Publications

Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?

2015 - Amir Moradi, Alexander Wild

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015, to appear.

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations

2015 - Tobias Schneider, Amir Moradi

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015, to appear. [pdf]

The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs

2015 - Georg T. Becker

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 - 16, 2015, to ap­pe­ar [PDF]

Exploiting the Physical Environment for Securing the Internet of Things

2015 - Christian Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Chris­tof Paar

New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8–11, 2015

Bringing PHY-based Key Generation into the Field: An Evaluation for Practical Scenarios

2015 - Rene Guillaume, Fredrik Winzer, Christian Zenger, Chris­tof Paar, Andreas Czylwik

82nd Vehicular Technology Conference, VTC 2015, Boston, USA, 6-9 September, 2015 [PDF]

On-line Entropy Estimation for Secure Information Reconciliation

2015 - Christian Zenger, Jan Zimmer, Jan-Felix Posielek, Chris­tof Paar

Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]

Security Analysis of Quantization Schemes for Channel-based Key Extraction

2015 - Christian Zenger, Jan Zimmer, Chris­tof Paar

Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]

On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation

2015 - Johannes Tobisch, Georg T. Becker

1th Workshop on RFID Security (RFIDSec 2015), New York, USA, June 23-24, 2015, to appear [pdf]

Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware

2015 - Tobias Schneider, Amir Moradi, Tim Güneysu

In­ter­na­tio­nal Con­fe­rence on Ap­p­lied Cryp­to­gra­phy and Net­work Se­cu­ri­ty - ACNS 2015, New York, USA, 2–5 June 2015, to ap­pe­ar. [pdf]

Differential Power Analysis of a McEliece Cryptosystem

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt

13th International Conference on Applied Cryptography and Network Security (ACNS), New York, USA, 2–5 June 2015, to appear. [pdf]
Page: