Publications

Statistical Tools Flavor Side-Channel Collision Attacks

2012 - Amir Moradi

Advances in Cryptology - EUROCRYPT 2012 - 31th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, United Kingdom, April 15-19, 2012, pages 428-445. [DOI] [pdf]

Experimentally Verifying a Complex Algebraic Attack on the Grain-128 Cipher Using Dedicated Reconfigurable Hardware

2012 - Itai Dinur, Tim Güneysu, Chris­tof Paar, Adi Shamir, Ralf Zimmermann

SHARCS 2012 (http://2012.sharcs.org/index.html), 17-18 March 2012, Washington DC, USA [SHARCS 2012 website] [pdf]

Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures – An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism

2012 - Amir Moradi, Markus Kasper, Chris­tof Paar

Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference, San Francisco, CA, USA, February 27- March 2, 2012, pages 1-18. [DOI] [pdf]

An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware

2011 - Itai Dinur, Tim Güneysu, Chris­tof Paar, Adi Shamir, Ralf Zimmermann

Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011 [DOI] [BibTeX] [pdf] [bib]

An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software

2011 - Daehyun Strobel, Chris­tof Paar

Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011

RAM-Based Ultra-Lightweight FPGA Implementation of PRESENT

2011 - Elif Bilge Kavun, Tolga Yalcin

In International Conference on ReConFigurable Computing and FPGAs 2011 (ReConFig'11), IEEE Computer Society, Cancun, Mexico, Nov. 30-Dec. 2, 2011 [DOI]

Security of Wireless Embedded Devices in the Real World

2011 - Timo Kasper, David Oswald, Chris­tof Paar

Information Security Solutions (ISSE) 2011 - Securing Electronic Business Processes (November 22-23 2011, Prague, Czech Republic) [pdf] [bib]

Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild

2011 - Timo Kasper, David Oswald, Chris­tof Paar

19th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) [pdf] [bib]

On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs

2011 - Amir Moradi, Alessandro Barenghi, Timo Kasper, Chris­tof Paar

18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, IL, USA, October 17-21, 2011, pages 111-124. [DOI] [pdf] [slides] [bib]

Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge

2011 - Georg T. Becker, Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, Wayne Burelson

29th IEEE International Conference on Computer Design (Invited Paper), ICCD 2011, Amherst, USA, October 2011 [PDF]

Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World

2011 - David Oswald, Chris­tof Paar

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2011, Nara, Japan, Sep­tem­ber 28-Oc­to­ber 1, 2011, pages 207-222 [pdf] [extended version]

Generic Side-Channel Countermeasures for Reconfigurable Devices

2011 - Tim Güneysu, Amir Moradi

Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011 [BibTex] [DOI] [pdf] [PROMs]

On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting

2011 - Amir Moradi, Oliver Mischke, Chris­tof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama

Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011 [BibTeX] [DOI] [pdf]

spongent: A Lightweight Hash Function

2011 - Andrey Bogdanov, Miroslav Kneževi?, Gregor Leander, Deniz Toz, Kerem Var?c?, Ingrid Verbauwhede

13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings [DOI] [bib]

Memory Encryption in Smart Cards

2011 - Baris Ege, Elif Bilge Kavun, Tolga Yalcin

10th Smart Card Research and Advanced Application Conference (CARDIS 2011), Leuven, Belgium, Sept. 14-16, 2011 [DOI] [pdf]

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

2011 - Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner

31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings [DOI] [bib]

Sec2 – Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage

2011 - Christopher Meyer, Juraj Somorovsky, Jörg Schwenk, Benedikt Driessen, Thang Tran, Christian Wietfeld

In Proceedings of the DACH Security 2011, Oldenburg, Germany [Paper] [Slides]

Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation

2011 - Timo Kasper, David Oswald, Chris­tof Paar

7th Workshop on RFID Security and Privacy 2011, RFIDSec 2011, Amherst, USA, June 26–28, 2011 [pdf] [bib]

7th Workshop on RFID Security and Privacy (RFIDsec)

2011 - A. Juels, K. Fu, Chris­tof Paar

Lecture Notes in Computer Science 7055, Springer, Amherst, MA, USA, June 26-27, 2011.

Practical Evaluation of DPA Countermeasures on Reconfigurable Hardware

2011 - Amir Moradi, Oliver Mischke, Chris­tof Paar

HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA [BibTeX] [DOI] [pdf]

Side-channel Watermarks for Embedded Software

2011 - Georg T. Becker, Wayne Burleson, Chris­tof Paar

9th IEEE NEWCAS Conference (Invited Paper), NEWCAS 2011, Bordeaux, France, June 2011 [pdf]

On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

2011 - Gregor Leander

30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings [DOI] [bib]

Pushing the Limits: A Very Compact and a Threshold Implementation of AES

2011 - Amir Moradi, Dipl.-Kfm. Axel Poschmann, San Ling, Chris­tof Paar, Huaxiong Wang

Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, vo­lu­me 6632 of LNCS, pages 69-88, Sprin­ger. [DOI] [bib] [pdf]

The future of high-speed cryptography: new computing platforms and new ciphers

2011 - Tim Güneysu, Stefan Heyse, Chris­tof Paar

Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, Lausanne, Switzerland, May 2-6, 2011 [pdf] [BibTex] [DOI]

Towards an Ultra Lightweight Crypto Processor

2011 - Begul Bilgin, Elif Bilge Kavun, Tolga Yalcin

Proceedings of the Workshop on Lightweight Security and Privacy (LightSec’11), Istanbul, Turkey, March 14-15, 2011 [DOI] [pdf]

Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes

2011 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen

18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [DOI] [bib]

Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations

2011 - Mohamed Ahmed Abdelraheem, Gregor Leander, Mohamed Ahmed Abdelraheem

18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers [DOI] [bib]

The World Is Not Enough: Another Look on Second-Order DPA

2010 - François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard

ASIACRYPT 2010: 112-129 [bib]

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

2010 - Gallais, J., Großschädl, J., Hanley, N., Markus Kasper, Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S.

In L. Chen & M. Yung (Eds.), International Conference on Trusted Computing. Springer. [bib]

Side-channel based watermarks for IP Protection

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design [bib]

Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L. Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI]

High-Performance Integer Factoring with Reconfigurable Devices

2010 - Ralf Zimmermann, Tim Güneysu, Chris­tof Paar

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI] [pdf] [bib]

Breaking Elliptic Curve Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L.Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

IEEE Field Programmable Logic, 133-138, IEEE Computer Society, 2010.

Cloning Cryptographic RFID Cards for 25$

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

Presented at the 5th Benelux Workshop on Information and System Security, WisSec 2010, November 29-30, 2010, Nijmegen, the Netherlands.

Chameleon: A Versatile Emulator for Contactless Smartcards

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

13th International Conference on Information Security and Cryptology - ICISC 2010, Seoul, Korea, December 1-3, 2010, volume 6829 of LNCS, pages 189-206, Springer. [SourceForge] [BibTeX] [DOI] [pdf]

Combined Implementation Attack Resistant Exponentiation

2010 - Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald

Springer LNCS 6112, LATINCRYPT 2010, Puebla, Mexico. [pdf] [bib]

Evaluation of SHA-3 Candidates for 8-bit Embedded Processors

2010 - Stefan Heyse, Ingo von Maurich, Alexander Wild, Cornel Reuber, Johannes Rave, Thomas Pöppelmann, Chris­tof Paar, Thomas Eisenbarth

2nd SHA-3 Candidate Conference, August 23-24, 2010, University of California, Santa Barbara, USA. [Paper]

Correlation-Enhanced Power Analysis Collision Attack

2010 - Amir Moradi, Oliver Mischke, Thomas Eisenbarth

Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings [BibTeX] [DOI] [pdf]

PRINTcipher: A Block Cipher for IC-Printing

2010 - Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings [DOI] [bib]

Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs

2010 - Andrey Bogdanov, Thomas Eisenbarth, Chris­tof Paar, M. Wienecke

Topics in Cryptology - CT-RSA 2010, LNCS, Springer-Verlag. [pdf]

Secure Location Verification - A Security Analysis of GPS Signal Authentication

2010 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Chris­tof Paar

DBSec 2010, Rome, Italy, June 21-23, 2010, to be published in Springer LNCS. [pdf]

A Pipelined Camellia Architecture for Compact Hardware Implementation

2010 - Elif Bilge Kavun, Tolga Yalcin

In Proceedings of the 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP’10), pages 305 - 308, IEEE, Rennes, France, July 7-9, 2010 [DOI]

Side-channel based watermarks for integrated circuits

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. [pdf]

A Lightweight Implementation of KECCAK Hash Function for Radio-Frequency Identification Applications

2010 - Elif Bilge Kavun, Tolga Yalcin

Proceedings of the 6th Workshop on RFID Security (RFIDSec'11), Istanbul, Turkey, June 7-9, 2010 [DOI] [pdf]

Practical Power Analysis Attacks on Software Implementations of McEliece

2010 - Stefan Heyse, Amir Moradi, Chris­tof Paar

Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings [DOI] [BibTeX] [bib] [pdf]

All You Can Eat or Breaking a Real-World Contactless Payment System

2010 - Timo Kasper, Michael Silbermann, Chris­tof Paar

Financial Cryptography and Data Security, 10 January 25-28, 2010, to be published in Springer LNCS. [pdf] [bib]

Lightweight Cryptography and DPA Countermeasures: A Survey

2010 - Amir Moradi, Axel Poschmann

First International Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010 (co-located with Financial Cryptography and Data Security - FC 2010), Tenerife, Canary Islands, Spain, Januar 25-28, 2010. [pdf]

Transforming Write Collisions in Block RAMs into Security Applications

2009 - Tim Güneysu, Chris­tof Paar

Proceedings of the 2009 International Conference on Field-Programmable Technology, FPT 2009, Sydney, Australia, December 9-11, 2009 [BibTeX] [DOI] [pdf]

A New Remote Keyless Entry System Resistant to Power Analysis Attacks

2009 - Amir Moradi, Timo Kasper

7th International Conference on Information, Communications and Signal Processing, ICICS 2009, Macau, China, Dezember 7-10, 2009. [pdf]

Lightweight Cryptography and RFID: Tackling the Hidden Overheads

2009 - Dipl.-Kfm. Axel Poschmann, Matt Robshaw, Frank Vater, Chris­tof Paar

7th International ConferenceInternational Conference on Information Security and Cryptology 2009 - ICISC 2009. LNCS, Springer-Verlag, to appear, Seoul, Korea, Dezember 2-4, 2009. [pdf]
Page: