BibTeX records: Michael Hutter

download as .bib file

@inproceedings{DBLP:conf/ets/0001AAB0MEGHHHK21,
  author       = {Jaume Abella and
                  Sergi Alcaide and
                  Jens Anders and
                  Francisco Bas and
                  Steffen Becker and
                  Elke De Mulder and
                  Nourhan Elhamawy and
                  Frank K. G{\"{u}}rkaynak and
                  Helena Handschuh and
                  Carles Hern{\'{a}}ndez and
                  Michael Hutter and
                  Leonidas Kosmidis and
                  Ilia Polian and
                  Matthias Sauer and
                  Stefan Wagner and
                  Francesco Regazzoni},
  title        = {Security, Reliability and Test Aspects of the {RISC-V} Ecosystem},
  booktitle    = {26th {IEEE} European Test Symposium, {ETS} 2021, Bruges, Belgium,
                  May 24-28, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ETS50041.2021.9465449},
  doi          = {10.1109/ETS50041.2021.9465449},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/0001AAB0MEGHHHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HutterW20,
  author       = {Michael Hutter and
                  Erich Wenger},
  title        = {Fast Multi-precision Multiplication for Public-Key Cryptography on
                  Embedded Microprocessors},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1442--1460},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09351-2},
  doi          = {10.1007/S00145-020-09351-2},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HutterW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SasdrichBHM20,
  author       = {Pascal Sasdrich and
                  Beg{\"{u}}l Bilgin and
                  Michael Hutter and
                  Mark E. Marson},
  title        = {Low-Latency Hardware Masking with Application to {AES}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {300--326},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.300-326},
  doi          = {10.13154/TCHES.V2020.I2.300-326},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SasdrichBHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasdrichBHM20,
  author       = {Pascal Sasdrich and
                  Beg{\"{u}}l Bilgin and
                  Michael Hutter and
                  Mark E. Marson},
  title        = {Low-Latency Hardware Masking with Application to {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/051},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasdrichBHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HutterT19,
  author       = {Michael Hutter and
                  Michael Tunstall},
  title        = {Constant-time higher-order Boolean-to-arithmetic masking},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {173--184},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0191-z},
  doi          = {10.1007/S13389-018-0191-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HutterT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/MulderGH19,
  author       = {Elke De Mulder and
                  Samatha Gummalla and
                  Michael Hutter},
  title        = {Protecting {RISC-V} against Side-Channel Attacks},
  booktitle    = {Proceedings of the 56th Annual Design Automation Conference 2019,
                  {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019},
  pages        = {45},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3316781.3323485},
  doi          = {10.1145/3316781.3323485},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/MulderGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HutterW18,
  author       = {Michael Hutter and
                  Erich Wenger},
  title        = {Fast Multi-precision Multiplication for Public-Key Cryptography on
                  Embedded Microprocessors},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {4},
  pages        = {1164--1182},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-018-9298-8},
  doi          = {10.1007/S00145-018-9298-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HutterW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/SasdrichH18,
  author       = {Pascal Sasdrich and
                  Michael Hutter},
  editor       = {Junfeng Fan and
                  Benedikt Gierlichs},
  title        = {Protecting Triple-DES Against {DPA} - {A} Practical Application of
                  Domain-Oriented Masking},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 9th International
                  Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10815},
  pages        = {207--226},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89641-0\_12},
  doi          = {10.1007/978-3-319-89641-0\_12},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/SasdrichH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RossiHHM17,
  author       = {Melissa Rossi and
                  Mike Hamburg and
                  Michael Hutter and
                  Mark E. Marson},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {A Side-Channel Assisted Cryptanalytic Attack Against QcBits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_1},
  doi          = {10.1007/978-3-319-66787-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RossiHHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RossiHHM17,
  author       = {Melissa Rossi and
                  Mike Hamburg and
                  Michael Hutter and
                  Mark E. Marson},
  title        = {A Side-Channel Assisted Cryptanalytic Attack Against QcBits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RossiHHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Hutter16,
  author       = {Michael Hutter},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Threshold Implementations in Industry: {A} Case Study on {SHA-256}},
  booktitle    = {Proceedings of the {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2016 Vienna, Austria, October, 2016},
  pages        = {37},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996366.2996373},
  doi          = {10.1145/2996366.2996373},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Hutter16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HutterSSW16,
  author       = {Michael Hutter and
                  J{\"{u}}rgen Schilling and
                  Peter Schwabe and
                  Wolfgang Wieser},
  title        = {NaCl's Crypto{\_}Box in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HutterSSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HutterT16,
  author       = {Michael Hutter and
                  Michael Tunstall},
  title        = {Constant-Time Higher-Order Boolean-to-Arithmetic Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1023},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HutterT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DullHHHPSS15,
  author       = {Michael D{\"{u}}ll and
                  Bj{\"{o}}rn Haase and
                  Gesine Hinterw{\"{a}}lder and
                  Michael Hutter and
                  Christof Paar and
                  Ana Helena S{\'{a}}nchez and
                  Peter Schwabe},
  title        = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {493--514},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0087-1},
  doi          = {10.1007/S10623-015-0087-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DullHHHPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HutterS15,
  author       = {Michael Hutter and
                  Peter Schwabe},
  title        = {Multiprecision multiplication on {AVR} revisited},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {201--214},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0093-2},
  doi          = {10.1007/S13389-015-0093-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HutterS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MartinKMH15,
  author       = {Honorio Mart{\'{\i}}n and
                  Thomas Korak and
                  Enrique San Mill{\'{a}}n and
                  Michael Hutter},
  title        = {Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering
                  on Randomness},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {266--277},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2374072},
  doi          = {10.1109/TIFS.2014.2374072},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MartinKMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterSSW15,
  author       = {Michael Hutter and
                  J{\"{u}}rgen Schilling and
                  Peter Schwabe and
                  Wolfgang Wieser},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {NaCl's Crypto{\_}box in Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {81--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_5},
  doi          = {10.1007/978-3-662-48324-4\_5},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/HutterSSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MuehlberghuberK15,
  author       = {Michael Muehlberghuber and
                  Thomas Korak and
                  Philipp Dunst and
                  Michael Hutter},
  editor       = {Stefan Mangard and
                  Axel Y. Poschmann},
  title        = {Towards Evaluating {DPA} Countermeasures for Keccak {K1012ECCAK} on
                  a Real {ASIC}},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 6th International
                  Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9064},
  pages        = {222--236},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21476-4\_15},
  doi          = {10.1007/978-3-319-21476-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MuehlberghuberK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DullHHHPSS15,
  author       = {Michael D{\"{u}}ll and
                  Bj{\"{o}}rn Haase and
                  Gesine Hinterw{\"{a}}lder and
                  Michael Hutter and
                  Christof Paar and
                  Ana Helena S{\'{a}}nchez and
                  Peter Schwabe},
  title        = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DullHHHPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MulderHMP14,
  author       = {Elke De Mulder and
                  Michael Hutter and
                  Mark E. Marson and
                  Peter Pearson},
  title        = {Using Bleichenbacher's solution to the hidden number problem to attack
                  nonce leaks in 384-bit {ECDSA:} extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {33--45},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0072-z},
  doi          = {10.1007/S13389-014-0072-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MulderHMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/WieserH14,
  author       = {Wolfgang Wieser and
                  Michael Hutter},
  title        = {Efficient Multiplication on Low-Resource Devices},
  booktitle    = {17th Euromicro Conference on Digital System Design, {DSD} 2014, Verona,
                  Italy, August 27-29, 2014},
  pages        = {175--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DSD.2014.52},
  doi          = {10.1109/DSD.2014.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/WieserH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/KorakHEB14,
  author       = {Thomas Korak and
                  Michael Hutter and
                  Baris Ege and
                  Lejla Batina},
  editor       = {Assia Tria and
                  Dooho Choi},
  title        = {Clock Glitch Attacks in the Presence of Heating},
  booktitle    = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2014, Busan, South Korea, September 23, 2014},
  pages        = {104--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FDTC.2014.20},
  doi          = {10.1109/FDTC.2014.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/KorakHEB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SollKMH14,
  author       = {Oliver Soll and
                  Thomas Korak and
                  Michael Muehlberghuber and
                  Michael Hutter},
  title        = {EM-based detection of hardware trojans on FPGAs},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {84--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855574},
  doi          = {10.1109/HST.2014.6855574},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SollKMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/HinterwalderMHS14,
  author       = {Gesine Hinterw{\"{a}}lder and
                  Amir Moradi and
                  Michael Hutter and
                  Peter Schwabe and
                  Christof Paar},
  editor       = {Diego F. Aranha and
                  Alfred Menezes},
  title        = {Full-Size High-Security {ECC} Implementation on {MSP430} Microcontrollers},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference
                  on Cryptology and Information Security in Latin America, Florian{\'{o}}polis,
                  Brazil, September 17-19, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8895},
  pages        = {31--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16295-9\_2},
  doi          = {10.1007/978-3-319-16295-9\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/HinterwalderMHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfid/KorakH14,
  author       = {Thomas Korak and
                  Michael Hutter},
  title        = {On the power of active relay attacks using custom-made proxies},
  booktitle    = {{IEEE} International Conference on RFID, {IEEE} {RFID} 2014, Orlando,
                  FL, USA, April 8-10, 2014},
  pages        = {126--133},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/RFID.2014.6810722},
  doi          = {10.1109/RFID.2014.6810722},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/rfid/KorakH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/GrossWMH14,
  author       = {Hannes Gro{\ss} and
                  Erich Wenger and
                  Honorio Mart{\'{\i}}n and
                  Michael Hutter},
  editor       = {Nitesh Saxena and
                  Ahmad{-}Reza Sadeghi},
  title        = {{PIONEER} - a Prototype for the Internet of Things Based on an Extendable
                  {EPC} Gen2 {RFID} Tag},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 10th
                  International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8651},
  pages        = {54--73},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13066-8\_4},
  doi          = {10.1007/978-3-319-13066-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/GrossWMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/PesslH14,
  author       = {Peter Pessl and
                  Michael Hutter},
  editor       = {Nitesh Saxena and
                  Ahmad{-}Reza Sadeghi},
  title        = {Curved Tags - {A} Low-Resource {ECDSA} Implementation Tailored for
                  {RFID}},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 10th
                  International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8651},
  pages        = {156--172},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13066-8\_10},
  doi          = {10.1007/978-3-319-13066-8\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/PesslH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HutterS14,
  author       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {The Temperature Side Channel and Heating Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HutterS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HutterS14a,
  author       = {Michael Hutter and
                  Peter Schwabe},
  title        = {Multiprecision multiplication on {AVR} revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HutterS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/PlosHFSC13,
  author       = {Thomas Plos and
                  Michael Hutter and
                  Martin Feldhofer and
                  Maksimiljan Stiglic and
                  Francesco Cavaliere},
  title        = {Security-Enabled Near-Field Communication Tag With Flexible Architecture
                  Supporting Asymmetric Cryptography},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {21},
  number       = {11},
  pages        = {1965--1974},
  year         = {2013},
  url          = {https://doi.org/10.1109/TVLSI.2012.2227849},
  doi          = {10.1109/TVLSI.2012.2227849},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/PlosHFSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/HutterS13,
  author       = {Michael Hutter and
                  Peter Schwabe},
  editor       = {Amr M. Youssef and
                  Abderrahmane Nitaj and
                  Aboul Ella Hassanien},
  title        = {NaCl on 8-Bit {AVR} Microcontrollers},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
                  on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7918},
  pages        = {156--172},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38553-7\_9},
  doi          = {10.1007/978-3-642-38553-7\_9},
  timestamp    = {Fri, 31 Jan 2020 16:14:16 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/HutterS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HutterS13,
  author       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {The Temperature Side Channel and Heating Fault Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {219--235},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_15},
  doi          = {10.1007/978-3-319-08302-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/HutterS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PesslH13,
  author       = {Peter Pessl and
                  Michael Hutter},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Pushing the Limits of {SHA-3} Hardware Implementations to Fit on {RFID}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_8},
  doi          = {10.1007/978-3-642-40349-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PesslH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MulderHMP13,
  author       = {Elke De Mulder and
                  Michael Hutter and
                  Mark E. Marson and
                  Peter Pearson},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Using Bleichenbacher"s Solution to the Hidden Number Problem
                  to Attack Nonce Leaks in 384-Bit {ECDSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {435--452},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_25},
  doi          = {10.1007/978-3-642-40349-1\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MulderHMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/MuehlberghuberGKDH13,
  author       = {Michael Muehlberghuber and
                  Frank K. G{\"{u}}rkaynak and
                  Thomas Korak and
                  Philipp Dunst and
                  Michael Hutter},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Red team vs. blue team hardware trojan analysis: detection of a hardware
                  trojan on an actual {ASIC}},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487727},
  doi          = {10.1145/2487726.2487727},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/MuehlberghuberGKDH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2013,
  editor       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Radio Frequency Identification - Security and Privacy Issues 9th International
                  Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8262},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41332-2},
  doi          = {10.1007/978-3-642-41332-2},
  isbn         = {978-3-642-41331-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MulderHMP13,
  author       = {Elke De Mulder and
                  Michael Hutter and
                  Mark E. Marson and
                  Peter Pearson},
  title        = {Using Bleichenbacher's Solution to the Hidden Number Problem to Attack
                  Nonce Leaks in 384-Bit {ECDSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MulderHMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HutterS13,
  author       = {Michael Hutter and
                  Peter Schwabe},
  title        = {NaCl on 8-Bit {AVR} Microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HutterS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PesslH13,
  author       = {Peter Pessl and
                  Michael Hutter},
  title        = {Pushing the Limits of {SHA-3} Hardware Implementations to Fit on {RFID}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PesslH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MohamedHH12,
  author       = {Nashwa A. F. Mohamed and
                  Mohsin H. A. Hashim and
                  Michael Hutter},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Improved Fixed-Base Comb Method for Fast Scalar Multiplication},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {342--359},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_21},
  doi          = {10.1007/978-3-642-31410-0\_21},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/MohamedHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PelnarMH12,
  author       = {Markus Pelnar and
                  Michael Muehlberghuber and
                  Michael Hutter},
  editor       = {Stefan Mangard},
  title        = {Putting together What Fits together - Gr{\AE}Stl},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_12},
  doi          = {10.1007/978-3-642-37288-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/PelnarMH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HutterKPSM12,
  author       = {Michael Hutter and
                  Mario Kirschbaum and
                  Thomas Plos and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Stefan Mangard},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Exploiting the Difference of Side-Channel Leakages},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_1},
  doi          = {10.1007/978-3-642-29912-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/HutterKPSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/KorakPH12,
  author       = {Thomas Korak and
                  Thomas Plos and
                  Michael Hutter},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Attacking an AES-Enabled {NFC} Tag: Implications from Design to a
                  Real-World Scenario},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_2},
  doi          = {10.1007/978-3-642-29912-4\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/KorakPH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ToeglH11,
  author       = {Ronald Toegl and
                  Michael Hutter},
  title        = {An approach to introducing locality in remote attestation using near
                  field communications},
  journal      = {J. Supercomput.},
  volume       = {55},
  number       = {2},
  pages        = {207--227},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11227-010-0407-1},
  doi          = {10.1007/S11227-010-0407-1},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ToeglH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/HutterJS11,
  author       = {Michael Hutter and
                  Marc Joye and
                  Yannick Sierra},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Memory-Constrained Implementations of Elliptic Curve Cryptography
                  in Co-\emph{Z} Coordinate Representation},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {170--187},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_11},
  doi          = {10.1007/978-3-642-21969-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/HutterJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/WengerH11,
  author       = {Erich Wenger and
                  Michael Hutter},
  editor       = {Emmanuel Prouff},
  title        = {A Hardware Processor Supporting Elliptic Curve Cryptography for Less
                  than 9 kGEs},
  booktitle    = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2011, Leuven, Belgium, September
                  14-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7079},
  pages        = {182--198},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27257-8\_12},
  doi          = {10.1007/978-3-642-27257-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/WengerH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterW11,
  author       = {Michael Hutter and
                  Erich Wenger},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Fast Multi-precision Multiplication for Public-Key Cryptography on
                  Embedded Microprocessors},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {459--474},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_30},
  doi          = {10.1007/978-3-642-23951-9\_30},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HutterW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/WengerH11,
  author       = {Erich Wenger and
                  Michael Hutter},
  editor       = {Peeter Laud},
  title        = {Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware
                  Implementations},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {256--271},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_18},
  doi          = {10.1007/978-3-642-29615-4\_18},
  timestamp    = {Mon, 03 Jan 2022 22:16:22 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/WengerH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/PendlPH11,
  author       = {Christian Pendl and
                  Markus Pelnar and
                  Michael Hutter},
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {Elliptic Curve Cryptography on the {WISP} {UHF} {RFID} Tag},
  booktitle    = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  pages        = {32--47},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25286-0\_3},
  doi          = {10.1007/978-3-642-25286-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/PendlPH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidta/IssovitsH11,
  author       = {Wolfgang Issovits and
                  Michael Hutter},
  title        = {Weaknesses of the {ISO/IEC} 14443 protocol regarding relay attacks},
  booktitle    = {2011 {IEEE} International Conference on RFID-Technologies and Applications,
                  {RFID-TA} 2011, Sitges, Spain, September 15-16, 2011},
  pages        = {335--342},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/RFID-TA.2011.6068658},
  doi          = {10.1109/RFID-TA.2011.6068658},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidta/IssovitsH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/HutterFW11,
  author       = {Michael Hutter and
                  Martin Feldhofer and
                  Johannes Wolkerstorfer},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {A Cryptographic Processor for Low-Resource Devices: Canning {ECDSA}
                  and {AES} Like Sardines},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_10},
  doi          = {10.1007/978-3-642-21040-2\_10},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/HutterFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HutterPF10,
  author       = {Michael Hutter and
                  Thomas Plos and
                  Martin Feldhofer},
  title        = {On the security of {RFID} devices against implementation attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {106--118},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032209},
  doi          = {10.1504/IJSN.2010.032209},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HutterPF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/SchmidtPKHMH10,
  author       = {J{\"{o}}rn{-}Marc Schmidt and
                  Thomas Plos and
                  Mario Kirschbaum and
                  Michael Hutter and
                  Marcel Medwed and
                  Christoph Herbst},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {Side-Channel Leakage across Borders},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {36--48},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_4},
  doi          = {10.1007/978-3-642-12510-2\_4},
  timestamp    = {Sat, 30 May 2020 20:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/SchmidtPKHMH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FeldhoferABHPW10,
  author       = {Martin Feldhofer and
                  Manfred Josef Aigner and
                  Thomas Baier and
                  Michael Hutter and
                  Thomas Plos and
                  Erich Wenger},
  title        = {Semi-passive {RFID} development platform for implementing and attacking
                  security tags},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678040/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FeldhoferABHPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/HutterFP10,
  author       = {Michael Hutter and
                  Martin Feldhofer and
                  Thomas Plos},
  editor       = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title        = {An {ECDSA} Processor for {RFID} Authentication},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th
                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6370},
  pages        = {189--202},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16822-2\_16},
  doi          = {10.1007/978-3-642-16822-2\_16},
  timestamp    = {Fri, 03 Sep 2021 17:40:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/HutterFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HutterMHW09,
  author       = {Michael Hutter and
                  Marcel Medwed and
                  Daniel M. Hein and
                  Johannes Wolkerstorfer},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Attacking ECDSA-Enabled {RFID} Devices},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {519--534},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_32},
  doi          = {10.1007/978-3-642-01957-9\_32},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HutterMHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/HutterSP09,
  author       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Thomas Plos},
  title        = {Contact-based fault injections and power analysis on {RFID} tags},
  booktitle    = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009,
                  Antalya, Turkey, August 23-27, 2009},
  pages        = {409--412},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECCTD.2009.5275012},
  doi          = {10.1109/ECCTD.2009.5275012},
  timestamp    = {Fri, 13 Nov 2020 09:23:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ecctd/HutterSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/SchmidtHP09,
  author       = {J{\"{o}}rn{-}Marc Schmidt and
                  Michael Hutter and
                  Thomas Plos},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {Optical Fault Attacks on {AES:} {A} Threat in Violet},
  booktitle    = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FDTC.2009.37},
  doi          = {10.1109/FDTC.2009.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/SchmidtHP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/HutterSW09,
  author       = {Michael Hutter and
                  Alexander Szekely and
                  Johannes Wolkerstorfer},
  title        = {Embedded system management using {WBEM}},
  booktitle    = {Integrated Network Management, {IM} 2009. 11th {IFIP/IEEE} International
                  Symposium on Integrated Network Management, Hofstra University, Long
                  Island, NY, USA, June 1-5, 2009},
  pages        = {390--397},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INM.2009.5188840},
  doi          = {10.1109/INM.2009.5188840},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/HutterSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Hutter09,
  author       = {Michael Hutter},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{RFID} Authentication Protocols based on Elliptic Curves - {A} Top-Down
                  Evaluation Survey},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {101--110},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 21:15:22 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Hutter09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PlosHF09,
  author       = {Thomas Plos and
                  Michael Hutter and
                  Martin Feldhofer},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {On Comparing Side-Channel Preprocessing Techniques for Attacking {RFID}
                  Devices},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_13},
  doi          = {10.1007/978-3-642-10838-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PlosHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/LorunserQMPWHSWPN08,
  author       = {Thomas Lor{\"{u}}nser and
                  Edwin Querasser and
                  Thomas Matyus and
                  Momtchil Peev and
                  Johannes Wolkerstorfer and
                  Michael Hutter and
                  Alexander Szekely and
                  Ilse Wimberger and
                  Christian Pfaffel{-}Janser and
                  Andreas Neppach},
  title        = {Security processor with quantum key distribution},
  booktitle    = {19th {IEEE} International Conference on Application-Specific Systems,
                  Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven,
                  Belgium},
  pages        = {37--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ASAP.2008.4580151},
  doi          = {10.1109/ASAP.2008.4580151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/LorunserQMPWHSWPN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterSP08,
  author       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Thomas Plos},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {{RFID} and Its Vulnerability to Faults},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {363--379},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_23},
  doi          = {10.1007/978-3-540-85053-3\_23},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HutterSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterMF07,
  author       = {Michael Hutter and
                  Stefan Mangard and
                  Martin Feldhofer},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Power and {EM} Attacks on Passive 13.56 MHz {RFID} Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {320--333},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_22},
  doi          = {10.1007/978-3-540-74735-2\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HutterMF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/selbstorg/Hutter92,
  author       = {Michael Hutter},
  editor       = {Wolfgang Niegel and
                  Peter Molzberger},
  title        = {Selbstorganisation in sozialen Systemen - Eine Theorie und ihre Anwendung
                  auf Wirtschaftssysteme},
  booktitle    = {Aspekte der Selbstorganisation},
  series       = {Informatik-Fachberichte},
  volume       = {304},
  pages        = {86--97},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/978-3-642-77485-0\_8},
  doi          = {10.1007/978-3-642-77485-0\_8},
  timestamp    = {Sun, 10 Dec 2023 16:08:05 +0100},
  biburl       = {https://dblp.org/rec/conf/selbstorg/Hutter92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics