default search action
BibTeX records: Christof Paar
@book{DBLP:books/sp/PaarPG24, author = {Christof Paar and Jan Pelzl and Tim G{\"{u}}neysu}, title = {Understanding Cryptography - From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms, Second Edition}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-662-69007-9}, doi = {10.1007/978-3-662-69007-9}, isbn = {978-3-662-69006-2}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/PaarPG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/EnderHFMP24, author = {Maik Ender and Felix Hahn and Marc Fyrbiak and Amir Moradi and Christof Paar}, title = {JustSTART: How to Find an {RSA} Authentication Bypass on Xilinx UltraScale(+) with Fuzzing}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {426--450}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.426-450}, doi = {10.46586/TCHES.V2024.I2.426-450}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/EnderHFMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiSLHZKEPH24, author = {Guyue Li and Paul Staat and Haoyu Li and Markus Heinrichs and Christian T. Zenger and Rainer Kronberger and Harald Elders{-}Boll and Christof Paar and Aiqun Hu}, title = {RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5090--5105}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3389569}, doi = {10.1109/TIFS.2024.3389569}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiSLHZKEPH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/AlbartusEMFPT24, author = {Nils Albartus and Maik Ender and Jan{-}Niklas M{\"{o}}ller and Marc Fyrbiak and Christof Paar and Russell Tessier}, title = {On the Malicious Potential of Xilinx's Internal Configuration Access Port {(ICAP)}}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {17}, number = {2}, pages = {26:1--26:28}, year = {2024}, url = {https://doi.org/10.1145/3633204}, doi = {10.1145/3633204}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/AlbartusEMFPT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/WalendyWL0WE0FR24, author = {Ren{\'{e}} Walendy and Markus Weber and Jingjie Li and Steffen Becker and Carina Wiesen and Malte Elson and Younghyun Kim and Kassem Fawaz and Nikol Rummel and Christof Paar}, editor = {Florian 'Floyd' Mueller and Penny Kyburz and Julie R. Williamson and Corina Sas and Max L. Wilson and Phoebe O. Toups Dugas and Irina Shklovski}, title = {I see an {IC:} {A} Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering}, booktitle = {Proceedings of the {CHI} Conference on Human Factors in Computing Systems, {CHI} 2024, Honolulu, HI, USA, May 11-16, 2024}, pages = {831:1--831:20}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3613904.3642837}, doi = {10.1145/3613904.3642837}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WalendyWL0WE0FR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LeanderPSS24, author = {Gregor Leander and Christof Paar and Julian Speith and Lukas Stennes}, editor = {Leonid Reyzin and Douglas Stebila}, title = {{HAWKEYE} - Recovering Symmetric Cryptography From Hardware Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14923}, pages = {340--376}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68385-5\_11}, doi = {10.1007/978-3-031-68385-5\_11}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LeanderPSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/SpeithSBZBP24, author = {Timo Speith and Julian Speith and Steffen Becker and Yixin Zou and Asia Biega and Christof Paar}, editor = {Grischa Liebel and Irit Hadar and Paola Spoletini}, title = {Explainability as a Requirement for Hardware: Introducing Explainable Hardware {(XHW)}}, booktitle = {32nd {IEEE} International Requirements Engineering Conference, {RE} 2024, Reykjavik, Iceland, June 24-28, 2024}, pages = {354--362}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/RE59067.2024.00042}, doi = {10.1109/RE59067.2024.00042}, timestamp = {Wed, 04 Sep 2024 21:11:45 +0200}, biburl = {https://dblp.org/rec/conf/re/SpeithSBZBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-09845, author = {Maik Ender and Felix Hahn and Marc Fyrbiak and Amir Moradi and Christof Paar}, title = {JustSTART: How to Find an {RSA} Authentication Bypass on Xilinx UltraScale(+) with Fuzzing}, journal = {CoRR}, volume = {abs/2402.09845}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.09845}, doi = {10.48550/ARXIV.2402.09845}, eprinttype = {arXiv}, eprint = {2402.09845}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-09845.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-13773, author = {Philipp Mackensen and Paul Staat and Stefan Roth and Aydin Sezgin and Christof Paar and Veelasha Moonsamy}, title = {Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces}, journal = {CoRR}, volume = {abs/2402.13773}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.13773}, doi = {10.48550/ARXIV.2402.13773}, eprinttype = {arXiv}, eprint = {2402.13773}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-13773.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-15452, author = {Ren{\'{e}} Walendy and Markus Weber and Jingjie Li and Steffen Becker and Carina Wiesen and Malte Elson and Younghyun Kim and Kassem Fawaz and Nikol Rummel and Christof Paar}, title = {I see an {IC:} {A} Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering}, journal = {CoRR}, volume = {abs/2402.15452}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.15452}, doi = {10.48550/ARXIV.2402.15452}, eprinttype = {arXiv}, eprint = {2402.15452}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-15452.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeanderPSS24, author = {Gregor Leander and Christof Paar and Julian Speith and Lukas Stennes}, title = {{HAWKEYE} - Recovering Symmetric Cryptography From Hardware Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {860}, year = {2024}, url = {https://eprint.iacr.org/2024/860}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeanderPSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tochi/WiesenBWPR23, author = {Carina Wiesen and Steffen Becker and Ren{\'{e}} Walendy and Christof Paar and Nikol Rummel}, title = {The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors During Problem Solving}, journal = {{ACM} Trans. Comput. Hum. Interact.}, volume = {30}, number = {4}, pages = {62:1--62:44}, year = {2023}, url = {https://doi.org/10.1145/3577198}, doi = {10.1145/3577198}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tochi/WiesenBWPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ashes/RothaugKABP0P23, author = {Nils Rothaug and Simon Klix and Nicole Auth and Sinan B{\"{o}}cker and Endres Puschner and Steffen Becker and Christof Paar}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Lejla Batina and Domenic Forte}, title = {Towards Unsupervised {SEM} Image Segmentation for {IC} Layout Extraction}, booktitle = {Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, {ASHES} 2023, Copenhagen, Denmark, 30 November 2023}, pages = {123--128}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605769.3624000}, doi = {10.1145/3605769.3624000}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ashes/RothaugKABP0P23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/AlbartusEMFPT23, author = {Nils Albartus and Maik Ender and Jan{-}Niklas M{\"{o}}ller and Marc Fyrbiak and Christof Paar and Russell Tessier}, title = {On the Malicious Potential of Xilinx' Internal Configuration Access Port {(ICAP)}}, booktitle = {International Conference on Field Programmable Technology, {ICFPT} 2023, Yokohama, Japan, December 12-14, 2023}, pages = {1}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICFPT59805.2023.00059}, doi = {10.1109/ICFPT59805.2023.00059}, timestamp = {Sat, 24 Feb 2024 20:42:47 +0100}, biburl = {https://dblp.org/rec/conf/fpt/AlbartusEMFPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/EngelsEP23, author = {Susanne Engels and Maik Ender and Christof Paar}, title = {Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2023, San Jose, CA, USA, May 1-4, 2023}, pages = {13--23}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/HOST55118.2023.10133494}, doi = {10.1109/HOST55118.2023.10133494}, timestamp = {Mon, 11 Sep 2023 17:53:23 +0200}, biburl = {https://dblp.org/rec/conf/host/EngelsEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PuschnerMBKMP23, author = {Endres Puschner and Thorben Moos and Steffen Becker and Christian Kison and Amir Moradi and Christof Paar}, title = {Red Team vs. Blue Team: {A} Real-World Hardware Trojan Detection Case Study Across Four Modern {CMOS} Technology Generations}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {56--74}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179341}, doi = {10.1109/SP46215.2023.10179341}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/PuschnerMBKMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-14661, author = {Timo Speith and Julian Speith and Steffen Becker and Yixin Zou and Asia Biega and Christof Paar}, title = {Expanding Explainability: From Explainable Artificial Intelligence to Explainable Hardware}, journal = {CoRR}, volume = {abs/2302.14661}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.14661}, doi = {10.48550/ARXIV.2302.14661}, eprinttype = {arXiv}, eprint = {2302.14661}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-14661.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-07015, author = {Guyue Li and Paul Staat and Haoyu Li and Markus Heinrichs and Christian T. Zenger and Rainer Kronberger and Harald Elders{-}Boll and Christof Paar and Aiqun Hu}, title = {RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based Key Generation}, journal = {CoRR}, volume = {abs/2303.07015}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.07015}, doi = {10.48550/ARXIV.2303.07015}, eprinttype = {arXiv}, eprint = {2303.07015}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-07015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-08411, author = {Alexander Warnecke and Julian Speith and Jan{-}Niklas M{\"{o}}ller and Konrad Rieck and Christof Paar}, title = {Evil from Within: Machine Learning Backdoors through Hardware Trojans}, journal = {CoRR}, volume = {abs/2304.08411}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.08411}, doi = {10.48550/ARXIV.2304.08411}, eprinttype = {arXiv}, eprint = {2304.08411}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-08411.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-05740, author = {Steffen Becker and Carina Wiesen and Ren{\'{e}} Walendy and Nikol Rummel and Christof Paar}, title = {{REVERSIM:} {A} Game-Based Approach to Accessing Large Populations for Studying Human Aspects in Hardware Reverse Engineering}, journal = {CoRR}, volume = {abs/2309.05740}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.05740}, doi = {10.48550/ARXIV.2309.05740}, eprinttype = {arXiv}, eprint = {2309.05740}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-05740.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-06195, author = {Simon Klix and Nils Albartus and Julian Speith and Paul Staat and Alice Verstege and Annika Wilde and Daniel Lammers and J{\"{o}}rn Langheinrich and Christian Kison and Sebastian Sester and Daniel E. Holcomb and Christof Paar}, title = {Stealing Maggie's Secrets - On the Challenges of {IP} Theft Through {FPGA} Reverse Engineering}, journal = {CoRR}, volume = {abs/2312.06195}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.06195}, doi = {10.48550/ARXIV.2312.06195}, eprinttype = {arXiv}, eprint = {2312.06195}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-06195.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/EngelsHP22, author = {Susanne Engels and Max Hoffmann and Christof Paar}, title = {A critical view on the real-world security of logic locking}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {3}, pages = {229--244}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00294-x}, doi = {10.1007/S13389-022-00294-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/EngelsHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/LiHSEZPH22, author = {Guyue Li and Lei Hu and Paul Staat and Harald Elders{-}Boll and Christian T. Zenger and Christof Paar and Aiqun Hu}, title = {Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?}, journal = {{IEEE} Wirel. Commun.}, volume = {29}, number = {4}, pages = {146--153}, year = {2022}, url = {https://doi.org/10.1109/MWC.007.2100545}, doi = {10.1109/MWC.007.2100545}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/LiHSEZPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/StaatEHZP22, author = {Paul Staat and Harald Elders{-}Boll and Markus Heinrichs and Christian T. Zenger and Christof Paar}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {208--221}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497767}, doi = {10.1145/3488932.3497767}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/StaatEHZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/EnderLMP22, author = {Maik Ender and Gregor Leander and Amir Moradi and Christof Paar}, title = {A Cautionary Note on Protecting Xilinx' UltraScale(+) Bitstream Encryption and Authentication Engine}, booktitle = {30th {IEEE} Annual International Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2022, New York City, NY, USA, May 15-18, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/FCCM53951.2022.9786118}, doi = {10.1109/FCCM53951.2022.9786118}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fccm/EnderLMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SpeithSEF0P22, author = {Julian Speith and Florian Schweins and Maik Ender and Marc Fyrbiak and Alexander May and Christof Paar}, title = {How Not to Protect Your {IP} - An Industry-Wide Break of {IEEE} 1735 Implementations}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1656--1671}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833605}, doi = {10.1109/SP46214.2022.9833605}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/SpeithSEF0P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/StaatM0MHKSP22, author = {Paul Staat and Simon Mulzer and Stefan Roth and Veelasha Moonsamy and Markus Heinrichs and Rainer Kronberger and Aydin Sezgin and Christof Paar}, title = {IRShield: {A} Countermeasure Against Adversarial Physical-Layer Wireless Sensing}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1705--1721}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833676}, doi = {10.1109/SP46214.2022.9833676}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/StaatM0MHKSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/StaatTZP22, author = {Paul Staat and Johannes Tobisch and Christian T. Zenger and Christof Paar}, title = {Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1722--1736}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833631}, doi = {10.1109/SP46214.2022.9833631}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/StaatTZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/StaatJZEP22, author = {Paul Staat and Kai Jansen and Christian T. Zenger and Harald Elders{-}Boll and Christof Paar}, editor = {Murtuza Jadliwala and Yongdae Kim and Alexandra Dmitrienko}, title = {Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging}, booktitle = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022}, pages = {60--72}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3507657.3528536}, doi = {10.1145/3507657.3528536}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/StaatJZEP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-06554, author = {Paul Staat and Kai Jansen and Christian T. Zenger and Harald Elders{-}Boll and Christof Paar}, title = {Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging}, journal = {CoRR}, volume = {abs/2202.06554}, year = {2022}, url = {https://arxiv.org/abs/2202.06554}, eprinttype = {arXiv}, eprint = {2202.06554}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-06554.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PuschnerMBKMP22, author = {Endres Puschner and Thorben Moos and Steffen Becker and Christian Kison and Amir Moradi and Christof Paar}, title = {Red Team vs. Blue Team: {A} Real-World Hardware Trojan Detection Case Study Across Four Modern {CMOS} Technology Generations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1720}, year = {2022}, url = {https://eprint.iacr.org/2022/1720}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PuschnerMBKMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AzrielSAGMP21, author = {Leonid Azriel and Julian Speith and Nils Albartus and Ran Ginosar and Avi Mendelson and Christof Paar}, title = {A survey of algorithmic methods in {IC} reverse engineering}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {299--315}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00268-5}, doi = {10.1007/S13389-021-00268-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AzrielSAGMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HoffmannP21, author = {Max Hoffmann and Christof Paar}, title = {Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {82--108}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.82-108}, doi = {10.46586/TCHES.V2021.I1.82-108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HoffmannP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/StolzASKNGFPGT21, author = {Florian Stolz and Nils Albartus and Julian Speith and Simon Klix and Clemens Nasenberg and Aiden Gula and Marc Fyrbiak and Christof Paar and Tim G{\"{u}}neysu and Russell Tessier}, title = {LifeLine for {FPGA} Protection: Obfuscated Cryptography for Real-World Security}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {412--446}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.412-446}, doi = {10.46586/TCHES.V2021.I4.412-446}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/StolzASKNGFPGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HoffmannSP21, author = {Max Hoffmann and Falk Schellenberg and Christof Paar}, title = {{ARMORY:} Fully Automated and Exhaustive Fault Simulation on {ARM-M} Binaries}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {1058--1073}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3027143}, doi = {10.1109/TIFS.2020.3027143}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HoffmannSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PuschnerSWDKRPE21, author = {Endres Puschner and Christoph Saatjohann and Markus Willing and Christian Dresen and Julia K{\"{o}}be and Benjamin Rath and Christof Paar and Lars Eckardt and Uwe Haverkamp and Sebastian Schinzel}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {Listen to Your Heart: Evaluation of the Cardiologic Ecosystem}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {10:1--10:10}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3465753}, doi = {10.1145/3465481.3465753}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PuschnerSWDKRPE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZimmerWZSP21, author = {Pascal Zimmer and Roland Weinreich and Christian T. Zenger and Aydin Sezgin and Christof Paar}, title = {Keys from the Sky: {A} First Exploration of Physical-Layer Security Using Satellite Links}, booktitle = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICC42927.2021.9500958}, doi = {10.1109/ICC42927.2021.9500958}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZimmerWZSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/StaatEHKZP21, author = {Paul Staat and Harald Elders{-}Boll and Markus Heinrichs and Rainer Kronberger and Christian T. Zenger and Christof Paar}, title = {Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments}, booktitle = {32nd {IEEE} Annual International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2021, Helsinki, Finland, September 13-16, 2021}, pages = {745--751}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PIMRC50174.2021.9569556}, doi = {10.1109/PIMRC50174.2021.9569556}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/StaatEHKZP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlbartusNSFPT21, author = {Nils Albartus and Clemens Nasenberg and Florian Stolz and Marc Fyrbiak and Christof Paar and Russell Tessier}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {On the Design and Misuse of Microcoded (Embedded) Processors - {A} Cautionary Note}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {267--284}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/albartus}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlbartusNSFPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13703, author = {Susanne Engels and Falk Schellenberg and Christof Paar}, title = {{SPFA:} {SFA} on Multiple Persistent Faults}, journal = {CoRR}, volume = {abs/2105.13703}, year = {2021}, url = {https://arxiv.org/abs/2105.13703}, eprinttype = {arXiv}, eprint = {2105.13703}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13703.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13725, author = {Carina Wiesen and Steffen Becker and Nils Albartus and Christof Paar and Nikol Rummel}, title = {Promoting the Acquisition of Hardware Reverse Engineering Skills}, journal = {CoRR}, volume = {abs/2105.13725}, year = {2021}, url = {https://arxiv.org/abs/2105.13725}, eprinttype = {arXiv}, eprint = {2105.13725}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13725.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13756, author = {Maik Ender and Amir Moradi and Christof Paar}, title = {The Unpatchable Silicon: {A} Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs}, journal = {CoRR}, volume = {abs/2105.13756}, year = {2021}, url = {https://arxiv.org/abs/2105.13756}, eprinttype = {arXiv}, eprint = {2105.13756}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13756.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13769, author = {Max Hoffmann and Falk Schellenberg and Christof Paar}, title = {{ARMORY:} Fully Automated and Exhaustive Fault Simulation on {ARM-M} Binaries}, journal = {CoRR}, volume = {abs/2105.13769}, year = {2021}, url = {https://arxiv.org/abs/2105.13769}, eprinttype = {arXiv}, eprint = {2105.13769}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14943, author = {Steffen Becker and Carina Wiesen and Nils Albartus and Nikol Rummel and Christof Paar}, title = {An Exploratory Study of Hardware Reverse Engineering Technical and Cognitive Processes}, journal = {CoRR}, volume = {abs/2105.14943}, year = {2021}, url = {https://arxiv.org/abs/2105.14943}, eprinttype = {arXiv}, eprint = {2105.14943}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14943.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-01709, author = {Paul Staat and Harald Elders{-}Boll and Markus Heinrichs and Christian T. Zenger and Christof Paar}, title = {Mirror Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces}, journal = {CoRR}, volume = {abs/2107.01709}, year = {2021}, url = {https://arxiv.org/abs/2107.01709}, eprinttype = {arXiv}, eprint = {2107.01709}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-01709.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-01967, author = {Paul Staat and Simon Mulzer and Stefan Roth and Veelasha Moonsamy and Aydin Sezgin and Christof Paar}, title = {IRShield: {A} Countermeasure Against Adversarial Physical-Layer Wireless Sensing}, journal = {CoRR}, volume = {abs/2112.01967}, year = {2021}, url = {https://arxiv.org/abs/2112.01967}, eprinttype = {arXiv}, eprint = {2112.01967}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-01967.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-04838, author = {Julian Speith and Florian Schweins and Maik Ender and Marc Fyrbiak and Alexander May and Christof Paar}, title = {How Not to Protect Your {IP} - An Industry-Wide Break of {IEEE} 1735 Implementations}, journal = {CoRR}, volume = {abs/2112.04838}, year = {2021}, url = {https://arxiv.org/abs/2112.04838}, eprinttype = {arXiv}, eprint = {2112.04838}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-04838.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-09014, author = {Paul Staat and Johannes Tobisch and Christian T. Zenger and Christof Paar}, title = {Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems}, journal = {CoRR}, volume = {abs/2112.09014}, year = {2021}, url = {https://arxiv.org/abs/2112.09014}, eprinttype = {arXiv}, eprint = {2112.09014}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-09014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-10043, author = {Guyue Li and Lei Hu and Paul Staat and Harald Elders{-}Boll and Christian T. Zenger and Christof Paar and Aiqun Hu}, title = {Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?}, journal = {CoRR}, volume = {abs/2112.10043}, year = {2021}, url = {https://arxiv.org/abs/2112.10043}, eprinttype = {arXiv}, eprint = {2112.10043}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-10043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbartusNSFPT21, author = {Nils Albartus and Clemens Nasenberg and Florian Stolz and Marc Fyrbiak and Christof Paar and Russell Tessier}, title = {On the Design and Misuse of Microcoded (Embedded) Processors - {A} Cautionary Note}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2021}, url = {https://eprint.iacr.org/2021/663}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbartusNSFPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StolzASKNGFPGT21, author = {Florian Stolz and Nils Albartus and Julian Speith and Simon Klix and Clemens Nasenberg and Aiden Gula and Marc Fyrbiak and Christof Paar and Tim G{\"{u}}neysu and Russell Tessier}, title = {LifeLine for {FPGA} Protection: Obfuscated Cryptography for Real-World Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1277}, year = {2021}, url = {https://eprint.iacr.org/2021/1277}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StolzASKNGFPGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzrielSAGMP21, author = {Leonid Azriel and Julian Speith and Nils Albartus and Ran Ginosar and Avi Mendelson and Christof Paar}, title = {A survey of algorithmic methods in {IC} reverse engineering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1278}, year = {2021}, url = {https://eprint.iacr.org/2021/1278}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AzrielSAGMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PuschnerSWDKRPE21, author = {Endres Puschner and Christoph Saatjohann and Markus Willing and Christian Dresen and Julia K{\"{o}}be and Benjamin Rath and Christof Paar and Lars Eckardt and Uwe Haverkamp and Sebastian Schinzel}, title = {Listen to Your Heart: Evaluation of the Cardiologic Ecosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1297}, year = {2021}, url = {https://eprint.iacr.org/2021/1297}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PuschnerSWDKRPE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SpeithBEPP20, author = {Julian Speith and Steffen Becker and Maik Ender and Endres Puschner and Christof Paar}, title = {Hardware-Trojaner}, journal = {Datenschutz und Datensicherheit}, volume = {44}, number = {7}, pages = {446--450}, year = {2020}, url = {https://doi.org/10.1007/s11623-020-1303-3}, doi = {10.1007/S11623-020-1303-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SpeithBEPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/FyrbiakWRBP20, author = {Marc Fyrbiak and Sebastian Wallat and Sascha Reinhard and Nicolai Bissantz and Christof Paar}, title = {Graph Similarity and its Applications to Hardware Security}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {4}, pages = {505--519}, year = {2020}, url = {https://doi.org/10.1109/TC.2019.2953752}, doi = {10.1109/TC.2019.2953752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/FyrbiakWRBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlbartusHTAP20, author = {Nils Albartus and Max Hoffmann and Sebastian Temme and Leonid Azriel and Christof Paar}, title = {{DANA} Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {309--336}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.309-336}, doi = {10.13154/TCHES.V2020.I4.309-336}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AlbartusHTAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/GhandaliMMP20, author = {Samaneh Ghandali and Thorben Moos and Amir Moradi and Christof Paar}, title = {Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {28}, number = {6}, pages = {1435--1448}, year = {2020}, url = {https://doi.org/10.1109/TVLSI.2020.2982473}, doi = {10.1109/TVLSI.2020.2982473}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/GhandaliMMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/EngelsSP20, author = {Susanne Engels and Falk Schellenberg and Christof Paar}, title = {{SPFA:} {SFA} on Multiple Persistent Faults}, booktitle = {17th Workshop on Fault Detection and Tolerance in Cryptography, {FDTC} 2020, Milan, Italy, September 13, 2020}, pages = {49--56}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/FDTC51366.2020.00014}, doi = {10.1109/FDTC51366.2020.00014}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/EngelsSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/0001WARP20, author = {Steffen Becker and Carina Wiesen and Nils Albartus and Nikol Rummel and Christof Paar}, editor = {Heather Richter Lipford and Sonia Chiasson}, title = {An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes}, booktitle = {Sixteenth Symposium on Usable Privacy and Security, {SOUPS} 2020, August 7-11, 2020}, pages = {285--300}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/soups2020/presentation/becker}, timestamp = {Mon, 01 Feb 2021 08:41:55 +0100}, biburl = {https://dblp.org/rec/conf/soups/0001WARP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Ender0P20, author = {Maik Ender and Amir Moradi and Christof Paar}, editor = {Srdjan Capkun and Franziska Roesner}, title = {The Unpatchable Silicon: {A} Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1803--1819}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/ender}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/Ender0P20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-03549, author = {Benjamin Kollenda and Philipp Koppe and Marc Fyrbiak and Christian Kison and Christof Paar and Thorsten Holz}, title = {An Exploratory Analysis of Microcode as a Building Block for System Defenses}, journal = {CoRR}, volume = {abs/2007.03549}, year = {2020}, url = {https://arxiv.org/abs/2007.03549}, eprinttype = {arXiv}, eprint = {2007.03549}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-03549.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-06613, author = {Paul Staat and Harald Elders{-}Boll and Markus Heinrichs and Rainer Kronberger and Christian T. Zenger and Christof Paar}, title = {Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments}, journal = {CoRR}, volume = {abs/2010.06613}, year = {2020}, url = {https://arxiv.org/abs/2010.06613}, eprinttype = {arXiv}, eprint = {2010.06613}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-06613.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-07194, author = {Pascal Zimmer and Roland Weinreich and Christian T. Zenger and Aydin Sezgin and Christof Paar}, title = {Keys from the Sky: {A} First Exploration of Physical-Layer Security Using Satellite Links}, journal = {CoRR}, volume = {abs/2010.07194}, year = {2020}, url = {https://arxiv.org/abs/2010.07194}, eprinttype = {arXiv}, eprint = {2010.07194}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-07194.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffmannP20, author = {Max Hoffmann and Christof Paar}, title = {Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {750}, year = {2020}, url = {https://eprint.iacr.org/2020/750}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffmannP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbartusHTAP20, author = {Nils Albartus and Max Hoffmann and Sebastian Temme and Leonid Azriel and Christof Paar}, title = {{DANA} - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2020}, url = {https://eprint.iacr.org/2020/751}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbartusHTAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WichmannSP19, author = {Astrid Wichmann and M. Angela Sasse and Christof Paar}, title = {IT-Sicherheit ist mehr als Technik}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {673--674}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1186-3}, doi = {10.1007/S11623-019-1186-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WichmannSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BeckerWPR19, author = {Steffen Becker and Carina Wiesen and Christof Paar and Nikol Rummel}, title = {Wie arbeiten Reverse Engineers?}, journal = {Datenschutz und Datensicherheit}, volume = {43}, number = {11}, pages = {686--690}, year = {2019}, url = {https://doi.org/10.1007/s11623-019-1190-7}, doi = {10.1007/S11623-019-1190-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BeckerWPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FyrbiakWSHHWWTP19, author = {Marc Fyrbiak and Sebastian Wallat and Pawel Swierczynski and Max Hoffmann and Sebastian Hoppach and Matthias Wilhelm and Tobias Weidlich and Russell Tessier and Christof Paar}, title = {{HAL} - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {3}, pages = {498--510}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2812183}, doi = {10.1109/TDSC.2018.2812183}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/FyrbiakWSHHWWTP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KisonAFP19, author = {Christian Kison and Omar Mohamed Awad and Marc Fyrbiak and Christof Paar}, title = {Security Implications of Intentional Capacitive Crosstalk}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {12}, pages = {3246--3258}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2900914}, doi = {10.1109/TIFS.2019.2900914}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KisonAFP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/WiesenA0BWFRP19, author = {Carina Wiesen and Nils Albartus and Max Hoffmann and Steffen Becker and Sebastian Wallat and Marc Fyrbiak and Nikol Rummel and Christof Paar}, editor = {Toshiyuki Shibuya}, title = {Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights}, booktitle = {Proceedings of the 24th Asia and South Pacific Design Automation Conference, {ASPDAC} 2019, Tokyo, Japan, January 21-24, 2019}, pages = {104--111}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3287624.3288741}, doi = {10.1145/3287624.3288741}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aspdac/WiesenA0BWFRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/EnderSWWKP19, author = {Maik Ender and Pawel Swierczynski and Sebastian Wallat and Matthias Wilhelm and Paul Martin Knopp and Christof Paar}, editor = {Toshiyuki Shibuya}, title = {Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream}, booktitle = {Proceedings of the 24th Asia and South Pacific Design Automation Conference, {ASPDAC} 2019, Tokyo, Japan, January 21-24, 2019}, pages = {112--119}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3287624.3288742}, doi = {10.1145/3287624.3288742}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aspdac/EnderSWWKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/HailfingerLP19, author = {Carl{-}Daniel Hailfinger and Kerstin Lemke{-}Rust and Christof Paar}, editor = {Sonia Bela{\"{\i}}d and Tim G{\"{u}}neysu}, title = {CCCiCC: {A} Cross-Core Cache-Independent Covert Channel on {AMD} Family 15h CPUs}, booktitle = {Smart Card Research and Advanced Applications - 18th International Conference, {CARDIS} 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11833}, pages = {159--175}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42068-0\_10}, doi = {10.1007/978-3-030-42068-0\_10}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/HailfingerLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/WallatA00EFDMP19, author = {Sebastian Wallat and Nils Albartus and Steffen Becker and Max Hoffmann and Maik Ender and Marc Fyrbiak and Adrian Drees and Sebastian Maa{\ss}en and Christof Paar}, editor = {Francesca Palumbo and Michela Becchi and Martin Schulz and Kento Sato}, title = {Highway to {HAL:} open-sourcing the first extendable gate-level netlist reverse engineering framework}, booktitle = {Proceedings of the 16th {ACM} International Conference on Computing Frontiers, {CF} 2019, Alghero, Italy, April 30 - May 2, 2019}, pages = {392--397}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3310273.3323419}, doi = {10.1145/3310273.3323419}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cf/WallatA00EFDMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/Wiesen0APR19, author = {Carina Wiesen and Steffen Becker and Nils Albartus and Christof Paar and Nikol Rummel}, title = {Promoting the Acquisition of Hardware Reverse Engineering Skills}, booktitle = {{IEEE} Frontiers in Education Conference, {FIE} 2019, Cincinnati, OH, USA, October 16-19, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/FIE43999.2019.9028668}, doi = {10.1109/FIE43999.2019.9028668}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fie/Wiesen0APR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00312, author = {Carina Wiesen and Steffen Becker and Marc Fyrbiak and Nils Albartus and Malte Elson and Nikol Rummel and Christof Paar}, title = {Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights}, journal = {CoRR}, volume = {abs/1910.00312}, year = {2019}, url = {http://arxiv.org/abs/1910.00312}, eprinttype = {arXiv}, eprint = {1910.00312}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00312.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00323, author = {Carina Wiesen and Nils Albartus and Max Hoffmann and Steffen Becker and Sebastian Wallat and Marc Fyrbiak and Nikol Rummel and Christof Paar}, title = {Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights}, journal = {CoRR}, volume = {abs/1910.00323}, year = {2019}, url = {http://arxiv.org/abs/1910.00323}, eprinttype = {arXiv}, eprint = {1910.00323}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00323.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00350, author = {Sebastian Wallat and Nils Albartus and Steffen Becker and Max Hoffmann and Maik Ender and Marc Fyrbiak and Adrian Drees and Sebastian Maa{\ss}en and Christof Paar}, title = {Highway to {HAL:} Open-Sourcing the First Extendable Gate-Level Netlist Reverse Engineering Framework}, journal = {CoRR}, volume = {abs/1910.00350}, year = {2019}, url = {http://arxiv.org/abs/1910.00350}, eprinttype = {arXiv}, eprint = {1910.00350}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00350.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00735, author = {Samaneh Ghandali and Daniel E. Holcomb and Christof Paar}, title = {Temperature-Based Hardware Trojan For Ring-Oscillator-Based TRNGs}, journal = {CoRR}, volume = {abs/1910.00735}, year = {2019}, url = {http://arxiv.org/abs/1910.00735}, eprinttype = {arXiv}, eprint = {1910.00735}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00735.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00737, author = {Samaneh Ghandali and Thorben Moos and Amir Moradi and Christof Paar}, title = {Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations}, journal = {CoRR}, volume = {abs/1910.00737}, year = {2019}, url = {http://arxiv.org/abs/1910.00737}, eprinttype = {arXiv}, eprint = {1910.00737}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00737.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00947, author = {Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar}, title = {Interdiction in Practice - Hardware Trojan Against a High-Security {USB} Flash Drive}, journal = {CoRR}, volume = {abs/1910.00947}, year = {2019}, url = {http://arxiv.org/abs/1910.00947}, eprinttype = {arXiv}, eprint = {1910.00947}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00947.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00948, author = {Philipp Koppe and Benjamin Kollenda and Marc Fyrbiak and Christian Kison and Robert Gawlik and Christof Paar and Thorsten Holz}, title = {Reverse Engineering x86 Processor Microcode}, journal = {CoRR}, volume = {abs/1910.00948}, year = {2019}, url = {http://arxiv.org/abs/1910.00948}, eprinttype = {arXiv}, eprint = {1910.00948}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00948.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00949, author = {Max Hoffmann and Christof Paar}, title = {Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead}, journal = {CoRR}, volume = {abs/1910.00949}, year = {2019}, url = {http://arxiv.org/abs/1910.00949}, eprinttype = {arXiv}, eprint = {1910.00949}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00949.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00981, author = {Arunkumar Vijayakumar and Vinay C. Patil and Daniel E. Holcomb and Christof Paar and Sandip Kundu}, title = {Physical Design Obfuscation of Hardware: {A} Comprehensive Investigation of Device- and Logic-Level Techniques}, journal = {CoRR}, volume = {abs/1910.00981}, year = {2019}, url = {http://arxiv.org/abs/1910.00981}, eprinttype = {arXiv}, eprint = {1910.00981}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00981.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-01517, author = {Maik Ender and Pawel Swierczynski and Sebastian Wallat and Matthias Wilhelm and Paul Martin Knopp and Christof Paar}, title = {Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream}, journal = {CoRR}, volume = {abs/1910.01517}, year = {2019}, url = {http://arxiv.org/abs/1910.01517}, eprinttype = {arXiv}, eprint = {1910.01517}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-01517.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-01518, author = {Marc Fyrbiak and Sebastian Strau{\ss} and Christian Kison and Sebastian Wallat and Malte Elson and Nikol Rummel and Christof Paar}, title = {Hardware Reverse Engineering: Overview and Open Challenges}, journal = {CoRR}, volume = {abs/1910.01518}, year = {2019}, url = {http://arxiv.org/abs/1910.01518}, eprinttype = {arXiv}, eprint = {1910.01518}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-01518.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-01519, author = {Sebastian Wallat and Marc Fyrbiak and Moritz Schl{\"{o}}gel and Christof Paar}, title = {A Look at the Dark Side of Hardware Reverse Engineering - {A} Case Study}, journal = {CoRR}, volume = {abs/1910.01519}, year = {2019}, url = {http://arxiv.org/abs/1910.01519}, eprinttype = {arXiv}, eprint = {1910.01519}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-01519.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EngelsHP19, author = {Susanne Engels and Max Hoffmann and Christof Paar}, title = {The End of Logic Locking? {A} Critical View on the Security of Logic Locking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {796}, year = {2019}, url = {https://eprint.iacr.org/2019/796}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EngelsHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FyrbiakWRBP19, author = {Marc Fyrbiak and Sebastian Wallat and Sascha Reinhard and Nicolai Bissantz and Christof Paar}, title = {Graph Similarity and Its Applications to Hardware Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {983}, year = {2019}, url = {https://eprint.iacr.org/2019/983}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FyrbiakWRBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FyrbiakWDABTP19, author = {Marc Fyrbiak and Sebastian Wallat and Jonathan D{\'{e}}chelotte and Nils Albartus and Sinan B{\"{o}}cker and Russell Tessier and Christof Paar}, title = {On the Difficulty of FSM-based Hardware Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1163}, year = {2019}, url = {https://eprint.iacr.org/2019/1163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FyrbiakWDABTP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/FyrbiakRBTP18, author = {Marc Fyrbiak and Simon Rokicki and Nicolai Bissantz and Russell Tessier and Christof Paar}, title = {Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {3}, pages = {307--321}, year = {2018}, url = {https://doi.org/10.1109/TC.2017.2649520}, doi = {10.1109/TC.2017.2649520}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/FyrbiakRBTP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SwierczynskiBMP18, author = {Pawel Swierczynski and Georg T. Becker and Amir Moradi and Christof Paar}, title = {Bitstream Fault Injections (BiFI)-Automated Fault Attacks Against SRAM-Based FPGAs}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {3}, pages = {348--360}, year = {2018}, url = {https://doi.org/10.1109/TC.2016.2646367}, doi = {10.1109/TC.2016.2646367}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/SwierczynskiBMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HoffmannP18, author = {Max Hoffmann and Christof Paar}, title = {Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {277--297}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.277-297}, doi = {10.13154/TCHES.V2018.I2.277-297}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HoffmannP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FyrbiakWDABTP18, author = {Marc Fyrbiak and Sebastian Wallat and Jonathan D{\'{e}}chelotte and Nils Albartus and Sinan B{\"{o}}cker and Russell Tessier and Christof Paar}, title = {On the Difficulty of FSM-based Hardware Obfuscation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {293--330}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.293-330}, doi = {10.13154/TCHES.V2018.I3.293-330}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/FyrbiakWDABTP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KollendaKFKPH18, author = {Benjamin Kollenda and Philipp Koppe and Marc Fyrbiak and Christian Kison and Christof Paar and Thorsten Holz}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {An Exploratory Analysis of Microcode as a Building Block for System Defenses}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1649--1666}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243861}, doi = {10.1145/3243734.3243861}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KollendaKFKPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KeshavarzSRPH18, author = {Shahrzad Keshavarz and Falk Schellenberg and Bastian Richter and Christof Paar and Daniel E. Holcomb}, title = {SAT-based reverse engineering of gate-level schematics using fault injection and probing}, booktitle = {2018 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2018, Washington, DC, USA, April 30 - May 4, 2018}, pages = {215--220}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/HST.2018.8383918}, doi = {10.1109/HST.2018.8383918}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/KeshavarzSRPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tale/WiesenBFAERP18, author = {Carina Wiesen and Steffen Becker and Marc Fyrbiak and Nils Albartus and Malte Elson and Nikol Rummel and Christof Paar}, title = {Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights}, booktitle = {{IEEE} International Conference on Teaching, Assessment, and Learning for Engineering, {TALE} 2018, Wollongong, Australia, December 4-7, 2018}, pages = {438--445}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TALE.2018.8615270}, doi = {10.1109/TALE.2018.8615270}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/tale/WiesenBFAERP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-08916, author = {Shahrzad Keshavarz and Falk Schellenberg and Bastian Richter and Christof Paar and Daniel E. Holcomb}, title = {SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing}, journal = {CoRR}, volume = {abs/1802.08916}, year = {2018}, url = {http://arxiv.org/abs/1802.08916}, eprinttype = {arXiv}, eprint = {1802.08916}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-08916.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SwierczynskiFKM17, author = {Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar}, title = {Interdiction in practice - Hardware Trojan against a high-security {USB} flash drive}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {199--211}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0132-7}, doi = {10.1007/S13389-016-0132-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SwierczynskiFKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VijayakumarPHPK17, author = {Arunkumar Vijayakumar and Vinay C. Patil and Daniel E. Holcomb and Christof Paar and Sandip Kundu}, title = {Physical Design Obfuscation of Hardware: {A} Comprehensive Investigation of Device and Logic-Level Techniques}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {1}, pages = {64--77}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2601067}, doi = {10.1109/TIFS.2016.2601067}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VijayakumarPHPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/ZengerPRBDBTP17, author = {Christian T. Zenger and Mario Pietersz and Andreas Rex and Jeremy Brauer and Falk{-}Peter Dressler and Christian Baiker and Daniel Theis and Christof Paar}, editor = {Michael B. Matthews}, title = {Implementing a real-time capable {WPLS} testbed for independent performance and security analyses}, booktitle = {51st Asilomar Conference on Signals, Systems, and Computers, {ACSSC} 2017, Pacific Grove, CA, USA, October 29 - November 1, 2017}, pages = {9--13}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ACSSC.2017.8335125}, doi = {10.1109/ACSSC.2017.8335125}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/acssc/ZengerPRBDBTP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/EnderG0P17, author = {Maik Ender and Samaneh Ghandali and Amir Moradi and Christof Paar}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {The First Thorough Side-Channel Hardware Trojan}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {755--780}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_26}, doi = {10.1007/978-3-319-70694-8\_26}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/EnderG0P17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Paar17, author = {Christof Paar}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Hardware Trojans and Other Threats against Embedded Systems}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {1}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053885}, doi = {10.1145/3052973.3053885}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Paar17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/KeshavarzPH17, author = {Shahrzad Keshavarz and Christof Paar and Daniel E. Holcomb}, editor = {David Atienza and Giorgio Di Natale}, title = {Design automation for obfuscated circuits with multiple viable functions}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2017, Lausanne, Switzerland, March 27-31, 2017}, pages = {886--889}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/DATE.2017.7927112}, doi = {10.23919/DATE.2017.7927112}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/KeshavarzPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/FyrbiakSKWERP17, author = {Marc Fyrbiak and Sebastian Strauss and Christian Kison and Sebastian Wallat and Malte Elson and Nikol Rummel and Christof Paar}, title = {Hardware reverse engineering: Overview and open challenges}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {88--94}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031550}, doi = {10.1109/IVSW.2017.8031550}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/FyrbiakSKWERP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivsw/WallatFSP17, author = {Sebastian Wallat and Marc Fyrbiak and Moritz Schl{\"{o}}gel and Christof Paar}, title = {A look at the dark side of hardware reverse engineering - a case study}, booktitle = {{IEEE} 2nd International Verification and Security Workshop, {IVSW} 2017, Thessaloniki, Greece, July 3-5, 2017}, pages = {95--100}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IVSW.2017.8031551}, doi = {10.1109/IVSW.2017.8031551}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivsw/WallatFSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KoppeKFKGPH17, author = {Philipp Koppe and Benjamin Kollenda and Marc Fyrbiak and Christian Kison and Robert Gawlik and Christof Paar and Thorsten Holz}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Reverse Engineering x86 Processor Microcode}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1163--1180}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/koppe}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/KoppeKFKGPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZengerVZSP17, author = {Christian T. Zenger and Hendrik Vogt and Jan Zimmer and Aydin Sezgin and Christof Paar}, title = {The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version)}, journal = {CoRR}, volume = {abs/1701.03904}, year = {2017}, url = {http://arxiv.org/abs/1701.03904}, eprinttype = {arXiv}, eprint = {1701.03904}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZengerVZSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KeshavarzPH17, author = {Shahrzad Keshavarz and Christof Paar and Daniel E. Holcomb}, title = {Design Automation for Obfuscated Circuits with Multiple Viable Functions}, journal = {CoRR}, volume = {abs/1703.00475}, year = {2017}, url = {http://arxiv.org/abs/1703.00475}, eprinttype = {arXiv}, eprint = {1703.00475}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KeshavarzPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FyrbiakWSHHWWTP17, author = {Marc Fyrbiak and Sebastian Wallat and Pawel Swierczynski and Max Hoffmann and Sebastian Hoppach and Matthias Wilhelm and Tobias Weidlich and Russell Tessier and Christof Paar}, title = {{HAL-} The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {783}, year = {2017}, url = {http://eprint.iacr.org/2017/783}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FyrbiakWSHHWWTP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EnderG0P17, author = {Maik Ender and Samaneh Ghandali and Amir Moradi and Christof Paar}, title = {The First Thorough Side-Channel Hardware Trojan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {865}, year = {2017}, url = {http://eprint.iacr.org/2017/865}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EnderG0P17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZengerPZPLP16, author = {Christian T. Zenger and Mario Pietersz and Jan Zimmer and Jan{-}Felix Posielek and Thorben Lenze and Christof Paar}, title = {Authenticated key establishment for low-resource devices exploiting correlated random channels}, journal = {Comput. Networks}, volume = {109}, pages = {105--123}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.013}, doi = {10.1016/J.COMNET.2016.06.013}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZengerPZPLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SanguinoLPEN16, author = {Luis Alberto Benthin Sanguino and Gregor Leander and Christof Paar and Bernhard Esslinger and Ingo Niebel}, title = {Analyzing the Spanish strip cipher by combining combinatorial and statistical methods}, journal = {Cryptologia}, volume = {40}, number = {3}, pages = {261--284}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1050332}, doi = {10.1080/01611194.2015.1050332}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SanguinoLPEN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GhandaliBHP16, author = {Samaneh Ghandali and Georg T. Becker and Daniel E. Holcomb and Christof Paar}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {625--647}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_30}, doi = {10.1007/978-3-662-53140-2\_30}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GhandaliBHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZengerVZSP16, author = {Christian T. Zenger and Hendrik Vogt and Jan Zimmer and Aydin Sezgin and Christof Paar}, title = {The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions}, booktitle = {2016 {IEEE} Globecom Workshops, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOMW.2016.7849064}, doi = {10.1109/GLOCOMW.2016.7849064}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZengerVZSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SchellenbergFGH16, author = {Falk Schellenberg and Markus Finkeldey and Nils Gerhardt and Martin Hofmann and Amir Moradi and Christof Paar}, editor = {William H. Robinson and Swarup Bhunia and Ryan Kastner}, title = {Large laser spots and fault sensitivity analysis}, booktitle = {2016 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016}, pages = {203--208}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HST.2016.7495583}, doi = {10.1109/HST.2016.7495583}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/SchellenbergFGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SamarinLP16, author = {Peter Samarin and Kerstin Lemke{-}Rust and Christof Paar}, editor = {William H. Robinson and Swarup Bhunia and Ryan Kastner}, title = {{IP} core protection using voltage-controlled side-channel receivers}, booktitle = {2016 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016}, pages = {217--222}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HST.2016.7495585}, doi = {10.1109/HST.2016.7495585}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SamarinLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZengerPP16, author = {Christian T. Zenger and Mario Pietersz and Christof Paar}, title = {Preventing relay attacks and providing perfect forward secrecy using {PHYSEC} on 8-bit {\(\mathrm{\mu}\)}C}, booktitle = {{IEEE} International Conference on Communication, {ICC} 2015, London, United Kingdom, June 8-12, 2015, Workshop Proceedings}, pages = {110--115}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICCW.2016.7503773}, doi = {10.1109/ICCW.2016.7503773}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZengerPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AviramSSHDSVAHD16, author = {Nimrod Aviram and Sebastian Schinzel and Juraj Somorovsky and Nadia Heninger and Maik Dankel and Jens Steube and Luke Valenta and David Adrian and J. Alex Halderman and Viktor Dukhovni and Emilia K{\"{a}}sper and Shaanan Cohney and Susanne Engels and Christof Paar and Yuval Shavitt}, editor = {Thorsten Holz and Stefan Savage}, title = {{DROWN:} Breaking {TLS} Using SSLv2}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {689--706}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aviram}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/AviramSSHDSVAHD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ZengerZPDP16, author = {Christian T. Zenger and Jan Zimmer and Mario Pietersz and Benedikt Driessen and Christof Paar}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {109--120}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939923}, doi = {10.1145/2939918.2939923}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ZengerZPDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinELNPS016, author = {Daniel J. Bernstein and Susanne Engels and Tanja Lange and Ruben Niederhagen and Christof Paar and Peter Schwabe and Ralf Zimmermann}, title = {Faster discrete logarithms on FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2016}, url = {http://eprint.iacr.org/2016/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinELNPS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhandaliBHP16, author = {Samaneh Ghandali and Georg T. Becker and Daniel E. Holcomb and Christof Paar}, title = {A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2016}, url = {http://eprint.iacr.org/2016/600}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhandaliBHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SwierczynskiB0P16, author = {Pawel Swierczynski and Georg T. Becker and Amir Moradi and Christof Paar}, title = {Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {641}, year = {2016}, url = {http://eprint.iacr.org/2016/641}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SwierczynskiB0P16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DullHHHPSS15, author = {Michael D{\"{u}}ll and Bj{\"{o}}rn Haase and Gesine Hinterw{\"{a}}lder and Michael Hutter and Christof Paar and Ana Helena S{\'{a}}nchez and Peter Schwabe}, title = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {493--514}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0087-1}, doi = {10.1007/S10623-015-0087-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DullHHHPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZengerZP15, author = {Christian T. Zenger and Jan Zimmer and Christof Paar}, title = {Security Analysis of Quantization Schemes for Channel-based Key Extraction}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {6}, pages = {e5}, year = {2015}, url = {https://doi.org/10.4108/eai.22-7-2015.2260194}, doi = {10.4108/EAI.22-7-2015.2260194}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZengerZP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/SwierczynskiFKP15, author = {Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar}, title = {{FPGA} Trojans Through Detecting and Weakening of Cryptographic Primitives}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {34}, number = {8}, pages = {1236--1249}, year = {2015}, url = {https://doi.org/10.1109/TCAD.2015.2399455}, doi = {10.1109/TCAD.2015.2399455}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/SwierczynskiFKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/GornikMOP15, author = {Andreas Gornik and Amir Moradi and J{\"{u}}rgen Oehm and Christof Paar}, title = {A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {34}, number = {8}, pages = {1308--1319}, year = {2015}, url = {https://doi.org/10.1109/TCAD.2015.2423274}, doi = {10.1109/TCAD.2015.2423274}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/GornikMOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RuppBHP15, author = {Andy Rupp and Foteini Baldimtsi and Gesine Hinterw{\"{a}}lder and Christof Paar}, title = {Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {3}, pages = {10:1--10:31}, year = {2015}, url = {https://doi.org/10.1145/2699904}, doi = {10.1145/2699904}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RuppBHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/SwierczynskiMOP15, author = {Pawel Swierczynski and Amir Moradi and David F. Oswald and Christof Paar}, title = {Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix {II} and Stratix {III} FPGAs}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {7}, number = {4}, pages = {34:1--34:23}, year = {2015}, url = {https://doi.org/10.1145/2629462}, doi = {10.1145/2629462}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/SwierczynskiMOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KisonFP15, author = {Christian Kison and J{\"{u}}rgen Frinken and Christof Paar}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Finding the {AES} Bits in the Haystack: Reverse Engineering and {SCA} Using Voltage Contrast}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {641--660}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_32}, doi = {10.1007/978-3-662-48324-4\_32}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KisonFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/StrobelBOSP15, author = {Daehyun Strobel and Florian Bache and David F. Oswald and Falk Schellenberg and Christof Paar}, editor = {Wolfgang Nebel and David Atienza}, title = {Scandalee: a side-channel-based disassembler using local electromagnetic emanations}, booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March 9-13, 2015}, pages = {139--144}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2755784}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/StrobelBOSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/HassanKCRGP15, author = {Muhammad Hassan and Ayesha Khalid and Anupam Chattopadhyay and Christian Rechberger and Tim G{\"{u}}neysu and Christof Paar}, title = {New {ASIC/FPGA} Cost Estimates for {SHA-1} Collisions}, booktitle = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira, Portugal, August 26-28, 2015}, pages = {669--676}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/DSD.2015.78}, doi = {10.1109/DSD.2015.78}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/HassanKCRGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/SwierczynskiFPH15, author = {Pawel Swierczynski and Marc Fyrbiak and Christof Paar and Christophe Huriaux and Russell Tessier}, title = {Protecting against Cryptographic Trojans in FPGAs}, booktitle = {23rd {IEEE} Annual International Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2015, Vancouver, BC, Canada, May 2-6, 2015}, pages = {151--154}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FCCM.2015.55}, doi = {10.1109/FCCM.2015.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/SwierczynskiFPH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/SchellenbergFRS15, author = {Falk Schellenberg and Markus Finkeldey and Bastian Richter and Maximilian Schapers and Nils Gerhardt and Martin Hofmann and Christof Paar}, editor = {Naofumi Homma and Victor Lomn{\'{e}}}, title = {On the Complexity Reduction of Laser Fault Injection Campaigns Using {OBIC} Measurements}, booktitle = {2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2015, Saint Malo, France, September 13, 2015}, pages = {14--27}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FDTC.2015.10}, doi = {10.1109/FDTC.2015.10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/SchellenbergFRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/MalikBPB15, author = {Shweta Malik and Georg T. Becker and Christof Paar and Wayne P. Burleson}, title = {Development of a Layout-Level Hardware Obfuscation Tool}, booktitle = {2015 {IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2015, Montpellier, France, July 8-10, 2015}, pages = {204--209}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ISVLSI.2015.118}, doi = {10.1109/ISVLSI.2015.118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/MalikBPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/ZengerZPP15, author = {Christian T. Zenger and Jan Zimmer and Jan{-}Felix Posielek and Christof Paar}, editor = {Pei Zhang and Jorge S{\'{a}} Silva and Nic Lane and Fernando Boavida and Andr{\'{e}} Rodrigues}, title = {On-line Entropy Estimation for Secure Information Reconciliation}, booktitle = {Proceedings of the 12th {EAI} International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2015, Coimbra, Portugal, July 22-24, 2015}, pages = {254--259}, publisher = {{ICST} / {ACM}}, year = {2015}, url = {https://doi.org/10.4108/eai.22-7-2015.2260196}, doi = {10.4108/EAI.22-7-2015.2260196}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobiquitous/ZengerZPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ZengerZPPP15, author = {Christian T. Zenger and Jan Zimmer and Mario Pietersz and Jan{-}Felix Posielek and Christof Paar}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Exploiting the Physical Environment for Securing the Internet of Things}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {44--58}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841117}, doi = {10.1145/2841113.2841117}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/ZengerZPPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/HinterwalderRP15, author = {Gesine Hinterw{\"{a}}lder and Felix Riek and Christof Paar}, editor = {Stefan Mangard and Patrick Schaumont}, title = {Efficient E-cash with Attributes on {MULTOS} Smartcards}, booktitle = {Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9440}, pages = {141--155}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24837-0\_9}, doi = {10.1007/978-3-319-24837-0\_9}, timestamp = {Mon, 15 Jun 2020 17:08:11 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/HinterwalderRP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/GuillaumeWCZP15, author = {Ren{\'{e}} Guillaume and Fredrik Winzer and Andreas Czylwik and Christian T. Zenger and Christof Paar}, title = {Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios}, booktitle = {{IEEE} 82nd Vehicular Technology Conference, {VTC} Fall 2015, Boston, MA, USA, September 6-9, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/VTCFall.2015.7390857}, doi = {10.1109/VTCFALL.2015.7390857}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/GuillaumeWCZP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DullHHHPSS15, author = {Michael D{\"{u}}ll and Bj{\"{o}}rn Haase and Gesine Hinterw{\"{a}}lder and Michael Hutter and Christof Paar and Ana Helena S{\'{a}}nchez and Peter Schwabe}, title = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2015}, url = {http://eprint.iacr.org/2015/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DullHHHPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gor-nikMOP15, author = {Andreas Gornik and Amir Moradi and J{\"{u}}rgen Oehm and Christof Paar}, title = {A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2015}, url = {http://eprint.iacr.org/2015/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gor-nikMOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SwierczynskiFKM15, author = {Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar}, title = {Interdiction in Practice - Hardware Trojan Against a High-Security {USB} Flash Drive}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {768}, year = {2015}, url = {http://eprint.iacr.org/2015/768}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SwierczynskiFKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BeckerRPB14, author = {Georg T. Becker and Francesco Regazzoni and Christof Paar and Wayne P. Burleson}, title = {Stealthy dopant-level hardware Trojans: extended version}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {19--31}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0068-0}, doi = {10.1007/S13389-013-0068-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BeckerRPB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/StrobelORSP14, author = {Daehyun Strobel and David F. Oswald and Bastian Richter and Falk Schellenberg and Christof Paar}, title = {Microcontrollers as (In)Security Devices for Pervasive Computing Applications}, journal = {Proc. {IEEE}}, volume = {102}, number = {8}, pages = {1157--1173}, year = {2014}, url = {https://doi.org/10.1109/JPROC.2014.2325397}, doi = {10.1109/JPROC.2014.2325397}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pieee/StrobelORSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balkancryptsec/ZengerAWPSP14, author = {Christian T. Zenger and Abhijit K. Ambekar and Fredrik Winzer and Thomas P{\"{o}}ppelmann and Hans D. Schotten and Christof Paar}, editor = {Berna {\"{O}}rs and Bart Preneel}, title = {Preventing Scaling of Successful Attacks: {A} Cross-Layer Security Architecture for Resource-Constrained Platforms}, booktitle = {Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9024}, pages = {103--120}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21356-9\_8}, doi = {10.1007/978-3-319-21356-9\_8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/balkancryptsec/ZengerAWPSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Paar14, author = {Christof Paar}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {How to Build Hardware Trojans}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {57}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2668384}, doi = {10.1145/2666141.2668384}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Paar14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlbrechtDKLPY14, author = {Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yal{\c{c}}in}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Block Ciphers - Focus on the Linear Layer (feat. {PRIDE)}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {57--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_4}, doi = {10.1007/978-3-662-44371-2\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlbrechtDKLPY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DondaSSLP14, author = {Ariano{-}Tim Donda and Peter Samarin and Jacek Samotyja and Kerstin Lemke{-}Rust and Christof Paar}, editor = {Jooyoung Lee and Jongsung Kim}, title = {Remote {IP} Protection Using Timing Channels}, booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8949}, pages = {222--237}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15943-0\_14}, doi = {10.1007/978-3-319-15943-0\_14}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/DondaSSLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/HinterwalderMHS14, author = {Gesine Hinterw{\"{a}}lder and Amir Moradi and Michael Hutter and Peter Schwabe and Christof Paar}, editor = {Diego F. Aranha and Alfred Menezes}, title = {Full-Size High-Security {ECC} Implementation on {MSP430} Microcontrollers}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian{\'{o}}polis, Brazil, September 17-19, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8895}, pages = {31--47}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16295-9\_2}, doi = {10.1007/978-3-319-16295-9\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/HinterwalderMHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/Heyse0P14, author = {Stefan Heyse and Ralf Zimmermann and Christof Paar}, editor = {Michele Mosca}, title = {Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware}, booktitle = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8772}, pages = {126--141}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11659-4\_8}, doi = {10.1007/978-3-319-11659-4\_8}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/Heyse0P14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaileyDP14, author = {Daniel V. Bailey and Markus D{\"{u}}rmuth and Christof Paar}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Statistics on Password Re-use and Adaptive Strength for Financial Accounts}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {218--235}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_13}, doi = {10.1007/978-3-319-10879-7\_13}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaileyDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siot/ZengerCPPW14, author = {Christian T. Zenger and Markus{-}Julian Chur and Jan{-}Felix Posielek and Christof Paar and Gerhard Wunder}, editor = {Gabriel Ghinita and Razvan Rughinis and Ahmad{-}Reza Sadeghi}, title = {A Novel Key Generating Architecture for Wireless Low-Resource Devices}, booktitle = {2014 International Workshop on Secure Internet of Things, SIoT 2014, Wroclaw, Poland, September 10, 2014}, pages = {26--34}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SIoT.2014.7}, doi = {10.1109/SIOT.2014.7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/siot/ZengerCPPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KasperOP14, author = {Timo Kasper and David F. Oswald and Christof Paar}, editor = {David Naccache and Damien Sauveron}, title = {Sweet Dreams and Nightmares: Security in the Internet of Things}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {1--9}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_1}, doi = {10.1007/978-3-662-43826-8\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KasperOP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtDKLPY14, author = {Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yal{\c{c}}in}, title = {Block Ciphers - Focus On The Linear Layer (feat. {PRIDE):} Full Version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2014}, url = {http://eprint.iacr.org/2014/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtDKLPY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SwierczynskiFKP14a, author = {Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar}, title = {{FPGA} Trojans through Detecting and Weakening of Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2014}, url = {http://eprint.iacr.org/2014/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SwierczynskiFKP14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SwierczynskiLP13, author = {Pawel Swierczynski and Gregor Leander and Christof Paar}, title = {Keccak und der {SHA-2}}, journal = {Datenschutz und Datensicherheit}, volume = {37}, number = {11}, pages = {712--719}, year = {2013}, url = {https://doi.org/10.1007/s11623-013-0299-3}, doi = {10.1007/S11623-013-0299-3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SwierczynskiLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MoradiMP13, author = {Amir Moradi and Oliver Mischke and Christof Paar}, title = {One Attack to Rule Them All: Collision Timing Attack versus 42 {AES} {ASIC} Cores}, journal = {{IEEE} Trans. Computers}, volume = {62}, number = {9}, pages = {1786--1798}, year = {2013}, url = {https://doi.org/10.1109/TC.2012.154}, doi = {10.1109/TC.2012.154}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/MoradiMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DriessenHWPH13, author = {Benedikt Driessen and Ralf Hund and Carsten Willems and Christof Paar and Thorsten Holz}, title = {An experimental security analysis of two satphone standards}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {10}, year = {2013}, url = {https://doi.org/10.1145/2535522}, doi = {10.1145/2535522}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DriessenHWPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/EngelsKPYM13, author = {Susanne Engels and Elif Bilge Kavun and Christof Paar and Tolga Yal{\c{c}}in and Hristina Mihajloska}, editor = {Alberto Nannarelli and Peter{-}Michael Seidel and Ping Tak Peter Tang}, title = {A Non-Linear/Linear Instruction Set Extension for Lightweight Ciphers}, booktitle = {21st {IEEE} Symposium on Computer Arithmetic, {ARITH} 2013, Austin, TX, USA, April 7-10, 2013}, pages = {67--75}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARITH.2013.36}, doi = {10.1109/ARITH.2013.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/EngelsKPYM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/EisenbarthMPY13, author = {Thomas Eisenbarth and Ingo von Maurich and Christof Paar and Xin Ye}, editor = {Marc Fischlin and Stefan Katzenbeisser}, title = {A Performance Boost for Hash-Based Signatures}, booktitle = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {8260}, pages = {166--182}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42001-6\_13}, doi = {10.1007/978-3-642-42001-6\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/EisenbarthMPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Paar13, author = {Christof Paar}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Constructive and destructive aspects of embedded security in the internet of things}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1495--1496}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516757}, doi = {10.1145/2508859.2516757}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Paar13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BeckerRPB13, author = {Georg T. Becker and Francesco Regazzoni and Christof Paar and Wayne P. Burleson}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Stealthy Dopant-Level Hardware Trojans}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {197--214}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_12}, doi = {10.1007/978-3-642-40349-1\_12}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BeckerRPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/StrobelDKLOSP13, author = {Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David F. Oswald and Falk Schellenberg and Christof Paar}, editor = {Ran Canetti and Juan A. Garay}, title = {Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {147--164}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_9}, doi = {10.1007/978-3-642-40041-4\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/StrobelDKLOSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RuppHBP13, author = {Andy Rupp and Gesine Hinterw{\"{a}}lder and Foteini Baldimtsi and Christof Paar}, editor = {Ahmad{-}Reza Sadeghi}, title = {{P4R:} Privacy-Preserving Pre-Payments with Refunds for Transportation Systems}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {205--212}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_17}, doi = {10.1007/978-3-642-39884-1\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/RuppHBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/MoradiOPS13, author = {Amir Moradi and David F. Oswald and Christof Paar and Pawel Swierczynski}, editor = {Brad L. Hutchings and Vaughn Betz}, title = {Side-channel attacks on the bitstream encryption mechanism of Altera Stratix {II:} facilitating black-box analysis using software reverse-engineering}, booktitle = {The 2013 {ACM/SIGDA} International Symposium on Field Programmable Gate Arrays, {FPGA} '13, Monterey, CA, USA, February 11-13, 2013}, pages = {91--100}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435264.2435282}, doi = {10.1145/2435264.2435282}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpga/MoradiOPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/HinterwalderZBLPB13, author = {Gesine Hinterw{\"{a}}lder and Christian T. Zenger and Foteini Baldimtsi and Anna Lysyanskaya and Christof Paar and Wayne P. Burleson}, editor = {Emiliano De Cristofaro and Matthew K. Wright}, title = {Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems}, booktitle = {Privacy Enhancing Technologies - 13th International Symposium, {PETS} 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7981}, pages = {40--59}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39077-7\_3}, doi = {10.1007/978-3-642-39077-7\_3}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/HinterwalderZBLPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/OswaldRP13, author = {David F. Oswald and Bastian Richter and Christof Paar}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {Side-Channel Attacks on the Yubikey 2 One-Time Password Generator}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {204--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_11}, doi = {10.1007/978-3-642-41284-4\_11}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/OswaldRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/KasperKOZP13, author = {Timo Kasper and Alexander K{\"{u}}hn and David F. Oswald and Christian T. Zenger and Christof Paar}, editor = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt}, title = {Rights Management with {NFC} Smartphones and Electronic {ID} Cards: {A} Proof of Concept for Modern Car Sharing}, booktitle = {Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8262}, pages = {34--53}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41332-2\_3}, doi = {10.1007/978-3-642-41332-2\_3}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/KasperKOZP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/BatinaDEKMPVY13, author = {Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yal{\c{c}}in}, editor = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt}, title = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures}, booktitle = {Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8262}, pages = {103--112}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41332-2\_7}, doi = {10.1007/978-3-642-41332-2\_7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rfidsec/BatinaDEKMPVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/OswaldSSKP13, author = {David F. Oswald and Daehyun Strobel and Falk Schellenberg and Timo Kasper and Christof Paar}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {571--588}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_29}, doi = {10.1007/978-3-662-43414-7\_29}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/OswaldSSKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StrobelDKLOSP13, author = {Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David F. Oswald and Falk Schellenberg and Christof Paar}, title = {Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {598}, year = {2013}, url = {http://eprint.iacr.org/2013/598}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/StrobelDKLOSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BatinaDEKMPVY13, author = {Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yal{\c{c}}in}, title = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2013}, url = {http://eprint.iacr.org/2013/753}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BatinaDEKMPVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DriessenP12, author = {Benedikt Driessen and Christof Paar}, title = {Angriff auf Thuraya Satellitentelefonie}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {886--890}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0296-y}, doi = {10.1007/S11623-012-0296-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DriessenP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KasperMBMGPB12, author = {Markus Kasper and Amir Moradi and Georg T. Becker and Oliver Mischke and Tim G{\"{u}}neysu and Christof Paar and Wayne P. Burleson}, title = {Side channels as building blocks}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {3}, pages = {143--159}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0040-4}, doi = {10.1007/S13389-012-0040-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/KasperMBMGPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BeckerSPB12, author = {Georg T. Becker and Daehyun Strobel and Christof Paar and Wayne P. Burleson}, title = {Detecting Software Theft in Embedded Systems: {A} Side-Channel Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {4}, pages = {1144--1154}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2191964}, doi = {10.1109/TIFS.2012.2191964}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BeckerSPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/MoradiKEP12, author = {Amir Moradi and Mario Kirschbaum and Thomas Eisenbarth and Christof Paar}, title = {Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {20}, number = {9}, pages = {1578--1589}, year = {2012}, url = {https://doi.org/10.1109/TVLSI.2011.2160375}, doi = {10.1109/TVLSI.2011.2160375}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/MoradiKEP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BorghoffCGKKKLNPRRTY12, author = {Julia Borghoff and Anne Canteaut and Tim G{\"{u}}neysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and S{\o}ren S. Thomsen and Tolga Yal{\c{c}}in}, editor = {Xiaoyun Wang and Kazue Sako}, title = {{PRINCE} - {A} Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {208--225}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_14}, doi = {10.1007/978-3-642-34961-4\_14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BorghoffCGKKKLNPRRTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/OswaldP12, author = {David F. Oswald and Christof Paar}, editor = {Stefan Mangard}, title = {Improving Side-Channel Analysis with Optimal Linear Transforms}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {219--233}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_15}, doi = {10.1007/978-3-642-37288-9\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/OswaldP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MoradiKP12, author = {Amir Moradi and Markus Kasper and Christof Paar}, editor = {Orr Dunkelman}, title = {Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {1--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_1}, doi = {10.1007/978-3-642-27954-6\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MoradiKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DurmuthGKPYZ12, author = {Markus D{\"{u}}rmuth and Tim G{\"{u}}neysu and Markus Kasper and Christof Paar and Tolga Yal{\c{c}}in and Ralf Zimmermann}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {716--733}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_41}, doi = {10.1007/978-3-642-33167-1\_41}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DurmuthGKPYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HeyseKLPP12, author = {Stefan Heyse and Eike Kiltz and Vadim Lyubashevsky and Christof Paar and Krzysztof Pietrzak}, editor = {Anne Canteaut}, title = {Lapin: An Efficient Authentication Protocol Based on Ring-LPN}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {346--365}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_20}, doi = {10.1007/978-3-642-34047-5\_20}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HeyseKLPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Paar12, author = {Christof Paar}, editor = {Chris J. Mitchell and Allan Tomlinson}, title = {The Yin and Yang Sides of Embedded Security}, booktitle = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London, UK, December 17-18, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7711}, pages = {112--115}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35371-0\_10}, doi = {10.1007/978-3-642-35371-0\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Paar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/DriessenGKMPP12, author = {Benedikt Driessen and Tim G{\"{u}}neysu and Elif Bilge Kavun and Oliver Mischke and Christof Paar and Thomas P{\"{o}}ppelmann}, title = {IPSecco: {A} lightweight and reconfigurable IPSec core}, booktitle = {2012 International Conference on Reconfigurable Computing and FPGAs, ReConFig 2012, Cancun, Mexico, December 5-7, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ReConFig.2012.6416757}, doi = {10.1109/RECONFIG.2012.6416757}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/reconfig/DriessenGKMPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/HinterwalderPB12, author = {Gesine Hinterw{\"{a}}lder and Christof Paar and Wayne P. Burleson}, editor = {Jaap{-}Henk Hoepman and Ingrid Verbauwhede}, title = {Privacy Preserving Payments on Computational {RFID} Devices with Application in Intelligent Transportation Systems}, booktitle = {Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7739}, pages = {109--122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36140-1\_8}, doi = {10.1007/978-3-642-36140-1\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/HinterwalderPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DriessenHWPH12, author = {Benedikt Driessen and Ralf Hund and Carsten Willems and Christof Paar and Thorsten Holz}, title = {Don't Trust Satellite Phones: {A} Security Analysis of Two Satphone Standards}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {128--142}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.18}, doi = {10.1109/SP.2012.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/DriessenHWPH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/DriessenP12, author = {Benedikt Driessen and Christof Paar}, editor = {Ferruh {\"{O}}zbudak and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Solving Binary Linear Equation Systems over the Rationals and Binaries}, booktitle = {Arithmetic of Finite Fields - 4th International Workshop, {WAIFI} 2012, Bochum, Germany, July 16-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7369}, pages = {187--195}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31662-3\_13}, doi = {10.1007/978-3-642-31662-3\_13}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/waifi/DriessenP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rfidsec/2011, editor = {Ari Juels and Christof Paar}, title = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-25286-0}, doi = {10.1007/978-3-642-25286-0}, isbn = {978-3-642-25285-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorghoffCGKKKLNPRRTY12, author = {Julia Borghoff and Anne Canteaut and Tim G{\"{u}}neysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and S{\o}ren S. Thomsen and Tolga Yal{\c{c}}in}, title = {{PRINCE} - {A} Low-latency Block Cipher for Pervasive Computing Applications (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2012}, url = {http://eprint.iacr.org/2012/529}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorghoffCGKKKLNPRRTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KasperKMP11, author = {Markus Kasper and Timo Kasper and Amir Moradi and Christof Paar}, title = {Praktische Angriffe auf die Bitstromverschl{\"{u}}sselung von Xilinx FPGAs}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {779--785}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0185-9}, doi = {10.1007/S11623-011-0185-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KasperKMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KasperOP11, author = {Timo Kasper and David F. Oswald and Christof Paar}, title = {Seitenkanalanalyse kontaktloser SmartCards}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {786--790}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0186-8}, doi = {10.1007/S11623-011-0186-8}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KasperOP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PaarQS11, author = {Christof Paar and Jean{-}Jacques Quisquater and Berk Sunar}, title = {Guest Editorial}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {245--246}, year = {2011}, url = {https://doi.org/10.1007/s00145-011-9099-9}, doi = {10.1007/S00145-011-9099-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PaarQS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DinurGPSZ11, author = {Itai Dinur and Tim G{\"{u}}neysu and Christof Paar and Adi Shamir and Ralf Zimmermann}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {327--343}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_18}, doi = {10.1007/978-3-642-25385-0\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DinurGPSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoradiBKP11, author = {Amir Moradi and Alessandro Barenghi and Timo Kasper and Christof Paar}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {On the vulnerability of {FPGA} bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {111--124}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046722}, doi = {10.1145/2046707.2046722}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoradiBKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OswaldP11, author = {David F. Oswald and Christof Paar}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Breaking Mifare DESFire {MF3ICD40:} Power Analysis and Templates in the Real World}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {207--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_14}, doi = {10.1007/978-3-642-23951-9\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OswaldP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiMPLOS11, author = {Amir Moradi and Oliver Mischke and Christof Paar and Yang Li and Kazuo Ohta and Kazuo Sakiyama}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {292--311}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_20}, doi = {10.1007/978-3-642-23951-9\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MoradiMPLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MoradiPLPW11, author = {Amir Moradi and Axel Poschmann and San Ling and Christof Paar and Huaxiong Wang}, editor = {Kenneth G. Paterson}, title = {Pushing the Limits: {A} Very Compact and a Threshold Implementation of {AES}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {69--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_6}, doi = {10.1007/978-3-642-20465-4\_6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MoradiPLPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/GuneysuHP11, author = {Tim G{\"{u}}neysu and Stefan Heyse and Christof Paar}, editor = {David Atienza and Yuan Xie and Jos{\'{e}} L. Ayala and Ken S. Stevens}, title = {The future of high-speed cryptography: new computing platforms and new ciphers}, booktitle = {Proceedings of the 21st {ACM} Great Lakes Symposium on {VLSI} 2010, Lausanne, Switzerland, May 2-6, 2011}, pages = {461--466}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1973009.1973112}, doi = {10.1145/1973009.1973112}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/glvlsi/GuneysuHP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MoradiMP11, author = {Amir Moradi and Oliver Mischke and Christof Paar}, title = {Practical evaluation of {DPA} countermeasures on reconfigurable hardware}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {154--160}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5955014}, doi = {10.1109/HST.2011.5955014}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MoradiMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/StrobelP11, author = {Daehyun Strobel and Christof Paar}, editor = {Howon Kim}, title = {An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {48--60}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_4}, doi = {10.1007/978-3-642-31912-9\_4}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/StrobelP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Paar11, author = {Christof Paar}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {The Yin and Yang Sides of Embedded Security}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {93}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_8}, doi = {10.1007/978-3-642-25578-6\_8}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Paar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/KasperOP11, author = {Timo Kasper and David F. Oswald and Christof Paar}, editor = {Ari Juels and Christof Paar}, title = {Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation}, booktitle = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, pages = {61--77}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25286-0\_5}, doi = {10.1007/978-3-642-25286-0\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/KasperOP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/softcom/KasperOP11, author = {Timo Kasper and David F. Oswald and Christof Paar}, title = {Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild}, booktitle = {19th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2011, Split, Croatia, September 15-17, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/freeabs\_all.jsp?arnumber=6064450}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/softcom/KasperOP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Paar11, author = {Christof Paar}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Exponentiation Algorithms}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {434--436}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_28}, doi = {10.1007/978-1-4419-5906-5\_28}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Paar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Paar11a, author = {Christof Paar}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Inversion in Finite Fields and Rings}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {631--632}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_33}, doi = {10.1007/978-1-4419-5906-5\_33}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Paar11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/EisenbarthKPI11, author = {Thomas Eisenbarth and Timo Kasper and Christof Paar and Sebastiaan Indesteege}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Keeloq}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {671--673}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_587}, doi = {10.1007/978-1-4419-5906-5\_587}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crypt/EisenbarthKPI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Paar11b, author = {Christof Paar}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Optimal Extension Fields (OEFs)}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {888--890}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_41}, doi = {10.1007/978-1-4419-5906-5\_41}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Paar11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Paar11c, author = {Christof Paar}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Special-Purpose Cryptanalytical Hardware}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1242--1243}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_47}, doi = {10.1007/978-1-4419-5906-5\_47}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Paar11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiMP11, author = {Amir Moradi and Oliver Mischke and Christof Paar}, title = {Collision Timing Attack when Breaking 42 {AES} {ASIC} Cores}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2011}, url = {http://eprint.iacr.org/2011/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurGPSZ11, author = {Itai Dinur and Tim G{\"{u}}neysu and Christof Paar and Adi Shamir and Ralf Zimmermann}, title = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2011}, url = {http://eprint.iacr.org/2011/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurGPSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiBKP11, author = {Amir Moradi and Alessandro Barenghi and Timo Kasper and Christof Paar}, title = {On the Vulnerability of {FPGA} Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2011}, url = {http://eprint.iacr.org/2011/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiBKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiKP11, author = {Amir Moradi and Markus Kasper and Christof Paar}, title = {On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4 and Virtex 5 Bitstream Encryption Mechanism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2011}, url = {http://eprint.iacr.org/2011/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0023872, author = {Christof Paar and Jan Pelzl}, title = {Understanding Cryptography - {A} Textbook for Students and Practitioners}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-04101-3}, doi = {10.1007/978-3-642-04101-3}, isbn = {978-3-642-04100-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0023872.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PoschmannRVP10, author = {Axel Poschmann and Matthew J. B. Robshaw and Frank Vater and Christof Paar}, title = {Lightweight Cryptography and {RFID:} Tackling the Hidden Overhead}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {4}, number = {2}, pages = {98--116}, year = {2010}, url = {https://doi.org/10.3837/tiis.2010.04.002}, doi = {10.3837/TIIS.2010.04.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/PoschmannRVP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/EisenbarthPW10, author = {Thomas Eisenbarth and Christof Paar and Bj{\"{o}}rn Weghenkel}, title = {Building a Side Channel Based Disassembler}, journal = {Trans. Comput. Sci.}, volume = {10}, pages = {78--99}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17499-5\_4}, doi = {10.1007/978-3-642-17499-5\_4}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/EisenbarthPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/KasperOP10, author = {Timo Kasper and David F. Oswald and Christof Paar}, title = {A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices}, journal = {Trans. Comput. Sci.}, volume = {10}, pages = {100--130}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17499-5\_5}, doi = {10.1007/978-3-642-17499-5\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/KasperOP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/DrimerGP10, author = {Saar Drimer and Tim G{\"{u}}neysu and Christof Paar}, title = {DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for {AES} on FPGAs}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {3}, number = {1}, pages = {3:1--3:27}, year = {2010}, url = {https://doi.org/10.1145/1661438.1661441}, doi = {10.1145/1661438.1661441}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/DrimerGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BogdanovEPW10, author = {Andrey Bogdanov and Thomas Eisenbarth and Christof Paar and Malte Wienecke}, editor = {Josef Pieprzyk}, title = {Differential Cache-Collision Timing Attacks on {AES} with Applications to Embedded CPUs}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {235--251}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_17}, doi = {10.1007/978-3-642-11925-5\_17}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BogdanovEPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BeckerLLEP10, author = {Georg T. Becker and Sherman C. Lo and David S. De Lorenzo and Per K. Enge and Christof Paar}, editor = {Sara Foresti and Sushil Jajodia}, title = {Secure Location Verification - {A} Security Analysis of {GPS} Signal Authentication}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {366--373}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_29}, doi = {10.1007/978-3-642-13739-6\_29}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BeckerLLEP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KasperSP10, author = {Timo Kasper and Michael Silbermann and Christof Paar}, editor = {Radu Sion}, title = {All You Can Eat or Breaking a Real-World Contactless Payment System}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {343--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_28}, doi = {10.1007/978-3-642-14577-3\_28}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KasperSP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/ZimmermannGP10, author = {Ralf Zimmermann and Tim G{\"{u}}neysu and Christof Paar}, title = {High-Performance Integer Factoring with Reconfigurable Devices}, booktitle = {International Conference on Field Programmable Logic and Applications, {FPL} 2010, August 31 2010 - September 2, 2010, Milano, Italy}, pages = {83--88}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FPL.2010.26}, doi = {10.1109/FPL.2010.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/ZimmermannGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/FanBBGPV10, author = {Junfeng Fan and Daniel V. Bailey and Lejla Batina and Tim G{\"{u}}neysu and Christof Paar and Ingrid Verbauwhede}, title = {Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware}, booktitle = {International Conference on Field Programmable Logic and Applications, {FPL} 2010, August 31 2010 - September 2, 2010, Milano, Italy}, pages = {133--138}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FPL.2010.34}, doi = {10.1109/FPL.2010.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/FanBBGPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BeckerKMP10, author = {Georg T. Becker and Markus Kasper and Amir Moradi and Christof Paar}, editor = {Jim Plusquellic and Ken Mai}, title = {Side-channel based Watermarks for Integrated Circuits}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {30--35}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513117}, doi = {10.1109/HST.2010.5513117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BeckerKMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KasperMOP10, author = {Timo Kasper and Ingo von Maurich and David F. Oswald and Christof Paar}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {Chameleon: {A} Versatile Emulator for Contactless Smartcards}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {189--206}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_13}, doi = {10.1007/978-3-642-24209-0\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KasperMOP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/HeyseMP10, author = {Stefan Heyse and Amir Moradi and Christof Paar}, editor = {Nicolas Sendrier}, title = {Practical Power Analysis Attacks on Software Implementations of McEliece}, booktitle = {Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6061}, pages = {108--125}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12929-2\_9}, doi = {10.1007/978-3-642-12929-2\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/HeyseMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/GuneysuP10, author = {Tim G{\"{u}}neysu and Christof Paar}, editor = {Ingrid M. R. Verbauwhede}, title = {Modular Integer Arithmetic for Public Key Cryptography}, booktitle = {Secure Integrated Circuits and Systems}, series = {Integrated Circuits and Systems}, pages = {3--26}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-71829-3\_1}, doi = {10.1007/978-0-387-71829-3\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/10/GuneysuP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/RegazzoniEPGGMDPPLI09, author = {Francesco Regazzoni and Thomas Eisenbarth and Axel Poschmann and Johann Gro{\ss}sch{\"{a}}dl and Frank K. G{\"{u}}rkaynak and Marco Macchetti and Zeynep Toprak Deniz and Laura Pozzi and Christof Paar and Yusuf Leblebici and Paolo Ienne}, title = {Evaluating Resistance of {MCML} Technology to Power Analysis Attacks Using a Simulation-Based Methodology}, journal = {Trans. Comput. Sci.}, volume = {4}, pages = {230--243}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01004-0\_13}, doi = {10.1007/978-3-642-01004-0\_13}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcos/RegazzoniEPGGMDPPLI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/KasperKMP09, author = {Markus Kasper and Timo Kasper and Amir Moradi and Christof Paar}, editor = {Bart Preneel}, title = {Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {403--420}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_25}, doi = {10.1007/978-3-642-02384-2\_25}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/KasperKMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/EisenbarthGHP09, author = {Thomas Eisenbarth and Tim G{\"{u}}neysu and Stefan Heyse and Christof Paar}, editor = {Christophe Clavier and Kris Gaj}, title = {MicroEliece: McEliece for Embedded Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {49--64}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_4}, doi = {10.1007/978-3-642-04138-9\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/EisenbarthGHP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Paar09, author = {Christof Paar}, editor = {Christophe Clavier and Kris Gaj}, title = {Crypto Engineering: Some History and Some Case Studies}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {220--224}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_16}, doi = {10.1007/978-3-642-04138-9\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Paar09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LinKGPB09, author = {Lang Lin and Markus Kasper and Tim G{\"{u}}neysu and Christof Paar and Wayne P. Burleson}, editor = {Christophe Clavier and Kris Gaj}, title = {Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {382--395}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_27}, doi = {10.1007/978-3-642-04138-9\_27}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LinKGPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/PaarEKKM09, author = {Christof Paar and Thomas Eisenbarth and Markus Kasper and Timo Kasper and Amir Moradi}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Elisabeth Oswald and Jean{-}Pierre Seifert}, title = {KeeLoq and Side-Channel Analysis-Evolution of an Attack}, booktitle = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2009, Lausanne, Switzerland, 6 September 2009}, pages = {65--69}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FDTC.2009.44}, doi = {10.1109/FDTC.2009.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/PaarEKKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/GuneysuP09, author = {Tim G{\"{u}}neysu and Christof Paar}, editor = {Neil W. Bergmann and Oliver Diessel and Lesley Shannon}, title = {Transforming write collisions in block RAMs into security applications}, booktitle = {Proceedings of the 2009 International Conference on Field-Programmable Technology, {FPT} 2009, Sydney, Australia, December 9-11, 2009}, pages = {128--134}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FPT.2009.5377631}, doi = {10.1109/FPT.2009.5377631}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fpt/GuneysuP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/GuajardoGKP09, author = {Jorge Guajardo and Tim G{\"{u}}neysu and Sandeep S. Kumar and Christof Paar}, editor = {Mohammad Tehranipoor and Jim Plusquellic}, title = {Secure IP-Block Distribution for Hardware Devices}, booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust, {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings}, pages = {82--89}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HST.2009.5224965}, doi = {10.1109/HST.2009.5224965}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/GuajardoGKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/LinBP09, author = {Lang Lin and Wayne P. Burleson and Christof Paar}, editor = {Jaijeet S. Roychowdhury}, title = {{MOLES:} Malicious off-chip leakage enabled by side-channels}, booktitle = {2009 International Conference on Computer-Aided Design, {ICCAD} 2009, San Jose, CA, USA, November 2-5, 2009}, pages = {117--122}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1687399.1687425}, doi = {10.1145/1687399.1687425}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccad/LinBP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/BaileyBRP09, author = {Daniel V. Bailey and John G. Brainard and Sebastian Rohde and Christof Paar}, editor = {Mohammad S. Obaidat and Joaquim Filipe}, title = {Wireless Authentication and Transaction-Confirmation Token}, booktitle = {e-Business and Telecommunications - 6th International Joint Conference, {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {130}, pages = {186--198}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-20077-9\_13}, doi = {10.1007/978-3-642-20077-9\_13}, timestamp = {Sat, 19 Oct 2019 20:35:36 +0200}, biburl = {https://dblp.org/rec/conf/icete/BaileyBRP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PoschmannRVP09, author = {Axel Poschmann and Matthew J. B. Robshaw and Frank Vater and Christof Paar}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Lightweight Cryptography and {RFID:} Tackling the Hidden Overheads}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {129--145}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_10}, doi = {10.1007/978-3-642-14423-3\_10}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PoschmannRVP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MoradiEPP09, author = {Amir Moradi and Thomas Eisenbarth and Axel Poschmann and Christof Paar}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Power Analysis of Single-Rail Storage Elements as Used in {MDPL}}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {146--160}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_11}, doi = {10.1007/978-3-642-14423-3\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MoradiEPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BaileyBRP09, author = {Daniel V. Bailey and John G. Brainard and Sebastian Rohde and Christof Paar}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {One-touch Financial Transaction Authentication}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--12}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 21:15:22 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BaileyBRP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KasperOP09, author = {Timo Kasper and David F. Oswald and Christof Paar}, editor = {Heung Youl Youm and Moti Yung}, title = {{EM} Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {79--93}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_7}, doi = {10.1007/978-3-642-10838-9\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KasperOP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoradiMPS09, author = {Amir Moradi and Nima Mousavi and Christof Paar and Mahmoud Salmasizadeh}, editor = {Heung Youl Youm and Moti Yung}, title = {A Comparative Study of Mutual Information Analysis under a Gaussian Assumption}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {193--205}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_15}, doi = {10.1007/978-3-642-10838-9\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MoradiMPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaileyBBBBBDMFGGKLMPRSU09, author = {Daniel V. Bailey and Brian Baldwin and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Gauthier Van Damme and Giacomo de Meulenaer and Junfeng Fan and Tim G{\"{u}}neysu and Frank K. G{\"{u}}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel}, title = {The Certicom Challenges {ECC2-X}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2009}, url = {http://eprint.iacr.org/2009/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaileyBBBBBDMFGGKLMPRSU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09, author = {Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Gauthier Van Damme and Giacomo de Meulenaer and Luis J. Dominguez Perez and Junfeng Fan and Tim G{\"{u}}neysu and Frank K. G{\"{u}}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo{-}Yin Yang}, title = {Breaking {ECC2K-130}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2009}, url = {http://eprint.iacr.org/2009/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EisenbarthKP08, author = {Thomas Eisenbarth and Timo Kasper and Christof Paar}, title = {Sicherheit moderner Funkt{\"{u}}r{\"{o}}ffnersysteme}, journal = {Datenschutz und Datensicherheit}, volume = {32}, number = {8}, pages = {507--510}, year = {2008}, url = {https://doi.org/10.1007/s11623-008-0121-9}, doi = {10.1007/S11623-008-0121-9}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/EisenbarthKP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/GuneysuKNPR08, author = {Tim G{\"{u}}neysu and Timo Kasper and Martin Novotn{\'{y}} and Christof Paar and Andy Rupp}, title = {Cryptanalysis with {COPACOBANA}}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {11}, pages = {1498--1513}, year = {2008}, url = {https://doi.org/10.1109/TC.2008.80}, doi = {10.1109/TC.2008.80}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/GuneysuKNPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/GuneysuPP08, author = {Tim G{\"{u}}neysu and Christof Paar and Jan Pelzl}, title = {Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {1}, number = {2}, pages = {8:1--8:21}, year = {2008}, url = {https://doi.org/10.1145/1371579.1371580}, doi = {10.1145/1371579.1371580}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/GuneysuPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/RolfesPLP08, author = {Carsten Rolfes and Axel Poschmann and Gregor Leander and Christof Paar}, editor = {Gilles Grimaud and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents}, booktitle = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2008, London, UK, September 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5189}, pages = {89--103}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85893-5\_7}, doi = {10.1007/978-3-540-85893-5\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/RolfesPLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/RohdeEDBP08, author = {Sebastian Rohde and Thomas Eisenbarth and Erik Dahmen and Johannes Buchmann and Christof Paar}, editor = {Gilles Grimaud and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Fast Hash-Based Signatures on Constrained Devices}, booktitle = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2008, London, UK, September 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5189}, pages = {104--117}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85893-5\_8}, doi = {10.1007/978-3-540-85893-5\_8}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/RohdeEDBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuneysuP08, author = {Tim G{\"{u}}neysu and Christof Paar}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Ultra High Performance {ECC} over {NIST} Primes on Commercial FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {62--78}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_5}, doi = {10.1007/978-3-540-85053-3\_5}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/GuneysuP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovLPPRS08, author = {Andrey Bogdanov and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Hash Functions and {RFID} Tags: Mind the Gap}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {283--299}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_18}, doi = {10.1007/978-3-540-85053-3\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BogdanovLPPRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EisenbarthKMPSS08, author = {Thomas Eisenbarth and Timo Kasper and Amir Moradi and Christof Paar and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani}, editor = {David A. Wagner}, title = {On the Power of Power Analysis in the Real World: {A} Complete Break of the KeeLoqCode Hopping Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {203--220}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_12}, doi = {10.1007/978-3-540-85174-5\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/EisenbarthKMPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GuneysuP08, author = {Tim G{\"{u}}neysu and Christof Paar}, editor = {Gene Tsudik}, title = {Breaking Legacy Banking Standards with Special-Purpose Hardware}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {128--140}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_10}, doi = {10.1007/978-3-540-85230-8\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GuneysuP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/DrimerGP08, author = {Saar Drimer and Tim G{\"{u}}neysu and Christof Paar}, editor = {Kenneth L. Pocek and Duncan A. Buell}, title = {DSPs, BRAMs and a Pinch of Logic: New Recipes for {AES} on FPGAs}, booktitle = {16th {IEEE} International Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2008, 14-15 April 2008, Stanford, Palo Alto, California, {USA}}, pages = {99--108}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FCCM.2008.42}, doi = {10.1109/FCCM.2008.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/DrimerGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/GuneysuPPS08, author = {Tim G{\"{u}}neysu and Christof Paar and Gerd Pfeiffer and Manfred Schimmler}, title = {Enhancing {COPACOBANA} for advanced applications in cryptography and cryptanalysis}, booktitle = {{FPL} 2008, International Conference on Field Programmable Logic and Applications, Heidelberg, Germany, 8-10 September 2008}, pages = {675--678}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/FPL.2008.4630037}, doi = {10.1109/FPL.2008.4630037}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/GuneysuPPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfP08, author = {Marko Wolf and Christof Paar}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Security Requirements Engineering in the Automotive Domain: On Specification Procedures and Implementation Aspects}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {485--498}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21500}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sies/MeiserELP08, author = {Gordon Meiser and Thomas Eisenbarth and Kerstin Lemke{-}Rust and Christof Paar}, title = {Efficient implementation of eSTREAM ciphers on 8-bit {AVR} microcontrollers}, booktitle = {{IEEE} Third International Symposium on Industrial Embedded Systems, {SIES} 2008, Montpellier / La Grande Motte, France, June 11-13, 2008}, pages = {58--66}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/SIES.2008.4577681}, doi = {10.1109/SIES.2008.4577681}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/sies/MeiserELP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DriessenPP08, author = {Benedikt Driessen and Axel Poschmann and Christof Paar}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {Comparison of innovative signature algorithms for WSNs}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {30--35}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352539}, doi = {10.1145/1352533.1352539}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DriessenPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EisenbarthKMPSS08, author = {Thomas Eisenbarth and Timo Kasper and Amir Moradi and Christof Paar and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani}, title = {Physical Cryptanalysis of KeeLoq Code Hopping Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2008}, url = {http://eprint.iacr.org/2008/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EisenbarthKMPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiEPRPSS08, author = {Amir Moradi and Thomas Eisenbarth and Axel Poschmann and Carsten Rolfes and Christof Paar and Mohammad T. Manzuri Shalmani and Mahmoud Salmasizadeh}, title = {Information Leakage of Flip-Flops in DPA-Resistant Logic Styles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2008}, url = {http://eprint.iacr.org/2008/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiEPRPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/EisenbarthKPPU07, author = {Thomas Eisenbarth and Sandeep S. Kumar and Christof Paar and Axel Poschmann and Leif Uhsadel}, title = {A Survey of Lightweight-Cryptography Implementations}, journal = {{IEEE} Des. Test Comput.}, volume = {24}, number = {6}, pages = {522--533}, year = {2007}, url = {https://doi.org/10.1109/MDT.2007.178}, doi = {10.1109/MDT.2007.178}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/EisenbarthKPPU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PaarSSW07, author = {Christof Paar and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk and Christoph Wegener}, title = {Studieren mit Sicherheit in Bochum - Die Studieng{\"{a}}nge zum Thema IT-Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {31}, number = {5}, pages = {338--342}, year = {2007}, url = {https://doi.org/10.1007/s11623-007-0130-0}, doi = {10.1007/S11623-007-0130-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PaarSSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PaarW07, author = {Christof Paar and Andr{\'{e}} Weimerskirch}, title = {Embedded security in a pervasive world}, journal = {Inf. Secur. Tech. Rep.}, volume = {12}, number = {3}, pages = {155--161}, year = {2007}, url = {https://doi.org/10.1016/j.istr.2007.05.006}, doi = {10.1016/J.ISTR.2007.05.006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PaarW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/BaktirKPS07, author = {Sel{\c{c}}uk Baktir and Sandeep S. Kumar and Christof Paar and Berk Sunar}, title = {A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain}, journal = {Mob. Networks Appl.}, volume = {12}, number = {4}, pages = {259--270}, year = {2007}, url = {https://doi.org/10.1007/s11036-007-0022-4}, doi = {10.1007/S11036-007-0022-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/BaktirKPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EisenbarthGPSSW07, author = {Thomas Eisenbarth and Tim G{\"{u}}neysu and Christof Paar and Ahmad{-}Reza Sadeghi and Dries Schellekens and Marko Wolf}, editor = {Peng Ning and Vijay Atluri and Shouhuai Xu and Moti Yung}, title = {Reconfigurable trusted computing in hardware}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing, {STC} 2007, Alexandria, VA, USA, November 2, 2007}, pages = {15--20}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314354.1314360}, doi = {10.1145/1314354.1314360}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EisenbarthGPSSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Lemke-RustP07, author = {Kerstin Lemke{-}Rust and Christof Paar}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Gaussian Mixture Models for Higher-Order Side Channel Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {14--27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_2}, doi = {10.1007/978-3-540-74735-2\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Lemke-RustP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin and C. Vikkelsoe}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{PRESENT:} An Ultra-Lightweight Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {450--466}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_31}, doi = {10.1007/978-3-540-74735-2\_31}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/RegazzoniEGBIKP07, author = {Francesco Regazzoni and Thomas Eisenbarth and Johann Gro{\ss}sch{\"{a}}dl and Luca Breveglieri and Paolo Ienne and Israel Koren and Christof Paar}, editor = {Cristiana Bolchini and Yong{-}Bin Kim and Adelio Salsano and Nur A. Touba}, title = {Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits}, booktitle = {22nd {IEEE} International Symposium on Defect and Fault-Tolerance in {VLSI} Systems {(DFT} 2007), 26-28 September 2007, Rome, Italy}, pages = {508--516}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/DFT.2007.61}, doi = {10.1109/DFT.2007.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dft/RegazzoniEGBIKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/UhsadelPP07, author = {Leif Uhsadel and Axel Poschmann and Christof Paar}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {73--86}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_6}, doi = {10.1007/978-3-540-73275-4\_6}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esas/UhsadelPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Lemke-RustP07, author = {Kerstin Lemke{-}Rust and Christof Paar}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {454--468}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_30}, doi = {10.1007/978-3-540-74835-9\_30}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Lemke-RustP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/GuneysuMP07, author = {Tim G{\"{u}}neysu and Bodo M{\"{o}}ller and Christof Paar}, editor = {Kenneth L. Pocek and Duncan A. Buell}, title = {New Protection Mechanisms for Intellectual Property in Reconfigurable Logic}, booktitle = {{IEEE} Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}}, pages = {287--288}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FCCM.2007.22}, doi = {10.1109/FCCM.2007.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/GuneysuMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/EisenbarthGPSWT07, author = {Thomas Eisenbarth and Tim G{\"{u}}neysu and Christof Paar and Ahmad{-}Reza Sadeghi and Marko Wolf and Russell Tessier}, editor = {Kenneth L. Pocek and Duncan A. Buell}, title = {Establishing Chain of Trust in Reconfigurable Hardware}, booktitle = {{IEEE} Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}}, pages = {289--290}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FCCM.2007.23}, doi = {10.1109/FCCM.2007.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/EisenbarthGPSWT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/GueneysuPP07, author = {Tim G{\"{u}}neysu and Christof Paar and Jan Pelzl}, editor = {Andr{\'{e}} DeHon and Mike Hutton}, title = {Attacking elliptic curve cryptosystems with special-purpose hardware}, booktitle = {Proceedings of the {ACM/SIGDA} 15th International Symposium on Field Programmable Gate Arrays, {FPGA} 2007, Monterey, California, USA, February 18-20, 2007}, pages = {207--215}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1216919.1216953}, doi = {10.1145/1216919.1216953}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpga/GueneysuPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/GuneysuMP07, author = {Tim G{\"{u}}neysu and Bodo M{\"{o}}ller and Christof Paar}, editor = {Hideharu Amano and Andy Ye and Takeshi Ikenaga}, title = {Dynamic Intellectual Property Protection for Reconfigurable Devices}, booktitle = {2007 International Conference on Field-Programmable Technology, {ICFPT} 2007, Kitakyushu, Japan, December 12-14, 2007}, pages = {169--176}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/FPT.2007.4439246}, doi = {10.1109/FPT.2007.4439246}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fpt/GuneysuMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LeanderPPS07, author = {Gregor Leander and Christof Paar and Axel Poschmann and Kai Schramm}, editor = {Alex Biryukov}, title = {New Lightweight {DES} Variants}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {196--210}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_13}, doi = {10.1007/978-3-540-74619-5\_13}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/LeanderPPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/PaarP07, author = {Christof Paar and Axel Poschmann}, editor = {Rainer Koschke and Otthein Herzog and Karl{-}Heinz R{\"{o}}diger and Marc Ronthaler}, title = {Hardware Optimierte Leichtgewichtige Blockchiffren f{\"{u}}r {RFID-} und Sensor-Systeme}, booktitle = {37. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik trifft Logistik, {INFORMATIK} 2007, Bremen, Germany, September 24-27, 2007, Band 2}, series = {{LNI}}, volume = {{P-110}}, pages = {200--204}, publisher = {{GI}}, year = {2007}, url = {https://dl.gi.de/handle/20.500.12116/22480}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/PaarP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/PoschmannLSP07, author = {Axel Poschmann and Gregor Leander and Kai Schramm and Christof Paar}, title = {New Light-Weight Crypto Algorithms for {RFID}}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20 May 2007, New Orleans, Louisiana, {USA}}, pages = {1843--1846}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISCAS.2007.378273}, doi = {10.1109/ISCAS.2007.378273}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/PoschmannLSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/LiuKLP07, author = {Yifei Liu and Timo Kasper and Kerstin Lemke{-}Rust and Christof Paar}, editor = {Robert Meersman and Zahir Tari}, title = {E-Passport: Cracking Basic Access Control Keys}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4804}, pages = {1531--1547}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76843-2\_30}, doi = {10.1007/978-3-540-76843-2\_30}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/LiuKLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/parco/GuneysuPPPSS07, author = {Tim G{\"{u}}neysu and Christof Paar and Jan Pelzl and Gerd Pfeiffer and Manfred Schimmler and Christian Schleiffer}, editor = {Christian H. Bischof and H. Martin B{\"{u}}cker and Paul Gibbon and Gerhard R. Joubert and Thomas Lippert and Bernd Mohr and Frans J. Peters}, title = {Parallel Computing with Low-Cost FPGAs: {A} Framework for {COPACOBANA}}, booktitle = {Parallel Computing: Architectures, Algorithms and Applications, ParCo 2007, Forschungszentrum J{\"{u}}lich and {RWTH} Aachen University, Germany, 4-7 September 2007}, series = {Advances in Parallel Computing}, volume = {15}, pages = {741--748}, publisher = {{IOS} Press}, year = {2007}, timestamp = {Mon, 16 Feb 2009 08:47:23 +0100}, biburl = {https://dblp.org/rec/conf/parco/GuneysuPPPSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/RegazzoniBEGPDMPPLI07, author = {Francesco Regazzoni and St{\'{e}}phane Badel and Thomas Eisenbarth and Johann Gro{\ss}sch{\"{a}}dl and Axel Poschmann and Zeynep Toprak Deniz and Marco Macchetti and Laura Pozzi and Christof Paar and Yusuf Leblebici and Paolo Ienne}, editor = {Holger Blume and Georgi Gaydadjiev and C. John Glossner and Peter M. W. Knijnenburg}, title = {A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to {CMOS} and {MCML} Technologies}, booktitle = {Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation {(IC-SAMOS} 2007), Samos, Greece, July 16-19, 2007}, pages = {209--214}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICSAMOS.2007.4285753}, doi = {10.1109/ICSAMOS.2007.4285753}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/samos/RegazzoniBEGPDMPPLI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/GuneysuPS07, author = {Tim G{\"{u}}neysu and Christof Paar and Sven Sch{\"{a}}ge}, editor = {Stefan Lucks and Ahmad{-}Reza Sadeghi and Christopher Wolf}, title = {Efficient Hash Collision Search Strategies on Special-Purpose Hardware}, booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4945}, pages = {39--51}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88353-1\_4}, doi = {10.1007/978-3-540-88353-1\_4}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/weworc/GuneysuPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KasperCP07, author = {Timo Kasper and Dario Carluccio and Christof Paar}, editor = {Damien Sauveron and Constantinos Markantonakis and Angelos Bilas and Jean{-}Jacques Quisquater}, title = {An Embedded System for Practical Security Analysis of Contactless Smartcards}, booktitle = {Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG} 11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4462}, pages = {150--160}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72354-7\_13}, doi = {10.1007/978-3-540-72354-7\_13}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KasperCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/KumarWP06, author = {Sandeep S. Kumar and Thomas J. Wollinger and Christof Paar}, title = {Optimum Digit Serial GF(2{\^{}}m) Multipliers for Curve-Based Cryptography}, journal = {{IEEE} Trans. Computers}, volume = {55}, number = {10}, pages = {1306--1311}, year = {2006}, url = {https://doi.org/10.1109/TC.2006.165}, doi = {10.1109/TC.2006.165}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/KumarWP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LemkePS06, author = {Kerstin Lemke and Christof Paar and Ahmad{-}Reza Sadeghi}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Physical Security Bounds Against Tampering}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {253--267}, year = {2006}, url = {https://doi.org/10.1007/11767480\_17}, doi = {10.1007/11767480\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LemkePS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdes/KumarPPPS06, author = {Sandeep S. Kumar and Christof Paar and Jan Pelzl and Gerd Pfeiffer and Manfred Schimmler}, editor = {Hamid R. Arabnia and Mary Mehrnoosh Eshaghian{-}Wilner}, title = {A Configuration Concept for a Massively Parallel {FPGA} Architecture}, booktitle = {Proceedings of the 2006 International Conference on Computer Design {\&} Conference on Computing in Nanotechnology, {CDES} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {207--212}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 04 May 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdes/KumarPPPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GierlichsLP06, author = {Benedikt Gierlichs and Kerstin Lemke{-}Rust and Christof Paar}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Templates vs. Stochastic Methods}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {15--29}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_2}, doi = {10.1007/11894063\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GierlichsLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KumarPPPS06, author = {Sandeep S. Kumar and Christof Paar and Jan Pelzl and Gerd Pfeiffer and Manfred Schimmler}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Breaking Ciphers with {COPACOBANA} - {A} Cost-Optimized Parallel Code Breaker}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {101--118}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_9}, doi = {10.1007/11894063\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KumarPPPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SchrammP06, author = {Kai Schramm and Christof Paar}, editor = {David Pointcheval}, title = {Higher Order Masking of the {AES}}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {208--225}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_14}, doi = {10.1007/11605805\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SchrammP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/BogdanovM06, author = {Andrey Bogdanov and M. C. Mertens and Christof Paar and Jan Pelzl and Andy Rupp}, title = {A Parallel Hardware Architecture for fast Gaussian Elimination over {GF(2)}}, booktitle = {14th {IEEE} Symposium on Field-Programmable Custom Computing Machines {(FCCM} 2006), 24-26 April 2006, Napa, CA, USA, Proceedings}, pages = {237--248}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FCCM.2006.12}, doi = {10.1109/FCCM.2006.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/BogdanovM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/KumarPPPS06, author = {Sandeep S. Kumar and Christof Paar and Jan Pelzl and Gerd Pfeiffer and Manfred Schimmler}, title = {{COPACOBANA} {A} Cost-Optimized Special-Purpose Hardware for Code-Breaking}, booktitle = {14th {IEEE} Symposium on Field-Programmable Custom Computing Machines {(FCCM} 2006), 24-26 April 2006, Napa, CA, USA, Proceedings}, pages = {311--312}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FCCM.2006.34}, doi = {10.1109/FCCM.2006.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/KumarPPPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/Lemke-RustP06, author = {Kerstin Lemke{-}Rust and Christof Paar}, editor = {Luca Breveglieri and Israel Koren and David Naccache and Jean{-}Pierre Seifert}, title = {An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices}, booktitle = {Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4236}, pages = {131--143}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889700\_13}, doi = {10.1007/11889700\_13}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/Lemke-RustP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/WollingerBBP06, author = {Thomas J. Wollinger and Guido Bertoni and Luca Breveglieri and Christof Paar}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Performance of {HECC} Coprocessors Using Inversion-Free Formulae}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {1004--1012}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_105}, doi = {10.1007/11751595\_105}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/WollingerBBP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/ElbirtP06, author = {Adam J. Elbirt and Christof Paar}, title = {Efficient Implementation of Galois Field Fixed Field Constant Multiplication}, booktitle = {Third International Conference on Information Technology: New Generations {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}}, pages = {172--177}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ITNG.2006.59}, doi = {10.1109/ITNG.2006.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/ElbirtP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/CarluccioLPS06, author = {Dario Carluccio and Kerstin Lemke{-}Rust and Christof Paar and Ahmad{-}Reza Sadeghi}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {E-Passport: The Global Traceability Or How to Feel Like a {UPS} Package}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {391--404}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_30}, doi = {10.1007/978-3-540-71093-6\_30}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/CarluccioLPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeimerskirchP06, author = {Andr{\'{e}} Weimerskirch and Christof Paar}, title = {Generalizations of the Karatsuba Algorithm for Efficient Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2006}, url = {http://eprint.iacr.org/2006/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeimerskirchP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/WesthoffLPW05, author = {Dirk Westhoff and Bernd Lamparter and Christof Paar and Andr{\'{e}} Weimerskirch}, title = {On digital signatures in ad hoc networks}, journal = {Eur. Trans. Telecommun.}, volume = {16}, number = {5}, pages = {411--425}, year = {2005}, url = {https://doi.org/10.1002/ett.1061}, doi = {10.1002/ETT.1061}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/WesthoffLPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/WollingerPP05, author = {Thomas J. Wollinger and Jan Pelzl and Christof Paar}, title = {Cantor versus Harley: Optimization and Analysis of Explicit Formulae for Hyperelliptic Curve Cryptosystems}, journal = {{IEEE} Trans. Computers}, volume = {54}, number = {7}, pages = {861--872}, year = {2005}, url = {https://doi.org/10.1109/TC.2005.109}, doi = {10.1109/TC.2005.109}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/WollingerPP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ElbirtP05, author = {Adam J. Elbirt and Christof Paar}, title = {An Instruction-Level Distributed Processor for Symmetric-Key Cryptography}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {16}, number = {5}, pages = {468--480}, year = {2005}, url = {https://doi.org/10.1109/TPDS.2005.51}, doi = {10.1109/TPDS.2005.51}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ElbirtP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchindlerLP05, author = {Werner Schindler and Kerstin Lemke and Christof Paar}, editor = {Josyula R. Rao and Berk Sunar}, title = {A Stochastic Model for Differential Side Channel Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {30--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_3}, doi = {10.1007/11545262\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/SchindlerLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FrankeKPPPS05, author = {Jens Franke and Thorsten Kleinjung and Christof Paar and Jan Pelzl and Christine Priplata and Colin Stahlke}, editor = {Josyula R. Rao and Berk Sunar}, title = {{SHARK:} {A} Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {119--130}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_9}, doi = {10.1007/11545262\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FrankeKPPPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/AmanorBPPS05, author = {David Narh Amanor and Viktor Bunimov and Christof Paar and Jan Pelzl and Manfred Schimmler}, editor = {Tero Rissa and Steven J. E. Wilton and Philip Heng Wai Leong}, title = {Efficient Hardware Architectures for Modular Multiplication on FPGAs}, booktitle = {Proceedings of the 2005 International Conference on Field Programmable Logic and Applications (FPL), Tampere, Finland, August 24-26, 2005}, pages = {539--542}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/FPL.2005.1515780}, doi = {10.1109/FPL.2005.1515780}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/AmanorBPPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfWP05, author = {Marko Wolf and Andr{\'{e}} Weimerskirch and Christof Paar}, editor = {Hannes Federrath}, title = {Digital Rights Management Systeme {(DRMS)} als Enabling Technology im Automobil}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {193--196}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28371}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2004, editor = {Claude Castelluccia and Hannes Hartenstein and Christof Paar and Dirk Westhoff}, title = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS} 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3313}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b105219}, doi = {10.1007/B105219}, isbn = {3-540-24396-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/LemkeP05, author = {Kerstin Lemke and Christof Paar}, editor = {Henk C. A. van Tilborg}, title = {Physical Attacks}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_300}, doi = {10.1007/0-387-23483-7\_300}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/LemkeP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Paar05, author = {Christof Paar}, editor = {Henk C. A. van Tilborg}, title = {Exponentiation Algorithms}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_150}, doi = {10.1007/0-387-23483-7\_150}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Paar05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Paar05a, author = {Christof Paar}, editor = {Henk C. A. van Tilborg}, title = {Inversion in Finite Fields and Rings}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_207}, doi = {10.1007/0-387-23483-7\_207}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Paar05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Paar05b, author = {Christof Paar}, editor = {Henk C. A. van Tilborg}, title = {Optimal Extension Fields (OEFs)}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_289}, doi = {10.1007/0-387-23483-7\_289}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Paar05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/WollingerPWPSK04, author = {Thomas J. Wollinger and Jan Pelzl and Volker Wittelsberger and Christof Paar and G{\"{o}}kay Saldamli and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Elliptic and hyperelliptic curves on embedded {\(\mathrm{\mu}\)}P}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {3}, number = {3}, pages = {509--533}, year = {2004}, url = {https://doi.org/10.1145/1015047.1015051}, doi = {10.1145/1015047.1015051}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/WollingerPWPSK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/WollingerGP04, author = {Thomas J. Wollinger and Jorge Guajardo and Christof Paar}, title = {Security on FPGAs: State-of-the-art implementations and attacks}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {3}, number = {3}, pages = {534--574}, year = {2004}, url = {https://doi.org/10.1145/1015047.1015052}, doi = {10.1145/1015047.1015052}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/WollingerGP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/GrossschadlKP04, author = {Johann Gro{\ss}sch{\"{a}}dl and Sandeep S. Kumar and Christof Paar}, title = {Architectural Support for Arithmetic in Optimal Extension Fields}, booktitle = {15th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2004), 27-29 September 2004, Galveston, TX, {USA}}, pages = {111--124}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/ASAP.2004.10004}, doi = {10.1109/ASAP.2004.10004}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/GrossschadlKP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchrammLFP04, author = {Kai Schramm and Gregor Leander and Patrick Felke and Christof Paar}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {A Collision-Attack on {AES:} Combining Side Channel- and Differential-Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {163--175}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_12}, doi = {10.1007/978-3-540-28632-5\_12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SchrammLFP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LemkeSP04, author = {Kerstin Lemke and Kai Schramm and Christof Paar}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {{DPA} on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {205--219}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_15}, doi = {10.1007/978-3-540-28632-5\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LemkeSP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaESA/BarteskaPPWW04, author = {E. Barteska and Christof Paar and Jan Pelzl and Volker Wittelsberger and Thomas J. Wollinger}, editor = {Hamid R. Arabnia and Minyi Guo and Laurence Tianruo Yang}, title = {Case Study: Compiler Comparison for an Embedded Cryptographical Application}, booktitle = {Proceedings of the International Conference on Embedded Systems and Applications, {ESA} '04 {\&} Proceedings of the International Conference on VLSI, {VLSI} '04, June 21-24, 2004, Las Vegas, Nevada, {USA}}, pages = {589--595}, publisher = {{CSREA} Press}, year = {2004}, timestamp = {Thu, 16 Jun 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaESA/BarteskaPPWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/KumarP04, author = {Sandeep S. Kumar and Christof Paar}, editor = {J{\"{u}}rgen Becker and Marco Platzner and Serge Vernalde}, title = {Reconfigurable Instruction Set Extension for Enabling {ECC} on an 8-Bit Processor}, booktitle = {Field Programmable Logic and Application, 14th International Conference , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3203}, pages = {586--595}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30117-2\_60}, doi = {10.1007/978-3-540-30117-2\_60}, timestamp = {Fri, 19 Jul 2019 13:02:47 +0200}, biburl = {https://dblp.org/rec/conf/fpl/KumarP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/SchrammP04, author = {Kai Schramm and Christof Paar}, title = {{IT} Security Project: Implementation of the Advanced Encryption Standard {(AES)} on a Smart Card}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {176--180}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286446}, doi = {10.1109/ITCC.2004.1286446}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/SchrammP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/PelzlWP04, author = {Jan Pelzl and Thomas J. Wollinger and Christof Paar}, title = {High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus Two}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {513--517}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286706}, doi = {10.1109/ITCC.2004.1286706}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/PelzlWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/BertoniBWP04, author = {Guido Bertoni and Luca Breveglieri and Thomas J. Wollinger and Christof Paar}, title = {Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {538}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286710}, doi = {10.1109/ITCC.2004.1286710}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/BertoniBWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimWCCP04, author = {Howon Kim and Thomas J. Wollinger and YongJe Choi and Kyoil Chung and Christof Paar}, editor = {Chae Hoon Lim and Moti Yung}, title = {Hyperelliptic Curve Coprocessors on a {FPGA}}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {360--374}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_29}, doi = {10.1007/978-3-540-31815-6\_29}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimWCCP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniBWP04, author = {Guido Bertoni and Luca Breveglieri and Thomas J. Wollinger and Christof Paar}, title = {Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2004}, url = {http://eprint.iacr.org/2004/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniBWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/KocP03, author = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Guest Editors' Introduction to the Special Section on Cryptographic Hardware and Embedded Systems}, journal = {{IEEE} Trans. Computers}, volume = {52}, number = {4}, pages = {401--402}, year = {2003}, url = {https://doi.org/10.1109/TC.2003.1190580}, doi = {10.1109/TC.2003.1190580}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/KocP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PelzlWGP03, author = {Jan Pelzl and Thomas J. Wollinger and Jorge Guajardo and Christof Paar}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {351--365}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_28}, doi = {10.1007/978-3-540-45238-6\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/PelzlWGP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BertoniGKOPW03, author = {Guido Bertoni and Jorge Guajardo and Sandeep S. Kumar and Gerardo Orlando and Christof Paar and Thomas J. Wollinger}, editor = {Marc Joye}, title = {Efficient GF(p\({}^{\mbox{m}}\)) Arithmetic Architectures for Cryptographic Applications}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {158--175}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_11}, doi = {10.1007/3-540-36563-X\_11}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/BertoniGKOPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/WollingerP03, author = {Thomas J. Wollinger and Christof Paar}, editor = {Peter Y. K. Cheung and George A. Constantinides and Jos{\'{e}} T. de Sousa}, title = {How Secure Are FPGAs in Cryptographic Applications?}, booktitle = {Field Programmable Logic and Application, 13th International Conference, {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2778}, pages = {91--100}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45234-8\_10}, doi = {10.1007/978-3-540-45234-8\_10}, timestamp = {Tue, 07 May 2024 20:11:13 +0200}, biburl = {https://dblp.org/rec/conf/fpl/WollingerP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SchrammWP03, author = {Kai Schramm and Thomas J. Wollinger and Christof Paar}, editor = {Thomas Johansson}, title = {A New Class of Collision Attacks and Its Application to {DES}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {206--222}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_16}, doi = {10.1007/978-3-540-39887-5\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/SchrammWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/PaarW03, author = {Christof Paar and Thomas J. Wollinger}, editor = {Klaus R. Dittrich and Wolfgang K{\"{o}}nig and Andreas Oberweis and Kai Rannenberg and Wolfgang Wahlster}, title = {Eingebettete Sicherheit und Kryptographie im Automobil: Eine Einf{\"{u}}hrung}, booktitle = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Innovative Informatikanwendungen, {INFORMATIK} 2003, Frankfurt am Main, Germany, September 29 - October 2, 2003, Band 1}, series = {{LNI}}, volume = {{P-34}}, pages = {325--329}, publisher = {{GI}}, year = {2003}, url = {https://dl.gi.de/handle/20.500.12116/29791}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/PaarW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/ElbirtP03, author = {Adam J. Elbirt and Christof Paar}, title = {Instruction-Level Distributed Processing for Symmetric-Key Cryptography}, booktitle = {17th International Parallel and Distributed Processing Symposium {(IPDPS} 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings}, pages = {78}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IPDPS.2003.1213181}, doi = {10.1109/IPDPS.2003.1213181}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/ElbirtP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PelzlWP03, author = {Jan Pelzl and Thomas J. Wollinger and Christof Paar}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {Low Cost Security: Explicit Formulae for Genus-4 Hyperelliptic Curves}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {1--16}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_1}, doi = {10.1007/978-3-540-24654-1\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PelzlWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2002, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36400-5}, doi = {10.1007/3-540-36400-5}, isbn = {3-540-00409-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2003, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6}, doi = {10.1007/978-3-540-45238-6}, isbn = {3-540-40833-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PelzlWGP03, author = {Jan Pelzl and Thomas J. Wollinger and Jorge Guajardo and Christof Paar}, title = {Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2003}, url = {http://eprint.iacr.org/2003/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PelzlWGP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PelzlWP03, author = {Jan Pelzl and Thomas J. Wollinger and Christof Paar}, title = {Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2003}, url = {http://eprint.iacr.org/2003/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PelzlWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WollingerP03, author = {Thomas J. Wollinger and Christof Paar}, title = {How Secure Are FPGAs in Cryptographic Applications?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2003}, url = {http://eprint.iacr.org/2003/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WollingerP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PelzlWP03a, author = {Jan Pelzl and Thomas J. Wollinger and Christof Paar}, title = {High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2003}, url = {http://eprint.iacr.org/2003/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PelzlWP03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuajardoP02, author = {Jorge Guajardo and Christof Paar}, title = {Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes}, journal = {Des. Codes Cryptogr.}, volume = {25}, number = {2}, pages = {207--216}, year = {2002}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuajardoP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/WollingerP02, author = {Thomas J. Wollinger and Christof Paar}, title = {Hardware architectures proposed for cryptosystems based on hyperelliptic curves}, booktitle = {Proceedings of the 2002 9th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2002, Dubrovnik, Croatia, September 15-18, 2002}, pages = {1159--1162}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ICECS.2002.1046458}, doi = {10.1109/ICECS.2002.1046458}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/WollingerP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BaileyP01, author = {Daniel V. Bailey and Christof Paar}, title = {Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography}, journal = {J. Cryptol.}, volume = {14}, number = {3}, pages = {153--176}, year = {2001}, url = {https://doi.org/10.1007/s001450010012}, doi = {10.1007/S001450010012}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BaileyP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BlumP01, author = {Thomas Blum and Christof Paar}, title = {High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware}, journal = {{IEEE} Trans. Computers}, volume = {50}, number = {7}, pages = {759--764}, year = {2001}, url = {https://doi.org/10.1109/12.936241}, doi = {10.1109/12.936241}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/BlumP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/ElbirtYCP01, author = {Adam J. Elbirt and W. Yip and B. Chetwynd and Christof Paar}, title = {An FPGA-based performance evaluation of the {AES} block cipher candidate algorithm finalists}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {9}, number = {4}, pages = {545--557}, year = {2001}, url = {https://doi.org/10.1109/92.931230}, doi = {10.1109/92.931230}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/ElbirtYCP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeimerskirchPS01, author = {Andr{\'{e}} Weimerskirch and Christof Paar and Sheueling Chang Shantz}, editor = {Vijay Varadharajan and Yi Mu}, title = {Elliptic Curve Cryptography on a Palm {OS} Device}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {502--513}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_39}, doi = {10.1007/3-540-47719-5\_39}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WeimerskirchPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrlandoP01, author = {Gerardo Orlando and Christof Paar}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {348--363}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_29}, doi = {10.1007/3-540-44709-1\_29}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/OrlandoP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GuajardoBKP01, author = {Jorge Guajardo and Rainer Bl{\"{u}}mel and Uwe Krieger and Christof Paar}, editor = {Kwangjo Kim}, title = {Efficient Implementation of Elliptic Curve Cryptosystems on the {TI} {MSP} 430x33x Family of Microcontrollers}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {365--382}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_27}, doi = {10.1007/3-540-44586-2\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GuajardoBKP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2001, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1}, doi = {10.1007/3-540-44709-1}, isbn = {3-540-42521-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/ElbirtYCP00, author = {Adam J. Elbirt and W. Yip and B. Chetwynd and Christof Paar}, title = {An {FPGA} Implementation and Performance Evaluation of the {AES} Block Cipher Candidate Algorithm Finalists}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {13--27}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/ElbirtYCP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/WollingerWGP00, author = {Thomas J. Wollinger and Min Wang and Jorge Guajardo and Christof Paar}, title = {How Well Are High-End DSPs Suited for the {AES} Algorithms? {AES} Algorithms on the TMS320C6x {DSP}}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {94--105}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aes/WollingerWGP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/WoodburyBP00, author = {Adam D. Woodbury and Daniel V. Bailey and Christof Paar}, editor = {Josep Domingo{-}Ferrer and David Chan and Anthony Watson}, title = {Elliptic Curve Cryptography on Smart Cards without Coprocessors}, booktitle = {Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {180}, pages = {71--92}, publisher = {Kluwer}, year = {2000}, timestamp = {Thu, 01 Aug 2002 11:36:41 +0200}, biburl = {https://dblp.org/rec/conf/cardis/WoodburyBP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrlandoP00, author = {Gerardo Orlando and Christof Paar}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A High Performance Reconfigurable Elliptic Curve Processor for GF(2\({}^{\mbox{m}}\))}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, pages = {41--56}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8\_3}, doi = {10.1007/3-540-44499-8\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrlandoP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/ElbirtP00, author = {Adam J. Elbirt and Christof Paar}, editor = {Steve Trimberger and Scott Hauck}, title = {An {FPGA} implementation and performance evaluation of the Serpent block cipher}, booktitle = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable Gate Arrays, {FPGA} 2000, Monterey, CA, USA, February 10-11, 2000}, pages = {33--40}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/329166.329176}, doi = {10.1145/329166.329176}, timestamp = {Tue, 06 Nov 2018 16:58:22 +0100}, biburl = {https://dblp.org/rec/conf/fpga/ElbirtP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2000, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8}, doi = {10.1007/3-540-44499-8}, isbn = {3-540-41455-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KapsP99, author = {Jens{-}Peter Kaps and Christof Paar}, title = {{DES} auf FPGAs - Hochgeschwindigkeits-Architekturen f{\"{u}}r den Data Encryption Standard auf rekonfigurierbarer Hardware}, journal = {Datenschutz und Datensicherheit}, volume = {23}, number = {9}, year = {1999}, timestamp = {Thu, 18 Dec 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KapsP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Paar99, author = {Christof Paar}, title = {Algorithmenunabh{\"{a}}ngige Krypto-Hardware - Moderne Sicherheitsprotokolle erfordern den Wechsel zwischen kryptographischen Algorithmen}, journal = {Datenschutz und Datensicherheit}, volume = {23}, number = {9}, year = {1999}, timestamp = {Thu, 18 Dec 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Paar99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/PaarFS99, author = {Christof Paar and Peter Fleischmann and Pedro Soria{-}Rodriguez}, title = {Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents}, journal = {{IEEE} Trans. Computers}, volume = {48}, number = {10}, pages = {1025--1034}, year = {1999}, url = {https://doi.org/10.1109/12.805153}, doi = {10.1109/12.805153}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/PaarFS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/OrlandoP99, author = {Gerardo Orlando and Christof Paar}, title = {A Super-Serial Galois Fields Multiplier for FPGAs and its Application to Public-Key Algorithms}, booktitle = {7th {IEEE} Symposium on Field-Programmable Custom Computing Machines {(FCCM} '99), 21-23 April 1999, Napa, CA, {USA}}, pages = {232--239}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/FPGA.1999.803685}, doi = {10.1109/FPGA.1999.803685}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/OrlandoP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/1999, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1717}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48059-5}, doi = {10.1007/3-540-48059-5}, isbn = {3-540-66646-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/PaarFR98, author = {Christof Paar and Peter Fleischmann and Peter Roelse}, title = {Efficient Multiplier Architectures for Galois Fields {GF(2} \({}^{\mbox{4n}}\))}, journal = {{IEEE} Trans. Computers}, volume = {47}, number = {2}, pages = {162--170}, year = {1998}, url = {https://doi.org/10.1109/12.663762}, doi = {10.1109/12.663762}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/PaarFR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaileyP98, author = {Daniel V. Bailey and Christof Paar}, editor = {Hugo Krawczyk}, title = {Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {472--485}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055748}, doi = {10.1007/BFB0055748}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaileyP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KapsP98, author = {Jens{-}Peter Kaps and Christof Paar}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Fast {DES} Implementation for FPGAs and Its Application to a Universal Key-Search Machine}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {234--247}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_19}, doi = {10.1007/3-540-48892-8\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KapsP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuajardoP97, author = {Jorge Guajardo and Christof Paar}, editor = {Burton S. Kaliski Jr.}, title = {Efficient Algorithms for Elliptic Curve Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {342--356}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052247}, doi = {10.1007/BFB0052247}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuajardoP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PaarR97, author = {Christof Paar and Pedro Soria{-}Rodriguez}, editor = {Walter Fumy}, title = {Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2\({}^{\mbox{n}}\))\({}^{\mbox{m}}\))}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {363--378}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_25}, doi = {10.1007/3-540-69053-0\_25}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PaarR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/PaarR97, author = {Christof Paar and Martin Rosner}, title = {Comparison of arithmetic architectures for Reed-Solomon decoders in reconfigurable hardware}, booktitle = {5th {IEEE} Symposium on Field-Programmable Custom Computing Machines {(FCCM} '97), 16-18 April 1997, Napa Valley, CA, {USA}}, pages = {219--225}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/FPGA.1997.624622}, doi = {10.1109/FPGA.1997.624622}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/PaarR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Paar96, author = {Christof Paar}, title = {A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composite Fields}, journal = {{IEEE} Trans. Computers}, volume = {45}, number = {7}, pages = {856--861}, year = {1996}, url = {https://doi.org/10.1109/12.508323}, doi = {10.1109/12.508323}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Paar96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Paar94, author = {Christof Paar}, title = {Efficient {VLSI} architectures for bit parallel computation in Galios [Galois] fields}, school = {University of Duisburg-Essen, Germany}, year = {1994}, url = {https://d-nb.info/943307856}, isbn = {978-3-18-332810-9}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Paar94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.