Veröffentlichungen

On the Problems of Realizing Reliable and Efficient Ring Oscillator PUFs on FPGAs

2016 - Alexander Wild, Georg T. Becker, Tim Güneysu

IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, McLean, VA, USA, May 3-5, 2016 [PDF]

Common-path depth-filtered digital holography for high resolution imaging of buried semiconductor structures

2016 - Markus Finkeldey, Falk Schellenberg, Nils C. Gerhardt, Chris­tof Paar, Martin R. Hofmann

Proc. SPIE 9771, Practical Holography XXX: Materials and Applications, 97710G (7 March 2016); doi: 10.1117/12.2212454 [DOI]

Leakage Assessment Methodology - Extended Version

2016 - Tobias Schneider, Amir Moradi

Journal of Cryptographic Engineering June 2016, Volume 6, Issue 2, pp 85–99 [DOI]

Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rai­ner Stein­wandt

IEEE Transactions on Information Forensics and Security, vol.PP, no.99, pp.1-1 DOI: 10.1109/TIFS.2015.2509944 [IEEEXplore] [pdf]

Finding the AES Bits in the Haystack: Reverse Enginering and SCA Using Voltage Contrast

2015 - Christian Kison, Jürgen Frinken, Chris­tof Paar

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 - 16, 2015 [Springer]

Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography

2015 - Pascal Sasdrich, Tim Güneysu

ACM Transactions on Reconfigurable Technology and Systems (TRETS) - Special Section on the 2014 International Symposium on Applied Reconfigurable Computing, Volume 9, Issue 1, November 2015, Article No. 3, ACM New York, NY, USA [Bibtex] [DOI] [pdf]

got HW crypto? On the (in)security of a Self-Encrypting Drive series

2015 - Gunnar Alendal, Christian Kison, modg

Hardware Security Conference and Training, Hardwear.io 2015, The Hague, Netherlands, Oct 1-2, 2015 [pdf]

Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?

2015 - Amir Moradi, Alexander Wild

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations

2015 - Tobias Schneider, Amir Moradi

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Malo, France, September 13 - 16, 2015. [pdf] [DOI]

On the Complexity Reduction of Laser Fault Injection Campaigns using OBIC Measurements

2015 - Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schäpers, Nils C. Gerhardt, Martin R. Hofmann , Chris­tof Paar

Fault Diagnosis and Tolerance in Cryptography - FDTC 2015, Saint Malo, France, September 13, 2015. [DOI] [pdf]

The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs

2015 - Georg T. Becker

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2015, Saint-Ma­lo, Fran­ce, Sep­tem­ber 13 - 16, 2015 [PDF]

Exploiting the Physical Environment for Securing the Internet of Things

2015 - Christian Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Chris­tof Paar

New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8–11, 2015 [pdf]

Bringing PHY-based Key Generation into the Field: An Evaluation for Practical Scenarios

2015 - Rene Guillaume, Fredrik Winzer, Christian Zenger, Chris­tof Paar, Andreas Czylwik

82nd Vehicular Technology Conference, VTC 2015, Boston, USA, 6-9 September, 2015 [PDF]

MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography

2015 - Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings [DOI]

Affine Equivalence and its Application to Tightening Threshold Implementations

2015 - Pascal Sasdrich, Amir Moradi, Tim Güneysu

22nd International Conference on Selected Areas in Cryptography, SAC 2015, Mount Allison University Sackville, New Brunswick, Canada, August 12-14 2015 [pdf]

Masking Large Keys in Hardware: A Masked Implementation of McEliece

2015 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt

22nd Conference on Selected Areas in Cryptography (SAC 2015), Sackville, New Brunswick, Canada, August 12-14, 2015, to ap­pe­ar. [eprint]

Security Analysis of Quantization Schemes for Channel-based Key Extraction

2015 - Christian Zenger, Jan Zimmer, Chris­tof Paar

EAI Endorsed Transactions on Security and Safety, vol. 15, no. 6 [DOI] [PDF]

Advances in Side-Channel Security

2015 - Amir Moradi

Habilitation Thesis [pdf] [URN]

On-line Entropy Estimation for Secure Information Reconciliation

2015 - Christian Zenger, Jan Zimmer, Jan-Felix Posielek, Chris­tof Paar

Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]

Security Analysis of Quantization Schemes for Channel-based Key Extraction

2015 - Christian Zenger, Jan Zimmer, Chris­tof Paar

Workshop on Wireless Communication Security at the Physical Layer, WiComSec-Phy 2015, Coimbra, Portugal, July 22, 2015 [PDF]
Seite: