BibTeX records: Martin Feldhofer

download as .bib file

@inproceedings{DBLP:conf/asiacrypt/MedwedSNF16,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Ventzislav Nikov and
                  Martin Feldhofer},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Unknown-Input Attacks in the Parallel Setting: Improving the Security
                  of the {CHES} 2012 Leakage-Resilient {PRF}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {602--623},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_22},
  doi          = {10.1007/978-3-662-53887-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MedwedSNF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/PlosHFSC13,
  author       = {Thomas Plos and
                  Michael Hutter and
                  Martin Feldhofer and
                  Maksimiljan Stiglic and
                  Francesco Cavaliere},
  title        = {Security-Enabled Near-Field Communication Tag With Flexible Architecture
                  Supporting Asymmetric Cryptography},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {21},
  number       = {11},
  pages        = {1965--1974},
  year         = {2013},
  url          = {https://doi.org/10.1109/TVLSI.2012.2227849},
  doi          = {10.1109/TVLSI.2012.2227849},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/PlosHFSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/ErtlPFFH13,
  author       = {Johann Ertl and
                  Thomas Plos and
                  Martin Feldhofer and
                  Norbert Felber and
                  Luca Henzen},
  title        = {A Security-Enhanced {UHF} {RFID} Tag Chip},
  booktitle    = {2013 Euromicro Conference on Digital System Design, {DSD} 2013, Los
                  Alamitos, CA, USA, September 4-6, 2013},
  pages        = {705--712},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSD.2013.80},
  doi          = {10.1109/DSD.2013.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/ErtlPFFH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/PlosF11,
  author       = {Thomas Plos and
                  Martin Feldhofer},
  title        = {Hardware Implementation of a Flexible Tag Platform for Passive {RFID}
                  Devices},
  booktitle    = {14th Euromicro Conference on Digital System Design, Architectures,
                  Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu,
                  Finland},
  pages        = {293--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DSD.2011.43},
  doi          = {10.1109/DSD.2011.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/PlosF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/PlosF11,
  author       = {Thomas Plos and
                  Martin Feldhofer},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Analyzing the Hardware Costs of Different Security-Layer Variants
                  for a Low-Cost {RFID} Tag},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {426--435},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_24},
  doi          = {10.1007/978-3-642-31909-9\_24},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/PlosF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HutterFW11,
  author       = {Michael Hutter and
                  Martin Feldhofer and
                  Johannes Wolkerstorfer},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {A Cryptographic Processor for Low-Resource Devices: Canning {ECDSA}
                  and {AES} Like Sardines},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_10},
  doi          = {10.1007/978-3-642-21040-2\_10},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/HutterFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HutterPF10,
  author       = {Michael Hutter and
                  Thomas Plos and
                  Martin Feldhofer},
  title        = {On the security of {RFID} devices against implementation attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {106--118},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032209},
  doi          = {10.1504/IJSN.2010.032209},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HutterPF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/KernF10,
  author       = {Thomas Kern and
                  Martin Feldhofer},
  title        = {Low-resource {ECDSA} implementation for passive {RFID} tags},
  booktitle    = {17th {IEEE} International Conference on Electronics, Circuits, and
                  Systems, {ICECS} 2010, Athens, Greece, 12-15 December, 2010},
  pages        = {1236--1239},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICECS.2010.5724742},
  doi          = {10.1109/ICECS.2010.5724742},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/KernF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FeldhoferABHPW10,
  author       = {Martin Feldhofer and
                  Manfred Josef Aigner and
                  Thomas Baier and
                  Michael Hutter and
                  Thomas Plos and
                  Erich Wenger},
  title        = {Semi-passive {RFID} development platform for implementing and attacking
                  security tags},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678040/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FeldhoferABHPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/HutterFP10,
  author       = {Michael Hutter and
                  Martin Feldhofer and
                  Thomas Plos},
  editor       = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title        = {An {ECDSA} Processor for {RFID} Authentication},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th
                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6370},
  pages        = {189--202},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16822-2\_16},
  doi          = {10.1007/978-3-642-16822-2\_16},
  timestamp    = {Fri, 03 Sep 2021 17:40:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/HutterFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PlosGF10,
  author       = {Thomas Plos and
                  Hannes Gro{\ss} and
                  Martin Feldhofer},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller
                  Targeting Passive {RFID} Tags},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_8},
  doi          = {10.1007/978-3-642-19574-7\_8},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PlosGF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WengerFF10,
  author       = {Erich Wenger and
                  Martin Feldhofer and
                  Norbert Felber},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless
                  Devices},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_7},
  doi          = {10.1007/978-3-642-17955-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WengerFF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PlosHF09,
  author       = {Thomas Plos and
                  Michael Hutter and
                  Martin Feldhofer},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {On Comparing Side-Channel Preprocessing Techniques for Attacking {RFID}
                  Devices},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_13},
  doi          = {10.1007/978-3-642-10838-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PlosHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/OrenF09,
  author       = {Yossef Oren and
                  Martin Feldhofer},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A low-resource public-key identification scheme for {RFID} tags and
                  sensor nodes},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514283},
  doi          = {10.1145/1514274.1514283},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/OrenF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TillichFIKKMNRKM09,
  author       = {Stefan Tillich and
                  Martin Feldhofer and
                  Wolfgang Issovits and
                  Thomas Kern and
                  Hermann Kureck and
                  Michael M{\"{u}}hlberghuber and
                  Georg Neubauer and
                  Andreas Reiter and
                  Armin K{\"{o}}fler and
                  Mathias Mayrhofer},
  title        = {Compact Hardware Implementations of the {SHA-3} Candidates ARIRANG,
                  BLAKE, Gr{\"{o}}stl, and Skein},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TillichFIKKMNRKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TillichFKPSS09,
  author       = {Stefan Tillich and
                  Martin Feldhofer and
                  Mario Kirschbaum and
                  Thomas Plos and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Alexander Szekely},
  title        = {High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish,
                  CubeHash, ECHO, Fugue, Gr{\"{o}}stl, Hamsi, JH, Keccak, Luffa,
                  Shabal, SHAvite-3, SIMD, and Skein},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {510},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/510},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TillichFKPSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/TillichFPG08,
  author       = {Stefan Tillich and
                  Martin Feldhofer and
                  Thomas Popp and
                  Johann Gro{\ss}sch{\"{a}}dl},
  title        = {Area, Delay, and Power Characteristics of Standard-Cell Implementations
                  of the {AES} S-Box},
  journal      = {J. Signal Process. Syst.},
  volume       = {50},
  number       = {2},
  pages        = {251--261},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11265-007-0158-2},
  doi          = {10.1007/S11265-007-0158-2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vlsisp/TillichFPG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterMF07,
  author       = {Michael Hutter and
                  Stefan Mangard and
                  Martin Feldhofer},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Power and {EM} Attacks on Passive 13.56 MHz {RFID} Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {320--333},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_22},
  doi          = {10.1007/978-3-540-74735-2\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HutterMF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/FeldhoferW07,
  author       = {Martin Feldhofer and
                  Johannes Wolkerstorfer},
  title        = {Strong Crypto for {RFID} Tags - {A} Comparison of Low-Power Hardware
                  Implementations},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20
                  May 2007, New Orleans, Louisiana, {USA}},
  pages        = {1839--1842},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCAS.2007.378272},
  doi          = {10.1109/ISCAS.2007.378272},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/FeldhoferW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/AignerDF07,
  author       = {Manfred Josef Aigner and
                  Sandra Dominikus and
                  Martin Feldhofer},
  title        = {A System of Secure Virtual Coupons Using {NFC} Technology},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2007), 19-23 March
                  2007, White Plains, New York, {USA}},
  pages        = {362--366},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOMW.2007.15},
  doi          = {10.1109/PERCOMW.2007.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/AignerDF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/FeldhoferR06,
  author       = {Martin Feldhofer and
                  Christian Rechberger},
  editor       = {Robert Meersman and
                  Zahir Tari and
                  Pilar Herrero},
  title        = {A Case Against Currently Used Hash Functions in {RFID} Protocols},
  booktitle    = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,
                  {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
                  COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}
                  Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,
                  France, October 29 - November 3, 2006. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4277},
  pages        = {372--381},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11915034\_61},
  doi          = {10.1007/11915034\_61},
  timestamp    = {Thu, 14 Oct 2021 10:28:26 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/FeldhoferR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/TillichFG06,
  author       = {Stefan Tillich and
                  Martin Feldhofer and
                  Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {Stamatis Vassiliadis and
                  Stephan Wong and
                  Timo H{\"{a}}m{\"{a}}l{\"{a}}inen},
  title        = {Area, Delay, and Power Characteristics of Standard-Cell Implementations
                  of the {AES} S-Box},
  booktitle    = {Embedded Computer Systems: Architectures, Modeling, and Simulation,
                  6th International Workshop, {SAMOS} 2006, Samos, Greece, July 17-20,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4017},
  pages        = {457--466},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11796435\_46},
  doi          = {10.1007/11796435\_46},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/samos/TillichFG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FeldhoferDW04,
  author       = {Martin Feldhofer and
                  Sandra Dominikus and
                  Johannes Wolkerstorfer},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Strong Authentication for {RFID} Systems Using the {AES} Algorithm},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {357--370},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_26},
  doi          = {10.1007/978-3-540-28632-5\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FeldhoferDW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/FeldhoferTS02,
  author       = {Martin Feldhofer and
                  Thomas Trathnigg and
                  Bernd Schnitzer},
  title        = {A Self-Timed Arithmetic Unit for Elliptic Curve Cryptography},
  booktitle    = {2002 Euromicro Symposium on Digital Systems Design {(DSD} 2002), Systems-on-Chip,
                  4-6 September 2002, Dortmund, Germany},
  pages        = {347--350},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/DSD.2002.1115389},
  doi          = {10.1109/DSD.2002.1115389},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/FeldhoferTS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics