Publications

High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers

2017 - Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede

ACM Transactions on Embedded Computing Systems (TECS) TECS Volume 16 Issue 4, July 2017 Article No. 117, ACM New York, NY, USA. [ACM] [pdf]

Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds

2017 - Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens

IACR Transactions on Symmetric Cryptology - Issue 2-2017 [pdf] [DOI]

Backside imaging of a microcontroller with common-path digital holography

2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Nils C. Gerhardt, Martin R. Hofmann

Proc. SPIE. 10127, Practical Holography XXXI: Materials and Applications, 1012704. (February 15, 2017) doi: 10.1117/12.2250903

Multimodal backside imaging of a microcontroller using confocal laser scanning and optical-beam-induced current imaging

2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Carsten Brenner, Nils C. Gerhardt, Martin R. Hofmann

Proc. SPIE. 10110, Photonic Instrumentation Engineering IV, 101101F. (February 20, 2017) doi: 10.1117/12.2250912

Authenticated Key Establishment for Low-Resource Devices Exploiting Correlated Random Channels

2016 - Christian Zenger, Mario Pietersz, Jan Zimmer, Jan-Felix Posielek, Thorben Lenze, Chris­tof Paar

[pdf]

Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive

2016 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Chris­tof Paar

Journal of Cryptographic Engineering, Springer, June 2016. [DOI] [pdf]

Common-path depth-filtered digital holography for high resolution imaging of buried semiconductor structures

2016 - Markus Finkeldey, Falk Schellenberg, Nils C. Gerhardt, Chris­tof Paar, Martin R. Hofmann

Proc. SPIE 9771, Practical Holography XXX: Materials and Applications, 97710G (7 March 2016); doi: 10.1117/12.2212454 [DOI]

Leakage Assessment Methodology - Extended Version

2016 - Tobias Schneider, Amir Moradi

Journal of Cryptographic Engineering June 2016, Volume 6, Issue 2, pp 85–99 [DOI]

Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rai­ner Stein­wandt

IEEE Transactions on Information Forensics and Security, vol.PP, no.99, pp.1-1 DOI: 10.1109/TIFS.2015.2509944 [IEEEXplore] [pdf]

Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography

2015 - Pascal Sasdrich, Tim Güneysu

ACM Transactions on Reconfigurable Technology and Systems (TRETS) - Special Section on the 2014 International Symposium on Applied Reconfigurable Computing, Volume 9, Issue 1, November 2015, Article No. 3, ACM New York, NY, USA [Bibtex] [DOI] [pdf]
Page: