Publications

The World Is Not Enough: Another Look on Second-Order DPA

2010 - François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard

ASIACRYPT 2010: 112-129 [bib]

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

2010 - Gallais, J., Großschädl, J., Hanley, N., Markus Kasper, Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S.

In L. Chen & M. Yung (Eds.), International Conference on Trusted Computing. Springer. [bib]

Side-channel based watermarks for IP Protection

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design [bib]

"Modular Integer Arithmetic for Public Key Cryptography". I. Verbauwhede ed. in "Secure Integrated Circuits and Systems"

2010 - Tim Güneysu, Chris­tof Paar

Springer US, ISBN: 978-0-387-71827-9, 2010.

Building a Side Channel Based Disassembler

2010 - Thomas Eisenbarth, Chris­tof Paar, Björn Weghenkel

Lecture Notes in Computer Science, 2010 [web] [bib]

A Versatile Framework for Implementation Attacks on Cryptographic and Embedded Devices

2010 - Timo Kasper, David Oswald, Chris­tof Paar

Lecture Notes in Computer Science, 2010 [web] [bib] [pdf]

DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs

2010 - S. Drimer, Tim Güneysu, Chris­tof Paar

ACM Transactions on Reconfigurable Technology and Systems (TRETS), Vol. 3. 2010.

Modeling attacks on physical unclonable functions

2010 - Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber

Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 [DOI]

Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L. Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI]

High-Performance Integer Factoring with Reconfigurable Devices

2010 - Ralf Zimmermann, Tim Güneysu, Chris­tof Paar

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI] [pdf] [bib]

Strong PUFs: Models, Constructions, and Security Proofs

2010 - Ulrich Rührmair, Heike Busch, Stefan Katzenbeisser

In A.-R. Sadeghi, P. Tuyls (Editors): “Towards Hardware Intrinsic Security: Foundation and Practice”. Springer, 2010. [DOI]

Strong Photoluminescence Enhancement from Colloidal Quantum Dot Near Silver Nano-Island Films

2010 - Hagen Langhuth, Simon Frédérick, Michael Kaniber, Jonathan J. Finley, Ulrich Rührmair

Journal of Fluorescence, 2010. [DOI]

Policy Gradients for Cryptanalysis

2010 - Frank Sehnke, Christian Osendorfer, Jan Sölter, Jürgen Schmidhuber, Ulrich Rührmair

Artificial Neural Networks - ICANN 2010 - 20th International Conference, Thessaloniki, Greece, September 15-18, 2010, Proceedings, Part III [DOI]

Breaking Elliptic Curve Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L.Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

IEEE Field Programmable Logic, 133-138, IEEE Computer Society, 2010.

Cloning Cryptographic RFID Cards for 25$

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

Presented at the 5th Benelux Workshop on Information and System Security, WisSec 2010, November 29-30, 2010, Nijmegen, the Netherlands.

Chameleon: A Versatile Emulator for Contactless Smartcards

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

13th International Conference on Information Security and Cryptology - ICISC 2010, Seoul, Korea, December 1-3, 2010, volume 6829 of LNCS, pages 189-206, Springer. [SourceForge] [BibTeX] [DOI] [pdf]

Combined Implementation Attack Resistant Exponentiation

2010 - Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald

Springer LNCS 6112, LATINCRYPT 2010, Puebla, Mexico. [pdf] [bib]

Evaluation of SHA-3 Candidates for 8-bit Embedded Processors

2010 - Stefan Heyse, Ingo von Maurich, Alexander Wild, Cornel Reuber, Johannes Rave, Thomas Pöppelmann, Chris­tof Paar, Thomas Eisenbarth

2nd SHA-3 Candidate Conference, August 23-24, 2010, University of California, Santa Barbara, USA. [Paper]

Audio watermarking forensics: detecting malicious re-embedding

2010 - Sascha Zmudzinski, Martin Steinebach, Stefan Katzenbeisser, Ulrich Rührmair

Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings [DOI]

Correlation-Enhanced Power Analysis Collision Attack

2010 - Amir Moradi, Oliver Mischke, Thomas Eisenbarth

Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings [BibTeX] [DOI] [pdf]

Security Applications of Diodes with Unique Current-Voltage Characteristics

2010 - Ulrich Rührmair, Christian Jaeger, Christian Hilgers, Michael Algasinger, György Csaba, Martin Stutzmann

Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers [DOI]

PRINTcipher: A Block Cipher for IC-Printing

2010 - Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings [DOI] [bib]

Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs

2010 - Andrey Bogdanov, Thomas Eisenbarth, Chris­tof Paar, M. Wienecke

Topics in Cryptology - CT-RSA 2010, LNCS, Springer-Verlag. [pdf]

Secure Location Verification - A Security Analysis of GPS Signal Authentication

2010 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Chris­tof Paar

DBSec 2010, Rome, Italy, June 21-23, 2010, to be published in Springer LNCS. [pdf]

A Pipelined Camellia Architecture for Compact Hardware Implementation

2010 - Elif Bilge Kavun, Tolga Yalcin

In Proceedings of the 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP’10), pages 305 - 308, IEEE, Rennes, France, July 7-9, 2010 [DOI]

A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree

2010 - Carl Bracken, Gregor Leander

Finite Fields and Their Applications Volume 16, Issue 4, July 2010, Pages 231–242 [DOI] [bib]

Side-channel based watermarks for integrated circuits

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. [pdf]

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

2010 - Ulrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Stefan Katzenbeisser

Communications and Multimedia Security, 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings [DOI]

A Lightweight Implementation of KECCAK Hash Function for Radio-Frequency Identification Applications

2010 - Elif Bilge Kavun, Tolga Yalcin

Proceedings of the 6th Workshop on RFID Security (RFIDSec'11), Istanbul, Turkey, June 7-9, 2010 [DOI] [pdf]

Oblivious Transfer Based on Physical Unclonable Functions (Extended Abstract)

2010 - Ulrich Rührmair

Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings [DOI]

Practical Power Analysis Attacks on Software Implementations of McEliece

2010 - Stefan Heyse, Amir Moradi, Chris­tof Paar

Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings [DOI] [BibTeX] [bib] [pdf]

Modeling Attacks on Physical Unclonable Functions

2010 - Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber

Cryptology ePrint Archive, Report 2010/251, 2010. [DOI]

Towards Electrical, Integrated Implementations of SIMPL Systems

2010 - Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba

Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings [DOI]

Random pn-junctions for physical cryptography

2010 - Christian Jaeger, Micha­el Al­gasin­ger, Ulrich Rührmair, Györ­gy Csaba, Mar­tin Stutz­mann

Applied Physics Letters 96, 2010. [DOI]

Application of mismatched Cellular Nonlinear Networks for Physical Cryptography

2010 - Györ­gy Csaba, X. Ju, Z. Ma, Qing­qing Chen, W. Porod, J. Schmidhuber, U. Schlichtmann, Paolo Lugli, Ulrich Rührmair

CNNA, 2010 12th International Workshop on Cellular Nanoscale Networks and Their Applications [DOI]

All You Can Eat or Breaking a Real-World Contactless Payment System

2010 - Timo Kasper, Michael Silbermann, Chris­tof Paar

Financial Cryptography and Data Security, 10 January 25-28, 2010, to be published in Springer LNCS. [pdf] [bib]

Lightweight Cryptography and DPA Countermeasures: A Survey

2010 - Amir Moradi, Axel Poschmann

First International Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010 (co-located with Financial Cryptography and Data Security - FC 2010), Tenerife, Canary Islands, Spain, Januar 25-28, 2010. [pdf]
Page: