Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Matthew J. Berryman
Daniel P. Kennedy
Roland Zumkeller
Maximilian Dürr
Dan Graur
Liangliang Shang
Rhoda Gai-Cherry
Chen Ma
Mohammad Samragh
Barbara Aquilani
Home
/
Author
/
MICHAEL HUTTER
Author Info
Open Visualization
Name
Affiliation
Papers
MICHAEL HUTTER
Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse, Graz, Austria
42
Collaborators
Citations
PageRank
49
345
25.26
Referers
Referees
References
764
766
550
Search Limit
100
766
Publications (42 rows)
Collaborators (49 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Low-Latency Hardware Masking with Application to AES.
0
0.34
2020
Protecting RISC-V against Side-Channel Attacks
1
0.35
2019
Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking.
0
0.34
2018
A Side-Channel Assisted Cryptanalytic Attack Against Qcbits
2
0.41
2017
Threshold Implementations in Industry: A Case Study on SHA-256
0
0.34
2016
Constant-Time Higher-Order Boolean-to-Arithmetic Masking.
1
0.35
2016
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers.
29
1.21
2015
Nacl'S Crypto-Box In Hardware
7
0.64
2015
Multiprecision multiplication on AVR revisited
11
0.65
2015
Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC.
0
0.34
2015
Full-Size High-Security Ecc Implementation On Msp430 Microcontrollers
4
0.44
2014
Clock Glitch Attacks in the Presence of Heating
8
0.66
2014
Curved Tags - A Low-Resource Ecdsa Implementation Tailored For Rfid
7
0.48
2014
Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version.
7
0.52
2014
Pioneer-A Prototype For The Internet Of Things Based On An Extendable Epc Gen2 Rfid Tag
4
0.39
2014
On the power of active relay attacks using custom-made proxies
3
0.42
2014
The Temperature Side Channel and Heating Fault Attacks.
21
0.77
2014
Efficient Multiplication on Low-Resource Devices
1
0.36
2014
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC.
2
0.42
2013
Pushing the limits of SHA-3 hardware implementations to fit on RFID
13
0.83
2013
Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography
5
0.44
2013
Using bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA
3
0.40
2013
Putting together what fits together: grÆstl
1
0.35
2012
Exploiting the difference of side-channel leakages
3
0.41
2012
Improved fixed-base comb method for fast scalar multiplication
6
0.49
2012
Attacking an AES-Enabled NFC tag: implications from design to a real-world scenario
1
0.36
2012
A cryptographic processor for low-resource devices: canning ECDSA and AES like sardines
13
0.80
2011
Exploring the design space of prime field vs. binary field ECC-Hardware implementations
7
0.46
2011
Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
36
1.58
2011
An approach to introducing locality in remote attestation using near field communications
5
0.60
2011
Elliptic curve cryptography on the WISP UHF RFID tag
16
0.74
2011
Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation
16
0.74
2011
A hardware processor supporting elliptic curve cryptography for less than 9 kGEs
10
0.51
2011
An ECDSA pocessor for RFID athentication
16
0.79
2010
On the security of RFID devices against implementation attacks
8
0.44
2010
Side-Channel leakage across borders
4
0.51
2010
Embedded system management using WBEM
4
0.58
2009
Optical Fault Attacks on AES: A Threat in Violet
17
1.20
2009
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices
3
0.43
2009
Attacking ECDSA-Enabled RFID Devices
12
0.68
2009
RFID and Its Vulnerability to Faults
24
1.51
2008
Power And Em Attacks On Passive 13.56 Mhz Rfid Devices
14
0.99
2007
1