Publications

Practical Lattice-based Digital Signature Schemes

2015 - James Howe, Thomas Pöppelmann, Maire O'Neill, Elizabeth O'Sullivan, Tim Güneysu

ACM Transaction on Embedded Computing, Volume 14 Issue 3, Article No. 41, May 2015 [NIST Workshop] [Extended Abstract] [Presentation NIST ] [PDF]

Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation

2015 - Georg T. Becker, Alexander Wild, Tim Güneysu

IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, McLean, VA, USA, May 5-7, 2015 [beckerPufIBS]

Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport

2015 - Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Chris­tof Paar

ACM Transactions on Information and System Security (TISSEC), Volume 17 Issue 3, March 2015, Article No. 10 [link]

FPGA Trojans through Detecting and Weakening of Cryptographic Primitives

2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Chris­tof Paar

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]

Implementing QC-MDPC McEliece Encryption

2015 - Ingo von Maurich, Tobias Oder, Tim Güneysu

ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on Embedded Platforms for Crypto and Regular Papers TECS, Volume 14 Issue 3, May 2015, Article No. 44, ACM New York, NY, USA.

Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment

2014 - Amir Moradi

15th International Conference on Cryptology in India, Indocrypt 2014, New Delhi, December 14 - 17, 2014. [DOI] [pdf]

A Hardware-Assisted Proof-of-Concept for Secure VoIP Clients on Untrusted Operating Systems

2014 - Ender, Maik, Düppmann, Gerd, Alexander Wild, Thomas Pöppelmann, Tim Güneysu

2014 International Conference on Reconfigurable Computing and FPGAs (ReConFig 2014), Cancun, Mexico, December 8-10, 2014 [Paper]

High-Speed Implementation of bcrypt Password Search using Special-Purpose Hardware

2014 - Ralf Zimmermann

ReConFig 2014, Cancun, Mexico, December 8th-10th 2014 [pdf]

Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs

2014 - Pawel Swierczynski, Amir Moradi, David Oswald, Chris­tof Paar

ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 7 Issue 4, December 2014. [DOI] [pdf]

Remote IP Protection using Timing Channels

2014 - Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Chris­tof Paar

The 17th Annual International Conference on Information Security and Cryptology -- ICISC 2014, December 3 ~ 5, 2014, Seoul, Korea, to appear [pdf]

Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms

2014 - Christian Zenger, Abhijit Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten, Chris­tof Paar

1st International Conference on Cryptography and Information Security (BalkanCryptSec), 2014 [pdf]

Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware

2014 - Stefan Heyse, Ralf Zimmermann, Chris­tof Paar

Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 [DOI] [BibTeX] [pdf] [bib]

Full-Size High-Security ECC Implementation on MSP430 Microcontrollers

2014 - Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Chris­tof Paar

Third International Conference on Cryptology and Information Security in Latin America, Latincrypt 2014, Florianópolis, Brazil, September 17 - 19, 2014. [DOI] [pdf] [code]

Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices

2014 - Ingo von Maurich, Tim Güneysu

Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014 [BibTeX] [DOI] [pdf]

Early Propagation and Imbalanced Routing, How to Diminish in FPGAs

2014 - Amir Moradi, Vincent Immler

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]

Side-Channel Leakage through Static Power – Should We Care about in Practice?

2014 - Amir Moradi

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, September 23 - 26, 2014. [DOI] [pdf]

POSTER: Implementation and Evaluation of Channel-based Key Establishment Systems

2014 - Christian Zenger, Jürgen Förster, Chris­tof Paar

Work­shop on Cryp­to­gra­phic Hard­ware and Em­bed­ded Sys­tems, CHES 2014, Busan, Korea, Sep­tem­ber 23 - 26, 2014, to ap­pe­ar. [pdf]

Enabling SRAM-PUFs on Xilinx FPGAs

2014 - Alexander Wild, Tim Güneysu

24th International Conference on Field Programmable Logic and Applications Munich, Germany; September 2 - 4, 2014 [BibTeX] [DOI] [Paper]

THOR - The hardware onion router

2014 - Tim Güneysu, Francesco Regazzoni, Pascal Sasdrich, Marcin Wójcik

24th In­ter­na­tio­nal Con­fe­rence on Field Pro­gramma­ble Logic and Ap­p­li­ca­ti­ons Mu­nich, Ger­ma­ny; Sep­tem­ber 2 - 4, 2014 [BibTex] [DOI]

A Novel Key Generating Architecture for Wireless Low-Resource Devices

2014 - Christian Zenger, Jan-Felix Posielek, Gerhard Wunder, Chris­tof Paar

ESORICS International Workshop on Secure Internet of Things 2014 (ESORICS-SIoT 2014), 16 pages [pdf]
Page: