Publications

Impeccable Circuits

2019 - Anita Aghaie, Amir Moradi, Shahram Rasoolzadeh, Aein Rezaei Shahmirzadi, Falk Schellenberg, Tobias Schneider

IEEE Transactions on Computers, 2019. [DOI] [pdf] [HDL code]

Static Power Side-Channel Analysis - An Investigation of Measurement Factors

2019 - Thorben Moos, Amir Moradi, Bastian Richter

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019. [DOI] [pdf]

Wie arbeiten Reverse Engineers?

2019 - Steffen Becker, Wiesen, Carina, Rummel, Nikol, Chris­tof Paar

Datenschutz und Datensichicherheit (2019) 43: 686. [DOI] [PDF]

Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed

2019 - Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 2, pp 256-292, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) **best paper award** [pdf] [doi]

Exploring the Effect of Device Aging on Static Power Analysis Attacks

2019 - Naghmeh Karimi, Thorben Moos, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 3, pp 233-256, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) [pdf] [doi]

Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments

2019 - Thorben Moos

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2019, No. 3, pp 202-232, 2019. (presentation at CHES 2019, Atlanta, USA, August 25–28, 2019) [pdf] [doi]

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

2019 - Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh

IACR Tran­sac­tions on Sym­me­tric Cryp­to­lo­gy, Vol. 2019, No. 1, pp 5-45, 2019. (presentation at FSE 2019, Paris, France, March 25–28, 2019) [pdf] [doi] [website]

Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection

2018 - Pascal Sasdrich, Tim Güneysu

Journal of Hardware and Systems Security, December 2018, Volume 2, Issue 4, pp 297–313 [pdf]

Hardware Masking, Revisited

2018 - Thomas De Cnudde, Maik Ender, Amir Moradi

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 2, pp 123-148, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI]

Leakage Detection with the χ²-Test

2018 - Amir Moradi, Bastian Richter, Tobias Schneider, François-Xavier Standaert

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 1, pp 209-237, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI]

Spin Me Right Round - Rotational Symmetry for FPGA-Specific AES

2018 - Lauren De Meyer, Amir Moradi, Felix Wegener

IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2018, No. 3, pp 596-626, 2018. (presentation at CHES 2018, Amsterdam, The Netherlands, September 9 – 12, 2018) [pdf] [DOI] [VHDL]

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

2018 - Max Hoffmann, Chris­tof Paar

IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925,Vol. 2018, No. 2, pp. 277–297 [pdf] [DOI]

Standard Lattice-Based Key Encapsulation on Embedded Devices

2018 - James Howe, Tobias Oder, Markus Krausz, Tim Güneysu

IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 3 [pdf]

HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

2018 - Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Mathias Wilhelm, Tobias Weidlich, Russell Tessier, Chris­tof Paar

IEEE Transactions on Dependable and Secure Computing (to appear)

Hybrid Obfuscation to Protect against Disclosure Attacks on Embedded Microprocessors

2018 - Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Chris­tof Paar

IEEE Transactions on Computers, Volume 67, Issue 3, pp. 307-321, 2018. [DOI]

Optical metrology for the investigation of buried technical structures

2018 - Lena Göring, Markus Finkeldey, Falk Schellenberg, Carsten Brenner, Martin R. Hofmann , Nils C. Gerhardt

tm-Technisches Messen, 2018, 85(2), 104-110.

Practical CCA2-Secure and Masked Ring-LWE Implementation

2018 - Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu

IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Volume 2018, Issue 1 [pdf]

Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs

2018 - Pawel Swierczynski, Georg T. Becker, Amir Moradi, Chris­tof Paar

IEEE Transactions on Computers, vol. 67, no. 3, pp. 348-360, 2018. [pdf] [DOI]

GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs

2018 - Alexander Wild, Amir Moradi, Tim Güneysu

IEEE Transactions on Computers, vol. 67, no. 3, pp. 375-387, 2018. [DOI]

IoT-Schlüsselmanagement

2017 - Heiko Koepke, Thorben Lenze, Mario Pietersz, Christian Zenger

Datenschutz und Datensicherheit 10/2017, vol. 41, pp. 617-622, Springer Gabler [DOI]

High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers

2017 - Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede

ACM Transactions on Embedded Computing Systems (TECS) TECS Volume 16 Issue 4, July 2017 Article No. 117, ACM New York, NY, USA. [ACM] [pdf]

Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds

2017 - Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens

IACR Transactions on Symmetric Cryptology - Issue 2-2017 [pdf] [DOI]

Backside imaging of a microcontroller with common-path digital holography

2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Nils C. Gerhardt, Martin R. Hofmann

Proc. SPIE. 10127, Practical Holography XXXI: Materials and Applications, 1012704. (February 15, 2017) doi: 10.1117/12.2250903

Multimodal backside imaging of a microcontroller using confocal laser scanning and optical-beam-induced current imaging

2017 - Markus Finkeldey, Lena Göring, Falk Schellenberg, Carsten Brenner, Nils C. Gerhardt, Martin R. Hofmann

Proc. SPIE. 10110, Photonic Instrumentation Engineering IV, 101101F. (February 20, 2017) doi: 10.1117/12.2250912

Authenticated Key Establishment for Low-Resource Devices Exploiting Correlated Random Channels

2016 - Christian Zenger, Mario Pietersz, Jan Zimmer, Jan-Felix Posielek, Thorben Lenze, Chris­tof Paar

[pdf]

Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive

2016 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Chris­tof Paar

Journal of Cryptographic Engineering, Springer, June 2016. [DOI] [pdf]

Common-path depth-filtered digital holography for high resolution imaging of buried semiconductor structures

2016 - Markus Finkeldey, Falk Schellenberg, Nils C. Gerhardt, Chris­tof Paar, Martin R. Hofmann

Proc. SPIE 9771, Practical Holography XXX: Materials and Applications, 97710G (7 March 2016); doi: 10.1117/12.2212454 [DOI]

Leakage Assessment Methodology - Extended Version

2016 - Tobias Schneider, Amir Moradi

Journal of Cryptographic Engineering June 2016, Volume 6, Issue 2, pp 85–99 [DOI]

Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rai­ner Stein­wandt

IEEE Transactions on Information Forensics and Security, vol.PP, no.99, pp.1-1 DOI: 10.1109/TIFS.2015.2509944 [IEEEXplore] [pdf]

Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography

2015 - Pascal Sasdrich, Tim Güneysu

ACM Transactions on Reconfigurable Technology and Systems (TRETS) - Special Section on the 2014 International Symposium on Applied Reconfigurable Computing, Volume 9, Issue 1, November 2015, Article No. 3, ACM New York, NY, USA [Bibtex] [DOI] [pdf]

MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography

2015 - Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings [DOI]

Security Analysis of Quantization Schemes for Channel-based Key Extraction

2015 - Christian Zenger, Jan Zimmer, Chris­tof Paar

EAI Endorsed Transactions on Security and Safety, vol. 15, no. 6 [DOI] [PDF]

On the Pitfalls of using Arbiter-PUFs as Building Blocks

2015 - Georg T. Becker

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, TCAD, 34 (8):1-13, August 2015 [DOI] [pdf]

A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation

2015 - Andreas Gornik, Amir Moradi, Jürgen Oehm, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 34, No.8, pages 1308-1319, 2015. [pdf] [DOI]

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers

2015 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Chris­tof Paar, Ana Helena Sánchez, Peter Schwabe

Designs, Codes and Cryptography comprising the “Special Issue on Cryptography, Codes, Designs and Finite Fields: In Memory of Scott A. Vanstone”, Springer-Verlag. [link] [MSP430 SW for IAR]

Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport

2015 - Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Chris­tof Paar

ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 3, March 2015, Article No. 10 [link]

FPGA Trojans through Detecting and Weakening of Cryptographic Primitives

2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]

Implementing QC-MDPC McEliece Encryption

2015 - Ingo von Maurich, Tobias Oder, Tim Güneysu

ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on Embedded Platforms for Crypto and Regular Papers TECS, Volume 14 Issue 3, May 2015, Article No. 44, ACM New York, NY, USA. [PDF]

Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs

2014 - Pawel Swierczynski, Amir Moradi, David Oswald, Chris­tof Paar

ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 7 Issue 4, December 2014. [DOI] [pdf]

Microcontrollers as (In)Security Devices for Pervasive Computing Applications

2014 - Daehyun Strobel, David Oswald, Bastian Richter, Falk Schellenberg, Chris­tof Paar

Proceedings of the IEEE, vol. 102, no. 8, pp. 1157-1173, 2014 [PDF (Open Access)] [bib]

Stealthy dopant-level hardware Trojans: extended version

2014 - Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson

Journal of Cryptographic Engineering 4.1 (2014): 19-31 [DOI] [PDF] [BIB]

Large-Scale High-Resolution Computational Validation of Novel Complexity Models in Linear Cryptanalysis

2014 - Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalcin

In Journal of Computational and Applied Mathematics, volume 259, part B, pages 592-598, Elsevier, March 15, 2014 [DOI]

Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis

2014 - Tobias Schneider, Ingo von Maurich, Tim Güneysu, David Oswald

Journal of Signal Processing Systems, Springer, 2014. [DOI] [BibTeX]

An Experimental Security Analysis of Two Satphone Standards

2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz

ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]

Keccak und der SHA-2

2013 - Pawel Swierczynski, Gregor Leander, Chris­tof Paar

DuD - Da­ten­schutz und Da­ten­si­cher­heit Aus­ga­be 11/2013 [bib]

SPONGENT: The Design Space of Lightweight Cryptographic Hashing

2013 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede

IEEE Trans. Computers vol. 62, number 10, 2013 [bib]

One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores

2013 - Amir Moradi, Oliver Mischke, Chris­tof Paar

IEEE Transactions on Computers, vol. 62, no. 9, pp. 1786-1798, Sept. 2013. [DOI] [BibTeX] [pdf]

Bounds in Shallows and in Miseries

2013 - Céline Blondeau, Andrey Bogdanov, Gregor Leander

Advances in Cryptology – CRYPTO 2013 Lecture Notes in Computer Science Volume 8042, 2013, pp 204-221 [bib]

When Reverse-Engineering Meets Side-Channel Analysis–Digital Lockpicking in Practice

2013 - David Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Chris­tof Paar

Selected Areas in Cryptography -- SAC 2013, Springer Berlin Heidelberg, 2014, 571-588 [bib]

Wireless Devices and Cryptography: About Digital Pickpocketing, Open Sesame and Tracking Paranoia

2013 - Timo Kasper

it - Information Technology: Vol. 55, No. 3, pp. 123-128 [pdf] [bib]
Page: