• Postal addressShow on map

    Ratzeburger Allee 160, Gebäude 64, 2. OG

    23562 Lübeck

    Germany

Filter
Conference contribution

Search results

  • 2012

    Wide Collisions in Practice

    Ye, X. & Eisenbarth, T., 06.2012, Applied Cryptography and Network Security. Bao, F., Samarati, P. & Zhou, J. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 7341. p. 329-343 15 p. (Lecture Notes in Computer Science; vol. 7341).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2010

    Correlation-Enhanced Power Analysis Collision Attack

    Moradi, A., Mischke, O. & Eisenbarth, T., 08.2010, Cryptographic Hardware and Embedded Systems, CHES 2010. Mangard, S. & Standaert, F.-X. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 6225. p. 125-139 15 p. (Lecture Notes in Computer Science; vol. 6225).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs

    Bogdanov, A., Eisenbarth, T., Paar, C. & Wienecke, M., 03.2010, Topics in Cryptology - CT-RSA 2010. Pieprzyk, J. (ed.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 5985. p. 235-251 17 p. (Lecture Notes in Computer Science; vol. 5985).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Power Analysis of Single-Rail Storage Elements as Used in MDPL

    Moradi, A., Eisenbarth, T., Poschmann, A. & Paar, C., 12.2010, Information, Security and Cryptology -- ICISC 2009. Lee, D. & Hong, S. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 5984. p. 146-160 15 p. (Lecture Notes in Computer Science; vol. 5984).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2009

    KeeLoq and Side-Channel Analysis-Evolution of an Attack

    Paar, C., Eisenbarth, T., Kasper, M., Kasper, T. & Moradi, A., 09.2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, p. 65-69 5 p. (IEEE proceedings).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • MicroEliece: McEliece for Embedded Devices

    Eisenbarth, T., Güneysu, T., Heyse, S. & Paar, C., 09.2009, Cryptographic Hardware and Embedded Systems - CHES 2009. Clavier, C. & Gaj, K. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 5747. p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 5747).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2008

    Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?

    Regazzoni, F., Eisenbarth, T., Breveglieri, L., Ienne, P. & Koren, I., 10.10.2008, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems. IEEE, p. 202-210 9 p. (International Symposium on Defect and Fault Tolerance of VLSI Systems).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers

    Meiser, G., Eisenbarth, T., Lemke-Rust, K. & Paar, C., 25.07.2008, 2008 International Symposium on Industrial Embedded Systems. IEEE, p. 58-66 9 p. (International Symposium on Industrial Embedded Systems).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Fast Hash-Based Signatures on Constrained Devices

    Rohde, S., Eisenbarth, T., Dahmen, E., Buchmann, J. & Paar, C., 09.2008, Smart Card Research and Advanced Applications. Grimaud, G. & Standaert, F.-X. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 5189. p. 104-117 14 p. (Lecture Notes in Computer Science; vol. 5189).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme

    Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M. & Shalmani, M. T. M., 08.2008, Advances in Cryptology -- CRYPTO 2008. Wagner, D. (ed.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 5157. p. 203-220 18 p. (Lecture Notes in Computer Science; vol. 5157).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Time-Area Optimized Public-Key Engines: MQ -Cryptosystems as Replacement for Elliptic Curves?

    Bogdanov, A., Eisenbarth, T., Rupp, A. & Wolf, C., 08.2008, Cryptographic Hardware and Embedded Systems -- CHES 2008. Oswald, E. & Rohatgi, P. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 5154. p. 45-61 17 p. (Lecture Notes in Computer Science; vol. 5154).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • 2007

    A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations

    Bogdanov, A., Eisenbarth, T. & Rupp, A., 09.2007, Cryptographic Hardware and Embedded Systems - CHES 2007. Paillier, P. & Verbauwhede, I. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, Vol. 4727. p. 394-412 19 p. (Lecture Notes in Computer Science; vol. 4727).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies

    Regazzoni, F., Badel, S., Eisenbarth, T., Grossschadl, J., Poschmann, A., Deniz, Z. T., Macchetti, M., Pozzi, L., Paar, C., Leblebici, Y. & Ienne, P., 08.08.2007, 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation. IEEE, p. 209-214 6 p. (International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Establishing Chain of Trust in Reconfigurable Hardware

    Eisenbarth, T., Guneysu, T., Paar, C., Sadeghi, A.-R., Wolf, M. & Tessier, R., 04.08.2007, 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007). IEEE, p. 289-290 2 p. (Symposium on Field-Programmable Custom Computing Machines ).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits

    Regazzoni, F., Eisenbarth, T., Grossschadl, J., Breveglieri, L., Ienne, P., Koren, I. & Paar, C., 22.10.2007, 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), 26-28 September 2007, Rome, Italy.. IEEE, p. 508-516 9 p. (International Symposium on Defect and Fault-Tolerance in VLSI Systems).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review

  • Reconfigurable trusted computing in hardware

    Eisenbarth, T., Güneysu, T., Paar, C., Sadeghi, A.-R., Schellekens, D. & Wolf, M., 02.11.2007, Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007. ACM, p. 15-20 6 p. (Proceedings of ACM workshop on Scalable trusted computin).

    Research output: Chapters in Books/Reports/Conference ProceedingsConference contributionpeer-review