Publications

The World Is Not Enough: Another Look on Second-Order DPA

2010 - François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard

ASIACRYPT 2010: 112-129 [bib]

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

2010 - Gallais, J., Großschädl, J., Hanley, N., Markus Kasper, Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S.

In L. Chen & M. Yung (Eds.), International Conference on Trusted Computing. Springer. [bib]

Side-channel based watermarks for IP Protection

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design [bib]

Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L. Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI]

High-Performance Integer Factoring with Reconfigurable Devices

2010 - Ralf Zimmermann, Tim Güneysu, Chris­tof Paar

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI] [pdf] [bib]

Breaking Elliptic Curve Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L.Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

IEEE Field Programmable Logic, 133-138, IEEE Computer Society, 2010.

Cloning Cryptographic RFID Cards for 25$

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

Presented at the 5th Benelux Workshop on Information and System Security, WisSec 2010, November 29-30, 2010, Nijmegen, the Netherlands.

Chameleon: A Versatile Emulator for Contactless Smartcards

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

13th International Conference on Information Security and Cryptology - ICISC 2010, Seoul, Korea, December 1-3, 2010, volume 6829 of LNCS, pages 189-206, Springer. [SourceForge] [BibTeX] [DOI] [pdf]

Combined Implementation Attack Resistant Exponentiation

2010 - Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald

Springer LNCS 6112, LATINCRYPT 2010, Puebla, Mexico. [pdf] [bib]

Evaluation of SHA-3 Candidates for 8-bit Embedded Processors

2010 - Stefan Heyse, Ingo von Maurich, Alexander Wild, Cornel Reuber, Johannes Rave, Thomas Pöppelmann, Chris­tof Paar, Thomas Eisenbarth

2nd SHA-3 Candidate Conference, August 23-24, 2010, University of California, Santa Barbara, USA. [Paper]
Page: