Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Martin Feldhofer
@inproceedings{DBLP:conf/asiacrypt/MedwedSNF16, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert and Ventzislav Nikov and Martin Feldhofer}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Unknown-Input Attacks in the Parallel Setting: Improving the Security of the {CHES} 2012 Leakage-Resilient {PRF}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {602--623}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_22}, doi = {10.1007/978-3-662-53887-6\_22}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MedwedSNF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/PlosHFSC13, author = {Thomas Plos and Michael Hutter and Martin Feldhofer and Maksimiljan Stiglic and Francesco Cavaliere}, title = {Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {21}, number = {11}, pages = {1965--1974}, year = {2013}, url = {https://doi.org/10.1109/TVLSI.2012.2227849}, doi = {10.1109/TVLSI.2012.2227849}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/PlosHFSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/ErtlPFFH13, author = {Johann Ertl and Thomas Plos and Martin Feldhofer and Norbert Felber and Luca Henzen}, title = {A Security-Enhanced {UHF} {RFID} Tag Chip}, booktitle = {2013 Euromicro Conference on Digital System Design, {DSD} 2013, Los Alamitos, CA, USA, September 4-6, 2013}, pages = {705--712}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSD.2013.80}, doi = {10.1109/DSD.2013.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/ErtlPFFH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/PlosF11, author = {Thomas Plos and Martin Feldhofer}, title = {Hardware Implementation of a Flexible Tag Platform for Passive {RFID} Devices}, booktitle = {14th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu, Finland}, pages = {293--300}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DSD.2011.43}, doi = {10.1109/DSD.2011.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/PlosF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/PlosF11, author = {Thomas Plos and Martin Feldhofer}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost {RFID} Tag}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {426--435}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_24}, doi = {10.1007/978-3-642-31909-9\_24}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/PlosF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HutterFW11, author = {Michael Hutter and Martin Feldhofer and Johannes Wolkerstorfer}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {A Cryptographic Processor for Low-Resource Devices: Canning {ECDSA} and {AES} Like Sardines}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {144--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_10}, doi = {10.1007/978-3-642-21040-2\_10}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/HutterFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HutterPF10, author = {Michael Hutter and Thomas Plos and Martin Feldhofer}, title = {On the security of {RFID} devices against implementation attacks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {106--118}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032209}, doi = {10.1504/IJSN.2010.032209}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HutterPF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/KernF10, author = {Thomas Kern and Martin Feldhofer}, title = {Low-resource {ECDSA} implementation for passive {RFID} tags}, booktitle = {17th {IEEE} International Conference on Electronics, Circuits, and Systems, {ICECS} 2010, Athens, Greece, 12-15 December, 2010}, pages = {1236--1239}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICECS.2010.5724742}, doi = {10.1109/ICECS.2010.5724742}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/KernF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FeldhoferABHPW10, author = {Martin Feldhofer and Manfred Josef Aigner and Thomas Baier and Michael Hutter and Thomas Plos and Erich Wenger}, title = {Semi-passive {RFID} development platform for implementing and attacking security tags}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678040/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FeldhoferABHPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/HutterFP10, author = {Michael Hutter and Martin Feldhofer and Thomas Plos}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {An {ECDSA} Processor for {RFID} Authentication}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {189--202}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_16}, doi = {10.1007/978-3-642-16822-2\_16}, timestamp = {Fri, 03 Sep 2021 17:40:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/HutterFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PlosGF10, author = {Thomas Plos and Hannes Gro{\ss} and Martin Feldhofer}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive {RFID} Tags}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {114--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_8}, doi = {10.1007/978-3-642-19574-7\_8}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/PlosGF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WengerFF10, author = {Erich Wenger and Martin Feldhofer and Norbert Felber}, editor = {Yongwha Chung and Moti Yung}, title = {Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {92--106}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_7}, doi = {10.1007/978-3-642-17955-6\_7}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WengerFF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PlosHF09, author = {Thomas Plos and Michael Hutter and Martin Feldhofer}, editor = {Heung Youl Youm and Moti Yung}, title = {On Comparing Side-Channel Preprocessing Techniques for Attacking {RFID} Devices}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {163--177}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_13}, doi = {10.1007/978-3-642-10838-9\_13}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PlosHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/OrenF09, author = {Yossef Oren and Martin Feldhofer}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A low-resource public-key identification scheme for {RFID} tags and sensor nodes}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {59--68}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514283}, doi = {10.1145/1514274.1514283}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/OrenF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TillichFIKKMNRKM09, author = {Stefan Tillich and Martin Feldhofer and Wolfgang Issovits and Thomas Kern and Hermann Kureck and Michael M{\"{u}}hlberghuber and Georg Neubauer and Andreas Reiter and Armin K{\"{o}}fler and Mathias Mayrhofer}, title = {Compact Hardware Implementations of the {SHA-3} Candidates ARIRANG, BLAKE, Gr{\"{o}}stl, and Skein}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2009}, url = {http://eprint.iacr.org/2009/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TillichFIKKMNRKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TillichFKPSS09, author = {Stefan Tillich and Martin Feldhofer and Mario Kirschbaum and Thomas Plos and J{\"{o}}rn{-}Marc Schmidt and Alexander Szekely}, title = {High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gr{\"{o}}stl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {510}, year = {2009}, url = {http://eprint.iacr.org/2009/510}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TillichFKPSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/TillichFPG08, author = {Stefan Tillich and Martin Feldhofer and Thomas Popp and Johann Gro{\ss}sch{\"{a}}dl}, title = {Area, Delay, and Power Characteristics of Standard-Cell Implementations of the {AES} S-Box}, journal = {J. Signal Process. Syst.}, volume = {50}, number = {2}, pages = {251--261}, year = {2008}, url = {https://doi.org/10.1007/s11265-007-0158-2}, doi = {10.1007/S11265-007-0158-2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vlsisp/TillichFPG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterMF07, author = {Michael Hutter and Stefan Mangard and Martin Feldhofer}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Power and {EM} Attacks on Passive 13.56 MHz {RFID} Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {320--333}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_22}, doi = {10.1007/978-3-540-74735-2\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/HutterMF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/FeldhoferW07, author = {Martin Feldhofer and Johannes Wolkerstorfer}, title = {Strong Crypto for {RFID} Tags - {A} Comparison of Low-Power Hardware Implementations}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20 May 2007, New Orleans, Louisiana, {USA}}, pages = {1839--1842}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISCAS.2007.378272}, doi = {10.1109/ISCAS.2007.378272}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/FeldhoferW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/AignerDF07, author = {Manfred Josef Aigner and Sandra Dominikus and Martin Feldhofer}, title = {A System of Secure Virtual Coupons Using {NFC} Technology}, booktitle = {Fifth Annual {IEEE} International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, {USA}}, pages = {362--366}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PERCOMW.2007.15}, doi = {10.1109/PERCOMW.2007.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/AignerDF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/FeldhoferR06, author = {Martin Feldhofer and Christian Rechberger}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {A Case Against Currently Used Hash Functions in {RFID} Protocols}, booktitle = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM} Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4277}, pages = {372--381}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11915034\_61}, doi = {10.1007/11915034\_61}, timestamp = {Thu, 14 Oct 2021 10:28:26 +0200}, biburl = {https://dblp.org/rec/conf/otm/FeldhoferR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/TillichFG06, author = {Stefan Tillich and Martin Feldhofer and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Stamatis Vassiliadis and Stephan Wong and Timo H{\"{a}}m{\"{a}}l{\"{a}}inen}, title = {Area, Delay, and Power Characteristics of Standard-Cell Implementations of the {AES} S-Box}, booktitle = {Embedded Computer Systems: Architectures, Modeling, and Simulation, 6th International Workshop, {SAMOS} 2006, Samos, Greece, July 17-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4017}, pages = {457--466}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11796435\_46}, doi = {10.1007/11796435\_46}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/samos/TillichFG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FeldhoferDW04, author = {Martin Feldhofer and Sandra Dominikus and Johannes Wolkerstorfer}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Strong Authentication for {RFID} Systems Using the {AES} Algorithm}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {357--370}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_26}, doi = {10.1007/978-3-540-28632-5\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/FeldhoferDW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/FeldhoferTS02, author = {Martin Feldhofer and Thomas Trathnigg and Bernd Schnitzer}, title = {A Self-Timed Arithmetic Unit for Elliptic Curve Cryptography}, booktitle = {2002 Euromicro Symposium on Digital Systems Design {(DSD} 2002), Systems-on-Chip, 4-6 September 2002, Dortmund, Germany}, pages = {347--350}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/DSD.2002.1115389}, doi = {10.1109/DSD.2002.1115389}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/FeldhoferTS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.