Tim Güneysu
Tim Erhan Güneysu
Person information
- affiliation: Ruhr University of Bochum, Germany
- affiliation: German Research Center for Artificial Intelligence (DFKI), Bremen, Germany
- affiliation: University of Bremen, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
Books and Theses
- 2009
- [b1]Tim Erhan Güneysu:
Cryptography and cryptanalysis on reconfigurable devices: security implementations for hardware and reprogrammable devices. Ruhr University Bochum 2009, ISBN 978-3-89966-338-9, pp. 1-210
Journal Articles
- 2018
- [j22]Alexander Wild, Amir Moradi, Tim Güneysu:
GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs. IEEE Trans. Computers 67(3): 375-387 (2018) - [j21]Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu:
Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 142-174 (2018) - 2017
- [j20]Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things. IEEE Access 5: 11909-11926 (2017) - [j19]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptographic Engineering 7(2): 149-165 (2017) - [j18]Jingwei Hu, Ray C. C. Cheung, Tim Güneysu:
Compact Constant Weight Coding Engines for the Code-Based Cryptography. IEEE Trans. on Circuits and Systems 64-II(9): 1092-1096 (2017) - [j17]Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers. ACM Trans. Embedded Comput. Syst. 16(4): 117:1-117:24 (2017) - 2016
- [j16]Christopher Huth, Rene Guillaume, Thomas Strohm, Paul Duplys, Irin Ann Samuel, Tim Güneysu:
Information reconciliation schemes in physical-layer security: A survey. Computer Networks 109: 84-104 (2016) - [j15]Tim Güneysu, Helena Handschuh:
Introduction to the CHES 2015 special issue. J. Cryptographic Engineering 6(2): 83-84 (2016) - 2015
- [j14]Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann:
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware. IEEE Trans. Computers 64(7): 1954-1967 (2015) - [j13]Patrick Schaumont, Máire O'Neill, Tim Güneysu:
Introduction for Embedded Platforms for Cryptography in the Coming Decade. ACM Trans. Embedded Comput. Syst. 14(3): 40:1-40:3 (2015) - [j12]James Howe, Thomas Pöppelmann, Máire O'Neill, Elizabeth O'Sullivan, Tim Güneysu:
Practical Lattice-Based Digital Signature Schemes. ACM Trans. Embedded Comput. Syst. 14(3): 41:1-41:24 (2015) - [j11]Ingo von Maurich, Tobias Oder, Tim Güneysu:
Implementing QC-MDPC McEliece Encryption. ACM Trans. Embedded Comput. Syst. 14(3): 44:1-44:27 (2015) - [j10]Pascal Sasdrich, Tim Güneysu:
Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography. TRETS 9(1): 3:1-3:15 (2015) - 2014
- [j9]Tobias Schneider, Ingo von Maurich, Tim Güneysu, David Oswald:
Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis. Signal Processing Systems 77(1-2): 151-167 (2014) - 2013
- [j8]Stefan Heyse, Tim Güneysu:
Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance. J. Cryptographic Engineering 3(1): 29-43 (2013) - 2012
- [j7]Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne Burleson:
Side channels as building blocks. J. Cryptographic Engineering 2(3): 143-159 (2012) - [j6]Tim Güneysu:
Using Data Contention in Dual-ported Memories for Security Applications. Signal Processing Systems 67(1): 15-29 (2012) - 2011
- [j5]Tim Güneysu:
Utilizing hard cores of modern FPGA devices for high-performance cryptography. J. Cryptographic Engineering 1(1): 37-55 (2011) - 2010
- [j4]Tim Güneysu:
Kryptografie auf programmierbarer Hardware. Datenschutz und Datensicherheit 34(12): 832-837 (2010) - [j3]Saar Drimer, Tim Güneysu, Christof Paar:
DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs. TRETS 3(1): 3:1-3:27 (2010) - 2008
- [j2]Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Andy Rupp:
Cryptanalysis with COPACOBANA. IEEE Trans. Computers 57(11): 1498-1513 (2008) - [j1]Tim Güneysu, Christof Paar, Jan Pelzl:
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. TRETS 1(2): 8:1-8:21 (2008)
Conference and Workshop Papers
- 2017
- [c86]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. CT-RSA 2017: 131-146 - [c85]Pascal Sasdrich, Tim Güneysu:
Cryptography for Next Generation TLS: Implementing the RFC 7748 Elliptic Curve448 Cryptosystem in Hardware. DAC 2017: 16:1-16:6 - [c84]Alexander Wild, Georg T. Becker, Tim Güneysu:
A fair and comprehensive large-scale analysis of oscillation-based PUFs for FPGAs. FPL 2017: 1-7 - [c83]Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
LWE-based lossless computational fuzzy extractor for the Internet of Things. HOST 2017: 154 - [c82]Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-Based Algorithm for Key Encapsulation. IMACC 2017: 207-226 - [c81]Tim Güneysu, Tobias Oder:
Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things. ISQED 2017: 319-324 - 2016
- [c80]Pascal Sasdrich, Tim Güneysu:
A grain in the silicon: SCA-protected AES in less than 30 slices. ASAP 2016: 25-32 - [c79]Johannes A. Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann:
High-Performance and Lightweight Lattice-Based Public-Key Encryption. IoTPTS@AsiaCCS 2016: 2-9 - [c78]Christopher Huth, René Guillaume, Paul Duplys, Kumaragurubaran Velmurugan, Tim Güneysu:
On the Energy Cost of Channel Based Key Agreement. TrustED@CCS 2016: 31-41 - [c77]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI: Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks. TIS@CCS 2016: 39 - [c76]Xinxin Fan, Tim Güneysu:
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016). ACM Conference on Computer and Communications Security 2016: 1888-1890 - [c75]Máire O'Neill, Elizabeth O'Sullivan, Gavin McWilliams, Markku-Juhani Saarinen, Ciara Moore, Ayesha Khalid, James Howe, Rafaël Del Pino, Michel Abdalla, Francesco Regazzoni, Felipe Valencia, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, David Lund:
Secure architectures of future emerging cryptography SAFEcrypto. Conf. Computing Frontiers 2016: 315-322 - [c74]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016: 171-193 - [c73]Tobias Schneider, Amir Moradi, Tim Güneysu:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. COSADE 2016: 199-217 - [c72]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks. CRYPTO (2) 2016: 302-332 - [c71]James Howe, Ciara Moore, Máire O'Neill, Francesco Regazzoni, Tim Güneysu, K. Beeden:
Standard lattices in hardware. DAC 2016: 162:1-162:6 - [c70]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -. FSE 2016: 185-203 - [c69]Alexander Wild, Georg T. Becker, Tim Güneysu:
On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs. HOST 2016: 103-108 - [c68]Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA. ICISC 2016: 28-48 - [c67]Tobias Oder, Tim Güneysu, Felipe Valencia, Ayesha Khalid, Máire O'Neill, Francesco Regazzoni:
Lattice-based cryptography: From reconfigurable hardware to ASIC. ISIC 2016: 1-4 - [c66]Christopher Huth, Paul Duplys, Tim Güneysu:
Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions. PerCom Workshops 2016: 1-6 - [c65]Ingo von Maurich, Lukas Heberle, Tim Güneysu:
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter. PQCrypto 2016: 1-17 - [c64]Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms. SAC 2016: 58-78 - 2015
- [c63]Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. ACNS 2015: 559-578 - [c62]Alexander Wild, Amir Moradi, Tim Güneysu:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. COSADE 2015: 81-94 - [c61]Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. COSADE 2015: 95-107 - [c60]Muhammad Hassan, Ayesha Khalid, Anupam Chattopadhyay, Christian Rechberger, Tim Güneysu, Christof Paar:
New ASIC/FPGA Cost Estimates for SHA-1 Collisions. DSD 2015: 669-676 - [c59]Georg T. Becker, Alexander Wild, Tim Güneysu:
Security analysis of index-based syndrome coding for PUF-based key generation. HOST 2015: 20-25 - [c58]Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu:
Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs. HOST 2015: 130-136 - [c57]Thomas Pöppelmann, Tobias Oder, Tim Güneysu:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers. LATINCRYPT 2015: 346-365 - [c56]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Affine Equivalence and Its Application to Tightening Threshold Implementations. SAC 2015: 263-276 - [c55]Christopher Huth, Jan Zibuschka, Paul Duplys, Tim Güneysu:
Securing systems on the Internet of Things via physical properties of devices and communications. SysCon 2015: 8-13 - 2014
- [c54]Pascal Sasdrich, Tim Güneysu:
Efficient Elliptic-Curve Cryptography Using Curve25519 on Reconfigurable Devices. ARC 2014: 25-36 - [c53]Christopher Pöpper, Oliver Mischke, Tim Güneysu:
MicroACP - A Fast and Secure Reconfigurable Asymmetric Crypto-Processor - -Overhead Evaluation of Side-Channel Countermeasures-. ARC 2014: 240-247 - [c52]Thomas Pöppelmann, Léo Ducas, Tim Güneysu:
Enhanced Lattice-Based Signatures on Reconfigurable Hardware. CHES 2014: 353-370 - [c51]Tobias Oder, Thomas Pöppelmann, Tim Güneysu:
Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices. DAC 2014: 110:1-110:6 - [c50]Ingo von Maurich, Tim Güneysu:
Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices. DATE 2014: 1-6 - [c49]Oliver Mischke, Amir Moradi, Tim Güneysu:
Fault Sensitivity Analysis Meets Zero-Value Attack. FDTC 2014: 59-67 - [c48]Tim Güneysu, Francesco Regazzoni, Pascal Sasdrich, Marcin Wójcik:
THOR - The hardware onion router. FPL 2014: 1-4 - [c47]
- [c46]Thomas Pöppelmann, Tim Güneysu:
Area optimization of lightweight lattice-based encryption on reconfigurable hardware. ISCAS 2014: 2796-2799 - [c45]Özgür Dagdelen, Rachid El Bansarkhani, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Ana Helena Sánchez, Peter Schwabe:
High-Speed Signatures from Standard Lattices. LATINCRYPT 2014: 84-103 - [c44]Ingo von Maurich, Tim Güneysu:
Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices. PQCrypto 2014: 266-282 - [c43]Maik Ender, Gerd Duppmann, Alexander Wild, Thomas Pöppelmann, Tim Güneysu:
A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems. ReConFig 2014: 1-6 - 2013
- [c42]Alexander Wild, Tim Güneysu, Amir Moradi:
Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware. ACNS 2013: 389-404 - [c41]Tobias Schneider, Ingo von Maurich, Tim Güneysu:
Efficient implementation of cryptographic primitives on the GA144 multi-core architecture. ASAP 2013: 67-74 - [c40]Stefan Heyse, Ingo von Maurich, Tim Güneysu:
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. CHES 2013: 273-292 - [c39]Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Peter Schwabe:
Software Speed Records for Lattice-Based Signatures. PQCrypto 2013: 67-82 - [c38]Thomas Pöppelmann, Tim Güneysu:
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware. Selected Areas in Cryptography 2013: 68-85 - 2012
- [c37]Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel:
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. AFRICACRYPT 2012: 172-187 - [c36]Tim Güneysu, Igor L. Markov, André Weimerskirch:
Securely Sealing Multi-FPGA Systems. ARC 2012: 276-289 - [c35]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. ASIACRYPT 2012: 208-225 - [c34]Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. CARDIS 2012: 158-172 - [c33]Stefan Heyse, Tim Güneysu:
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware. CHES 2012: 340-355 - [c32]Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann:
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems. CHES 2012: 530-547 - [c31]Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann:
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms. ESORICS 2012: 716-733 - [c30]
- [c29]Thomas Pöppelmann, Tim Güneysu:
Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware. LATINCRYPT 2012: 139-158 - [c28]Benedikt Driessen, Tim Güneysu, Elif Bilge Kavun, Oliver Mischke, Christof Paar, Thomas Pöppelmann:
IPSecco: A lightweight and reconfigurable IPSec core. ReConFig 2012: 1-7 - [c27]Lubos Gaspar, Viktor Fischer, Tim Güneysu, Zouha Cherif Jouini:
Two IP protection schemes for multi-FPGA systems. ReConFig 2012: 1-6 - 2011
- [c26]Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. ASIACRYPT 2011: 327-343 - [c25]Tim Güneysu, Amir Moradi:
Generic Side-Channel Countermeasures for Reconfigurable Devices. CHES 2011: 33-48 - [c24]Tim Güneysu, Stefan Heyse, Christof Paar:
The future of high-speed cryptography: new computing platforms and new ciphers. ACM Great Lakes Symposium on VLSI 2011: 461-466 - [c23]Michal Varchola, Tim Güneysu, Oliver Mischke:
MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-processor. ReConFig 2011: 204-210 - [c22]Benno Lomb, Tim Güneysu:
Decrypting HDCP-protected Video Streams Using Reconfigurable Hardware. ReConFig 2011: 249-254 - [c21]
- 2010
- [c20]Ralf Zimmermann, Tim Güneysu, Christof Paar:
High-Performance Integer Factoring with Reconfigurable Devices. FPL 2010: 83-88 - [c19]Junfeng Fan, Daniel V. Bailey, Lejla Batina, Tim Güneysu, Christof Paar, Ingrid Verbauwhede:
Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware. FPL 2010: 133-138 - [c18]Tim Güneysu:
True random number generation in block memories of reconfigurable devices. FPT 2010: 200-207 - 2009
- [c17]Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar:
MicroEliece: McEliece for Embedded Devices. CHES 2009: 49-64 - [c16]Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne Burleson:
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. CHES 2009: 382-395 - [c15]Tim Güneysu, Christof Paar:
Transforming write collisions in block RAMs into security applications. FPT 2009: 128-134 - [c14]Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar, Christof Paar:
Secure IP-Block Distribution for Hardware Devices. HOST 2009: 82-89 - 2008
- [c13]Tim Güneysu, Christof Paar:
Ultra High Performance ECC over NIST Primes on Commercial FPGAs. CHES 2008: 62-78 - [c12]Robert Szerwinski, Tim Güneysu:
Exploiting the Power of GPUs for Asymmetric Cryptography. CHES 2008: 79-99 - [c11]Tim Güneysu, Christof Paar:
Breaking Legacy Banking Standards with Special-Purpose Hardware. Financial Cryptography 2008: 128-140 - [c10]Saar Drimer, Tim Güneysu, Christof Paar:
DSPs, BRAMs and a Pinch of Logic: New Recipes for AES on FPGAs. FCCM 2008: 99-108 - [c9]Tim Güneysu, Christof Paar, Gerd Pfeiffer, Manfred Schimmler:
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis. FPL 2008: 675-678 - 2007
- [c8]Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf:
Reconfigurable trusted computing in hardware. STC 2007: 15-20 - [c7]Tim Güneysu, Bodo Möller, Christof Paar:
New Protection Mechanisms for Intellectual Property in Reconfigurable Logic. FCCM 2007: 287-288 - [c6]Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier:
Establishing Chain of Trust in Reconfigurable Hardware. FCCM 2007: 289-290 - [c5]Tim Güneysu, Christof Paar, Jan Pelzl:
Attacking elliptic curve cryptosystems with special-purpose hardware. FPGA 2007: 207-215 - [c4]Tim Güneysu, Bodo Möller, Christof Paar:
Dynamic Intellectual Property Protection for Reconfigurable Devices. FPT 2007: 169-176 - [c3]Tim Güneysu, Andy Rupp, Stefan Spitz:
Cryptanalytic Time-Memory Tradeoffs on COPACOBANA. GI Jahrestagung (2) 2007: 205-209 - [c2]Tim Güneysu, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler, Christian Schleiffer:
Parallel Computing with Low-Cost FPGAs: A Framework for COPACOBANA. PARCO 2007: 741-748 - [c1]Tim Güneysu, Christof Paar, Sven Schäge:
Efficient Hash Collision Search Strategies on Special-Purpose Hardware. WEWoRC 2007: 39-51
Parts in Books or Collections
- 2010
- [p1]Tim Güneysu, Christof Paar:
Modular Integer Arithmetic for Public Key Cryptography. Secure Integrated Circuits and Systems 2010: 3-26
Editorship
- 2016
- [e3]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu:
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4567-5 [contents] - [e2]Tim Güneysu, Gregor Leander, Amir Moradi:
Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9542, Springer 2016, ISBN 978-3-319-29077-5 [contents] - 2015
- [e1]Tim Güneysu, Helena Handschuh:
Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Lecture Notes in Computer Science 9293, Springer 2015, ISBN 978-3-662-48323-7 [contents]
Reference Works
- 2011
- [r1]Tim Güneysu:
FPGAs in Cryptography. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 499-501
Informal and Other Publications
- 2017
- [i25]Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O'Sullivan, Tim Güneysu, Francesco Regazzoni:
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling. IACR Cryptology ePrint Archive 2017: 298 (2017) - [i24]Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-based Algorithm for Key Encapsulation. IACR Cryptology ePrint Archive 2017: 757 (2017) - 2016
- [i23]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels. IACR Cryptology ePrint Archive 2016: 203 (2016) - [i22]Pascal Sasdrich, Tim Güneysu:
Closing the Gap in RFC 7748: Implementing Curve448 in Hardware. IACR Cryptology ePrint Archive 2016: 352 (2016) - [i21]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptology ePrint Archive 2016: 647 (2016) - [i20]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks. IACR Cryptology ePrint Archive 2016: 648 (2016) - [i19]Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms. IACR Cryptology ePrint Archive 2016: 719 (2016) - [i18]Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT. IACR Cryptology ePrint Archive 2016: 982 (2016) - [i17]Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu:
Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Cryptology ePrint Archive 2016: 1109 (2016) - [i16]