Veröffentlichungen

Sec2 – Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept für Cloud-Storage

2011 - Christopher Meyer, Juraj Somorovsky, Jörg Schwenk, Benedikt Driessen, Thang Tran, Christian Wietfeld

In Proceedings of the DACH Security 2011, Oldenburg, Germany [Paper] [Slides]

Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods

2011 - Amir Moradi, Mario Kirschbaum, Thomas Eisenbarth, Chris­tof Paar

IEEE Transactions on Very Large Scale Integration Systems, Volume 20 , Issue 9, Pages 1578 - 1589, 2012. [DOI] [pdf]

Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation

2011 - Timo Kasper, David Oswald, Chris­tof Paar

7th Workshop on RFID Security and Privacy 2011, RFIDSec 2011, Amherst, USA, June 26–28, 2011 [pdf] [bib]

7th Workshop on RFID Security and Privacy (RFIDsec)

2011 - A. Juels, K. Fu, Chris­tof Paar

Lecture Notes in Computer Science 7055, Springer, Amherst, MA, USA, June 26-27, 2011.

Practical Evaluation of DPA Countermeasures on Reconfigurable Hardware

2011 - Amir Moradi, Oliver Mischke, Chris­tof Paar

HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA [BibTeX] [DOI] [pdf]

Side-channel Watermarks for Embedded Software

2011 - Georg T. Becker, Wayne Burleson, Chris­tof Paar

9th IEEE NEWCAS Conference (Invited Paper), NEWCAS 2011, Bordeaux, France, June 2011 [pdf]

On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

2011 - Gregor Leander

30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings [DOI] [bib]

Pushing the Limits: A Very Compact and a Threshold Implementation of AES

2011 - Amir Moradi, Dipl.-Kfm. Axel Poschmann, San Ling, Chris­tof Paar, Huaxiong Wang

Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, vo­lu­me 6632 of LNCS, pages 69-88, Sprin­ger. [DOI] [bib] [pdf]

Bounds on the degree of APN polynomials: the case of x^(-1) + g(x)

2011 - Gregor Leander, François Rodier

Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 207-222 [DOI] [bib]

Counting all bent functions in dimension eight 99270589265934370305785861242880

2011 - Philippe Langevin, Gregor Leander

Designs, Codes and Cryptography April 2011, Volume 59, Issue 1-3, pp 193-205 [DOI] [bib]