default search action
Marc Stöttinger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations. COSADE 2024: 133-154 - [c37]Tim Henkes, Steffen Reith, Marc Stöttinger, Norbert Herfurth, Goran Panic, Julian Wälde, Fabian Buschkowski, Pascal Sasdrich, Christoph Lüth, Milan Funck, Tuba Kiyan, Arnd Weber, Detlef Boeck, René Rathfelder, Torsten Grawunder:
Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP. DATE 2024: 1-6 - [c36]Jan Ackermann, Johannes Kaeppel, Patrick Schönberger, Carin Schreiner, Marc Stöttinger:
Shell we find it: A Shelly Smart Home Device Discovery Tool. INFORMATIK 2024: 381-389 - 2023
- [j5]Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger:
Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 221-245 (2023) - [c35]Arnd Weber, Sylvain Guilley, René Rathfelder, Marc Stöttinger, Christoph Lüth, Maja Malenko, Torsten Grawunder, Steffen Reith, Armand Puccetti, Jean-Pierre Seifert, Norbert Herfurth, Hagen Sankowski, Gernot Heiser:
Verified Value Chains, Innovation and Competition. CSR 2023: 470-476 - [c34]Marius Eggert, Marc Stöttinger:
Voronoi Based Multidimensional Parameter Optimization for Fault Injection Attacks. FDTC 2023: 13-23 - [i8]Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger:
Separating Oil and Vinegar with a Single Trace. IACR Cryptol. ePrint Arch. 2023: 335 (2023) - [i7]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1252 (2023) - 2022
- [c33]Marc-André Kaufhold, Ali Sercan Basyurt, Kaan Eyilmez, Marc Stöttinger, Christian Reuter:
Cyber Threat Observatory: Design and Evaluation of an Interactive Dashboard for Computer Emergency Response Teams. ECIS 2022 - [c32]Fabio Campos, Michael Meyer, Krijn Reijnders, Marc Stöttinger:
Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE. SAC 2022: 234-262 - [i6]Fabio Campos, Michael Meyer, Krijn Reijnders, Marc Stöttinger:
Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE. IACR Cryptol. ePrint Arch. 2022: 904 (2022) - 2021
- [c31]Yi Wang, Marc Stöttinger, Yajun Ha:
A Fault Resistant AES via Input-Output Differential Tables with DPA Awareness. ISCAS 2021: 1-5 - [c30]Marc-André Kaufhold, Jennifer Fromm, Thea Riebe, Milad Mirbabaie, Philipp Kühn, Ali Sercan Basyurt, Markus Bayer, Marc Stöttinger, Kaan Eyilmez, Reinhard Möller, Christoph Fuchß, Stefan Stieglitz, Christian Reuter:
CYWARN: Strategy and Technology Development for Cross-Platform Cyber Situational Awareness and Actor-Specific Cyber Threat Communication. MuC (Workshopband) 2021 - [c29]Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang:
Verifying Post-Quantum Signatures in 8 kB of RAM. PQCrypto 2021: 215-233 - [i5]Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang:
Verifying Post-Quantum Signatures in 8 kB of RAM. IACR Cryptol. ePrint Arch. 2021: 662 (2021) - 2020
- [c28]Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stöttinger:
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4. AFRICACRYPT 2020: 258-277 - [c27]Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger:
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks. FDTC 2020: 57-65 - [i4]Wen Wang, Marc Stöttinger:
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules. IACR Cryptol. ePrint Arch. 2020: 26 (2020) - [i3]Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stöttinger:
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2020: 470 (2020) - [i2]Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger:
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2020: 1005 (2020)
2010 – 2019
- 2019
- [j4]Bernhard Jungk, Marc Stöttinger:
Serialized lightweight SHA-3 FPGA implementations. Microprocess. Microsystems 71 (2019) - [c26]Stefan Katzenbeisser, Ilia Polian, Francesco Regazzoni, Marc Stöttinger:
Security in Autonomous Systems. ETS 2019: 1-8 - [e1]Ilia Polian, Marc Stöttinger:
Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings. Lecture Notes in Computer Science 11421, Springer 2019, ISBN 978-3-030-16349-5 [contents] - 2018
- [j3]Bernhard Jungk, Richard Petri, Marc Stöttinger:
Efficient Side-Channel Protections of ARX Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 627-653 (2018) - [i1]Bernhard Jungk, Richard Petri, Marc Stöttinger:
Efficient Side-Channel Protections of ARX Ciphers. IACR Cryptol. ePrint Arch. 2018: 693 (2018) - 2016
- [c25]Marc Stöttinger, Bernhard Jungk:
There ain't no plain key: A PUF based first-order side-channel resistant encryption construction. ISIC 2016: 1-4 - [c24]Bernhard Jungk, Marc Stöttinger:
Hobbit - Smaller but faster than a dwarf: Revisiting lightweight SHA-3 FPGA implementations. ReConFig 2016: 1-7 - 2015
- [c23]Alexander Herrmann, Marc Stöttinger:
Evaluation Tools for Multivariate Side-Channel Analysis. CS2@HiPEAC 2015: 1-6 - [c22]Dirmanto Jap, Marc Stöttinger, Shivam Bhasin:
Support vector regression: exploiting machine learning techniques for leakage modeling. HASP@ISCA 2015: 2:1-2:8 - 2014
- [j2]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [c21]Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Marc Stöttinger:
Minimizing S-Boxes in Hardware by Utilizing Linear Transformations. AFRICACRYPT 2014: 235-250 - [c20]Aderinola Gbade-Alabi, David C. Keezer, Vincent John Mooney, Axel York Poschmann, Marc Stöttinger, Kshitij Divekar:
A signature based architecture for Trojan detection. WESS 2014: 3:1-3:10 - [c19]Marc Stöttinger, Gavin Xiaoxu Yao, Ray C. C. Cheung:
Zero collision attack and its countermeasures on Residue Number System multipliers. ISIC 2014: 30-33 - [c18]Alexander Herrmann, Marc Stöttinger:
Constructive side-channel analysis for secure hardware design. ISIC 2014: 34-37 - 2013
- [c17]Sorin A. Huss, Marc Stöttinger, Michael Zohner:
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework. Number Theory and Cryptography 2013: 151-165 - [c16]Sebastian Kutzner, Axel York Poschmann, Marc Stöttinger:
Hardware trojan design and detection: a practical evaluation. WESS 2013: 1:1-1:9 - [c15]Sebastian Kutzner, Axel Poschmann, Marc Stöttinger:
TROJANUS: An ultra-lightweight side-channel leakage generator for FPGAs. FPT 2013: 160-167 - [c14]Fabrizio De Santis, Michael Kasper, Stefan Mangard, Georg Sigl, Oliver Stein, Marc Stöttinger:
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective. INDOCRYPT 2013: 215-226 - [c13]Bernhard Jungk, Marc Stöttinger:
Among slow dwarfs and fast giants: A systematic design space exploration of KECCAK. ReCoSoC 2013: 1-8 - 2012
- [b1]Marc Stöttinger:
Mutating runtime architectures as a countermeasure against power analysis attacks. Darmstadt University of Technology, Germany, 2012, pp. 1-161 - [c12]Michael Zohner, Michael Kasper, Marc Stöttinger:
Butterfly-Attack on Skein's Modular Addition. COSADE 2012: 215-230 - [c11]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models. CT-RSA 2012: 365-382 - [c10]Michael Zohner, Michael Kasper, Marc Stöttinger, Sorin A. Huss:
Side channel analysis of the SHA-3 finalists. DATE 2012: 1012-1017 - [c9]Annelie Heuser, Werner Schindler, Marc Stöttinger:
Revealing side-channel issues of complex circuits by enhanced leakage models. DATE 2012: 1179-1184 - [c8]Bernhard Jungk, Marc Stöttinger, Jan Gampe, Steffen Reith, Sorin A. Huss:
Side-channel resistant AES architecture utilizing randomized composite field representations. FPT 2012: 125-128 - [c7]Michael Zohner, Marc Stöttinger, Sorin A. Huss, Oliver Stein:
An adaptable, modular, and autonomous side-channel vulnerability evaluator. HOST 2012: 43-48 - 2011
- [j1]H. Gregor Molter, Marc Stöttinger, Abdulhadi Shoufan, Falko Strenzke:
A simple power analysis attack on a McEliece cryptoprocessor. J. Cryptogr. Eng. 1(1): 29-36 (2011) - [c6]Alexander Biedermann, Marc Stöttinger, Lijing Chen, Sorin A. Huss:
Secure Virtualization within a Multi-processor Soft-Core System-on-Chip Architecture. ARC 2011: 385-396 - [c5]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis. DSD 2011: 674-681 - 2010
- [c4]Marc Stöttinger, Alexander Biedermann, Sorin Alexander Huss:
Virtualization within a Parallel Array of Homogeneous Processing Units. ARC 2010: 17-28 - [c3]Marc Stöttinger, Sorin A. Huss, Sascha Mühlbach, Andreas Koch:
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme. EUC 2010: 603-608 - [c2]Michael Kasper, Werner Schindler, Marc Stöttinger:
A stochastic method for security evaluation of cryptographic FPGA implementations. FPT 2010: 146-153 - [p1]Marc Stöttinger, Felix Madlener, Sorin A. Huss:
Procedures for Securing ECC Implementations Against Differential Power Analysis Using Reconfigurable Architectures. Dynamically Reconfigurable Systems 2010: 395-415
2000 – 2009
- 2009
- [c1]Abdulhadi Shoufan, Falko Strenzke, H. Gregor Molter, Marc Stöttinger:
A Timing Attack against Patterson Algorithm in the McEliece PKC. ICISC 2009: 161-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint