Publications

Finding the AES Bits in the Haystack: Reverse Enginering and SCA Using Voltage Contrast

2015 - Christian Kison, Jürgen Frinken, Chris­tof Paar

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 - 16, 2015 [Springer]

got HW crypto? On the (in)security of a Self-Encrypting Drive series

2015 - Gunnar Alendal, Christian Kison, modg

Hardware Security Conference and Training, Hardwear.io 2015, The Hague, Netherlands, Oct 1-2, 2015 [pdf]

Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?

2015 - Amir Moradi, Alexander Wild

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 (best paper can­di­da­te). [pdf] [DOI]

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations

2015 - Tobias Schneider, Amir Moradi

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]

On the Complexity Reduction of Laser Fault Injection Campaigns using OBIC Measurements

2015 - Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schäpers, Nils C. Gerhardt, Martin R. Hofmann , Chris­tof Paar

Fault Diagnosis and Tolerance in Cryptography - FDTC 2015, Saint Malo, France, September 13, 2015. [DOI] [pdf]

The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs

2015 - Georg T. Becker

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 - 16, 2015 [PDF]

Exploiting the Physical Environment for Securing the Internet of Things

2015 - Christian Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Chris­tof Paar

New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8–11, 2015 [pdf]

Bringing PHY-based Key Generation into the Field: An Evaluation for Practical Scenarios

2015 - Rene Guillaume, Fredrik Winzer, Christian Zenger, Chris­tof Paar, Andreas Czylwik

82nd Vehicular Technology Conference, VTC 2015, Boston, USA, 6-9 September, 2015 [PDF]

Affine Equivalence and its Application to Tightening Threshold Implementations

2015 - Pascal Sasdrich, Amir Moradi, Tim Güneysu

22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015 [pdf]

Masking Large Keys in Hardware: A Masked Implementation of McEliece

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt

22nd Conference on Selected Areas in Cryptography (SAC 2015), Sackville, New Brunswick, Canada, August 12-14, 2015, to ap­pe­ar. [eprint]

On-line Entropy Estimation for Secure Information Reconciliation

2015 - Christian Zenger, Jan Zimmer, Jan-Felix Posielek, Chris­tof Paar

Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]

Security Analysis of Quantization Schemes for Channel-based Key Extraction

2015 - Christian Zenger, Jan Zimmer, Chris­tof Paar

Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]

Development of a Layout-Level Hardware Obfuscation Tool

2015 - Shweta Malik, Georg T. Becker, Chris­tof Paar, Wayne P. Burleson

IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015 (Invited Paper), Montpellier, France, July 2015 [PDF]

On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation

2015 - Johannes Tobisch, Georg T. Becker

11th Workshop on RFID Security (RFIDSec 2015), New York, USA, June 23-24, 2015 [pdf]

Security Evaluation and Enhancement of Bistable Ring PUFs

2015 - Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson

Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers & Lecture Notes in Computer Science, vol. 9440, page 3-16, Springer, 2015 [DOI] [ePrint]

Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware

2015 - Tobias Schneider, Amir Moradi, Tim Güneysu

In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty - ACNS 2015, New York, USA, 2–5 June 2015. [pdf] [DOI]

Differential Power Analysis of a McEliece Cryptosystem

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt

13th International Conference on Applied Cryptography and Network Security (ACNS), New York, USA, 2–5 June 2015. [Springer] [pdf]

High-Performance Ideal Lattice-Based Cryptography on ATxmega 8-bit Microcontrollers

2015 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu

Latincrypt 2015, Bienvenido, Guadalajara, Mexico, August 23-26, 2015 [Preprint] [Source Code]

Virtual Proofs of Reality and their Physical Implementation

2015 - Ulrich Rührmair, J.L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson

2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 [DOI]

Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs

2015 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu

IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [pdf]

Efficient E-cash with Attributes on MULTOS Smartcards

2015 - Gesine Hinterwälder, Felix Riek, Chris­tof Paar

11th Workshop on RFID Security - RFIDsec 2015 (to appear) [pdf]

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

2015 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger

CT-RSA 2015, San Francisco, CA, USA, April 20-24, 2015. [eprint report]

Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs

2015 - Alexander Wild, Amir Moradi, Tim Güneysu

6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015. [pdf] [DOI]

Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives

2015 - Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu

6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015, Berlin, Germany, April 13-14, 2015 [pdf]

Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs

2015 - Amir Moradi, Gesine Hinterwälder

6th In­ter­na­tio­nal Work­shop on Con­struc­tive Si­de-Chan­nel Ana­ly­sis and Se­cu­re De­sign, CO­SA­DE 2015, Ber­lin, Ger­ma­ny, April 13-14, 2015 (best pa­per award). [pdf] [DOI]

Protecting against Cryptographic Trojans in FPGAs

2015 - Pawel Swierczynski, Marc Fyrbiak, Chris­tof Paar, Christophe Huriaux, Russell Tessier

In the Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, Vancouver, British Columbia, May 2015. [pdf]

SCANDALee: A Side-ChANnel-based DisAssembLer using Local Electromagnetic Emanations

2015 - Daehyun Strobel, Florian Bache, David Oswald, Falk Schellenberg, Chris­tof Paar

De­sign, Au­to­ma­ti­on & Test in Eu­ro­pe Con­fe­rence & Ex­hi­bi­ti­on, DATE 2015, Gre­no­ble, Fran­ce, March 9 - 13 , 2015. [pdf]

Side-Channel Attacks from Static Power: When Should we Care?

2015 - Santos Merino Del Pozo, François-Xavier Standaert, Dina Kamel, Amir Moradi

Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9 - 13 , 2015. [pdf] [DOI]

Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation

2015 - Georg T. Becker, Alexander Wild, Tim Güneysu

IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [beckerPufIBS]
Page: