default search action
BibTeX records: Pascal Sasdrich
@article{DBLP:journals/tches/FeldtkellerRSG24, author = {Jakob Feldtkeller and Jan Richter{-}Brockmann and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Combined Threshold Implementation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {307--334}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.307-334}, doi = {10.46586/TCHES.V2024.I4.307-334}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FeldtkellerRSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/HenkesRSHPWBSLF24, author = {Tim Henkes and Steffen Reith and Marc St{\"{o}}ttinger and Norbert Herfurth and Goran Panic and Julian W{\"{a}}lde and Fabian Buschkowski and Pascal Sasdrich and Christoph L{\"{u}}th and Milan Funck and Tuba Kiyan and Arnd Weber and Detlef Boeck and Ren{\'{e}} Rathfelder and Torsten Grawunder}, title = {Evaluating an Open-Source Hardware Approach from {HDL} to {GDS} for a Security Chip Design - a Review of the Final Stage of Project {HEP}}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2024, Valencia, Spain, March 25-27, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://ieeexplore.ieee.org/document/10546500}, timestamp = {Mon, 17 Jun 2024 14:45:14 +0200}, biburl = {https://dblp.org/rec/conf/date/HenkesRSHPWBSLF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuschkowskiLRSG24, author = {Fabian Buschkowski and Georg Land and Jan Richter{-}Brockmann and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {{HADES:} Automated Hardware Design Exploration for Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2024}, url = {https://eprint.iacr.org/2024/130}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuschkowskiLRSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeldtkellerRSG24, author = {Jakob Feldtkeller and Jan Richter{-}Brockmann and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Combined Threshold Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2024}, url = {https://eprint.iacr.org/2024/365}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FeldtkellerRSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidFGGRRST24, author = {Sonia Bela{\"{\i}}d and Jakob Feldtkeller and Tim G{\"{u}}neysu and Anna Guinet and Jan Richter{-}Brockmann and Matthieu Rivain and Pascal Sasdrich and Abdul Rahman Taleb}, title = {Formal Definition and Verification for Combined Random Fault and Random Probing Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {757}, year = {2024}, url = {https://eprint.iacr.org/2024/757}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidFGGRRST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeierleFGGLRS24, author = {Christof Beierle and Jakob Feldtkeller and Anna Guinet and Tim G{\"{u}}neysu and Gregor Leander and Jan Richter{-}Brockmann and Pascal Sasdrich}, title = {{INDIANA} - Verifying (Random) Probing Security through Indistinguishability Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {833}, year = {2024}, url = {https://eprint.iacr.org/2024/833}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeierleFGGLRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/RichterBrockmannSG23, author = {Jan Richter{-}Brockmann and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice}, journal = {{IEEE} Trans. Computers}, volume = {72}, number = {2}, pages = {572--585}, year = {2023}, url = {https://doi.org/10.1109/TC.2022.3164259}, doi = {10.1109/TC.2022.3164259}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/RichterBrockmannSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/StolzTSG23, author = {Florian Stolz and Jan Philipp Thoma and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Risky Translations: Securing TLBs against Timing Side Channels}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {1--31}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.1-31}, doi = {10.46586/TCHES.V2023.I1.1-31}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/StolzTSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/FeldtkellerSG23, author = {Jakob Feldtkeller and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Challenges and Opportunities of Security-Aware {EDA}}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {22}, number = {3}, pages = {43:1--43:34}, year = {2023}, url = {https://doi.org/10.1145/3576199}, doi = {10.1145/3576199}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/FeldtkellerSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/StolzFSG23, author = {Florian Stolz and Marc Fyrbiak and Pascal Sasdrich and Tim G{\"{u}}neysu}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Recommendation for a Holistic Secure Embedded {ISA} Extension}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13906}, pages = {62--84}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33491-7\_3}, doi = {10.1007/978-3-031-33491-7\_3}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/StolzFSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeldtkellerGMRS23, author = {Jakob Feldtkeller and Tim G{\"{u}}neysu and Thorben Moos and Jan Richter{-}Brockmann and Sayandeep Saha and Pascal Sasdrich and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Combined Private Circuits - Combined Security Refurbished}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {990--1004}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623129}, doi = {10.1145/3576915.3623129}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FeldtkellerGMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BuschkowskiSG23, author = {Fabian Buschkowski and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {EasiMask-Towards Efficient, Automated, and Secure Implementation of Masking in Hardware}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2023, Antwerp, Belgium, April 17-19, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/DATE56975.2023.10137330}, doi = {10.23919/DATE56975.2023.10137330}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/BuschkowskiSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StolzFSG23, author = {Florian Stolz and Marc Fyrbiak and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Recommendation for a holistic secure embedded {ISA} extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2023}, url = {https://eprint.iacr.org/2023/022}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/StolzFSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeldtkellerGMRSSS23, author = {Jakob Feldtkeller and Tim G{\"{u}}neysu and Thorben Moos and Jan Richter{-}Brockmann and Sayandeep Saha and Pascal Sasdrich and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Combined Private Circuits - Combined Security Refurbished}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1341}, year = {2023}, url = {https://eprint.iacr.org/2023/1341}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeldtkellerGMRSSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KnichelSM22, author = {David Knichel and Pascal Sasdrich and Amir Moradi}, title = {Generic Hardware Private Circuits Towards Automated Generation of Composable Secure Gadgets}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {323--344}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.323-344}, doi = {10.46586/TCHES.V2022.I1.323-344}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KnichelSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KnichelMMS22, author = {David Knichel and Amir Moradi and Nicolai M{\"{u}}ller and Pascal Sasdrich}, title = {Automated Generation of Masked Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {589--629}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.589-629}, doi = {10.46586/TCHES.V2022.I1.589-629}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KnichelMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MullerKSM22, author = {Nicolai M{\"{u}}ller and David Knichel and Pascal Sasdrich and Amir Moradi}, title = {Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {266--288}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.266-288}, doi = {10.46586/TCHES.V2022.I2.266-288}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MullerKSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FeldtkellerKSMG22, author = {Jakob Feldtkeller and David Knichel and Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {Randomness Optimization for Gadget Compositions in Higher-Order Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {188--227}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.188-227}, doi = {10.46586/TCHES.V2022.I4.188-227}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FeldtkellerKSMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Richter-Brockmann22a, author = {Jan Richter{-}Brockmann and Jakob Feldtkeller and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {{VERICA} - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {255--284}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.255-284}, doi = {10.46586/TCHES.V2022.I4.255-284}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Richter-Brockmann22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeldtkellerRSG22, author = {Jakob Feldtkeller and Jan Richter{-}Brockmann and Pascal Sasdrich and Tim G{\"{u}}neysu}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{CINI} {MINIS:} Domain Isolation for Fault and Combined Security}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1023--1036}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560614}, doi = {10.1145/3548606.3560614}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FeldtkellerRSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MullerKSM22, author = {Nicolai M{\"{u}}ller and David Knichel and Pascal Sasdrich and Amir Moradi}, title = {Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2022}, url = {https://eprint.iacr.org/2022/023}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MullerKSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Richter-Brockmann22, author = {Jan Richter{-}Brockmann and Jakob Feldtkeller and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {{VERICA} - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2022}, url = {https://eprint.iacr.org/2022/484}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Richter-Brockmann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeldtkellerKS0G22, author = {Jakob Feldtkeller and David Knichel and Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {Randomness Optimization for Gadget Compositions in Higher-Order Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {882}, year = {2022}, url = {https://eprint.iacr.org/2022/882}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeldtkellerKS0G22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeldtkellerRSG22, author = {Jakob Feldtkeller and Jan Richter{-}Brockmann and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {{CINI} {MINIS:} Domain Isolation for Fault and Combined Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1131}, year = {2022}, url = {https://eprint.iacr.org/2022/1131}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeldtkellerRSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StolzTSG22, author = {Florian Stolz and Jan Philipp Thoma and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Risky Translations: Securing TLBs against Timing Side Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1394}, year = {2022}, url = {https://eprint.iacr.org/2022/1394}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StolzTSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Richter-Brockmann21, author = {Jan Richter{-}Brockmann and Aein Rezaei Shahmirzadi and Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {{FIVER} - Robust Verification of Countermeasures against Fault Injections}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {447--473}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.447-473}, doi = {10.46586/TCHES.V2021.I4.447-473}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Richter-Brockmann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/LandSG21, author = {Georg Land and Pascal Sasdrich and Tim G{\"{u}}neysu}, editor = {Vincent Grosso and Thomas P{\"{o}}ppelmann}, title = {A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware}, booktitle = {Smart Card Research and Advanced Applications - 20th International Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13173}, pages = {210--230}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97348-3\_12}, doi = {10.1007/978-3-030-97348-3\_12}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/LandSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KnichelS021, author = {David Knichel and Pascal Sasdrich and Amir Moradi}, title = {Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2021}, url = {https://eprint.iacr.org/2021/247}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KnichelS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Richter-Brockmann21, author = {Jan Richter{-}Brockmann and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2021}, url = {https://eprint.iacr.org/2021/296}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Richter-Brockmann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LandSG21, author = {Georg Land and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2021}, url = {https://eprint.iacr.org/2021/355}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LandSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KnichelMMS21, author = {David Knichel and Amir Moradi and Nicolai M{\"{u}}ller and Pascal Sasdrich}, title = {Automated Generation of Masked Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2021}, url = {https://eprint.iacr.org/2021/569}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KnichelMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Richter-Brockmann21a, author = {Jan Richter{-}Brockmann and Aein Rezaei Shahmirzadi and Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {{FIVER} - Robust Verification of Countermeasures against Fault Injections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {936}, year = {2021}, url = {https://eprint.iacr.org/2021/936}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Richter-Brockmann21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SasdrichBHM20, author = {Pascal Sasdrich and Beg{\"{u}}l Bilgin and Michael Hutter and Mark E. Marson}, title = {Low-Latency Hardware Masking with Application to {AES}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {300--326}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.300-326}, doi = {10.13154/TCHES.V2020.I2.300-326}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SasdrichBHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeierleJKLMPSSS20, author = {Christof Beierle and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, title = {{SKINNY-AEAD} and SKINNY-Hash}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {88--131}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.88-131}, doi = {10.13154/TOSC.V2020.IS1.88-131}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BeierleJKLMPSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Richter-Brockmann20, author = {Jan Richter{-}Brockmann and Pascal Sasdrich and Florian Bache and Tim G{\"{u}}neysu}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Concurrent error detection revisited: hardware protection against fault and side-channel attacks}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {20:1--20:11}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407046}, doi = {10.1145/3407023.3407046}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Richter-Brockmann20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnichelS020, author = {David Knichel and Pascal Sasdrich and Amir Moradi}, editor = {Shiho Moriai and Huaxiong Wang}, title = {{SILVER} - Statistical Independence and Leakage Verification}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {787--816}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_26}, doi = {10.1007/978-3-030-64837-4\_26}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnichelS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichBHM20, author = {Pascal Sasdrich and Beg{\"{u}}l Bilgin and Michael Hutter and Mark E. Marson}, title = {Low-Latency Hardware Masking with Application to {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2020}, url = {https://eprint.iacr.org/2020/051}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichBHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KnichelSM20, author = {David Knichel and Pascal Sasdrich and Amir Moradi}, title = {{SILVER} - Statistical Independence and Leakage Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2020}, url = {https://eprint.iacr.org/2020/634}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KnichelSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Sasdrich18, author = {Pascal Sasdrich}, title = {Cryptographic hardware agility for physical protection}, school = {Ruhr University Bochum, Germany}, year = {2018}, url = {https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/5663}, urn = {urn:nbn:de:hbz:294-56631}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Sasdrich18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/SasdrichG18, author = {Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Exploring {RFC} 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection}, journal = {J. Hardw. Syst. Secur.}, volume = {2}, number = {4}, pages = {297--313}, year = {2018}, url = {https://doi.org/10.1007/s41635-018-0048-z}, doi = {10.1007/S41635-018-0048-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/SasdrichG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/SasdrichH18, author = {Pascal Sasdrich and Michael Hutter}, editor = {Junfeng Fan and Benedikt Gierlichs}, title = {Protecting Triple-DES Against {DPA} - {A} Practical Application of Domain-Oriented Masking}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10815}, pages = {207--226}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89641-0\_12}, doi = {10.1007/978-3-319-89641-0\_12}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/SasdrichH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/SasdrichB018, author = {Pascal Sasdrich and Ren{\'{e}} Bock and Amir Moradi}, editor = {Junfeng Fan and Benedikt Gierlichs}, title = {Threshold Implementation in Software - Case Study of {PRESENT}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10815}, pages = {227--244}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89641-0\_13}, doi = {10.1007/978-3-319-89641-0\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/SasdrichB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichB018, author = {Pascal Sasdrich and Ren{\'{e}} Bock and Amir Moradi}, title = {Threshold Implementation in Software - Case Study of {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2018}, url = {http://eprint.iacr.org/2018/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JeanMPS17, author = {J{\'{e}}r{\'{e}}my Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich}, editor = {Wieland Fischer and Naofumi Homma}, title = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {687--707}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_33}, doi = {10.1007/978-3-319-66787-4\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JeanMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Sasdrich0G17, author = {Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, editor = {Helena Handschuh}, title = {Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {131--146}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_8}, doi = {10.1007/978-3-319-52153-4\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Sasdrich0G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/SasdrichG17, author = {Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Cryptography for Next Generation {TLS:} Implementing the {RFC} 7748 Elliptic Curve448 Cryptosystem in Hardware}, booktitle = {Proceedings of the 54th Annual Design Automation Conference, {DAC} 2017, Austin, TX, USA, June 18-22, 2017}, pages = {16:1--16:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3061639.3062222}, doi = {10.1145/3061639.3062222}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/SasdrichG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanMPS17, author = {J{\'{e}}r{\'{e}}my Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich}, title = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2017}, url = {http://eprint.iacr.org/2017/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/SasdrichG16, author = {Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {A grain in the silicon: SCA-protected {AES} in less than 30 slices}, booktitle = {27th {IEEE} International Conference on Application-specific Systems, Architectures and Processors, {ASAP} 2016, London, United Kingdom, July 6-8, 2016}, pages = {25--32}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ASAP.2016.7760769}, doi = {10.1109/ASAP.2016.7760769}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/SasdrichG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeierleJKL0PSSS16, author = {Christof Beierle and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, editor = {Matthew Robshaw and Jonathan Katz}, title = {The {SKINNY} Family of Block Ciphers and Its Low-Latency Variant {MANTIS}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {123--153}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_5}, doi = {10.1007/978-3-662-53008-5\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeierleJKL0PSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Sasdrich0G16, author = {Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, editor = {Thomas Peyrin}, title = {White-Box Cryptography in the Gray Box - - {A} Hardware Implementation and its Side Channels -}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {185--203}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_10}, doi = {10.1007/978-3-662-52993-5\_10}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/Sasdrich0G16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichMG16, author = {Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {White-Box Cryptography in the Gray Box - {A} Hardware Implementation and its Side Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2016}, url = {http://eprint.iacr.org/2016/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichG16, author = {Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Closing the Gap in {RFC} 7748: Implementing Curve448 in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2016}, url = {http://eprint.iacr.org/2016/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeierleJKL0PSSS16, author = {Christof Beierle and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, title = {The {SKINNY} Family of Block Ciphers and its Low-Latency Variant {MANTIS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2016}, url = {http://eprint.iacr.org/2016/660}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeierleJKL0PSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichMG16a, author = {Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1111}, year = {2016}, url = {http://eprint.iacr.org/2016/1111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichMG16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/SasdrichG15, author = {Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {9}, number = {1}, pages = {3:1--3:15}, year = {2015}, url = {https://doi.org/10.1145/2700834}, doi = {10.1145/2700834}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/SasdrichG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/SasdrichMMG15, author = {Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim G{\"{u}}neysu}, editor = {Stefan Mangard and Axel Y. Poschmann}, title = {Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9064}, pages = {95--107}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21476-4\_7}, doi = {10.1007/978-3-319-21476-4\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/SasdrichMMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/SasdrichMMG15, author = {Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim G{\"{u}}neysu}, title = {Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {130--136}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140251}, doi = {10.1109/HST.2015.7140251}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/SasdrichMMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SasdrichMG15, author = {Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, editor = {Orr Dunkelman and Liam Keliher}, title = {Affine Equivalence and Its Application to Tightening Threshold Implementations}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {263--276}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_16}, doi = {10.1007/978-3-319-31301-6\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SasdrichMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichMMG15, author = {Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim G{\"{u}}neysu}, title = {Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2015}, url = {http://eprint.iacr.org/2015/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichMMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichMMG15a, author = {Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim G{\"{u}}neysu}, title = {Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2015}, url = {http://eprint.iacr.org/2015/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichMMG15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichMG15, author = {Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {Affine Equivalence and its Application to Tightening Threshold Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {749}, year = {2015}, url = {http://eprint.iacr.org/2015/749}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/SasdrichG14, author = {Pascal Sasdrich and Tim G{\"{u}}neysu}, editor = {Diana Goehringer and Marco Domenico Santambrogio and Jo{\~{a}}o M. P. Cardoso and Koen Bertels}, title = {Efficient Elliptic-Curve Cryptography Using Curve25519 on Reconfigurable Devices}, booktitle = {Reconfigurable Computing: Architectures, Tools, and Applications - 10th International Symposium, {ARC} 2014, Vilamoura, Portugal, April 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8405}, pages = {25--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05960-0\_3}, doi = {10.1007/978-3-319-05960-0\_3}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/SasdrichG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/GuneysuRSW14, author = {Tim G{\"{u}}neysu and Francesco Regazzoni and Pascal Sasdrich and Marcin W{\'{o}}jcik}, title = {{THOR} - The hardware onion router}, booktitle = {24th International Conference on Field Programmable Logic and Applications, {FPL} 2014, Munich, Germany, 2-4 September, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/FPL.2014.6927408}, doi = {10.1109/FPL.2014.6927408}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/GuneysuRSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.