Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Michael Hutter
@inproceedings{DBLP:conf/ets/0001AAB0MEGHHHK21, author = {Jaume Abella and Sergi Alcaide and Jens Anders and Francisco Bas and Steffen Becker and Elke De Mulder and Nourhan Elhamawy and Frank K. G{\"{u}}rkaynak and Helena Handschuh and Carles Hern{\'{a}}ndez and Michael Hutter and Leonidas Kosmidis and Ilia Polian and Matthias Sauer and Stefan Wagner and Francesco Regazzoni}, title = {Security, Reliability and Test Aspects of the {RISC-V} Ecosystem}, booktitle = {26th {IEEE} European Test Symposium, {ETS} 2021, Bruges, Belgium, May 24-28, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ETS50041.2021.9465449}, doi = {10.1109/ETS50041.2021.9465449}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ets/0001AAB0MEGHHHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HutterW20, author = {Michael Hutter and Erich Wenger}, title = {Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1442--1460}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09351-2}, doi = {10.1007/S00145-020-09351-2}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HutterW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SasdrichBHM20, author = {Pascal Sasdrich and Beg{\"{u}}l Bilgin and Michael Hutter and Mark E. Marson}, title = {Low-Latency Hardware Masking with Application to {AES}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {300--326}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.300-326}, doi = {10.13154/TCHES.V2020.I2.300-326}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SasdrichBHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichBHM20, author = {Pascal Sasdrich and Beg{\"{u}}l Bilgin and Michael Hutter and Mark E. Marson}, title = {Low-Latency Hardware Masking with Application to {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2020}, url = {https://eprint.iacr.org/2020/051}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichBHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HutterT19, author = {Michael Hutter and Michael Tunstall}, title = {Constant-time higher-order Boolean-to-arithmetic masking}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {173--184}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0191-z}, doi = {10.1007/S13389-018-0191-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HutterT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/MulderGH19, author = {Elke De Mulder and Samatha Gummalla and Michael Hutter}, title = {Protecting {RISC-V} against Side-Channel Attacks}, booktitle = {Proceedings of the 56th Annual Design Automation Conference 2019, {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019}, pages = {45}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3316781.3323485}, doi = {10.1145/3316781.3323485}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/MulderGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HutterW18, author = {Michael Hutter and Erich Wenger}, title = {Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors}, journal = {J. Cryptol.}, volume = {31}, number = {4}, pages = {1164--1182}, year = {2018}, url = {https://doi.org/10.1007/s00145-018-9298-8}, doi = {10.1007/S00145-018-9298-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HutterW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/SasdrichH18, author = {Pascal Sasdrich and Michael Hutter}, editor = {Junfeng Fan and Benedikt Gierlichs}, title = {Protecting Triple-DES Against {DPA} - {A} Practical Application of Domain-Oriented Masking}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10815}, pages = {207--226}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89641-0\_12}, doi = {10.1007/978-3-319-89641-0\_12}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/SasdrichH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RossiHHM17, author = {Melissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson}, editor = {Wieland Fischer and Naofumi Homma}, title = {A Side-Channel Assisted Cryptanalytic Attack Against QcBits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {3--23}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_1}, doi = {10.1007/978-3-319-66787-4\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/RossiHHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RossiHHM17, author = {Melissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson}, title = {A Side-Channel Assisted Cryptanalytic Attack Against QcBits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2017}, url = {http://eprint.iacr.org/2017/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RossiHHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Hutter16, author = {Michael Hutter}, editor = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, title = {Threshold Implementations in Industry: {A} Case Study on {SHA-256}}, booktitle = {Proceedings of the {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016}, pages = {37}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996366.2996373}, doi = {10.1145/2996366.2996373}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Hutter16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HutterSSW16, author = {Michael Hutter and J{\"{u}}rgen Schilling and Peter Schwabe and Wolfgang Wieser}, title = {NaCl's Crypto{\_}Box in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2016}, url = {http://eprint.iacr.org/2016/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HutterSSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HutterT16, author = {Michael Hutter and Michael Tunstall}, title = {Constant-Time Higher-Order Boolean-to-Arithmetic Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2016}, url = {http://eprint.iacr.org/2016/1023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HutterT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DullHHHPSS15, author = {Michael D{\"{u}}ll and Bj{\"{o}}rn Haase and Gesine Hinterw{\"{a}}lder and Michael Hutter and Christof Paar and Ana Helena S{\'{a}}nchez and Peter Schwabe}, title = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {493--514}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0087-1}, doi = {10.1007/S10623-015-0087-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DullHHHPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HutterS15, author = {Michael Hutter and Peter Schwabe}, title = {Multiprecision multiplication on {AVR} revisited}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {3}, pages = {201--214}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0093-2}, doi = {10.1007/S13389-015-0093-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HutterS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MartinKMH15, author = {Honorio Mart{\'{\i}}n and Thomas Korak and Enrique San Mill{\'{a}}n and Michael Hutter}, title = {Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {266--277}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2374072}, doi = {10.1109/TIFS.2014.2374072}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MartinKMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterSSW15, author = {Michael Hutter and J{\"{u}}rgen Schilling and Peter Schwabe and Wolfgang Wieser}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {NaCl's Crypto{\_}box in Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {81--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_5}, doi = {10.1007/978-3-662-48324-4\_5}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/HutterSSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MuehlberghuberK15, author = {Michael Muehlberghuber and Thomas Korak and Philipp Dunst and Michael Hutter}, editor = {Stefan Mangard and Axel Y. Poschmann}, title = {Towards Evaluating {DPA} Countermeasures for Keccak {K1012ECCAK} on a Real {ASIC}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9064}, pages = {222--236}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21476-4\_15}, doi = {10.1007/978-3-319-21476-4\_15}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MuehlberghuberK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DullHHHPSS15, author = {Michael D{\"{u}}ll and Bj{\"{o}}rn Haase and Gesine Hinterw{\"{a}}lder and Michael Hutter and Christof Paar and Ana Helena S{\'{a}}nchez and Peter Schwabe}, title = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2015}, url = {http://eprint.iacr.org/2015/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DullHHHPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MulderHMP14, author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson}, title = {Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit {ECDSA:} extended version}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {33--45}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0072-z}, doi = {10.1007/S13389-014-0072-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MulderHMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/WieserH14, author = {Wolfgang Wieser and Michael Hutter}, title = {Efficient Multiplication on Low-Resource Devices}, booktitle = {17th Euromicro Conference on Digital System Design, {DSD} 2014, Verona, Italy, August 27-29, 2014}, pages = {175--182}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DSD.2014.52}, doi = {10.1109/DSD.2014.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/WieserH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/KorakHEB14, author = {Thomas Korak and Michael Hutter and Baris Ege and Lejla Batina}, editor = {Assia Tria and Dooho Choi}, title = {Clock Glitch Attacks in the Presence of Heating}, booktitle = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2014, Busan, South Korea, September 23, 2014}, pages = {104--114}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FDTC.2014.20}, doi = {10.1109/FDTC.2014.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/KorakHEB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SollKMH14, author = {Oliver Soll and Thomas Korak and Michael Muehlberghuber and Michael Hutter}, title = {EM-based detection of hardware trojans on FPGAs}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {84--87}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855574}, doi = {10.1109/HST.2014.6855574}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SollKMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/HinterwalderMHS14, author = {Gesine Hinterw{\"{a}}lder and Amir Moradi and Michael Hutter and Peter Schwabe and Christof Paar}, editor = {Diego F. Aranha and Alfred Menezes}, title = {Full-Size High-Security {ECC} Implementation on {MSP430} Microcontrollers}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian{\'{o}}polis, Brazil, September 17-19, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8895}, pages = {31--47}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16295-9\_2}, doi = {10.1007/978-3-319-16295-9\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/HinterwalderMHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfid/KorakH14, author = {Thomas Korak and Michael Hutter}, title = {On the power of active relay attacks using custom-made proxies}, booktitle = {{IEEE} International Conference on RFID, {IEEE} {RFID} 2014, Orlando, FL, USA, April 8-10, 2014}, pages = {126--133}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/RFID.2014.6810722}, doi = {10.1109/RFID.2014.6810722}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/rfid/KorakH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/GrossWMH14, author = {Hannes Gro{\ss} and Erich Wenger and Honorio Mart{\'{\i}}n and Michael Hutter}, editor = {Nitesh Saxena and Ahmad{-}Reza Sadeghi}, title = {{PIONEER} - a Prototype for the Internet of Things Based on an Extendable {EPC} Gen2 {RFID} Tag}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8651}, pages = {54--73}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13066-8\_4}, doi = {10.1007/978-3-319-13066-8\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/GrossWMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/PesslH14, author = {Peter Pessl and Michael Hutter}, editor = {Nitesh Saxena and Ahmad{-}Reza Sadeghi}, title = {Curved Tags - {A} Low-Resource {ECDSA} Implementation Tailored for {RFID}}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8651}, pages = {156--172}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13066-8\_10}, doi = {10.1007/978-3-319-13066-8\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/PesslH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HutterS14, author = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt}, title = {The Temperature Side Channel and Heating Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2014}, url = {http://eprint.iacr.org/2014/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HutterS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HutterS14a, author = {Michael Hutter and Peter Schwabe}, title = {Multiprecision multiplication on {AVR} revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2014}, url = {http://eprint.iacr.org/2014/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HutterS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/PlosHFSC13, author = {Thomas Plos and Michael Hutter and Martin Feldhofer and Maksimiljan Stiglic and Francesco Cavaliere}, title = {Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {21}, number = {11}, pages = {1965--1974}, year = {2013}, url = {https://doi.org/10.1109/TVLSI.2012.2227849}, doi = {10.1109/TVLSI.2012.2227849}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/PlosHFSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/HutterS13, author = {Michael Hutter and Peter Schwabe}, editor = {Amr M. Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien}, title = {NaCl on 8-Bit {AVR} Microcontrollers}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7918}, pages = {156--172}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38553-7\_9}, doi = {10.1007/978-3-642-38553-7\_9}, timestamp = {Fri, 31 Jan 2020 16:14:16 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/HutterS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HutterS13, author = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {The Temperature Side Channel and Heating Fault Attacks}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {219--235}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_15}, doi = {10.1007/978-3-319-08302-5\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/HutterS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PesslH13, author = {Peter Pessl and Michael Hutter}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Pushing the Limits of {SHA-3} Hardware Implementations to Fit on {RFID}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {126--141}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_8}, doi = {10.1007/978-3-642-40349-1\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/PesslH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MulderHMP13, author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit {ECDSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {435--452}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_25}, doi = {10.1007/978-3-642-40349-1\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MulderHMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/MuehlberghuberGKDH13, author = {Michael Muehlberghuber and Frank K. G{\"{u}}rkaynak and Thomas Korak and Philipp Dunst and Michael Hutter}, editor = {Ruby B. Lee and Weidong Shi}, title = {Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual {ASIC}}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {1}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487727}, doi = {10.1145/2487726.2487727}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/MuehlberghuberGKDH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rfidsec/2013, editor = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt}, title = {Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8262}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41332-2}, doi = {10.1007/978-3-642-41332-2}, isbn = {978-3-642-41331-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MulderHMP13, author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson}, title = {Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit {ECDSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2013}, url = {http://eprint.iacr.org/2013/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MulderHMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HutterS13, author = {Michael Hutter and Peter Schwabe}, title = {NaCl on 8-Bit {AVR} Microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2013}, url = {http://eprint.iacr.org/2013/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HutterS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PesslH13, author = {Peter Pessl and Michael Hutter}, title = {Pushing the Limits of {SHA-3} Hardware Implementations to Fit on {RFID}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2013}, url = {http://eprint.iacr.org/2013/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PesslH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/MohamedHH12, author = {Nashwa A. F. Mohamed and Mohsin H. A. Hashim and Michael Hutter}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Improved Fixed-Base Comb Method for Fast Scalar Multiplication}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {342--359}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_21}, doi = {10.1007/978-3-642-31410-0\_21}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/MohamedHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/PelnarMH12, author = {Markus Pelnar and Michael Muehlberghuber and Michael Hutter}, editor = {Stefan Mangard}, title = {Putting together What Fits together - Gr{\AE}Stl}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {173--187}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_12}, doi = {10.1007/978-3-642-37288-9\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/PelnarMH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/HutterKPSM12, author = {Michael Hutter and Mario Kirschbaum and Thomas Plos and J{\"{o}}rn{-}Marc Schmidt and Stefan Mangard}, editor = {Werner Schindler and Sorin A. Huss}, title = {Exploiting the Difference of Side-Channel Leakages}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_1}, doi = {10.1007/978-3-642-29912-4\_1}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HutterKPSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/KorakPH12, author = {Thomas Korak and Thomas Plos and Michael Hutter}, editor = {Werner Schindler and Sorin A. Huss}, title = {Attacking an AES-Enabled {NFC} Tag: Implications from Design to a Real-World Scenario}, booktitle = {Constructive Side-Channel Analysis and Secure Design - Third International Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7275}, pages = {17--32}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29912-4\_2}, doi = {10.1007/978-3-642-29912-4\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/KorakPH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ToeglH11, author = {Ronald Toegl and Michael Hutter}, title = {An approach to introducing locality in remote attestation using near field communications}, journal = {J. Supercomput.}, volume = {55}, number = {2}, pages = {207--227}, year = {2011}, url = {https://doi.org/10.1007/s11227-010-0407-1}, doi = {10.1007/S11227-010-0407-1}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ToeglH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/HutterJS11, author = {Michael Hutter and Marc Joye and Yannick Sierra}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-\emph{Z} Coordinate Representation}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {170--187}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_11}, doi = {10.1007/978-3-642-21969-6\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/HutterJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/WengerH11, author = {Erich Wenger and Michael Hutter}, editor = {Emmanuel Prouff}, title = {A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs}, booktitle = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7079}, pages = {182--198}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27257-8\_12}, doi = {10.1007/978-3-642-27257-8\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/WengerH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterW11, author = {Michael Hutter and Erich Wenger}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {459--474}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_30}, doi = {10.1007/978-3-642-23951-9\_30}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/HutterW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/WengerH11, author = {Erich Wenger and Michael Hutter}, editor = {Peeter Laud}, title = {Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {256--271}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_18}, doi = {10.1007/978-3-642-29615-4\_18}, timestamp = {Mon, 03 Jan 2022 22:16:22 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/WengerH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/PendlPH11, author = {Christian Pendl and Markus Pelnar and Michael Hutter}, editor = {Ari Juels and Christof Paar}, title = {Elliptic Curve Cryptography on the {WISP} {UHF} {RFID} Tag}, booktitle = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, pages = {32--47}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25286-0\_3}, doi = {10.1007/978-3-642-25286-0\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/PendlPH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidta/IssovitsH11, author = {Wolfgang Issovits and Michael Hutter}, title = {Weaknesses of the {ISO/IEC} 14443 protocol regarding relay attacks}, booktitle = {2011 {IEEE} International Conference on RFID-Technologies and Applications, {RFID-TA} 2011, Sitges, Spain, September 15-16, 2011}, pages = {335--342}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/RFID-TA.2011.6068658}, doi = {10.1109/RFID-TA.2011.6068658}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidta/IssovitsH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/HutterFW11, author = {Michael Hutter and Martin Feldhofer and Johannes Wolkerstorfer}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {A Cryptographic Processor for Low-Resource Devices: Canning {ECDSA} and {AES} Like Sardines}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {144--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_10}, doi = {10.1007/978-3-642-21040-2\_10}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/HutterFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HutterPF10, author = {Michael Hutter and Thomas Plos and Martin Feldhofer}, title = {On the security of {RFID} devices against implementation attacks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {106--118}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032209}, doi = {10.1504/IJSN.2010.032209}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HutterPF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/SchmidtPKHMH10, author = {J{\"{o}}rn{-}Marc Schmidt and Thomas Plos and Mario Kirschbaum and Michael Hutter and Marcel Medwed and Christoph Herbst}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {Side-Channel Leakage across Borders}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {36--48}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_4}, doi = {10.1007/978-3-642-12510-2\_4}, timestamp = {Sat, 30 May 2020 20:05:42 +0200}, biburl = {https://dblp.org/rec/conf/cardis/SchmidtPKHMH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FeldhoferABHPW10, author = {Martin Feldhofer and Manfred Josef Aigner and Thomas Baier and Michael Hutter and Thomas Plos and Erich Wenger}, title = {Semi-passive {RFID} development platform for implementing and attacking security tags}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678040/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FeldhoferABHPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/HutterFP10, author = {Michael Hutter and Martin Feldhofer and Thomas Plos}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {An {ECDSA} Processor for {RFID} Authentication}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {189--202}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_16}, doi = {10.1007/978-3-642-16822-2\_16}, timestamp = {Fri, 03 Sep 2021 17:40:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/HutterFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HutterMHW09, author = {Michael Hutter and Marcel Medwed and Daniel M. Hein and Johannes Wolkerstorfer}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Attacking ECDSA-Enabled {RFID} Devices}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {519--534}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_32}, doi = {10.1007/978-3-642-01957-9\_32}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HutterMHW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/HutterSP09, author = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt and Thomas Plos}, title = {Contact-based fault injections and power analysis on {RFID} tags}, booktitle = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009, Antalya, Turkey, August 23-27, 2009}, pages = {409--412}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECCTD.2009.5275012}, doi = {10.1109/ECCTD.2009.5275012}, timestamp = {Fri, 13 Nov 2020 09:23:49 +0100}, biburl = {https://dblp.org/rec/conf/ecctd/HutterSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/SchmidtHP09, author = {J{\"{o}}rn{-}Marc Schmidt and Michael Hutter and Thomas Plos}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {Optical Fault Attacks on {AES:} {A} Threat in Violet}, booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FDTC.2009.37}, doi = {10.1109/FDTC.2009.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/SchmidtHP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/HutterSW09, author = {Michael Hutter and Alexander Szekely and Johannes Wolkerstorfer}, title = {Embedded system management using {WBEM}}, booktitle = {Integrated Network Management, {IM} 2009. 11th {IFIP/IEEE} International Symposium on Integrated Network Management, Hofstra University, Long Island, NY, USA, June 1-5, 2009}, pages = {390--397}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INM.2009.5188840}, doi = {10.1109/INM.2009.5188840}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/HutterSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Hutter09, author = {Michael Hutter}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{RFID} Authentication Protocols based on Elliptic Curves - {A} Top-Down Evaluation Survey}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {101--110}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 21:15:22 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Hutter09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PlosHF09, author = {Thomas Plos and Michael Hutter and Martin Feldhofer}, editor = {Heung Youl Youm and Moti Yung}, title = {On Comparing Side-Channel Preprocessing Techniques for Attacking {RFID} Devices}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {163--177}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_13}, doi = {10.1007/978-3-642-10838-9\_13}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PlosHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/LorunserQMPWHSWPN08, author = {Thomas Lor{\"{u}}nser and Edwin Querasser and Thomas Matyus and Momtchil Peev and Johannes Wolkerstorfer and Michael Hutter and Alexander Szekely and Ilse Wimberger and Christian Pfaffel{-}Janser and Andreas Neppach}, title = {Security processor with quantum key distribution}, booktitle = {19th {IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven, Belgium}, pages = {37--42}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ASAP.2008.4580151}, doi = {10.1109/ASAP.2008.4580151}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/LorunserQMPWHSWPN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterSP08, author = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt and Thomas Plos}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {{RFID} and Its Vulnerability to Faults}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {363--379}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_23}, doi = {10.1007/978-3-540-85053-3\_23}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/HutterSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterMF07, author = {Michael Hutter and Stefan Mangard and Martin Feldhofer}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Power and {EM} Attacks on Passive 13.56 MHz {RFID} Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {320--333}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_22}, doi = {10.1007/978-3-540-74735-2\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/HutterMF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/selbstorg/Hutter92, author = {Michael Hutter}, editor = {Wolfgang Niegel and Peter Molzberger}, title = {Selbstorganisation in sozialen Systemen - Eine Theorie und ihre Anwendung auf Wirtschaftssysteme}, booktitle = {Aspekte der Selbstorganisation}, series = {Informatik-Fachberichte}, volume = {304}, pages = {86--97}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/978-3-642-77485-0\_8}, doi = {10.1007/978-3-642-77485-0\_8}, timestamp = {Sun, 10 Dec 2023 16:08:05 +0100}, biburl = {https://dblp.org/rec/conf/selbstorg/Hutter92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.