Christof Paar
#127,926
Most Influential Person Now
German crytpographer
Christof Paar's AcademicInfluence.com Rankings
Christof Paarcomputer-science Degrees
Computer Science
#5475
World Rank
#5783
Historical Rank
Database
#2631
World Rank
#2753
Historical Rank

Download Badge
Computer Science
Why Is Christof Paar Influential?
(Suggest an Edit or Addition)Christof Paar's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- PRESENT: An Ultra-Lightweight Block Cipher (2007) (2467)
- Understanding Cryptography: A Textbook for Students and Practitioners (2009) (801)
- Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) (646)
- A Stochastic Model for Differential Side Channel Cryptanalysis (2005) (505)
- A Survey of Lightweight-Cryptography Implementations (2007) (472)
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES (2011) (458)
- PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract (2012) (434)
- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme (2008) (324)
- Cryptographic Hardware and Embedded Systems — CHES 2001 (2001) (322)
- PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) (2012) (318)
- An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists (2001) (299)
- New Lightweight DES Variants (2007) (288)
- Cryptographic Hardware and Embedded Systems - CHES 2003 (2003) (266)
- Cryptographic Hardware and Embedded Systems — CHES 2000 (2002) (257)
- Security in Automotive Bus Systems (2004) (252)
- A High Performance Reconfigurable Elliptic Curve Processor for GF(2m) (2000) (248)
- Stealthy Dopant-Level Hardware Trojans (2013) (242)
- An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists (2000) (225)
- On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs (2011) (224)
- Higher Order Masking of the AES (2006) (214)
- Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms (1998) (211)
- High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware (2001) (201)
- Security on FPGAs: State-of-the-art implementations and attacks (2004) (201)
- A New Class of Collision Attacks and Its Application to DES (2003) (200)
- Templates vs. Stochastic Methods (2006) (196)
- A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composite Fields (1996) (195)
- Hash Functions and RFID Tags: Mind the Gap (2008) (194)
- Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents (2008) (185)
- Generalizations of the Karatsuba Algorithm for Efficient Implementations (2006) (182)
- Efficient Algorithms for Elliptic Curve Cryptosystems (1997) (181)
- Ultra High Performance ECC over NIST Primes on Commercial FPGAs (2008) (180)
- A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware (2001) (179)
- Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering (2009) (179)
- Block Ciphers - Focus on the Linear Layer (feat. PRIDE) (2014) (178)
- Cryptanalysis with COPACOBANA (2008) (170)
- Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker (2006) (169)
- A Collision-Attack on AES: Combining Side Channel- and Differential-Attack (2004) (166)
- Understanding Cryptography (2015) (163)
- Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World (2011) (160)
- DROWN: Breaking TLS Using SSLv2 (2016) (153)
- ECRYPT yearly report on algorithms and keysizes (2009) (143)
- MOLES: Malicious off-chip leakage enabled by side-channels (2009) (135)
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers (2015) (127)
- Optimum Digit Serial GF(2^m) Multipliers for Curve-Based Cryptography (2006) (125)
- Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes (2002) (118)
- Are standards compliant Elliptic Curve Cryptosystems feasible on RFID ? (2006) (110)
- Building a Side Channel Based Disassembler (2010) (107)
- New Light-Weight Crypto Algorithms for RFID (2007) (105)
- Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism (2012) (104)
- Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents (1999) (101)
- Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (2003) (99)
- A survey of lighweight- cryptography implementations (2007) (94)
- Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine (1998) (94)
- An FPGA implementation and performance evaluation of the Serpent block cipher (2000) (92)
- Efficient Multiplier Architectures for Galois Fields GF(2 4n) (1998) (87)
- Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering (2013) (87)
- Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes (2007) (86)
- Lapin: An Efficient Authentication Protocol Based on Ring-LPN (2012) (85)
- Elliptic Curve Cryptography on Smart Cards without Coprocessors (2001) (85)
- MicroEliece: McEliece for Embedded Devices (2009) (84)
- An instruction-level distributed processor for symmetric-key cryptography (2005) (79)
- An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware (2011) (78)
- Optimized arithmetic for Reed-Solomon encoders (1997) (77)
- FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives (2015) (77)
- Secure In-Vehicle Communication (2006) (76)
- Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications (2003) (74)
- Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs (2010) (74)
- On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting (2011) (72)
- How Secure Are FPGAs in Cryptographic Applications? (2003) (71)
- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment (2009) (70)
- Reconfigurable trusted computing in hardware (2007) (70)
- Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers (2003) (70)
- Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques (2019) (70)
- DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction (2004) (69)
- Efficient hardware architectures for modular multiplication on FPGAs (2005) (67)
- Stealthy dopant-level hardware Trojans: extended version (2014) (66)
- Fast Hash-Based Signatures on Constrained Devices (2008) (64)
- Side-channel based watermarks for integrated circuits (2010) (61)
- Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers (2005) (60)
- Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures (2013) (59)
- A super-serial Galois fields multiplier for FPGAs and its application to public-key algorithms (1999) (58)
- Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation (2011) (58)
- Breaking ECC2K-130 (2009) (58)
- Embedded Security in Cars: Securing Current and Future Automotive IT Applications (2005) (57)
- Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards (2012) (54)
- Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed (2009) (54)
- Hardware reverse engineering: Overview and open challenges (2017) (53)
- Cryptography in Embedded Systems : An Overview (2003) (52)
- DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs (2010) (52)
- Dynamic Intellectual Property Protection for Reconfigurable Devices (2007) (51)
- Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers (2008) (51)
- Gaussian Mixture Models for Higher-Order Side Channel Analysis (2007) (51)
- A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) (2006) (51)
- SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers (2005) (50)
- Comparison of arithmetic architectures for Reed-Solomon decoders in reconfigurable hardware (1997) (49)
- Embedded Security in Cars (2006) (49)
- SCANDALee: A side-ChANnel-based DisAssembLer using local electromagnetic emanations (2015) (48)
- Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers (2001) (48)
- Elliptic Curve Cryptography on a Palm OS Device (2001) (47)
- Low Cost Security: Explicit Formulae for Genus-4 Hyperelliptic Curves (2003) (47)
- Comparison of innovative signature algorithms for WSNs (2008) (47)
- Embedded end-to-end wireless security with ECDH key exchange (2003) (47)
- A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies (2007) (46)
- The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs (2021) (46)
- Improving Side-Channel Analysis with Optimal Linear Transforms (2012) (46)
- HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion (2019) (45)
- E-Passport: The Global Traceability Or How to Feel Like a UPS Package (2006) (44)
- Interdiction in practice—Hardware Trojan against a high-security USB flash drive (2017) (43)
- A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications (2006) (43)
- Cantor versus Harley: optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems (2005) (43)
- Bitstream Fault Injections (BiFI)–Automated Fault Attacks Against SRAM-Based FPGAs (2018) (43)
- Practical Power Analysis Attacks on Software Implementations of McEliece (2010) (42)
- Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers (2007) (42)
- Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor (2004) (42)
- Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography (2015) (42)
- How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP (2000) (41)
- Elliptic and hyperelliptic curves on embedded μP (2004) (41)
- All You Can Eat or Breaking a Real-World Contactless Payment System (2010) (40)
- Power Attacks Resistance of Cryptographic S-boxes with added Error Detection Circuits (2007) (40)
- An Embedded System for Practical Security Analysis of Contactless Smartcards (2007) (40)
- Microcontrollers as (In)Security Devices for Pervasive Computing Applications (2014) (39)
- Some remarks on efficient inversion in finite fields (1995) (38)
- Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms (2012) (38)
- Development of a Layout-Level Hardware Obfuscation Tool (2015) (37)
- On the Difficulty of FSM-based Hardware Obfuscation (2018) (37)
- Design space exploration of present implementations for FPGAS (2009) (37)
- Authenticated key establishment for low-resource devices exploiting correlated random channels (2016) (36)
- A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks (2016) (36)
- E-Passport: Cracking Basic Access Control Keys (2007) (36)
- Cryptography on FPGAs: State of the Art Implementations and Attacks (2003) (36)
- A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation (2015) (35)
- Efficient Hardware Implementation of Finite Fields with Applications to Cryptography (2006) (35)
- Area-time efficient hardware architecture for factoring integers with the elliptic curve method (2005) (34)
- Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs (2015) (34)
- Implementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems (1999) (34)
- RFID. Security and Privacy (2011) (34)
- Security Analysis of Quantization Schemes for Channel-based Key Extraction (2015) (33)
- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption (2009) (33)
- Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods (2012) (33)
- Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods (2007) (33)
- A Novel Key Generating Architecture for Wireless Low-Resource Devices (2014) (33)
- DSPs, BRAMs and a Pinch of Logic: New Recipes for AES on FPGAs (2008) (33)
- Large laser spots and fault sensitivity analysis (2016) (32)
- High performance arithmetic for special hyperelliptic curve cryptosystems of genus two (2004) (32)
- Full-Size High-Security ECC Implementation on MSP430 Microcontrollers (2014) (32)
- Efficient Software-Implementation of Finite Fields with Applications to Cryptography (2006) (32)
- Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios (2015) (32)
- Lightweight Cryptography and RFID: Tackling the Hidden Overhead (2009) (32)
- Side-Channel Attacks on the Yubikey 2 One-Time Password Generator (2013) (32)
- Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation (2014) (31)
- Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2n)m) (1997) (31)
- New Designs in Lightweight Symmetric Encryption (2008) (30)
- The Advanced Encryption Standard (AES) (2010) (30)
- KeeLoq and Side-Channel Analysis-Evolution of an Attack (2009) (30)
- Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems (2013) (29)
- Introduction to Cryptography and Data Security (2010) (29)
- Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware (2010) (29)
- Exploiting the Physical Environment for Securing the Internet of Things (2015) (28)
- Embedded security in a pervasive world (2007) (27)
- Statistics on Password Re-use and Adaptive Strength for Financial Accounts (2014) (27)
- Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System (2013) (27)
- Graph Similarity and its Applications to Hardware Security (2020) (26)
- One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores (2013) (26)
- Physical Cryptanalysis of KeeLoq Code Hopping Applications (2008) (26)
- Toward an FPGA architecture optimized for public-key algorithms (1999) (25)
- Security Aspects of FPGAs in Cryptographic Applications (2005) (25)
- ECRYPT Stream Cipher Project (2011) (24)
- High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two (2003) (24)
- On efficient inversion in tower fields of characteristic two (1997) (24)
- The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions (2016) (24)
- A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain (2007) (23)
- Templates vs. stochastic methods : A performance analysis for side channel cryptanalysis (2006) (23)
- On digital signatures in ad hoc networks (2005) (23)
- The First Thorough Side-Channel Hardware Trojan (2017) (23)
- Pay as you go (1980) (23)
- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology (2009) (22)
- Side channels as building blocks (2012) (22)
- Hyperelliptic Curve Coprocessors on a FPGA (2004) (22)
- Reconfigurable computing for symmetric-key algorithms (2002) (22)
- Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments (2020) (22)
- Attacking elliptic curve cryptosystems with special-purpose hardware (2007) (21)
- Efficient Authentication Mechanisms for Navigation Systems - a Radio-Navigation Case Study (2009) (21)
- Hardware architectures proposed for cryptosystems based on hyperelliptic curves (2002) (21)
- Detecting Software Theft in Embedded Systems: A Side-Channel Approach (2012) (21)
- The End of Logic Locking? A Critical View on the Security of Logic Locking (2019) (21)
- Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem (2008) (21)
- Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream (2019) (21)
- Information Security Management System (2014) (21)
- A look at the dark side of hardware reverse engineering - a case study (2017) (20)
- Reverse Engineering x86 Processor Microcode (2019) (20)
- When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice (2013) (19)
- An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software (2011) (19)
- Information Leakage of Flip-Flops in DPA-Resistant Logic Styles (2008) (19)
- IPSecco: A lightweight and reconfigurable IPSec core (2012) (18)
- Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport (2015) (18)
- Transforming write collisions in block RAMs into security applications (2009) (18)
- On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4 and Virtex 5 Bitstream Encryption Mechanism (2011) (17)
- Finding optimum parallel coprocessor design for genus 2 hyperelliptic curve cryptosystems (2004) (17)
- Pollard Rho on the PlayStation 3 (2009) (17)
- Cryptographic component identification: enabler for secure vehicles (2005) (17)
- SMITH - A Parallel Hardware Architecture for Fast Gaussian Elimination over GF(2) (2006) (17)
- Chameleon: A Versatile Emulator for Contactless Smartcards (2010) (17)
- Iso/iec 27001 (2011) (16)
- Security Implications of Intentional Capacitive Crosstalk (2019) (16)
- Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive? (2021) (16)
- The Data Encryption Standard (DES) and Alternatives (2010) (16)
- Protecting against Cryptographic Trojans in FPGAs (2015) (16)
- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (2013) (15)
- Cryptography is feasible on 4-Bit microcontrollers - A proof of concept (2009) (15)
- An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices (2006) (15)
- On the Portability of Side-Channel Attacks – An Analysis of the Xilinx Virtex 4 , Virtex 5 , and Spartan 6 Bitstream Encryption Mechanism – (2011) (15)
- Some Thoughts about Implementation Properties of Stream Ciphers ? (2004) (15)
- IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing (2021) (14)
- On the Complexity Reduction of Laser Fault Injection Campaigns Using OBIC Measurements (2015) (14)
- The Certicom Challenges ECC2-X (2009) (14)
- Instruction-level distributed processing for symmetric-key cryptography (2003) (14)
- Architectural support for arithmetic in optimal extension fields (2004) (14)
- Side-channel watermarks for embedded software (2011) (14)
- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems (2012) (14)
- New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs (2009) (13)
- Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework (2019) (13)
- Practical evaluation of DPA countermeasures on reconfigurable hardware (2011) (13)
- Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis (2008) (13)
- DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering (2020) (13)
- Embedded Cryptography: Side Channel Attacks (2006) (13)
- Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations (2019) (13)
- Three Years of Evolution : Cryptanalysis with COPACOBANA (2009) (12)
- Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights (2018) (12)
- IT security project: implementation of the Advanced Encryption Standard (AES) on a smart card (2004) (12)
- Testing Framework for eSTREAM Proflle II Candidates (2005) (12)
- Entity Resolution (2011) (12)
- Cryptographic Hardware and Embedded Systems: First InternationalWorkshop, CHES’99 Worcester, MA, USA, August 12–13, 1999 Proceedings (1999) (11)
- High-Performance Cryptanalysis on RIVYERA and COPACOBANA Computing Systems (2013) (11)
- Better than Brute-Force --- Optimized Hardware Architecture for Efficient Biclique Attacks on AES-128 (2012) (11)
- Introduction to Public-Key Cryptography (2010) (11)
- A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices (2010) (11)
- An Efficient General Purpose Elliptic Curve Cryptography Module for Ubiquitous Sensor Networks (2007) (11)
- chitecture for a Parallel Finite lier with Low Complexity Based on Composite Fields Fi (1996) (11)
- Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead (2018) (11)
- An experimental security analysis of two satphone standards (2013) (10)
- Design automation for obfuscated circuits with multiple viable functions (2017) (10)
- SAT-based reverse engineering of gate-level schematics using fault injection and probing (2018) (10)
- Power Analysis of Single-Rail Storage Elements as Used in MDPL (2009) (10)
- Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors (2018) (10)
- An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method (2005) (10)
- Cryptographic Hardware and Embedded Systems - CHES 2001: Third International Workshop, Paris, France, May 14-16, 2001 Proceedings (2001) (10)
- Faster discrete logarithms on FPGAs (2016) (9)
- Secure IP-block distribution for hardware devices (2009) (9)
- Squaring architecture for GF(2/sup m/) and its applications in cryptographic systems (2000) (9)
- Area efficient GF(p) architectures for GF(p/sup m/) multipliers (2002) (9)
- COPACOBANA A Cost-Optimized Special-Purpose Hardware for Code-Breaking (2006) (9)
- Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild (2011) (9)
- New Protection Mechanisms for Intellectual Property in Reconfigurable Logic (2007) (8)
- Efficient Hash-Based Signatures on Embedded Devices (2008) (8)
- Faster elliptic-curve discrete logarithms on FPGAs (2016) (8)
- Side-Channel based Watermarks for IP Protection (2010) (8)
- An Exploratory Analysis of Microcode as a Building Block for System Defenses (2018) (8)
- How to Break DES for B C 8 , 980 (8)
- How Secure Are FPGAs in Cryptographic Applications? (Long Version) ? (2003) (8)
- Low Complexity Parallel Multipliers for Galois Fields GF( (q4) Based on Special Types of Primitive Polynomials (2015) (8)
- High-Performance Integer Factoring with Reconfigurable Devices (2010) (8)
- A survey of algorithmic methods in IC reverse engineering (2021) (8)
- Parallel Computing with Low-Cost FPGAs: A Framework for COPACOBANA (2007) (8)
- On the Security and Efficiency of Real-World Lightweight Authentication Protocols (2008) (7)
- Message Authentication Codes (MACs) (2010) (7)
- Efficient Implementation of Galois Field Fixed Field Constant Multiplication (2006) (7)
- On-line Entropy Estimation for Secure Information Reconciliation (2015) (7)
- Low complexity parallel multipliers for Galois fields GF((2/sup n/)/sup 4/) based on special types of primitive polynomials (1994) (7)
- Preventing relay attacks and providing perfect forward secrecy using PHYSEC on 8-bit µC (2016) (7)
- Cryptographic Hardware and Embedded Systems -- CHES 2003: 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings (2003) (7)
- Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast (2015) (7)
- A Non-Linear/Linear Instruction Set Extension for Lightweight Ciphers (2013) (7)
- Chapter I Special Hyperelliptic Curve Cryptosystems of Genus Two : Efficient Arithmetic and Fast Implementation (2004) (7)
- Embedded IT Security in Automotive Application — An Emerging Area (2006) (7)
- Public-Key Cryptosystems Based on the Discrete Logarithm Problem (2010) (7)
- Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet (2016) (6)
- Efficient E-cash with Attributes on MULTOS Smartcards (2015) (6)
- Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights (2019) (6)
- An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes (2021) (6)
- Collision Timing Attack when Breaking 42 AES ASIC Cores (2011) (6)
- Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms (2014) (6)
- Cloning Cryptographic RFID (2010) (6)
- Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces (2021) (6)
- Establishing Chain of Trust in Reconfigurable Hardware (2007) (6)
- On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware (2006) (6)
- Implementing Data Security and Privacy in Next-Generation Electric Vehicle Systems (2010) (6)
- Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing (2013) (6)
- E-Passport : Cracking Basic Access Control Keys with COPACOBANA ⋆ (2007) (6)
- An Algorithm-Agile Cryptographic Co-processor Based on FPGAs (1999) (5)
- Security for 1000 Gate Equivalents (2008) (5)
- Automotive digital rights management systems (2006) (5)
- DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering (2020) (5)
- Sweet Dreams and Nightmares: Security in the Internet of Things (2014) (5)
- Performance of HECC Coprocessors Using Inversion-Free Formulae (2006) (5)
- The RSA Cryptosystem (2010) (5)
- Efficient VLSI architectures for bit parallel computation in Galios [Galois] fields (1994) (5)
- Architectures for Advanced Cryptographic Systems (2004) (4)
- Cryptographic hardware and embedded systems - CHES 2000 : second international workshop, Worcester, MA, USA, August 17-18, 2000 : proceedings (2000) (4)
- Wireless Authentication and Transaction-Confirmation Token (2009) (4)
- Common-path depth-filtered digital holography for high resolution imaging of buried semiconductor structures (2016) (4)
- Implementation of AES Algorithm Using FPGA & Its Performance Analysis (2015) (4)
- Efficient Hash Collision Search Strategies on Special-Purpose Hardware (2007) (4)
- Promoting the Acquisition of Hardware Reverse Engineering Skills (2019) (4)
- Challenges for Cryptology Research in Europe for 2007-2013 and beyond (2006) (4)
- SPFA: SFA on Multiple Persistent Faults (2020) (4)
- Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging (2020) (4)
- Design of Low-Power DPA-Resistant Cryptographic Functional Units (2005) (4)
- Eingebettete Sicherheit: State-of-the-art (2004) (4)
- New ASIC/FPGA Cost Estimates for SHA-1 Collisions (2015) (4)
- IP core protection using voltage-controlled side-channel receivers (2016) (4)
- Small-Footprint Block Cipher Design - How far can you go? (2007) (4)
- Physical Security Bounds Against Tampering (2006) (3)
- A Configuration Concept for a Massively Parallel FPGA Architecture (2006) (3)
- Elliptic Curve Cryptosystems (2010) (3)
- Secure Location Verification (2010) (3)
- Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware (2014) (3)
- Implementation of a Reprogrammable Reed-SolomonDecoder over GF ( 216 ) on a Digital Signal Processorwith External Arithmetic Unit (1994) (3)
- Fast Inversion in Composite Galois Fields GF( (2n)m)1 (1998) (3)
- Recent Developments in Digital Wireless Network Security (1996) (3)
- How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 Implementations (2021) (3)
- Security of Wireless Embedded Devices in the Real World (2012) (3)
- Case Study: Compiler Comparison for an Embedded Cryptographical Application (2004) (3)
- Mirror Mirror on the Wall: Next-Generation Wireless Jamming Attacks Based on Software-Controlled Surfaces (2021) (3)
- A Performance Boost for Hash-Based Signatures (2013) (3)
- Breaking KeeLoq in a Flash ⋆ - (2009) (3)
- Breaking Legacy Banking Standards with Special-Purpose Hardware (2008) (3)
- Fast inversion in composite Galois fields GF((2/sup n/)/sup m/) (1998) (3)
- Modular Integer Arithmetic for Public Key Cryptography (2010) (2)
- Crypto Engineering: Some History and Some Case Studies (2009) (2)
- Guest Editors' Introduction to the Special Section on Cryptographic Hardware and Embedded Systems (2003) (2)
- ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries (2021) (2)
- Experimentally Verifying a Complex Algebraic Attack on the Grain-128 Cipher Using Dedicated Reconfigurable Hardware (2012) (2)
- The future of high-speed cryptography: new computing platforms and new ciphers (2011) (2)
- Analyzing the Spanish strip cipher by combining combinatorial and statistical methods (2016) (2)
- - 1-SECURING GREEN CARS : IT SECURITY IN NEXT-GENERATION ELECTRIC VEHICLE SYSTEMS (2009) (2)
- Constructive and destructive aspects of embedded security in the internet of things (2013) (2)
- Cryptography in Modern Communication Systems (1999) (2)
- Algorithm-agile cryptographic coprocessor based on FPGAs (1999) (2)
- Physical Attacks (2020) (2)
- Temperature-Based Hardware Trojan For Ring-Oscillator-Based TRNGs (2019) (2)
- Design of Low-Power DPA-Resistant Cryptographic Functional Units for Pervasive Computing (2005) (2)
- Improving Side-Channel Analysis with Optimal Pre-Processing (2012) (2)
- Hardware Trojans and Other Threats against Embedded Systems (2017) (2)
- Trusted Computing in Automotive Systems (2007) (2)
- Time Memory Tradeoff Implementation on Copacobana (2007) (2)
- A Cautionary Note on Protecting Xilinx’ UltraScale(+) Bitstream Encryption and Authentication Engine (2022) (2)
- Solving Binary Linear Equation Systems over the Rationals and Binaries (2012) (1)
- The Certicom Challenges ECC 2X (2017) (1)
- RFID security and privacy : 7th International Workshop, RFIDSec 2011, Amherst, MA, USA, June 26-28, 2011 : revised selected papers (2012) (1)
- One-touch Financial Transaction Authentication (2009) (1)
- More About Block Ciphers (2010) (1)
- Inversion in Finite Fields and Rings (2005) (1)
- An Efficient Squaring Architecture for GF (2 m )a nd its Applications in Cryptographic Systems (2000) (1)
- Information Integrity (2011) (1)
- Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems (2021) (1)
- An Experimentally Veri ed Attack on Full Grain-128 Using Dedicated Recon gurable Hardware (2011) (1)
- Software-Based Attestation (2011) (1)
- How to Build Hardware Trojans (2014) (1)
- Security Requirements Engineering in the Automotive Domain: On Specification Procedures and Implementation Aspects (2008) (1)
- Reverse Engineering x 86 Processor Microcode (2017) (1)
- Keys from the Sky: A First Exploration of Physical-Layer Security Using Satellite Links (2020) (1)
- Digital Rights Management Systeme (DRMS) als Enabling Technology im Automobil (2005) (1)
- On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note (2021) (1)
- Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems (2000) (1)
- Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging (2022) (1)
- IT Security and Electromobility (2012) (1)
- LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security (2021) (1)
- Remote IP Protection Using Timing Channels (2014) (1)
- Cryptography on Trace-Zero Varieties (2008) (0)
- A survey of algorithmic methods in IC reverse engineering (2021) (0)
- The Yin and Yang Sides of Embedded Security (2011) (0)
- Trusted Computing für automobile IT-Systeme (2008) (0)
- Guest Editorial (2011) (0)
- Guest Editorial: Cryptography algorithms and architectures for System-on-Chip (2005) (0)
- Remote IP Prote tion using Timing (2014) (0)
- Identity Proof (2011) (0)
- Side channels as building blocks (2012) (0)
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers (2015) (0)
- A critical view on the real-world security of logic locking (2022) (0)
- DynamicIntellectual Property Protection forReconfigurable Devices (2007) (0)
- Under surveillance (2012) (0)
- The Yin and Yang Sides of Embedded Security ( Extended Abstract ) (0)
- Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks (2004) (0)
- Expanding Explainability: From Explainable Artificial Intelligence to Explainable Hardware (2023) (0)
- Exponentiation Algorithms (2005) (0)
- Subgroup Cryptosystems (2011) (0)
- Special-Purpose Cryptanalytical Hardware (2011) (0)
- A Compact Implementation of Edon 80 ? (0)
- Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems (2002) (0)
- Chapter 1 SECURITY ASPECTS OF FPGAS IN CRYPTOGRAPHIC APPLICATIONS (2004) (0)
- Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems (1999) (0)
- PowerAttacksResistanceofCryptographicS-boxeswithaddedError DetectionCircuits (2007) (0)
- The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors during Problem Solving (2022) (0)
- Implementing a real-time capable WPLS testbed for independent performance and security analyses (2017) (0)
- "Security requires a holistic approach" (2019) (0)
- Public-Key Cryptography with Arbitrary Finite Fields (2000) (0)
- Time-Memory Analysis of Parallel Collision Search Algorithms (2021) (0)
- Security Analysis of IoT Devices: From the system level to the logic level (2023) (0)
- Proceedings of the 7th international conference on RFID Security and Privacy (2011) (0)
- RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based Key Generation (2023) (0)
- Secure Location Verification - A Security Analysis of GPS Signal Authentication (2010) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- Optimal Extension Fields (OEFs) (2005) (0)
- Common Randomness Channel Estimation Quantization Information Reconciliation Privacy Amplification Channel Estimation Quantization Information Reconciliation Privacy Amplification Channel Profile Quantized Channel Profile Synchronized Key Material Key Candidate (2015) (0)
- Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations (2022) (0)
- Interdiction in practice—Hardware Trojan against a high-security USB flash drive (2016) (0)
- CCCiCC: A Cross-Core Cache-Independent Covert Channel on AMD Family 15h CPUs (2019) (0)
- Evil from Within: Machine Learning Backdoors through Hardware Trojans (2023) (0)
- Listen to Your Heart: Evaluation of the Cardiologic Ecosystem (2021) (0)
- Stealthy dopant-level hardware Trojans: extended version (2014) (0)
- IT-Sicherheit in Geoinformationssystemen (2004) (0)
- Speaker Biometrics (2009) (0)
- Breaking ECC 2 K-130 (2017) (0)
- Elektroautos und IT Security: Sicherheit fr alternative Transportsysteme (2009) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Christof Paar?
Christof Paar is affiliated with the following schools: