
Christof Paar
Person information
- affiliation: Ruhr University Bochum, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j64]Max Hoffmann, Christof Paar:
Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 82-108 (2021) - [j63]Max Hoffmann
, Falk Schellenberg
, Christof Paar
:
ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries. IEEE Trans. Inf. Forensics Secur. 16: 1058-1073 (2021) - 2020
- [j62]Julian Speith, Steffen Becker
, Maik Ender, Endres Puschner, Christof Paar:
Hardware-Trojaner. Datenschutz und Datensicherheit 44(7): 446-450 (2020) - [j61]Marc Fyrbiak
, Sebastian Wallat
, Sascha Reinhard, Nicolai Bissantz, Christof Paar
:
Graph Similarity and its Applications to Hardware Security. IEEE Trans. Computers 69(4): 505-519 (2020) - [j60]Nils Albartus
, Max Hoffmann
, Sebastian Temme, Leonid Azriel, Christof Paar:
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 309-336 (2020) - [j59]Samaneh Ghandali, Thorben Moos
, Amir Moradi
, Christof Paar
:
Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations. IEEE Trans. Very Large Scale Integr. Syst. 28(6): 1435-1448 (2020) - [c173]Susanne Engels, Falk Schellenberg, Christof Paar:
SPFA: SFA on Multiple Persistent Faults. FDTC 2020: 49-56 - [c172]Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar:
An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes. SOUPS @ USENIX Security Symposium 2020: 285-300 - [c171]Maik Ender, Amir Moradi, Christof Paar:
The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs. USENIX Security Symposium 2020: 1803-1819 - [i50]Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz:
An Exploratory Analysis of Microcode as a Building Block for System Defenses. CoRR abs/2007.03549 (2020) - [i49]Paul Staat, Harald Elders-Boll, Markus Heinrichs, Rainer Kronberger, Christian T. Zenger, Christof Paar:
Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments. CoRR abs/2010.06613 (2020) - [i48]Pascal Zimmer, Roland Weinreich, Christian T. Zenger, Aydin Sezgin, Christof Paar:
Keys from the Sky: A First Exploration of Physical-Layer Security Using Satellite Links. CoRR abs/2010.07194 (2020) - [i47]Max Hoffmann, Christof Paar:
Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging. IACR Cryptol. ePrint Arch. 2020: 750 (2020) - [i46]Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar:
DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering. IACR Cryptol. ePrint Arch. 2020: 751 (2020)
2010 – 2019
- 2019
- [j58]Astrid Wichmann, M. Angela Sasse, Christof Paar:
IT-Sicherheit ist mehr als Technik. Datenschutz und Datensicherheit 43(11): 673-674 (2019) - [j57]Steffen Becker
, Carina Wiesen, Christof Paar, Nikol Rummel:
Wie arbeiten Reverse Engineers? Datenschutz und Datensicherheit 43(11): 686-690 (2019) - [j56]Marc Fyrbiak
, Sebastian Wallat, Pawel Swierczynski
, Max Hoffmann
, Sebastian Hoppach
, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
:
HAL - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion. IEEE Trans. Dependable Secur. Comput. 16(3): 498-510 (2019) - [j55]Christian Kison
, Omar Mohamed Awad
, Marc Fyrbiak
, Christof Paar
:
Security Implications of Intentional Capacitive Crosstalk. IEEE Trans. Inf. Forensics Secur. 14(12): 3246-3258 (2019) - [c170]Carina Wiesen, Nils Albartus
, Max Hoffmann
, Steffen Becker
, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel
, Christof Paar:
Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights. ASP-DAC 2019: 104-111 - [c169]Maik Ender
, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar:
Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream. ASP-DAC 2019: 112-119 - [c168]Carl-Daniel Hailfinger
, Kerstin Lemke-Rust, Christof Paar:
CCCiCC: A Cross-Core Cache-Independent Covert Channel on AMD Family 15h CPUs. CARDIS 2019: 159-175 - [c167]Sebastian Wallat, Nils Albartus
, Steffen Becker
, Max Hoffmann
, Maik Ender
, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework. CF 2019: 392-397 - [i45]Carina Wiesen, Steffen Becker, Marc Fyrbiak, Nils Albartus, Malte Elson, Nikol Rummel, Christof Paar:
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights. CoRR abs/1910.00312 (2019) - [i44]Carina Wiesen, Nils Albartus, Max Hoffmann, Steffen Becker, Sebastian Wallat, Marc Fyrbiak, Nikol Rummel, Christof Paar:
Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering Based on Psychological Insights. CoRR abs/1910.00323 (2019) - [i43]Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: Open-Sourcing the First Extendable Gate-Level Netlist Reverse Engineering Framework. CoRR abs/1910.00350 (2019) - [i42]Samaneh Ghandali, Daniel E. Holcomb, Christof Paar:
Temperature-Based Hardware Trojan For Ring-Oscillator-Based TRNGs. CoRR abs/1910.00735 (2019) - [i41]Samaneh Ghandali, Thorben Moos, Amir Moradi, Christof Paar:
Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations. CoRR abs/1910.00737 (2019) - [i40]Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar:
Interdiction in Practice - Hardware Trojan Against a High-Security USB Flash Drive. CoRR abs/1910.00947 (2019) - [i39]Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz:
Reverse Engineering x86 Processor Microcode. CoRR abs/1910.00948 (2019) - [i38]Max Hoffmann, Christof Paar:
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead. CoRR abs/1910.00949 (2019) - [i37]Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, Sandip Kundu:
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device- and Logic-Level Techniques. CoRR abs/1910.00981 (2019) - [i36]Maik Ender, Pawel Swierczynski, Sebastian Wallat, Matthias Wilhelm, Paul Martin Knopp, Christof Paar:
Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream. CoRR abs/1910.01517 (2019) - [i35]Marc Fyrbiak, Sebastian Strauß, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, Christof Paar:
Hardware Reverse Engineering: Overview and Open Challenges. CoRR abs/1910.01518 (2019) - [i34]Sebastian Wallat, Marc Fyrbiak, Moritz Schlögel, Christof Paar:
A Look at the Dark Side of Hardware Reverse Engineering - A Case Study. CoRR abs/1910.01519 (2019) - [i33]Susanne Engels, Max Hoffmann, Christof Paar:
The End of Logic Locking? A Critical View on the Security of Logic Locking. IACR Cryptol. ePrint Arch. 2019: 796 (2019) - [i32]Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar:
Graph Similarity and Its Applications to Hardware Security. IACR Cryptol. ePrint Arch. 2019: 983 (2019) - [i31]Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar:
On the Difficulty of FSM-based Hardware Obfuscation. IACR Cryptol. ePrint Arch. 2019: 1163 (2019) - 2018
- [j54]Marc Fyrbiak
, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Christof Paar:
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors. IEEE Trans. Computers 67(3): 307-321 (2018) - [j53]Pawel Swierczynski
, Georg T. Becker
, Amir Moradi
, Christof Paar:
Bitstream Fault Injections (BiFI)-Automated Fault Attacks Against SRAM-Based FPGAs. IEEE Trans. Computers 67(3): 348-360 (2018) - [j52]Max Hoffmann
, Christof Paar:
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 277-297 (2018) - [j51]Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus
, Sinan Böcker, Russell Tessier, Christof Paar:
On the Difficulty of FSM-based Hardware Obfuscation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 293-330 (2018) - [c166]Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
:
An Exploratory Analysis of Microcode as a Building Block for System Defenses. CCS 2018: 1649-1666 - [c165]Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Christof Paar, Daniel E. Holcomb:
SAT-based reverse engineering of gate-level schematics using fault injection and probing. HOST 2018: 215-220 - [c164]Carina Wiesen, Steffen Becker
, Marc Fyrbiak, Nils Albartus
, Malte Elson
, Nikol Rummel
, Christof Paar:
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights. TALE 2018: 438-445 - [i30]Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Christof Paar, Daniel E. Holcomb:
SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing. CoRR abs/1802.08916 (2018) - 2017
- [j50]Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi
, Christof Paar:
Interdiction in practice - Hardware Trojan against a high-security USB flash drive. J. Cryptogr. Eng. 7(3): 199-211 (2017) - [j49]Arunkumar Vijayakumar
, Vinay C. Patil
, Daniel E. Holcomb, Christof Paar, Sandip Kundu:
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques. IEEE Trans. Inf. Forensics Secur. 12(1): 64-77 (2017) - [c163]Christian T. Zenger, Mario Pietersz, Andreas Rex, Jeremy Brauer, Falk-Peter Dressler, Christian Baiker, Daniel Theis, Christof Paar:
Implementing a real-time capable WPLS testbed for independent performance and security analyses. ACSSC 2017: 9-13 - [c162]Maik Ender
, Samaneh Ghandali, Amir Moradi
, Christof Paar:
The First Thorough Side-Channel Hardware Trojan. ASIACRYPT (1) 2017: 755-780 - [c161]Christof Paar:
Hardware Trojans and Other Threats against Embedded Systems. AsiaCCS 2017: 1 - [c160]Shahrzad Keshavarz
, Christof Paar, Daniel E. Holcomb:
Design automation for obfuscated circuits with multiple viable functions. DATE 2017: 886-889 - [c159]Marc Fyrbiak, Sebastian Strauss
, Christian Kison, Sebastian Wallat, Malte Elson
, Nikol Rummel
, Christof Paar:
Hardware reverse engineering: Overview and open challenges. IVSW 2017: 88-94 - [c158]Sebastian Wallat, Marc Fyrbiak, Moritz Schlögel, Christof Paar:
A look at the dark side of hardware reverse engineering - a case study. IVSW 2017: 95-100 - [c157]Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz:
Reverse Engineering x86 Processor Microcode. USENIX Security Symposium 2017: 1163-1180 - [i29]Christian T. Zenger, Hendrik Vogt, Jan Zimmer, Aydin Sezgin, Christof Paar:
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version). CoRR abs/1701.03904 (2017) - [i28]Shahrzad Keshavarz, Christof Paar, Daniel E. Holcomb:
Design Automation for Obfuscated Circuits with Multiple Viable Functions. CoRR abs/1703.00475 (2017) - [i27]Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar:
HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion. IACR Cryptol. ePrint Arch. 2017: 783 (2017) - [i26]Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar:
The First Thorough Side-Channel Hardware Trojan. IACR Cryptol. ePrint Arch. 2017: 865 (2017) - 2016
- [j48]Christian T. Zenger, Mario Pietersz, Jan Zimmer, Jan-Felix Posielek, Thorben Lenze, Christof Paar:
Authenticated key establishment for low-resource devices exploiting correlated random channels. Comput. Networks 109: 105-123 (2016) - [j47]Luis Alberto Benthin Sanguino, Gregor Leander
, Christof Paar, Bernhard Esslinger, Ingo Niebel:
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods. Cryptologia 40(3): 261-284 (2016) - [c156]Samaneh Ghandali, Georg T. Becker, Daniel E. Holcomb, Christof Paar:
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks. CHES 2016: 625-647 - [c155]Christian T. Zenger, Hendrik Vogt, Jan Zimmer, Aydin Sezgin
, Christof Paar:
The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions. GLOBECOM Workshops 2016: 1-6 - [c154]Falk Schellenberg, Markus Finkeldey, Nils Gerhardt, Martin Hofmann
, Amir Moradi
, Christof Paar:
Large laser spots and fault sensitivity analysis. HOST 2016: 203-208 - [c153]Peter Samarin, Kerstin Lemke-Rust, Christof Paar:
IP core protection using voltage-controlled side-channel receivers. HOST 2016: 217-222 - [c152]Christian T. Zenger, Mario Pietersz, Christof Paar:
Preventing relay attacks and providing perfect forward secrecy using PHYSEC on 8-bit µC. ICC Workshops 2016: 110-115 - [c151]Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt:
DROWN: Breaking TLS Using SSLv2. USENIX Security Symposium 2016: 689-706 - [c150]Christian T. Zenger, Jan Zimmer, Mario Pietersz, Benedikt Driessen, Christof Paar:
Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet. WISEC 2016: 109-120 - [i25]Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann:
Faster discrete logarithms on FPGAs. IACR Cryptol. ePrint Arch. 2016: 382 (2016) - [i24]Samaneh Ghandali, Georg T. Becker, Daniel E. Holcomb, Christof Paar:
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks. IACR Cryptol. ePrint Arch. 2016: 600 (2016) - [i23]Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar:
Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs. IACR Cryptol. ePrint Arch. 2016: 641 (2016) - 2015
- [j46]Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. Des. Codes Cryptogr. 77(2-3): 493-514 (2015) - [j45]Christian T. Zenger, Jan Zimmer, Christof Paar:
Security Analysis of Quantization Schemes for Channel-based Key Extraction. EAI Endorsed Trans. Security Safety 2(6): e5 (2015) - [j44]Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar:
FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8): 1236-1249 (2015) - [j43]Andreas Gornik, Amir Moradi
, Jürgen Oehm
, Christof Paar:
A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(8): 1308-1319 (2015) - [j42]Andy Rupp, Foteini Baldimtsi, Gesine Hinterwälder, Christof Paar:
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport. ACM Trans. Inf. Syst. Secur. 17(3): 10:1-10:31 (2015) - [j41]Pawel Swierczynski, Amir Moradi
, David F. Oswald, Christof Paar:
Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs. ACM Trans. Reconfigurable Technol. Syst. 7(4): 34:1-34:23 (2015) - [c149]Christian Kison, Jürgen Frinken, Christof Paar:
Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast. CHES 2015: 641-660 - [c148]Daehyun Strobel, Florian Bache, David F. Oswald, Falk Schellenberg, Christof Paar:
Scandalee: a side-channel-based disassembler using local electromagnetic emanations. DATE 2015: 139-144 - [c147]Muhammad Hassan, Ayesha Khalid, Anupam Chattopadhyay, Christian Rechberger, Tim Güneysu
, Christof Paar:
New ASIC/FPGA Cost Estimates for SHA-1 Collisions. DSD 2015: 669-676 - [c146]Pawel Swierczynski, Marc Fyrbiak, Christof Paar, Christophe Huriaux
, Russell Tessier:
Protecting against Cryptographic Trojans in FPGAs. FCCM 2015: 151-154 - [c145]Falk Schellenberg, Markus Finkeldey, Bastian Richter, Maximilian Schapers, Nils Gerhardt, Martin Hofmann
, Christof Paar:
On the Complexity Reduction of Laser Fault Injection Campaigns Using OBIC Measurements. FDTC 2015: 14-27 - [c144]Shweta Malik, Georg T. Becker, Christof Paar, Wayne P. Burleson:
Development of a Layout-Level Hardware Obfuscation Tool. ISVLSI 2015: 204-209 - [c143]Christian T. Zenger, Jan Zimmer, Jan-Felix Posielek, Christof Paar:
On-line Entropy Estimation for Secure Information Reconciliation. MobiQuitous 2015: 254-259 - [c142]Christian T. Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar:
Exploiting the Physical Environment for Securing the Internet of Things. NSPW 2015: 44-58 - [c141]Gesine Hinterwälder, Felix Riek, Christof Paar:
Efficient E-cash with Attributes on MULTOS Smartcards. RFIDSec 2015: 141-155 - [c140]Rene Guillaume, Fredrik Winzer, Andreas Czylwik, Christian T. Zenger, Christof Paar:
Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios. VTC Fall 2015: 1-5 - [i22]Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. IACR Cryptol. ePrint Arch. 2015: 343 (2015) - [i21]Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar:
A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation. IACR Cryptol. ePrint Arch. 2015: 348 (2015) - [i20]Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar:
Interdiction in Practice - Hardware Trojan Against a High-Security USB Flash Drive. IACR Cryptol. ePrint Arch. 2015: 768 (2015) - 2014
- [j40]Georg T. Becker, Francesco Regazzoni
, Christof Paar, Wayne P. Burleson:
Stealthy dopant-level hardware Trojans: extended version. J. Cryptogr. Eng. 4(1): 19-31 (2014) - [j39]Daehyun Strobel, David F. Oswald, Bastian Richter, Falk Schellenberg, Christof Paar:
Microcontrollers as (In)Security Devices for Pervasive Computing Applications. Proc. IEEE 102(8): 1157-1173 (2014) - [c139]Christian T. Zenger, Abhijit K. Ambekar, Fredrik Winzer, Thomas Pöppelmann, Hans D. Schotten
, Christof Paar:
Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms. BalkanCryptSec 2014: 103-120 - [c138]Christof Paar:
How to Build Hardware Trojans. TrustED@CCS 2014: 57 - [c137]Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander
, Christof Paar, Tolga Yalçin:
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). CRYPTO (1) 2014: 57-76 - [c136]Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar:
Remote IP Protection Using Timing Channels. ICISC 2014: 222-237 - [c135]Gesine Hinterwälder, Amir Moradi
, Michael Hutter, Peter Schwabe, Christof Paar:
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers. LATINCRYPT 2014: 31-47 - [c134]Stefan Heyse, Ralf Zimmermann, Christof Paar:
Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware. PQCrypto 2014: 126-141 - [c133]Daniel V. Bailey, Markus Dürmuth, Christof Paar:
Statistics on Password Re-use and Adaptive Strength for Financial Accounts. SCN 2014: 218-235 - [c132]Christian T. Zenger, Markus-Julian Chur, Jan-Felix Posielek, Christof Paar, Gerhard Wunder:
A Novel Key Generating Architecture for Wireless Low-Resource Devices. SIoT 2014: 26-34 - [c131]Timo Kasper, David F. Oswald, Christof Paar:
Sweet Dreams and Nightmares: Security in the Internet of Things. WISTP 2014: 1-9 - [i19]Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin:
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version. IACR Cryptol. ePrint Arch. 2014: 453 (2014) - [i18]Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar:
FPGA Trojans through Detecting and Weakening of Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2014: 649 (2014) - 2013
- [j38]Pawel Swierczynski, Gregor Leander
, Christof Paar:
Keccak und der SHA-2. Datenschutz und Datensicherheit 37(11): 712-719 (2013) - [j37]Amir Moradi
, Oliver Mischke, Christof Paar:
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores. IEEE Trans. Computers 62(9): 1786-1798 (2013) - [j36]Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
:
An experimental security analysis of two satphone standards. ACM Trans. Inf. Syst. Secur. 16(3): 10:1-10:30 (2013) - [c130]Susanne Engels, Elif Bilge Kavun
, Christof Paar, Tolga Yalçin, Hristina Mihajloska:
A Non-Linear/Linear Instruction Set Extension for Lightweight Ciphers. IEEE Symposium on Computer Arithmetic 2013: 67-75 - [c129]Thomas Eisenbarth
, Ingo von Maurich, Christof Paar, Xin Ye:
A Performance Boost for Hash-Based Signatures. Number Theory and Cryptography 2013: 166-182 - [c128]Christof Paar:
Constructive and destructive aspects of embedded security in the internet of things. CCS 2013: 1495-1496 - [c127]Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson:
Stealthy Dopant-Level Hardware Trojans. CHES 2013: 197-214 - [c126]Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander
, David F. Oswald, Falk Schellenberg, Christof Paar:
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System. CRYPTO (1) 2013: 147-164 - [c125]Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Christof Paar:
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems. Financial Cryptography 2013: 205-212 - [c124]Amir Moradi, David F. Oswald, Christof Paar, Pawel Swierczynski:
Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering. FPGA 2013: 91-100 - [c123]Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson:
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems. Privacy Enhancing Technologies 2013: 40-59 - [c122]David F. Oswald, Bastian Richter, Christof Paar:
Side-Channel Attacks on the Yubikey 2 One-Time Password Generator. RAID 2013: 204-222 - [c121]Timo Kasper, Alexander Kühn, David F. Oswald, Christian T. Zenger, Christof Paar:
Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing. RFIDSec 2013: 34-53 - [c120]Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede
, Tolga Yalçin:
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. RFIDSec 2013: 103-112 - [c119]David F. Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Christof Paar:
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice. Selected Areas in Cryptography 2013: 571-588 - [i17]Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David F. Oswald, Falk Schellenberg, Christof Paar:
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version. IACR Cryptol. ePrint Arch. 2013: 598 (2013) - [i16]Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin:
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. IACR Cryptol. ePrint Arch. 2013: 753 (2013) - 2012
- [j35]Benedikt Driessen, Christof Paar:
Angriff auf Thuraya Satellitentelefonie. Datenschutz und Datensicherheit 36(12): 886-890 (2012) - [j34]Markus Kasper, Amir Moradi
, Georg T. Becker, Oliver Mischke, Tim Güneysu
, Christof Paar, Wayne P. Burleson:
Side channels as building blocks. J. Cryptogr. Eng. 2(3): 143-159 (2012) - [j33]Georg T. Becker, Daehyun Strobel, Christof Paar, Wayne P. Burleson:
Detecting Software Theft in Embedded Systems: A Side-Channel Approach. IEEE Trans. Inf. Forensics Secur. 7(4): 1144-1154 (2012) - [j32]Amir Moradi
, Mario Kirschbaum, Thomas Eisenbarth
, Christof Paar:
Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods. IEEE Trans. Very Large Scale Integr. Syst. 20(9): 1578-1589 (2012) - [c118]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen
, Gregor Leander
, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. ASIACRYPT 2012: 208-225 - [c117]