Publications
Finding the AES Bits in the Haystack: Reverse Enginering and SCA Using Voltage Contrast
2015 - Christian Kison, Jürgen Frinken, Christof Paar
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 [Springer]got HW crypto? On the (in)security of a Self-Encrypting Drive series
2015 - Gunnar Alendal, Christian Kison, modg
Hardware Security Conference and Training, Hardwear.io 2015, The Hague, Netherlands, Oct 1-2, 2015 [pdf]Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?
2015 - Amir Moradi, Alexander Wild
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 (best paper candidate). [pdf] [DOI]Leakage Assessment Methodology - a clear roadmap for side-channel evaluations
2015 - Tobias Schneider, Amir Moradi
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]On the Complexity Reduction of Laser Fault Injection Campaigns using OBIC Measurements
2015 - Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schäpers, Nils C. Gerhardt, Martin R. Hofmann , Christof Paar
Fault Diagnosis and Tolerance in Cryptography - FDTC 2015, Saint Malo, France, September 13, 2015. [DOI] [pdf]The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
2015 - Georg T. Becker
Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015 [PDF]Exploiting the Physical Environment for Securing the Internet of Things
2015 - Christian Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar
New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8–11, 2015 [pdf]Bringing PHY-based Key Generation into the Field: An Evaluation for Practical Scenarios
2015 - Rene Guillaume, Fredrik Winzer, Christian Zenger, Christof Paar, Andreas Czylwik
82nd Vehicular Technology Conference, VTC 2015, Boston, USA, 6-9 September, 2015 [PDF]Affine Equivalence and its Application to Tightening Threshold Implementations
2015 - Pascal Sasdrich, Amir Moradi, Tim Güneysu
22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015 [pdf]Masking Large Keys in Hardware: A Masked Implementation of McEliece
2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
22nd Conference on Selected Areas in Cryptography (SAC 2015), Sackville, New Brunswick, Canada, August 12-14, 2015, to appear. [eprint]On-line Entropy Estimation for Secure Information Reconciliation
2015 - Christian Zenger, Jan Zimmer, Jan-Felix Posielek, Christof Paar
Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]Security Analysis of Quantization Schemes for Channel-based Key Extraction
2015 - Christian Zenger, Jan Zimmer, Christof Paar
Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]Development of a Layout-Level Hardware Obfuscation Tool
2015 - Shweta Malik, Georg T. Becker, Christof Paar, Wayne P. Burleson
IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2015 (Invited Paper), Montpellier, France, July 2015 [PDF]On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation
2015 - Johannes Tobisch, Georg T. Becker
11th Workshop on RFID Security (RFIDSec 2015), New York, USA, June 23-24, 2015 [pdf]Security Evaluation and Enhancement of Bistable Ring PUFs
2015 - Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson
Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers & Lecture Notes in Computer Science, vol. 9440, page 3-16, Springer, 2015 [DOI] [ePrint]Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
2015 - Tobias Schneider, Amir Moradi, Tim Güneysu
International Conference on Applied Cryptography and Network Security - ACNS 2015, New York, USA, 2–5 June 2015. [pdf] [DOI]Differential Power Analysis of a McEliece Cryptosystem
2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
13th International Conference on Applied Cryptography and Network Security (ACNS), New York, USA, 2–5 June 2015. [Springer] [pdf]High-Performance Ideal Lattice-Based Cryptography on ATxmega 8-bit Microcontrollers
2015 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu
Latincrypt 2015, Bienvenido, Guadalajara, Mexico, August 23-26, 2015 [Preprint] [Source Code]Virtual Proofs of Reality and their Physical Implementation
2015 - Ulrich Rührmair, J.L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson
2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015 [DOI]Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs
2015 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu
IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [pdf]