Publications
A Reconfigurable Architecture For Searching Optimal Software Code To Implement Block Cipher Permutation Matrices
2013 - Elif Bilge Kavun, Gregor Leander, Tolga Yalcin
In International Conference on ReConFigurable Computing and FPGAs 2013 (ReConFig'13), IEEE Computer Society, Cancun, Mexico, Dec. 9-11, 2013 [DOI]Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure
2013 - Amir Moradi, Oliver Mischke
International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20 - 22, 2013. [DOI] [BibTeX] [pdf]Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
2013 - David Oswald, Bastian Richter, Christof Paar
RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. [bibtex] [pdf]Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
2013 - Daehyun Strobel, Benedikt Driessen, Gregor Leander, Timo Kasper, David Oswald, Falk Schellenberg, Christof Paar
Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013 [bibtex]Stealthy Dopant-Level Hardware Trojans
2013 - Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013 Extended version in Journal of Cryptographic Engineering, Springer, 2014 [pdf] [bib]On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme
2013 - Amir Moradi, Oliver Mischke
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013. [DOI] [BibTeX] [pdf]Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices
2013 - Stefan Heyse, Ingo von Maurich, Tim Güneysu
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013 [BibTeX] [DOI] [Paper]Faster Hash-based Signatures with Bounded Leakage
2013 - Thomas Eisenbarth, Ingo von Maurich, Xin Ye
Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 [BibTeX] [DOI] [Paper]Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing
2013 - Timo Kasper, David Oswald, Christian Zenger, Christof Paar
9th Workshop on RFID Security, RFIDsec 2013, July 9-11, 2013, Graz, Austria [pdf] [bib]Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware
2013 - Alexander Wild, Tim Güneysu, Amir Moradi
Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013 [BibTeX] [DOI] [Paper]