SPONGENT: The Design Space of Lightweight Cryptographic Hashing

2013 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede

IEEE Trans. Computers vol. 62, number 10, 2013 [bib]

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System

2013 - Daehyun Strobel, Benedikt Driessen, Gregor Leander, Timo Kasper, David Oswald, Falk Schellenberg, Chris­tof Paar

Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013 [bibtex]

One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores

2013 - Amir Moradi, Oliver Mischke, Chris­tof Paar

IEEE Transactions on Computers, vol. 62, no. 9, pp. 1786-1798, Sept. 2013. [DOI] [BibTeX] [pdf]

Stealthy Dopant-Level Hardware Trojans

2013 - Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Bar­ba­ra, Ca­li­for­nia, USA, Au­gust 20 - 23, 2013 Extended version in Journal of Cryptographic Engineering, Springer, 2014 [pdf] [bib]

On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme

2013 - Amir Moradi, Oliver Mischke

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2013, Santa Barbara, California, USA, August 20 - 23, 2013. [DOI] [BibTeX] [pdf]

Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices

2013 - Stefan Heyse, Ingo von Maurich, Tim Güneysu

Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013 [BibTeX] [DOI] [Paper]

Bounds in Shallows and in Miseries

2013 - Céline Blondeau, Andrey Bogdanov, Gregor Leander

Advances in Cryptology – CRYPTO 2013 Lecture Notes in Computer Science Volume 8042, 2013, pp 204-221 [bib]

Faster Hash-based Signatures with Bounded Leakage

2013 - Thomas Eisenbarth, Ingo von Maurich, Xin Ye

Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 [BibTeX] [DOI] [Paper]

When Reverse-Engineering Meets Side-Channel Analysis–Digital Lockpicking in Practice

2013 - David Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Chris­tof Paar

Selected Areas in Cryptography -- SAC 2013, Springer Berlin Heidelberg, 2014, 571-588 [bib]

Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing

2013 - Timo Kasper, Alexander Kühn, David Oswald, Christian Zenger, Chris­tof Paar

9th Workshop on RFID Security, RFIDsec 2013, July 9-11, 2013, Graz, Austria [pdf] [bib]

Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware

2013 - Alexander Wild, Tim Güneysu, Amir Moradi

Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013 [BibTeX] [DOI] [Paper]

Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation System

2013 - Gesine Hinterwälder, Christian Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Chris­tof Paar, Wayne P. Burleson

E. De Cristofaro and M. Wright (Eds.): PETS 2013, LNCS 7981, pp. 40–59, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

Wireless Devices and Cryptography: About Digital Pickpocketing, Open Sesame and Tracking Paranoia

2013 - Timo Kasper

it - Information Technology: Vol. 55, No. 3, pp. 123-128 [pdf] [bib]

P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems

2013 - Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Chris­tof Paar

A.-R. Sadeghi (Eds.): Financial Cryptography and Data Security 2013, Volume 7859, pp 205-212, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

High-Performance Cryptanalysis on RIVYERA and COPACOBANA Computing Systems

2013 - Tim Güneysu, Timo Kasper, Martin Novotný, Chris­tof Paar, Lars Wienbrandt, Ralf Zimmermann

"High-Performance Computing Using FPGAs", Vanderbauwhede, Benkrid (Eds.), p. 335-366, February 2013, Springer Verlag, ISBN: 978-1-4614-1790-3 [DOI]

Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II - Facilitating Black-Box Analysis using Software Reverse-Engineering

2013 - Amir Moradi, David Oswald, Chris­tof Paar, Pawel Swierczynski

21st ACM/SIGDA International Symposium on Field-Programmable Gate Arrays- FPGA 2013, pages 91-100, February 11 - 13. ACM, 2013. [DOI] [pdf]

SHA-3 - Portierung auf einer ATmega163 Smartcard

2013 - Pawel Swierczynski, Chris­tof Paar

23. SMARTCARD-WORKSHOP, Tagungsband, Darmstadt, 6/7. Februar 2013.

Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms

2013 - Markus Dürmuth, Tim Güneysu, Markus Kasper, Chris­tof Paar, Tolga Yalcin, Ralf Zimmermann

Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 [DOI] [BibTeX] [pdf] [bib]

A new construction of bent functions based on Z-bent functions

2013 - Sugata Gangopadhyay, Anand Joshi, Gregor Leander, Rajendra Kumar Sharma

Designs, Codes and Cryptography January 2013, Volume 66, Issue 1-3, pp 243-256 [bib]

Achieving anonymity against major face recognition algorithms

2013 - Benedikt Driessen, Markus Dürmuth

Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013.