Veröffentlichungen

The World Is Not Enough: Another Look on Second-Order DPA

2010 - François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard

ASIACRYPT 2010: 112-129 [bib]

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

2010 - Gallais, J., Großschädl, J., Hanley, N., Markus Kasper, Medwed, M., Regazzoni, F., Schmidt, J., Tillich, S.

In L. Chen & M. Yung (Eds.), International Conference on Trusted Computing. Springer. [bib]

Side-channel based watermarks for IP Protection

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design [bib]

"COPACOBANA: A Massively Parallel FPGA-Based Computer Architecture". B. Schmidt ed. in "Bioinformatics: High Performance Parallel Computer Architectures"

2010 - M. Schimmler, L. Wienbrandt, Tim Güneysu, J. Bissel

CRC Press Inc., ISBN 978-1-439-81488-8, 2010.

"Modular Integer Arithmetic for Public Key Cryptography". I. Verbauwhede ed. in "Secure Integrated Circuits and Systems"

2010 - Tim Güneysu, Chris­tof Paar

Springer US, ISBN: 978-0-387-71827-9, 2010.

Building a Side Channel Based Disassembler

2010 - Thomas Eisenbarth, Chris­tof Paar, Björn Weghenkel

Lecture Notes in Computer Science, 2010 [web] [bib]

A Versatile Framework for Implementation Attacks on Cryptographic and Embedded Devices

2010 - Timo Kasper, David Oswald, Chris­tof Paar

Lecture Notes in Computer Science, 2010 [web] [bib] [pdf]

DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs

2010 - S. Drimer, Tim Güneysu, Chris­tof Paar

ACM Transactions on Reconfigurable Technology and Systems (TRETS), Vol. 3. 2010.

Using Data Contention in Dual-Ported Memories for Security Applications

2010 - Tim Güneysu

Journal of Signal Processing Systems, Springer, 2010, Online-first DOI: 10.1007/s11265-010-0560-z [pdf]

Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L. Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI]

High-Performance Integer Factoring with Reconfigurable Devices

2010 - Ralf Zimmermann, Tim Güneysu, Chris­tof Paar

International Conference on Field Programmable Logic and Applications, FPL 2010, August 31 2010 - September 2, 2010, Milano, Italy [BibTeX] [DOI] [pdf] [bib]

Utilizing hard cores of modern FPGA devices for high-performance cryptography

2010 - Tim Güneysu

Journal of Cryptographic Engineering, Volume 1, Number 1, 37-55, DOI: 10.1007/s13389-011-0002-2 [Link]

Breaking Elliptic Curve Cryptosystems using Reconfigurable Hardware

2010 - J. Fan, D. V. Bailey, L.Batina, Tim Güneysu, Chris­tof Paar, I. Verbauwhede

IEEE Field Programmable Logic, 133-138, IEEE Computer Society, 2010.

Cloning Cryptographic RFID Cards for 25$

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

Presented at the 5th Benelux Workshop on Information and System Security, WisSec 2010, November 29-30, 2010, Nijmegen, the Netherlands.

Chameleon: A Versatile Emulator for Contactless Smartcards

2010 - Timo Kasper, Ingo von Maurich, David Oswald, Chris­tof Paar

13th International Conference on Information Security and Cryptology - ICISC 2010, Seoul, Korea, December 1-3, 2010, volume 6829 of LNCS, pages 189-206, Springer. [SourceForge] [BibTeX] [DOI] [pdf]

Combined Implementation Attack Resistant Exponentiation

2010 - Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald

Springer LNCS 6112, LATINCRYPT 2010, Puebla, Mexico. [pdf] [bib]

Evaluation of SHA-3 Candidates for 8-bit Embedded Processors

2010 - Stefan Heyse, Ingo von Maurich, Alexander Wild, Cornel Reuber, Johannes Rave, Thomas Pöppelmann, Chris­tof Paar, Thomas Eisenbarth

2nd SHA-3 Candidate Conference, August 23-24, 2010, University of California, Santa Barbara, USA. [Paper]

Correlation-Enhanced Power Analysis Collision Attack

2010 - Amir Moradi, Oliver Mischke, Thomas Eisenbarth

Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings [BibTeX] [DOI] [pdf]

PRINTcipher: A Block Cipher for IC-Printing

2010 - Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw

12th International Workshop, Santa Barbara, USA, August 17-20, 2010. Proceedings [DOI] [bib]

Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs

2010 - Andrey Bogdanov, Thomas Eisenbarth, Chris­tof Paar, M. Wienecke

Topics in Cryptology - CT-RSA 2010, LNCS, Springer-Verlag. [pdf]

Secure Location Verification - A Security Analysis of GPS Signal Authentication

2010 - Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Chris­tof Paar

DBSec 2010, Rome, Italy, June 21-23, 2010, to be published in Springer LNCS. [pdf]

A Pipelined Camellia Architecture for Compact Hardware Implementation

2010 - Elif Bilge Kavun, Tolga Yalcin

In Proceedings of the 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP’10), pages 305 - 308, IEEE, Rennes, France, July 7-9, 2010 [DOI]

A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree

2010 - Carl Bracken, Gregor Leander

Finite Fields and Their Applications Volume 16, Issue 4, July 2010, Pages 231–242 [DOI] [bib]

Side-channel based watermarks for integrated circuits

2010 - Georg T. Becker, Markus Kasper, Amir Moradi, Chris­tof Paar

IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), AnaheimCA , USA, 13-14 June 2010. [pdf]

A Lightweight Implementation of KECCAK Hash Function for Radio-Frequency Identification Applications

2010 - Elif Bilge Kavun, Tolga Yalcin

Proceedings of the 6th Workshop on RFID Security (RFIDSec'11), Istanbul, Turkey, June 7-9, 2010 [DOI] [pdf]

Practical Power Analysis Attacks on Software Implementations of McEliece

2010 - Stefan Heyse, Amir Moradi, Chris­tof Paar

Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings [DOI] [BibTeX] [bib] [pdf]

All You Can Eat or Breaking a Real-World Contactless Payment System

2010 - Timo Kasper, Michael Silbermann, Chris­tof Paar

Financial Cryptography and Data Security, 10 January 25-28, 2010, to be published in Springer LNCS. [pdf] [bib]

Lightweight Cryptography and DPA Countermeasures: A Survey

2010 - Amir Moradi, Axel Poschmann

First International Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010 (co-located with Financial Cryptography and Data Security - FC 2010), Tenerife, Canary Islands, Spain, Januar 25-28, 2010. [pdf]
Seite: