Publications

Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation System

2013 - Gesine Hinterwälder, Christian Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Chris­tof Paar, Wayne P. Burleson

E. De Cristofaro and M. Wright (Eds.): PETS 2013, LNCS 7981, pp. 40–59, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

Wireless Devices and Cryptography: About Digital Pickpocketing, Open Sesame and Tracking Paranoia

2013 - Timo Kasper

it - Information Technology: Vol. 55, No. 3, pp. 123-128 [pdf] [bib]

P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems

2013 - Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Chris­tof Paar

A.-R. Sadeghi (Eds.): Financial Cryptography and Data Security 2013, Volume 7859, pp 205-212, 2013. © Springer-Verlag Berlin Heidelberg 2013 [pdf]

High-Performance Cryptanalysis on RIVYERA and COPACOBANA Computing Systems

2013 - Tim Güneysu, Timo Kasper, Martin Novotný, Chris­tof Paar, Lars Wienbrandt, Ralf Zimmermann

"High-Performance Computing Using FPGAs", Vanderbauwhede, Benkrid (Eds.), p. 335-366, February 2013, Springer Verlag, ISBN: 978-1-4614-1790-3 [DOI]

Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II - Facilitating Black-Box Analysis using Software Reverse-Engineering

2013 - Amir Moradi, David Oswald, Chris­tof Paar, Pawel Swierczynski

21st ACM/SIGDA International Symposium on Field-Programmable Gate Arrays- FPGA 2013, pages 91-100, February 11 - 13. ACM, 2013. [DOI] [pdf]

SHA-3 - Portierung auf einer ATmega163 Smartcard

2013 - Pawel Swierczynski, Chris­tof Paar

23. SMARTCARD-WORKSHOP, Tagungsband, Darmstadt, 6/7. Februar 2013.

Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms

2013 - Markus Dürmuth, Tim Güneysu, Markus Kasper, Chris­tof Paar, Tolga Yalcin, Ralf Zimmermann

Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 [DOI] [BibTeX] [pdf] [bib]

A new construction of bent functions based on Z-bent functions

2013 - Sugata Gangopadhyay, Anand Joshi, Gregor Leander, Rajendra Kumar Sharma

Designs, Codes and Cryptography January 2013, Volume 66, Issue 1-3, pp 243-256 [bib]

Achieving anonymity against major face recognition algorithms

2013 - Benedikt Driessen, Markus Dürmuth

Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013.

Anonymität und Gesichtserkennung

2013 - Benedikt Driessen, Markus Dürmuth

digma, Zeitschrift für Datenrecht und Informationssicherheit, 2013.

Slender-Set Differential Cryptanalysis

2013 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen

Journal of Cryptology January 2013, Volume 26, Issue 1, pp 11-38 [bib]

IPSecco: A Lightweight and Reconfigurable IPSec Core

2012 - Benedikt Driessen, Tim Güneysu, Elif Bilge Kavun, Oliver Mischke, Chris­tof Paar, Thomas Pöppelmann

2012 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2012, Cancun, Mexico, December 5-7, 2012 [BibTeX] [DOI] [PDF]

Integral and Multidimensional Linear Distinguishers with Correlation Zero

2012 - Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang

Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings [bib]

PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications (Extended Abstract)

2012 - Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Chris­tof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalcin

Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012 [DOI] [BibTeX]

Improving Side-Channel Analysis with Optimal Linear Transforms

2012 - David Oswald, Chris­tof Paar

CARDIS 2012 [pdf] [bibtex]

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

2012 - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, Francois Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, Francois-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loic Van Oldeneel Tot Oldenzeel, Ingo von Maurich

Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012 [Full Version] [Block Cipher Version] [BibTeX] [DOI]

Side Channels as Building Blocks

2012 - Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Chris­tof Paar, Wayne Burleson

Journal of Cryptographic Engineering, Volume 2, Number 3, pages 143-159, 2012, Springer. [DOI] [BibTeX] [pdf]

How Far Should Theory be from Practice? – Evaluation of a Countermeasure

2012 - Amir Moradi, Oliver Mischke

Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012 [DOI] [BibTeX] [pdf]

On the Distribution of Linear Biases: Three Instructive Examples

2012 - Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander

Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings [bib]

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

2012 - Martin R. Albrecht, Gregor Leander

Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers [bib]
Page: