Publications

SHA-3 - Portierung auf einer ATmega163 Smartcard

2013 - Pawel Swierczynski, Chris­tof Paar

23. SMARTCARD-WORKSHOP, Tagungsband, Darmstadt, 6/7. Februar 2013.

Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms

2013 - Markus Dürmuth, Tim Güneysu, Markus Kasper, Chris­tof Paar, Tolga Yalcin, Ralf Zimmermann

Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 [DOI] [BibTeX] [pdf] [bib]

A new construction of bent functions based on Z-bent functions

2013 - Sugata Gangopadhyay, Anand Joshi, Gregor Leander, Rajendra Kumar Sharma

Designs, Codes and Cryptography January 2013, Volume 66, Issue 1-3, pp 243-256 [bib]

Achieving anonymity against major face recognition algorithms

2013 - Benedikt Driessen, Markus Dürmuth

Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013.

Anonymität und Gesichtserkennung

2013 - Benedikt Driessen, Markus Dürmuth

digma, Zeitschrift für Datenrecht und Informationssicherheit, 2013.

Slender-Set Differential Cryptanalysis

2013 - Julia Borghoff, Lars R. Knudsen, Gregor Leander, Sören S. Thomsen

Journal of Cryptology January 2013, Volume 26, Issue 1, pp 11-38 [bib]

IPSecco: A Lightweight and Reconfigurable IPSec Core

2012 - Benedikt Driessen, Tim Güneysu, Elif Bilge Kavun, Oliver Mischke, Chris­tof Paar, Thomas Pöppelmann

2012 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2012, Cancun, Mexico, December 5-7, 2012 [BibTeX] [DOI] [PDF]

Integral and Multidimensional Linear Distinguishers with Correlation Zero

2012 - Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang

Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings [bib]

PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications (Extended Abstract)

2012 - Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Chris­tof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalcin

Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012 [DOI] [BibTeX]

Improving Side-Channel Analysis with Optimal Linear Transforms

2012 - David Oswald, Chris­tof Paar

CARDIS 2012 [pdf] [bibtex]

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices

2012 - Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, Francois Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, Francois-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loic Van Oldeneel Tot Oldenzeel, Ingo von Maurich

Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012 [Full Version] [Block Cipher Version] [BibTeX] [DOI]

Side Channels as Building Blocks

2012 - Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Chris­tof Paar, Wayne Burleson

Journal of Cryptographic Engineering, Volume 2, Number 3, pages 143-159, 2012, Springer. [DOI] [BibTeX] [pdf]

How Far Should Theory be from Practice? – Evaluation of a Countermeasure

2012 - Amir Moradi, Oliver Mischke

Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012 [DOI] [BibTeX] [pdf]

On the Distribution of Linear Biases: Three Instructive Examples

2012 - Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander

Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings [bib]

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

2012 - Martin R. Albrecht, Gregor Leander

Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers [bib]

Detecting Software Theft in Embedded Systems: A Side-Channel Approach

2012 - Georg T. Becker, Daehyun Strobel, Chris­tof Paar, Wayne Burleson

IEEE Transactions on Information Forensics and Security, , vol.7, no.4, pp.1144,1154, Aug. 2012 [pdf] [bib]

IT-Sicherheit in der Elektromobilität

2012 - Chris­tof Paar, Marko Wolf, Ingo von Maurich

ATZelektronik, volume 7, issue 4, pp 274-279, Springer, 2012.

Solving Binary Linear Equation Systems over the Rationals and Binaries

2012 - Benedikt Driessen, Chris­tof Paar

International Workshop on the Arithmetic of Finite Fields (Bochum) 2012 [Waifi 2012] [pdf] [bib]

Pay as you Go

2012 - Foteini Baldimtsi, Gesine Hinterwälder, Andy Rupp, Anna Lysyanskaya, Chris­tof Paar, Wayne P. Burleson

5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012) Held in conjunction with the 12th Privacy Enhancing Technologies Symposium July 13, 2012, Vigo, Spain [pdf]

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

2012 - Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, Francois Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, Francois-Xavier Standaert, Loic van Oldeneel tot Oldenzeel

Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012 [BibTeX] [DOI] [Full Version] [Hash Funct. Version]
Page: