PUF Interfaces and their Security

2014 - Mar­ten van Dijk, Ulrich Rührmair

ISVLSI, 2014 IEEE Computer Society Annual Symposium on VLSI [DOI]

Differential Power Analysis of a McEliece Cryptosystem

2014 - Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt

Cryptology ePrint Archive, Report 2014/534. [pdf]

Sweet Dreams and Nightmares: Security in the Internet of Things

2014 - Timo Kasper, David Oswald, Chris­tof Paar

Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. [pdf]

Proof-of-Concept: Using Homomorphic Cryptography to Provide for Privacy in Modern Vehicular Environments

2014 - Susanne Wetzel, Bernhard Borsch, Chris­tof Paar, Thomas Pöppelmann

escar Embedded Security in Cars Conference, June 18-19, 2014, Detroid Metropolitan, Michigan, USA, extended abstract [Website]

Detecting Hidden Leakages

2014 - Amir Moradi, Sylvain Guilley, Annelie Heuser

International Conference on Applied Cryptography and Network Security - ACNS 2014, Lausanne, Switzerland, June 10 - 13, 2014 (best-[student]-paper award). [DOI] [pdf]

Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices

2014 - Tobias Oder, Thomas Pöppelmann, Tim Güneysu

The 51st Annual Design Automation Conference 2014, DAC '14, San Francisco, CA, USA, June 1-5, 2014 [Paper] [BibTeX] [DOI]

Virtual Proofs of Reality

2014 - Ulrich Rührmair

Cryptology ePrint Archive, Report 2014/215, 2014. [DOI]

Protocol attacks on advanced PUF protocols and countermeasures

2014 - Marten van Dijk, Ulrich Rührmair

Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014 [DOI]

PUF modeling attacks: An introduction and overview

2014 - Ulrich Rührmair, Jan Sölter

Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014 [DOI]

PUFs at a glance

2014 - Ulrich Rührmair, Daniel E. Holcomb

Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014 [DOI]

Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks

2014 - Ulrich Rührmair, Ulf Schlichtmann, Wayne Burleson

Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, Dresden, Germany, March 24-28, 2014 [DOI]

Efficient Elliptic-Curve Cryptography using Curve25519 on Recon figurable Devices

2014 - Pascal Sasdrich, Tim Güneysu

Reconfigurable Computing: Architectures, Tools, and Applications - 10th International Symposium, ARC 2014, Vilamoura, Portugal, April 14-16, 2014 [BibTeX] [DOI] [pdf]

Stealthy dopant-level hardware Trojans: extended version

2014 - Georg T. Becker, Francesco Regazzoni, Chris­tof Paar, Wayne P. Burleson

Journal of Cryptographic Engineering 4.1 (2014): 19-31 [DOI] [PDF] [BIB]

Large-Scale High-Resolution Computational Validation of Novel Complexity Models in Linear Cryptanalysis

2014 - Andrey Bogdanov, Elif Bilge Kavun, Elmar Tischhauser, Tolga Yalcin

In Journal of Computational and Applied Mathematics, volume 259, part B, pages 592-598, Elsevier, March 15, 2014 [DOI]

Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis

2014 - Tobias Schneider, Ingo von Maurich, Tim Güneysu, David Oswald

Journal of Signal Processing Systems, Springer, 2014. [DOI] [BibTeX]

On Password Guessing with GPUs and FPGAs

2014 - Markus Dürmuth, Thorsten Kranz

PASSWORDS 2014 Conference, 2014. [pdf]

Statistics on Password Re-use and Adaptive Strength for Financial Accounts

2014 - Daniel V. Bailey, Markus Dürmuth, Chris­tof Paar

Proceedings 9th International Conference on Security and Cryptography (SCN), 2014.

Typing passwords with voice recognition --or-- How to authenticate to Google Glass

2014 - Daniel Bailey, Markus Dürmuth, Chris­tof Paar

Adventures in Authentication: WAY Workshop. 2014.

Power and Timing Side Channels for PUFs and their Efficient Exploitation

2013 - Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson

Cryptology ePrint Archive, Report 2013/851, 2013. [DOI]

A Reconfigurable Architecture For Searching Optimal Software Code To Implement Block Cipher Permutation Matrices

2013 - Elif Bilge Kavun, Gregor Leander, Tolga Yalcin

In In­ter­na­tio­nal Con­fe­rence on Re­Con­Fi­gura­ble Com­pu­ting and FPGAs 2013 (Re­Con­Fig'13), IEEE Com­pu­ter So­cie­ty, Cancun, Me­xi­co, Dec. 9-11, 2013 [DOI]