


Остановите войну!
for scientists:
Tim Güneysu
Tim Erhan Güneysu
Person information

- affiliation: Ruhr University of Bochum, Germany
- affiliation: German Research Center for Artificial Intelligence (DFKI), Bremen, Germany
- affiliation: University of Bremen, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j32]Jan Richter-Brockmann
, Johannes Mono
, Tim Güneysu
:
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices. IEEE Trans. Computers 71(5): 1204-1215 (2022) - [j31]Jan Richter-Brockmann
, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu:
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 557-588 (2022) - [i42]Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu:
VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering. IACR Cryptol. ePrint Arch. 2022: 484 (2022) - 2021
- [j30]Benjamin Hettwer, Sebastien Leger, Daniel Fennes, Stefan Gehrer, Tim Güneysu:
Side-Channel Analysis of the Xilinx Zynq UltraScale+ Encryption Engine. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 279-304 (2021) - [j29]Florian Stolz, Nils Albartus, Julian Speith
, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier:
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 412-446 (2021) - [j28]Jan Richter-Brockmann
, Aein Rezaei Shahmirzadi, Pascal Sasdrich
, Amir Moradi, Tim Güneysu:
FIVER - Robust Verification of Countermeasures against Fault Injections. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 447-473 (2021) - [c110]Georg Land
, Pascal Sasdrich
, Tim Güneysu
:
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware. CARDIS 2021: 210-230 - [c109]Arnold Abromeit, Florian Bache, Leon A. Becker, Marc Gourjon, Tim Güneysu, Sabrina Jorn, Amir Moradi
, Maximilian Orlt, Falk Schellenberg:
Automated Masking of Software Implementations on Industrial Microcontrollers. DATE 2021: 1006-1011 - [c108]Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du
, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, Jens Trommer:
Nano Security: From Nano-Electronics to Secure Systems. DATE 2021: 1334-1339 - [c107]Jan Philipp Thoma
, Jakob Feldtkeller, Markus Krausz, Tim Güneysu, Daniel J. Bernstein:
BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs Faster. RAID 2021: 103-118 - [i41]Jan Philipp Thoma
, Christian Niesler, Dominic A. Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu:
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions. CoRR abs/2104.11469 (2021) - [i40]Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice. IACR Cryptol. ePrint Arch. 2021: 296 (2021) - [i39]Jan Philipp Thoma, Tim Güneysu:
A Configurable Hardware Implementation of XMSS. IACR Cryptol. ePrint Arch. 2021: 352 (2021) - [i38]Georg Land, Pascal Sasdrich, Tim Güneysu:
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2021: 355 (2021) - [i37]Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
FIVER - Robust Verification of Countermeasures against Fault Injections. IACR Cryptol. ePrint Arch. 2021: 936 (2021) - [i36]Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier:
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security. IACR Cryptol. ePrint Arch. 2021: 1277 (2021) - [i35]Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu:
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware. IACR Cryptol. ePrint Arch. 2021: 1344 (2021) - 2020
- [j27]Benjamin Hettwer
, Stefan Gehrer, Tim Güneysu:
Applications of machine learning techniques in side-channel attacks: a survey. J. Cryptogr. Eng. 10(2): 135-162 (2020) - [j26]Florian Bache, Clara Paglialonga, Tobias Oder, Tobias Schneider, Tim Güneysu:
High-Speed Masking for Polynomial Comparison in Lattice-based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 483-507 (2020) - [c106]Jan Richter-Brockmann
, Pascal Sasdrich
, Florian Bache, Tim Güneysu:
Concurrent error detection revisited: hardware protection against fault and side-channel attacks. ARES 2020: 20:1-20:11 - [c105]Jan Richter-Brockmann
, Tim Güneysu:
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures. ASAP 2020: 117-124 - [c104]Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu:
Revisiting ECM on GPUs. CANS 2020: 299-319 - [c103]Benjamin Hettwer, Daniel Fennes, Sebastien Leger, Jan Richter-Brockmann
, Stefan Gehrer, Tim Güneysu:
Deep Learning Multi-Channel Fusion Attack Against Side-Channel Protected Hardware. DAC 2020: 1-6 - [c102]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. DATE 2020: 508-513 - [c101]Benjamin Hettwer, Kallyan Das, Sebastien Leger, Stefan Gehrer, Tim Güneysu:
Lightweight Side-Channel Protection using Dynamic Clock Randomization. FPL 2020: 200-207 - [c100]Vladimir Herdt, Daniel Große, Jonas Wloka, Tim Güneysu, Rolf Drechsler:
Verification of Embedded Binaries using Coverage-guided Fuzzing with SystemC-based Virtual Prototypes. ACM Great Lakes Symposium on VLSI 2020: 101-106 - [c99]Benjamin Hettwer, Tobias Horn, Stefan Gehrer, Tim Güneysu:
Encoding Power Traces as Images for Efficient Side-Channel Analysis. HOST 2020: 46-56 - [e4]Sonia Belaïd, Tim Güneysu
:
Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11833, Springer 2020, ISBN 978-3-030-42067-3 [contents] - [i34]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. CoRR abs/2001.09672 (2020) - [i33]Benjamin Hettwer, Tobias Horn, Stefan Gehrer, Tim Güneysu:
Encoding Power Traces as Images for Efficient Side-Channel Analysis. CoRR abs/2004.11015 (2020) - [i32]Jan Philipp Thoma
, Jakob Feldtkeller
, Markus Krausz
, Tim Güneysu, Daniel J. Bernstein:
BasicBlocker: Redesigning ISAs to Eliminate Speculative-Execution Attacks. CoRR abs/2007.15919 (2020) - [i31]Jan Richter-Brockmann, Tim Güneysu:
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures. IACR Cryptol. ePrint Arch. 2020: 742 (2020) - [i30]Jan Richter-Brockmann, Tim Güneysu:
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices. IACR Cryptol. ePrint Arch. 2020: 897 (2020) - [i29]Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu:
Revisiting ECM on GPUs. IACR Cryptol. ePrint Arch. 2020: 1265 (2020)
2010 – 2019
- 2019
- [j25]Florian Bache, Christina Plump, Jonas Wloka, Tim Güneysu, Rolf Drechsler
:
Evaluation of (power) side-channels in cryptographic implementations. it Inf. Technol. 61(1): 15-28 (2019) - [c98]Benjamin Hettwer, Johannes Petersen, Stefan Gehrer, Heike Neumann, Tim Güneysu:
Securing Cryptographic Circuits by Exploiting Implementation Diversity and Partial Reconfiguration on FPGAs. DATE 2019: 260-263 - [c97]Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu:
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. Public Key Cryptography (2) 2019: 534-564 - [c96]Tobias Oder, Julian Speith
, Kira Höltgen, Tim Güneysu:
Towards Practical Microcontroller Implementation of the Signature Scheme Falcon. PQCrypto 2019: 65-80 - [c95]Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery. SAC 2019: 645-666 - [c94]Mario Bischof, Tobias Oder, Tim Güneysu:
Efficient Microcontroller Implementation of BIKE. SECITC 2019: 34-49 - [i28]Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery. IACR Cryptol. ePrint Arch. 2019: 143 (2019) - [i27]Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu:
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. IACR Cryptol. ePrint Arch. 2019: 910 (2019) - 2018
- [j24]Pascal Sasdrich
, Tim Güneysu
:
Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection. J. Hardw. Syst. Secur. 2(4): 297-313 (2018) - [j23]Alexander Wild
, Amir Moradi
, Tim Güneysu
:
GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs. IEEE Trans. Computers 67(3): 375-387 (2018) - [j22]Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
:
Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 142-174 (2018) - [j21]James Howe
, Tobias Oder, Markus Krausz
, Tim Güneysu
:
Standard Lattice-Based Key Encapsulation on Embedded Devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 372-393 (2018) - [c93]Florian Bache, Christina Plump, Tim Güneysu
:
Confident leakage assessment - A side-channel evaluation framework based on confidence intervals. DATE 2018: 1117-1122 - [c92]Ayesha Khalid, Tobias Oder, Felipe Valencia
, Máire O'Neill, Tim Güneysu
, Francesco Regazzoni:
Physical Protection of Lattice-Based Cryptography: Challenges and Solutions. ACM Great Lakes Symposium on VLSI 2018: 365-370 - [c91]Felipe Valencia
, Tobias Oder, Tim Güneysu
, Francesco Regazzoni:
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks. CS2@HiPEAC 2018: 7-12 - [c90]Tim Güneysu
, Markus Krausz
, Tobias Oder, Julian Speith
:
Evaluation of Lattice-Based Signature Schemes in Embedded Systems. ICECS 2018: 385-388 - [c89]Rolf Drechsler
, Christoph Lüth, Görschwin Fey
, Tim Güneysu
:
Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation. IVSW 2018: 1-6 - [c88]Benjamin Hettwer
, Stefan Gehrer
, Tim Güneysu
:
Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge. SAC 2018: 479-498 - [i26]James Howe, Tobias Oder, Markus Krausz, Tim Güneysu:
Standard Lattice-Based Key Encapsulation on Embedded Devices. IACR Cryptol. ePrint Arch. 2018: 686 (2018) - 2017
- [j20]Christopher Huth
, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu
:
Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things. IEEE Access 5: 11909-11926 (2017) - [j19]Erik Boss, Vincent Grosso
, Tim Güneysu
, Gregor Leander
, Amir Moradi
, Tobias Schneider
:
Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptogr. Eng. 7(2): 149-165 (2017) - [j18]Jingwei Hu
, Ray C. C. Cheung, Tim Güneysu
:
Compact Constant Weight Coding Engines for the Code-Based Cryptography. IEEE Trans. Circuits Syst. II Express Briefs 64-II(9): 1092-1096 (2017) - [j17]Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu
, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers. ACM Trans. Embed. Comput. Syst. 16(4): 117:1-117:24 (2017) - [c87]Pascal Sasdrich
, Amir Moradi
, Tim Güneysu
:
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. CT-RSA 2017: 131-146 - [c86]Pascal Sasdrich
, Tim Güneysu
:
Cryptography for Next Generation TLS: Implementing the RFC 7748 Elliptic Curve448 Cryptosystem in Hardware. DAC 2017: 16:1-16:6 - [c85]Alexander Wild, Georg T. Becker, Tim Güneysu
:
A fair and comprehensive large-scale analysis of oscillation-based PUFs for FPGAs. FPL 2017: 1-7 - [c84]Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
LWE-based lossless computational fuzzy extractor for the Internet of Things. HOST 2017: 154 - [c83]Paulo S. L. M. Barreto, Shay Gueron
, Tim Güneysu
, Rafael Misoczki, Edoardo Persichetti
, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-Based Algorithm for Key Encapsulation. IMACC 2017: 207-226 - [c82]Tim Güneysu
, Tobias Oder:
Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things. ISQED 2017: 319-324 - [c81]Tobias Oder, Tim Güneysu:
Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs. LATINCRYPT 2017: 128-142 - [i25]Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O'Sullivan, Tim Güneysu, Francesco Regazzoni:
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling. IACR Cryptol. ePrint Arch. 2017: 298 (2017) - [i24]Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-based Algorithm for Key Encapsulation. IACR Cryptol. ePrint Arch. 2017: 757 (2017) - 2016
- [j16]Christopher Huth
, René Guillaume, Thomas Strohm, Paul Duplys, Irin Ann Samuel, Tim Güneysu
:
Information reconciliation schemes in physical-layer security: A survey. Comput. Networks 109: 84-104 (2016) - [j15]Tim Güneysu
, Helena Handschuh:
Introduction to the CHES 2015 special issue. J. Cryptogr. Eng. 6(2): 83-84 (2016) - [c80]Pascal Sasdrich
, Tim Güneysu
:
A grain in the silicon: SCA-protected AES in less than 30 slices. ASAP 2016: 25-32 - [c79]Johannes Buchmann, Florian Göpfert, Tim Güneysu
, Tobias Oder, Thomas Pöppelmann:
High-Performance and Lightweight Lattice-Based Public-Key Encryption. IoTPTS@AsiaCCS 2016: 2-9 - [c78]Christopher Huth
, René Guillaume, Paul Duplys, Kumaragurubaran Velmurugan, Tim Güneysu
:
On the Energy Cost of Channel Based Key Agreement. TrustED@CCS 2016: 31-41 - [c77]Tobias Schneider, Amir Moradi
, Tim Güneysu:
ParTI: Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks. TIS@CCS 2016: 39 - [c76]Xinxin Fan, Tim Güneysu
:
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016). CCS 2016: 1888-1890 - [c75]Máire O'Neill, Elizabeth O'Sullivan, Gavin McWilliams, Markku-Juhani O. Saarinen
, Ciara Moore
, Ayesha Khalid, James Howe, Rafaël Del Pino, Michel Abdalla
, Francesco Regazzoni
, Felipe Valencia
, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, David Lund:
Secure architectures of future emerging cryptography SAFEcrypto. Conf. Computing Frontiers 2016: 315-322 - [c74]Erik Boss, Vincent Grosso, Tim Güneysu
, Gregor Leander
, Amir Moradi
, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016: 171-193 - [c73]Tobias Schneider, Amir Moradi
, Tim Güneysu
:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. COSADE 2016: 199-217 - [c72]Tobias Schneider, Amir Moradi
, Tim Güneysu
:
ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks. CRYPTO (2) 2016: 302-332 - [c71]James Howe
, Ciara Moore
, Máire O'Neill, Francesco Regazzoni
, Tim Güneysu
, K. Beeden:
Standard lattices in hardware. DAC 2016: 162:1-162:6 - [c70]Pascal Sasdrich
, Amir Moradi
, Tim Güneysu
:
White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -. FSE 2016: 185-203 - [c69]Alexander Wild, Georg T. Becker, Tim Güneysu
:
On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs. HOST 2016: 103-108 - [c68]Christopher Huth
, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu
:
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA. ICISC 2016: 28-48 - [c67]Tobias Oder, Tim Güneysu
, Felipe Valencia
, Ayesha Khalid, Máire O'Neill, Francesco Regazzoni
:
Lattice-based cryptography: From reconfigurable hardware to ASIC. ISIC 2016: 1-4 - [c66]Christopher Huth
, Paul Duplys, Tim Güneysu
:
Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions. PerCom Workshops 2016: 1-6 - [c65]Ingo von Maurich, Lukas Heberle, Tim Güneysu
:
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter. PQCrypto 2016: 1-17 - [c64]Tobias Schneider, Amir Moradi
, François-Xavier Standaert
, Tim Güneysu
:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms. SAC 2016: 58-78 - [e3]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu:
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4567-5 [contents] - [e2]Tim Güneysu, Gregor Leander, Amir Moradi:
Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9542, Springer 2016, ISBN 978-3-319-29077-5 [contents] - [i23]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels. IACR Cryptol. ePrint Arch. 2016: 203 (2016) - [i22]Pascal Sasdrich, Tim Güneysu:
Closing the Gap in RFC 7748: Implementing Curve448 in Hardware. IACR Cryptol. ePrint Arch. 2016: 352 (2016) - [i21]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptol. ePrint Arch. 2016: 647 (2016) - [i20]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks. IACR Cryptol. ePrint Arch. 2016: 648 (2016) - [i19]Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms. IACR Cryptol. ePrint Arch. 2016: 719 (2016) - [i18]Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT. IACR Cryptol. ePrint Arch. 2016: 982 (2016) - [i17]Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu:
Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Cryptol. ePrint Arch. 2016: 1109 (2016) - [i16]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2016: 1111 (2016) - 2015
- [j14]Tim Güneysu
, Vadim Lyubashevsky, Thomas Pöppelmann:
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware. IEEE Trans. Computers 64(7): 1954-1967 (2015) - [j13]Patrick Schaumont
, Máire O'Neill, Tim Güneysu
:
Introduction for Embedded Platforms for Cryptography in the Coming Decade. ACM Trans. Embed. Comput. Syst. 14(3): 40:1-40:3 (2015) - [j12]James Howe, Thomas Pöppelmann, Máire O'Neill, Elizabeth O'Sullivan, Tim Güneysu
:
Practical Lattice-Based Digital Signature Schemes. ACM Trans. Embed. Comput. Syst. 14(3): 41:1-41:24 (2015) - [j11]Ingo von Maurich, Tobias Oder, Tim Güneysu
:
Implementing QC-MDPC McEliece Encryption. ACM Trans. Embed. Comput. Syst. 14(3): 44:1-44:27 (2015) - [j10]Pascal Sasdrich
, Tim Güneysu
:
Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography. ACM Trans. Reconfigurable Technol. Syst. 9(1): 3:1-3:15 (2015) - [c63]Tobias Schneider, Amir Moradi
, Tim Güneysu
:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. ACNS 2015: 559-578 - [c62]Alexander Wild, Amir Moradi
, Tim Güneysu
:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. COSADE 2015: 81-94 - [c61]Pascal Sasdrich
, Oliver Mischke, Amir Moradi
, Tim Güneysu
:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. COSADE 2015: 95-107 - [c60]Muhammad Hassan, Ayesha Khalid, Anupam Chattopadhyay, Christian Rechberger, Tim Güneysu
, Christof Paar:
New ASIC/FPGA Cost Estimates for SHA-1 Collisions. DSD 2015: 669-676 - [c59]Georg T. Becker, Alexander Wild, Tim Güneysu
:
Security analysis of index-based syndrome coding for PUF-based key generation. HOST 2015: 20-25 - [c58]Pascal Sasdrich
, Amir Moradi
, Oliver Mischke, Tim Güneysu
:
Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs. HOST 2015: 130-136 - [c57]Thomas Pöppelmann, Tobias Oder, Tim Güneysu
:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers. LATINCRYPT 2015: 346-365 - [c56]Pascal Sasdrich
, Amir Moradi
, Tim Güneysu
:
Affine Equivalence and Its Application to Tightening Threshold Implementations. SAC 2015: 263-276 - [c55]Christopher Huth
, Jan Zibuschka, Paul Duplys, Tim Güneysu
:
Securing systems on the Internet of Things via physical properties of devices and communications. SysCon 2015: 8-13 - [e1]Tim Güneysu
, Helena Handschuh:
Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Lecture Notes in Computer Science 9293, Springer 2015, ISBN 978-3-662-48323-7 [contents] - [i15]Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. IACR Cryptol. ePrint Arch. 2015: 66 (2015) - [i14]Alexander Wild, Amir Moradi, Tim Güneysu:
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs. IACR Cryptol. ePrint Arch. 2015: 124 (2015) - [i13]Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. IACR Cryptol. ePrint Arch. 2015: 198 (2015) - [i12]Alexander Wild, Amir Moradi, Tim Güneysu:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. IACR Cryptol. ePrint Arch. 2015: 200 (2015) - [i11]Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu:
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs. IACR Cryptol. ePrint Arch. 2015: 203 (2015) - [i10]Thomas Pöppelmann, Tobias Oder, Tim Güneysu:
Speed Records for Ideal Lattice-Based Cryptography on AVR. IACR Cryptol. ePrint Arch. 2015: 382 (2015) - [i9]Stefan Heyse, Ingo von Maurich, Tim Güneysu:
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. IACR Cryptol. ePrint Arch. 2015: 425 (2015) - [i8]Tobias Schneider, Amir Moradi, Tim Güneysu:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. IACR Cryptol. ePrint Arch. 2015: 571 (2015) - [i7]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Affine Equivalence and its Application to Tightening Threshold Implementations. IACR Cryptol. ePrint Arch. 2015: 749 (2015) - 2014
- [j9]Tobias Schneider, Ingo von Maurich, Tim Güneysu
, David F. Oswald:
Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis. J. Signal Process. Syst. 77(1-2): 151-167 (2014) - [c54]