Publications

The World Is Not Enough: Another Look on Second-Order DPA

2010 - François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard

ASIACRYPT 2010: 112-129 [bib]

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

2010 - Gallais, J., Großschädl, J., Hanley, N., Markus Kasper, Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S.

In L. Chen & M. Yung (Eds.), International Conference on Trusted Computing. Springer. [bib]

Side-channel based watermarks for IP Protection

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design [bib]

"Modular Integer Arithmetic for Public Key Cryptography". I. Verbauwhede ed. in "Secure Integrated Circuits and Systems"

2010 - Tim Güneysu, Chris­tof Paar

Springer US, ISBN: 978-0-387-71827-9, 2010.

Building a Side Channel Based Disassembler

2010 - Thomas Eisenbarth, Chris­tof Paar, Björn Weghenkel

Lecture Notes in Computer Science, 2010 [web] [bib]

A Versatile Framework for Implementation Attacks on Cryptographic and Embedded Devices

2010 - Timo Kasper, David Oswald, Chris­tof Paar

Lecture Notes in Computer Science, 2010 [web] [bib] [pdf]

DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs

2010 - S. Drimer, Tim Güneysu, Chris­tof Paar

ACM Transactions on Reconfigurable Technology and Systems (TRETS), Vol. 3. 2010.

Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L. Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI]

High-Performance Integer Factoring with Reconfigurable Devices

2010 - Ralf Zimmermann, Tim Güneysu, Chris­tof Paar

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI] [pdf] [bib]

Breaking Elliptic Curve Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L.Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

IEEE Field Programmable Logic, 133-138, IEEE Computer Society, 2010.

Cloning Cryptographic RFID Cards for 25$

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

Presented at the 5th Benelux Workshop on Information and System Security, WisSec 2010, November 29-30, 2010, Nijmegen, the Netherlands.

Chameleon: A Versatile Emulator for Contactless Smartcards

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

13th International Conference on Information Security and Cryptology - ICISC 2010, Seoul, Korea, December 1-3, 2010, volume 6829 of LNCS, pages 189-206, Springer. [SourceForge] [BibTeX] [DOI] [pdf]

Combined Implementation Attack Resistant Exponentiation

2010 - Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald

Springer LNCS 6112, LATINCRYPT 2010, Puebla, Mexico. [pdf] [bib]

Evaluation of SHA-3 Candidates for 8-bit Embedded Processors

2010 - Stefan Heyse, Ingo von Maurich, Alexander Wild, Cornel Reuber, Johannes Rave, Thomas Pöppelmann, Chris­tof Paar, Thomas Eisenbarth

2nd SHA-3 Candidate Conference, August 23-24, 2010, University of California, Santa Barbara, USA. [Paper]

Correlation-Enhanced Power Analysis Collision Attack

2010 - Amir Moradi, Oliver Mischke, Thomas Eisenbarth

Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings [BibTeX] [DOI] [pdf]

PRINTcipher: A Block Cipher for IC-Printing

2010 - Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings [DOI] [bib]

Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs

2010 - Andrey Bogdanov, Thomas Eisenbarth, Chris­tof Paar, M. Wienecke

Topics in Cryptology - CT-RSA 2010, LNCS, Springer-Verlag. [pdf]

Secure Location Verification - A Security Analysis of GPS Signal Authentication

2010 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Chris­tof Paar

DBSec 2010, Rome, Italy, June 21-23, 2010, to be published in Springer LNCS. [pdf]

A Pipelined Camellia Architecture for Compact Hardware Implementation

2010 - Elif Bilge Kavun, Tolga Yalcin

In Proceedings of the 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP’10), pages 305 - 308, IEEE, Rennes, France, July 7-9, 2010 [DOI]

A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree

2010 - Carl Bracken, Gregor Leander

Finite Fields and Their Applications Volume 16, Issue 4, July 2010, Pages 231–242 [DOI] [bib]

Side-channel based watermarks for integrated circuits

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. [pdf]

A Lightweight Implementation of KECCAK Hash Function for Radio-Frequency Identification Applications

2010 - Elif Bilge Kavun, Tolga Yalcin

Proceedings of the 6th Workshop on RFID Security (RFIDSec'11), Istanbul, Turkey, June 7-9, 2010 [DOI] [pdf]

Practical Power Analysis Attacks on Software Implementations of McEliece

2010 - Stefan Heyse, Amir Moradi, Chris­tof Paar

Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings [DOI] [BibTeX] [bib] [pdf]

All You Can Eat or Breaking a Real-World Contactless Payment System

2010 - Timo Kasper, Michael Silbermann, Chris­tof Paar

Financial Cryptography and Data Security, 10 January 25-28, 2010, to be published in Springer LNCS. [pdf] [bib]

Lightweight Cryptography and DPA Countermeasures: A Survey

2010 - Amir Moradi, Axel Poschmann

First International Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010 (co-located with Financial Cryptography and Data Security - FC 2010), Tenerife, Canary Islands, Spain, Januar 25-28, 2010. [pdf]

Transforming Write Collisions in Block RAMs into Security Applications

2009 - Tim Güneysu, Chris­tof Paar

Proceedings of the 2009 International Conference on Field-Programmable Technology, FPT 2009, Sydney, Australia, December 9-11, 2009 [BibTeX] [DOI] [pdf]

A New Remote Keyless Entry System Resistant to Power Analysis Attacks

2009 - Amir Moradi, Timo Kasper

7th International Conference on Information, Communications and Signal Processing, ICICS 2009, Macau, China, Dezember 7-10, 2009. [pdf]

Lightweight Cryptography and RFID: Tackling the Hidden Overheads

2009 - Dipl.-Kfm. Axel Poschmann, Matt Robshaw, Frank Vater, Chris­tof Paar

7th International ConferenceInternational Conference on Information Security and Cryptology 2009 - ICISC 2009. LNCS, Springer-Verlag, to appear, Seoul, Korea, Dezember 2-4, 2009. [pdf]

Power Analysis of Single-Rail Storage Elements as used in MDPL

2009 - Amir Moradi, Thomas Eisenbarth, Dipl.-Kfm. Axel Poschmann, Chris­tof Paar

12th International Conference on Information Security and Cryptology - ICISC 2009, Seoul, Korea, December 2-4, 2009. [pdf]

MOLES: Malicious Off-chip Leakage Enabled by Side-channels

2009 - Lang Lin, Wayne Burleson, Chris­tof Paar

ACM/IEEE International Conference on Computer-Aided Design (ICCAD), pp. 117-122, San Jose, 2009.

Efficient Authentication Mechanisms for Navigation Systems – a Radio-Navigation Case Study

2009 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Di Qiu, Chris­tof Paar, Per Enge

Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2009) pp. 901 - 912, September 22-25 2009, Savannah, GA. [pdf]

Cryptanalysis of KeeLoq with COPACOBANA

2009 - Martin Novotny, Timo Kasper

Special-purpose Hardware for Attacking Cryptographic Systems 2009, SHARCS 2009, Lausanne, Switzerland. September 9-10, 2009. [pdf] [bib]

Three Years of Evolution: Cryptanalysis with COPACOBANA Special-purpose Hardware for Attacking Cryptographic Systems 2009

2009 - Tim Güneysu, Gerd Pfeiffer, Chris­tof Paar, Manfred Schimmler

SHARCS 2009, Lausanne, Switzerland. September 9-10, 2009. [pdf]

Crypto Engineering: Some History and Some Case Studies

2009 - Chris­tof Paar

Workshop on Cryptographic Hardware and Embedded Systems 2009, CHES 2009, Lausanne, Switzerland. September 6-9, 2009. [pdf]

KeeLoq and Side-Channel Analysis --- Evolution of an Attack

2009 - Chris­tof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, Amir Moradi

6th IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009.Lausanne, Switzerland, September 6, 2009. [pdf]

MicroEliece: McEliece for Embedded Devices

2009 - Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Chris­tof Paar

Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009 [DOI] [BibTeX] [pdf]

Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering

2009 - Lang Lin, Markus Kasper, Tim Güneysu, Chris­tof Paar, Wayne Burleson

Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009 [DOI] [BibTeX] [pdf] [Talk Slides]

A Comparative Study of Mutual Information Analysis under a Gaussian Assumption

2009 - Amir Moradi, Nima Mousavi, Chris­tof Paar, Mahmoud Salmasizadeh

10th International Workshop on Information Security Applications, WISA 2009, Busan, Korea. August 25-27, 2009. [pdf]

EM Side-Channel Attacks on Commercial Contactless Smartcards using Low-Cost Equipment

2009 - Timo Kasper, David Oswald, Chris­tof Paar

10th International Workshop on Information Security Applications, WISA 2009, Busan, Korea. August 25-27, 2009. [pdf] [bib]

Secure IP-Block Distribution for Hardware Devices

2009 - Jorge Guajardo Merchan, Tim Güneysu, Sandeep Kumar, Chris­tof Paar

IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009 [BibTeX] [DOI] [pdf]

One-touch Financial Transaction Authentication

2009 - Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Chris­tof Paar

SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, Juli 7-10, 2009. [pdf] [bib]

New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs

2009 - Timo Kasper, David Oswald, Chris­tof Paar

Workshop on RFID Security 2009, RFIDSec 2009, Leuven, Belgium, 30. Juni - 2.Juli, 2009. [pdf] [bib]

Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed

2009 - Markus Kasper, Timo Kasper, Amir Moradi, Chris­tof Paar

2nd International Conference on Cryptology in Africa, Progress in Cryptology - AFRICACRYPT 2009, Gammarth, Tunisia, 21-25 Juni, 2009. [DOI] [pdf] [bib]

Green Car Security: IT-Sicherheit und Elektromobilität

2009 - Chris­tof Paar, Jan Pelzl, Andy Rupp, Kai Schramm, André Weimerskirch

DACH Security 2009, Ruhr-Universität Bochum, Bochum, Germany, Mai, 19-20, 2009. [pdf]

Cryptography is Feasible on 4-Bit Microcontrollers - A Proof of Concept

2009 - Markus Vogt, Dipl.-Kfm. Axel Poschmann, Chris­tof Paar

International IEEE Conference on RFID, Orlando, Florida, USA, April, 27 - 28, 2009. [pdf] [bib]

Design Space Exploration of PRESENT Implementations for FPGAs

2009 - Mohamad Sbeiti, Michael Silbermann, Dipl.-Kfm. Axel Poschmann, Chris­tof Paar

Proceedings of the 5th Southern Programmable Logic Conference -- SPL'09, Sao Carlos, Brazil, April 1 - 3, 2009. [pdf] [bib]

Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology

2009 - Francesco Regazzoni, Thomas Eisenbarth, Dipl.-Kfm. Axel Poschmann, Johann Großschädl, Frank Gurkaynak, Marco Macchetti, Zeynep Toprak, Laura Pozzi, Chris­tof Paar, Yusuf Leblebici, Paolo Ienne

Transactions on Computational Science IV, 2009. [bib] [pdf]

Securing Green Cars: IT Security in Next-Generation Electric Vehicle Systems

2009 - Chris­tof Paar, Andy Rupp, Kai Schramm, André Weimerskirch, Wayne Burleson

Accepted at the 2009 Annual Meeting and Exposition of the Intelligent Transportation Society of America. [pdf]

Understanding Cryptography: A Textbook for Students and Practitioners

2009 - Chris­tof Paar, Jan Pelzl

Springer Monograph Series, 2009. [web]

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

2008 - Andy Rupp, G. Leander, E. Bangerter, A. Dent, Ahmad-Reza Sadeghi

In 14th International Conference on the Theory and Application of Cryptology and Information Security —- ASIACRYPT 2008 (to appear). Melbourne, Australia, Dezember 7-11, 2008.
Page: