Publications

Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms

2014 - Christian Zenger, Abhijit Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten, Chris­tof Paar

1st International Conference on Cryptography and Information Security (BalkanCryptSec), 2014 [pdf]

Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware

2014 - Stefan Heyse, Ralf Zimmermann, Chris­tof Paar

Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 [DOI] [BibTeX] [pdf] [bib]

Full-Size High-Security ECC Implementation on MSP430 Microcontrollers

2014 - Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Chris­tof Paar

Third International Conference on Cryptology and Information Security in Latin America, Latincrypt 2014, Florianópolis, Brazil, September 17 - 19, 2014. [DOI] [pdf] [code]

Early Propagation and Imbalanced Routing, How to Diminish in FPGAs

2014 - Amir Moradi, Vincent Immler

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]

Side-Channel Leakage through Static Power – Should We Care about in Practice?

2014 - Amir Moradi

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]

POSTER: Implementation and Evaluation of Channel-based Key Establishment Systems

2014 - Christian Zenger, Chris­tof Paar

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, Sep­tem­ber 23 - 26, 2014. [pdf]

Enabling SRAM-PUFs on Xilinx FPGAs

2014 - Alexander Wild, Tim Güneysu

24th International Conference on Field Programmable Logic and Applications Munich, Germany; September 2 - 4, 2014 [BibTeX] [DOI] [Paper]

THOR - The hardware onion router

2014 - Tim Güneysu, Francesco Regazzoni, Pascal Sasdrich, Marcin Wójcik

24th In­ter­na­tio­nal Con­fe­rence on Field Pro­gramma­ble Logic and Ap­p­li­ca­ti­ons Mu­nich, Ger­ma­ny; Sep­tem­ber 2 - 4, 2014 [BibTex] [DOI]

A Novel Key Generating Architecture for Wireless Low-Resource Devices

2014 - Christian Zenger, Jan-Felix Posielek, Gerhard Wunder, Chris­tof Paar

ESORICS International Workshop on Secure Internet of Things 2014 (ESORICS-SIoT 2014), 16 pages [pdf]

Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation

2014 - René Guillaume, Andreas Mueller , Christian Zenger, Chris­tof Paar, Andreas Czylwik

18th International OFDM Workshop 2014, Essen, Germany [pdf]

High-speed signatures from standard lattices

2014 - Özgür Dagdelen, Rachid El Bansarkhani, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Ana Helena Sánchez, Peter Schwabe

to appear in Latincrypt 2014 [PDF]

Fault Sensitivity Analysis Meets Zero-Value Attack

2014 - Oliver Mischke, Amir Moradi, Tim Güneysu

Fault Diagnosis and Tolerance in Cryptography - FDTC 2014, Busan, Korea, September 23, 2013. [PDF]

Block Ciphers – Focus On The Linear Layer (feat. PRIDE)

2014 - Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Chris­tof Paar, Tolga Yalcin

In Proceedings of the 34th International Cryptology Conference 2014 (CRYPTO’14), volume 8616 of Lecture Notes in Computer Science, pages 57-76. Springer, Santa Barbara, CA, US, August 17-21, 2014 [DOI]

Sweet Dreams and Nightmares: Security in the Internet of Things

2014 - Timo Kasper, David Oswald, Chris­tof Paar

Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. [pdf]

Proof-of-Concept: Using Homomorphic Cryptography to Provide for Privacy in Modern Vehicular Environments

2014 - Susanne Wetzel, Bernhard Borsch, Chris­tof Paar, Thomas Pöppelmann

escar Embedded Security in Cars Conference, June 18-19, 2014, Detroid Metropolitan, Michigan, USA, extended abstract [Website]

Detecting Hidden Leakages

2014 - Amir Moradi, Sylvain Guilley, Annelie Heuser

International Conference on Applied Cryptography and Network Security - ACNS 2014, Lausanne, Switzerland, June 10 - 13, 2014 (best-[student]-paper award). [DOI] [pdf]

Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices

2014 - Tobias Oder, Thomas Pöppelmann, Tim Güneysu

The 51st Annual Design Automation Conference 2014, DAC '14, San Francisco, CA, USA, June 1-5, 2014 [Paper] [BibTeX] [DOI] [Code]

Efficient Elliptic-Curve Cryptography using Curve25519 on Recon figurable Devices

2014 - Pascal Sasdrich, Tim Güneysu

Reconfigurable Computing: Architectures, Tools, and Applications - 10th International Symposium, ARC 2014, Vilamoura, Portugal, April 14-16, 2014 [BibTeX] [DOI] [pdf]

Statistics on Password Re-use and Adaptive Strength for Financial Accounts

2014 - Daniel V. Bailey, Markus Dürmuth, Chris­tof Paar

Proceedings 9th International Conference on Security and Cryptography (SCN), 2014. [PDF]

Typing passwords with voice recognition --or-- How to authenticate to Google Glass

2014 - Daniel Bailey, Markus Dürmuth, Chris­tof Paar

Adventures in Authentication: WAY Workshop. 2014. [PDF]

A Reconfigurable Architecture For Searching Optimal Software Code To Implement Block Cipher Permutation Matrices

2013 - Elif Bilge Kavun, Gregor Leander, Tolga Yalcin

In In­ter­na­tio­nal Con­fe­rence on Re­Con­Fi­gura­ble Com­pu­ting and FPGAs 2013 (Re­Con­Fig'13), IEEE Com­pu­ter So­cie­ty, Cancun, Me­xi­co, Dec. 9-11, 2013 [DOI]

Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure

2013 - Amir Moradi, Oliver Mischke

International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20 - 22, 2013. [DOI] [BibTeX] [pdf]

Side-Channel Attacks on the Yubikey 2 One-Time Password Generator

2013 - David Oswald, Bastian Richter, Chris­tof Paar

RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. [bibtex] [pdf]

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System

2013 - Daehyun Strobel, Benedikt Driessen, Gregor Leander, Timo Kasper, David Oswald, Falk Schellenberg, Chris­tof Paar

Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013 [bibtex]

Stealthy Dopant-Level Hardware Trojans

2013 - Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 20 - 23, 2013 Extended version in Journal of Cryptographic Engineering, Springer, 2014 [pdf] [bib]

On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme

2013 - Amir Moradi, Oliver Mischke

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013. [DOI] [BibTeX] [pdf]

Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices

2013 - Stefan Heyse, Ingo von Maurich, Tim Güneysu

Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013 [BibTeX] [DOI] [Paper]

Faster Hash-based Signatures with Bounded Leakage

2013 - Thomas Eisenbarth, Ingo von Maurich, Xin Ye

Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 [BibTeX] [DOI] [Paper]

Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing

2013 - Timo Kasper, David Oswald, Christian Zenger, Chris­tof Paar

9th Workshop on RFID Security, RFIDsec 2013, July 9-11, 2013, Graz, Austria [pdf] [bib]

Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware

2013 - Alexander Wild, Tim Güneysu, Amir Moradi

Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013 [BibTeX] [DOI] [Paper]

Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation System

2013 - Gesine Hinterwälder, Christian Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Chris­tof Paar, Wayne P. Burleson

E. De Cristofaro and M. Wright (Eds.): PETS 2013, LNCS 7981, pp. 40–59, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

Efficient Implementation of Cryptographic Primitives on the GA144 Multi-core Architecture

2013 - Tobias Schneider, Ingo von Maurich, Tim Güneysu

24th International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2013, Washington, DC, USA, June 5-7, 2013 [BibTeX] [DOI] [Paper]

Software Speed Records for Lattice-Based Signatures

2013 - Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Peter Schwabe

Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013 [Software] [BibTeX] [DOI] [Paper]

P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems

2013 - Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Chris­tof Paar

A.-R. Sadeghi (Eds.): Financial Cryptography and Data Security 2013, Volume 7859, pp 205-212, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II - Facilitating Black-Box Analysis using Software Reverse-Engineering

2013 - Amir Moradi, David Oswald, Chris­tof Paar, Pawel Swierczynski

21st ACM/SIGDA International Symposium on Field-Programmable Gate Arrays- FPGA 2013, pages 91-100, February 11 - 13. ACM, 2013. [DOI] [pdf]

SHA-3 - Portierung auf einer ATmega163 Smartcard

2013 - Pawel Swierczynski, Chris­tof Paar

23. SMARTCARD-WORKSHOP, Tagungsband, Darmstadt, 6/7. Februar 2013.

Achieving anonymity against major face recognition algorithms

2013 - Benedikt Driessen, Markus Dürmuth

Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013. [PDF]

IPSecco: A Lightweight and Reconfigurable IPSec Core

2012 - Benedikt Driessen, Tim Güneysu, Elif Bilge Kavun, Oliver Mischke, Chris­tof Paar, Thomas Pöppelmann

2012 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2012, Cancun, Mexico, December 5-7, 2012 [BibTeX] [DOI] [PDF]

PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications (Extended Abstract)

2012 - Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Chris­tof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalcin

Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012 [DOI] [BibTeX]

Improving Side-Channel Analysis with Optimal Linear Transforms

2012 - David Oswald, Chris­tof Paar

CARDIS 2012 [pdf] [bibtex]

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

2012 - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, Francois Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, Francois-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loic Van Oldeneel Tot Oldenzeel, Ingo von Maurich

Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012 [Full Version] [Block Cipher Version] [BibTeX] [DOI]

How Far Should Theory be from Practice? – Evaluation of a Countermeasure

2012 - Amir Moradi, Oliver Mischke

Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012 [DOI] [BibTeX] [pdf]

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

2012 - Martin R. Albrecht, Gregor Leander

Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers [bib]

Solving Binary Linear Equation Systems over the Rationals and Binaries

2012 - Benedikt Driessen, Chris­tof Paar

International Workshop on the Arithmetic of Finite Fields (Bochum) 2012 [Waifi 2012] [pdf] [bib]

Pay as you Go

2012 - Foteini Baldimtsi, Gesine Hinterwälder, Andy Rupp, Anna Lysyanskaya, Chris­tof Paar, Wayne P. Burleson

5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012) Held in conjunction with the 12th Privacy Enhancing Technologies Symposium July 13, 2012, Vigo, Spain [pdf]

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

2012 - Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, Francois Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, Francois-Xavier Standaert, Loic van Oldeneel tot Oldenzeel

Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 [BibTeX] [DOI] [Full Version] [Hash Funct. Version]

Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems

2012 - Gesine Hinterwälder, Chris­tof Paar, Wayne P. Burleson

J.-H. Hoepman, I. Verbauwhede (Eds.): RFIDSec 2012, Volume 7739, pp 109-122, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

Glitch-Free Implementation of Masking in Modern FPGAs

2012 - Amir Moradi, Oliver Mischke

2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012 [DOI] [BibTeX] [pdf] [verilog]

Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards

2012 - Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz

IEEE Symposium on Security and Privacy ("Oakland"), San Francisco, CA, May 2012 - **Best Paper Award** [More Info] [PDF]

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations

2012 - Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser

Advances in Cryptology – EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings [bib]
Page: