se­cu­ri­ty, ASI­A­CRYPT 2017, Hong Kong, China, De­cem­ber 3 - 7, 2017. [pdf] [DOI] [slides]

BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection

2017 - Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp

ACM CCS 2017 on Oct. 30–Nov. 3, 2017, Dallas, TX, USA [pdf]

Implementing a Real-Time Capable WPLS Testbed for Independent Performance and Security Analyses

2017 - Christian Zenger, Mario Pietersz, Jeremy Brauer, Falk-Peter Dreßler, Daniel Theis, Chris­tof Paar

Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, October 29th - November 1st, 2017

New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth–Sahai Proofs

2017 - Gottfried Herold, Max Hoffmann, Michael Klooß, Carla Ràfols, Andy Rupp

ACM CCS 2017 on Oct. 30–Nov. 3, 2017, Dallas, TX, USA [pdf]

Differential Cryptanalysis of 18-Round PRIDE

2017 - Virginie Lallemand, Shahram Rasoolzadeh

International Conference on Cryptology in India (Indocrypt 2017), Chennai, December 10-13, 2017. [pdf] [DOI]

Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives

2017 - Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2017, Taipei, Taiwan, September 25 – 28, 2017. [pdf] [DOI] [slides]

Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs

2017 - Tobias Oder, Tim Güneysu

La­tin­crypt 2017, La Habana, Cuba, September 20-22, 2017 [VHDL] [pdf]

IoT-Schlüsselmanagement

2017 - Heiko Koepke, Thorben Lenze, Mario Pietersz, Christian Zenger

Datenschutz und Datensicherheit 10/2017, vol. 41, pp. 617-622, Springer Gabler [DOI]

Reverse Engineering x86 Processor Microcode

2017 - Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Chris­tof Paar, Thorsten Holz

USENIX Security Symposium, Vancouver, Canada, August 2017 [GitHub] [PDF]

A look at the dark side of hardware reverse engineering - a case study

2017 - Sebastian Wallat, Marc Fyrbiak, Moritz Schlögel, Chris­tof Paar

IEEE 2nd International Verification and Security Workshop, IVSW 2017, Thessaloniki, Greece, July 3-5, 2017. [DOI]

Hardware reverse engineering: Overview and open challenges

2017 - Marc Fyrbiak, Sebastian Strauß, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, Chris­tof Paar

IEEE 2nd International Verification and Security Workshop, IVSW 2017, Thessaloniki, Greece, July 3-5, 2017. [DOI] [PDF]

High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers

2017 - Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede

ACM Transactions on Embedded Computing Systems (TECS) TECS Volume 16 Issue 4, July 2017 Article No. 117, ACM New York, NY, USA. [ACM] [pdf]

Cryptography for Next Generation TLS: Implementing the RFC 7748 Elliptic Curve448 Cryptosystem in Hardware

2017 - Pascal Sasdrich, Tim Güneysu

54. Design Automation Conference, DAC 2017, Austin, TX, USA, June 18-22 2017. [DOI] [pdf]

Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds

2017 - Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens

IACR Transactions on Symmetric Cryptology - Issue 2-2017 [pdf] [DOI]

On the Easiness of Turning Higher-Order Leakages into First-Order

2017 - Thorben Moos, Amir Moradi

8th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2017, Paris, France, April 13-14, 2017. [pdf] [DOI]

SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA

2017 - Maik Ender, Alexander Wild, Amir Moradi

In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, COSA­DE 2017, Paris, France, April 13-14, 2017. [pdf] [DOI]
Seite: