PUFs at a glance

2014 - Ulrich Rührmair, Daniel E. Holcomb

Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014 [DOI]

Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks

2014 - Ulrich Rührmair, Ulf Schlichtmann, Wayne Burleson

Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014 [DOI]

Stealthy dopant-level hardware Trojans: extended version

2014 - Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson

Journal of Cryptographic Engineering 4.1 (2014): 19-31 [DOI] [PDF] [BIB]

Large-Scale High-Resolution Computational Validation of Novel Complexity Models in Linear Cryptanalysis

2014 - Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalcin

In Journal of Computational and Applied Mathematics, volume 259, part B, pages 592-598, Elsevier, March 15, 2014 [DOI]

Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis

2014 - Tobias Schneider, Ingo von Maurich, Tim Güneysu, David Oswald

Journal of Signal Processing Systems, Springer, 2014. [DOI] [BibTeX]

On Password Guessing with GPUs and FPGAs

2014 - Markus Dürmuth, Thorsten Kranz

PASSWORDS 2014 Conference, 2014. [pdf]

Statistics on Password Re-use and Adaptive Strength for Financial Accounts

2014 - Daniel V. Bailey, Markus Dürmuth, Chris­tof Paar

Proceedings 9th International Conference on Security and Cryptography (SCN), 2014.

Typing passwords with voice recognition --or-- How to authenticate to Google Glass

2014 - Daniel Bailey, Markus Dürmuth, Chris­tof Paar

Adventures in Authentication: WAY Workshop. 2014.

Power and Timing Side Channels for PUFs and their Efficient Exploitation

2013 - Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson

Cryptology ePrint Archive, Report 2013/851, 2013. [DOI]

A Reconfigurable Architecture For Searching Optimal Software Code To Implement Block Cipher Permutation Matrices

2013 - Elif Bilge Kavun, Gregor Leander, Tolga Yalcin

In In­ter­na­tio­nal Con­fe­rence on Re­Con­Fi­gura­ble Com­pu­ting and FPGAs 2013 (Re­Con­Fig'13), IEEE Com­pu­ter So­cie­ty, Cancun, Me­xi­co, Dec. 9-11, 2013 [DOI]

A Performance Boost for Hash-based Signatures

2013 - Thomas Eisenbarth, Ingo von Maurich, Chris­tof Paar, Xin Ye

Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday [BibTeX] [DOI] [Paper]

Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure

2013 - Amir Moradi, Oliver Mischke

International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20 - 22, 2013. [DOI] [BibTeX] [pdf]

PUF Modeling Attacks on Simulated and Silicon Data

2013 - Ulrich Rührmair, Jan Sölter, Frank Sehnke, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne Burleson, Srinivas Devadas

IEEE Transactions on Information Forensics and Security, 2013. [DOI]

An Experimental Security Analysis of Two Satphone Standards

2013 - Benedikt Driessen, Ralf Hund, Carsten Willems, Chris­tof Paar, Thorsten Holz

ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 3, Article 10, Publication date: November 2013 [PDF]

Keccak und der SHA-2

2013 - Pawel Swierczynski, Gregor Leander, Chris­tof Paar

DuD - Da­ten­schutz und Da­ten­si­cher­heit Aus­ga­be 11/2013 [bib]

Side-Channel Attacks on the Yubikey 2 One-Time Password Generator

2013 - David Oswald, Bastian Richter, Chris­tof Paar

RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. [bibtex] [pdf]

Combined Modeling and Side Channel Attacks on Strong PUFs

2013 - Ahmed Mahmoud, Ulrich Rührmair, Mehrdad Majzoobi, Farinaz Koushanfar

Cryptology ePrint Archive, Report 2013/632, 2013. [DOI]

SPONGENT: The Design Space of Lightweight Cryptographic Hashing

2013 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede

IEEE Trans. Computers vol. 62, number 10, 2013 [bib]

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System

2013 - Daehyun Strobel, Benedikt Driessen, Gregor Leander, Timo Kasper, David Oswald, Falk Schellenberg, Chris­tof Paar

Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013 [bibtex]

One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores

2013 - Amir Moradi, Oliver Mischke, Chris­tof Paar

IEEE Transactions on Computers, vol. 62, no. 9, pp. 1786-1798, Sept. 2013. [DOI] [BibTeX] [pdf]