Publications

PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications (Extended Abstract)

2012 - Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Chris­tof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalcin

Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012 [DOI] [BibTeX]

Improving Side-Channel Analysis with Optimal Linear Transforms

2012 - David Oswald, Chris­tof Paar

CARDIS 2012 [pdf] [bibtex]

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

2012 - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, Francois Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, Francois-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loic Van Oldeneel Tot Oldenzeel, Ingo von Maurich

Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012 [Full Version] [Block Cipher Version] [BibTeX] [DOI]

Side Channels as Building Blocks

2012 - Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Chris­tof Paar, Wayne Burleson

Journal of Cryptographic Engineering, Volume 2, Number 3, pages 143-159, 2012, Springer. [DOI] [BibTeX] [pdf]

How Far Should Theory be from Practice? – Evaluation of a Countermeasure

2012 - Amir Moradi, Oliver Mischke

Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012 [DOI] [BibTeX] [pdf]

On the Distribution of Linear Biases: Three Instructive Examples

2012 - Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander

Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings [bib]

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

2012 - Martin R. Albrecht, Gregor Leander

Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers [bib]

Detecting Software Theft in Embedded Systems: A Side-Channel Approach

2012 - Georg T. Becker, Daehyun Strobel, Chris­tof Paar, Wayne Burleson

IEEE Transactions on Information Forensics and Security, , vol.7, no.4, pp.1144,1154, Aug. 2012 [bib] [pdf]

IT-Sicherheit in der Elektromobilität

2012 - Chris­tof Paar, Marko Wolf, Ingo von Maurich

ATZelektronik, volume 7, issue 4, pp 274-279, Springer, 2012.

Solving Binary Linear Equation Systems over the Rationals and Binaries

2012 - Benedikt Driessen, Chris­tof Paar

International Workshop on the Arithmetic of Finite Fields (Bochum) 2012 [Waifi 2012] [pdf] [bib]

Pay as you Go

2012 - Foteini Baldimtsi, Gesine Hinterwälder, Andy Rupp, Anna Lysyanskaya, Chris­tof Paar, Wayne P. Burleson

5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012) Held in conjunction with the 12th Privacy Enhancing Technologies Symposium July 13, 2012, Vigo, Spain [pdf]

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

2012 - Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, Francois Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, Francois-Xavier Standaert, Loic van Oldeneel tot Oldenzeel

Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 [BibTeX] [DOI] [Full Version] [Hash Funct. Version]

Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems

2012 - Gesine Hinterwälder, Chris­tof Paar, Wayne P. Burleson

J.-H. Hoepman, I. Verbauwhede (Eds.): RFIDSec 2012, Volume 7739, pp 109-122, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

Glitch-Free Implementation of Masking in Modern FPGAs

2012 - Amir Moradi, Oliver Mischke

2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012 [DOI] [BibTeX] [pdf] [verilog]

Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards

2012 - Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz

IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2012 - **Best Paper Award** [More Info] [PDF]

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations

2012 - Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser

Advances in Cryptology – EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings [bib]

Statistical Tools Flavor Side-Channel Collision Attacks

2012 - Amir Moradi

Advances in Cryptology - EUROCRYPT 2012 - 31th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, United Kingdom, April 15-19, 2012, pages 428-445. [DOI] [pdf]

Experimentally Verifying a Complex Algebraic Attack on the Grain-128 Cipher Using Dedicated Reconfigurable Hardware

2012 - Itai Dinur, Tim Güneysu, Chris­tof Paar, Adi Shamir, Ralf Zimmermann

SHARCS 2012 (http://2012.sharcs.org/index.html), 17-18 March 2012, Washington DC, USA [SHARCS 2012 website] [pdf]

A new construction of highly nonlinear S-boxes

2012 - Peter Beelen, Gregor Leander

Cryptography and Communications Volume 4, Issue 1, pp 65-77 [bib]

Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures – An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism

2012 - Amir Moradi, Markus Kasper, Chris­tof Paar

Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference, San Francisco, CA, USA, February 27- March 2, 2012, pages 1-18. [DOI] [pdf]

An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware

2011 - Itai Dinur, Tim Güneysu, Chris­tof Paar, Adi Shamir, Ralf Zimmermann

Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011 [DOI] [BibTeX] [pdf] [bib]

An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software

2011 - Daehyun Strobel, Chris­tof Paar

Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011

RAM-Based Ultra-Lightweight FPGA Implementation of PRESENT

2011 - Elif Bilge Kavun, Tolga Yalcin

In International Conference on ReConFigurable Computing and FPGAs 2011 (ReConFig'11), IEEE Computer Society, Cancun, Mexico, Nov. 30-Dec. 2, 2011 [DOI]

Security of Wireless Embedded Devices in the Real World

2011 - Timo Kasper, David Oswald, Chris­tof Paar

Information Security Solutions (ISSE) 2011 - Securing Electronic Business Processes (November 22-23 2011, Prague, Czech Republic) [pdf] [bib]

Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild

2011 - Timo Kasper, David Oswald, Chris­tof Paar

19th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) [pdf] [bib]

Praktische Angriffe auf die Bitstromverschlüsselung von Xilinx FPGAs

2011 - Markus Kasper, Timo Kasper, Amir Moradi, Chris­tof Paar

Datenschutz und Datensicherheit - DuD - Ausgabe 11/2011 - http://www.dud.de/Ausgabe/2011-11.html [Dud Webseite] [pdf]

Seitenkanalanalyse kontaktloser SmartCards

2011 - Timo Kasper, David Oswald, Chris­tof Paar

Datenschutz und Datensicherheit - DuD - Ausgabe 11/2011 - http://www.dud.de/Ausgabe/2011-11.html [DuD Webseite] [pdf]

On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs

2011 - Amir Moradi, Alessandro Barenghi, Timo Kasper, Chris­tof Paar

18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, IL, USA, October 17-21, 2011, pages 111-124. [DOI] [pdf] [slides] [bib]

Switchings, extensions, and reductions in central digraphs

2011 - André Kündgen, Gregor Leander, Carsten Thomassen

Journal of Combinatorial Theory, Series A Volume 118, Issue 7, October 2011, Pages 2025–2034 [DOI] [bib]

Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge

2011 - Georg T. Becker, Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, Wayne Burelson

29th IEEE International Conference on Computer Design (Invited Paper), ICCD 2011, Amherst, USA, October 2011 [PDF]

Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World

2011 - David Oswald, Chris­tof Paar

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2011, Nara, Japan, Sep­tem­ber 28-Oc­to­ber 1, 2011, pages 207-222 [pdf] [extended version]

Generic Side-Channel Countermeasures for Reconfigurable Devices

2011 - Tim Güneysu, Amir Moradi

Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011 [BibTex] [DOI] [pdf] [PROMs]

On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting

2011 - Amir Moradi, Oliver Mischke, Chris­tof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama

Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011 [BibTeX] [DOI] [pdf]

spongent: A Lightweight Hash Function

2011 - Andrey Bogdanov, Miroslav Kneževi?, Gregor Leander, Deniz Toz, Kerem Var?c?, Ingrid Verbauwhede

13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings [DOI] [bib]

Memory Encryption in Smart Cards

2011 - Baris Ege, Elif Bilge Kavun, Tolga Yalcin

10th Smart Card Research and Advanced Application Conference (CARDIS 2011), Leuven, Belgium, Sept. 14-16, 2011 [DOI] [pdf]

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

2011 - Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner

31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings [DOI] [bib]

Sec2 – Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage

2011 - Christopher Meyer, Juraj Somorovsky, Jörg Schwenk, Benedikt Driessen, Thang Tran, Christian Wietfeld

In Proceedings of the DACH Security 2011, Oldenburg, Germany [Paper] [Slides]

Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods

2011 - Amir Moradi, Mario Kirschbaum, Thomas Eisenbarth, Chris­tof Paar

IEEE Transactions on Very Large Scale Integration Systems, Volume 20 , Issue 9, Pages 1578 - 1589, 2012. [DOI] [pdf]

Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation

2011 - Timo Kasper, David Oswald, Chris­tof Paar

7th Workshop on RFID Security and Privacy 2011, RFIDSec 2011, Amherst, USA, June 26–28, 2011 [pdf] [bib]

7th Workshop on RFID Security and Privacy (RFIDsec)

2011 - A. Juels, K. Fu, Chris­tof Paar

Lecture Notes in Computer Science 7055, Springer, Amherst, MA, USA, June 26-27, 2011.

Practical Evaluation of DPA Countermeasures on Reconfigurable Hardware

2011 - Amir Moradi, Oliver Mischke, Chris­tof Paar

HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA [BibTeX] [DOI] [pdf]

Side-channel Watermarks for Embedded Software

2011 - Georg T. Becker, Wayne Burleson, Chris­tof Paar

9th IEEE NEWCAS Conference (Invited Paper), NEWCAS 2011, Bordeaux, France, June 2011 [pdf]

On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

2011 - Gregor Leander

30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings [DOI] [bib]

Pushing the Limits: A Very Compact and a Threshold Implementation of AES

2011 - Amir Moradi, Dipl.-Kfm. Axel Poschmann, San Ling, Chris­tof Paar, Huaxiong Wang

Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, vo­lu­me 6632 of LNCS, pages 69-88, Sprin­ger. [DOI] [bib] [pdf]

Bounds on the degree of APN polynomials: the case of x^(-1) + g(x)

2011 - Gregor Leander, François Rodier

Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 207-222 [DOI] [bib]

Counting all bent functions in dimension eight 99270589265934370305785861242880

2011 - Philippe Langevin, Gregor Leander

Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 193-205 [DOI] [bib]

Side-Channel Resistant Crypto for less than 2,300 GE

2011 - Axel Poschmann, Amir Moradi, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling

Journal of Cryptology, Special Issue on Hardware and Security, Volume 24, Number 2, pages 322-345, April 2011. [DOI] [pdf] [bib]

The future of high-speed cryptography: new computing platforms and new ciphers

2011 - Tim Güneysu, Stefan Heyse, Chris­tof Paar

Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, Lausanne, Switzerland, May 2-6, 2011 [pdf] [BibTex] [DOI]

Towards an Ultra Lightweight Crypto Processor

2011 - Begul Bilgin, Elif Bilge Kavun, Tolga Yalcin

Proceedings of the Workshop on Lightweight Security and Privacy (LightSec’11), Istanbul, Turkey, March 14-15, 2011 [DOI] [pdf]

Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes

2011 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen

18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [DOI] [bib]
Page: