How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations | 0 | 0.34 | 2022 |
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing. | 0 | 0.34 | 2021 |
<italic>ARMORY</italic>: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries | 0 | 0.34 | 2021 |
On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note | 0 | 0.34 | 2021 |
Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments | 1 | 0.38 | 2021 |
Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging. | 0 | 0.34 | 2021 |
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security. | 0 | 0.34 | 2021 |
An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes. | 0 | 0.34 | 2020 |
IT-Sicherheit ist mehr als Technik | 0 | 0.34 | 2019 |
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework | 0 | 0.34 | 2019 |
Security Implications of Intentional Capacitive Crosstalk | 3 | 0.45 | 2019 |
The End of Logic Locking? A Critical View on the Security of Logic Locking. | 0 | 0.34 | 2019 |
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights | 0 | 0.34 | 2018 |
An Exploratory Analysis of Microcode as a Building Block for System Defenses. | 0 | 0.34 | 2018 |
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version). | 0 | 0.34 | 2017 |
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods | 1 | 0.36 | 2016 |
Drown: Breaking Tls Using Sslv2 | 16 | 1.10 | 2016 |
Authenticated key establishment for low-resource devices exploiting correlated random channels. | 5 | 0.44 | 2016 |
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport | 3 | 0.40 | 2015 |
Efficient E-cash with Attributes on MULTOS Smartcards | 2 | 0.38 | 2015 |
On-line Entropy Estimation for Secure Information Reconciliation. | 4 | 0.39 | 2015 |
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. | 29 | 1.21 | 2015 |
On the Complexity Reduction of Laser Fault Injection Campaigns Using OBIC Measurements. | 2 | 0.43 | 2015 |
Statistics on Password Re-use and Adaptive Strength for Financial Accounts. | 7 | 0.54 | 2014 |
Remote IP Protection Using Timing Channels. | 1 | 0.43 | 2014 |
A Novel Key Generating Architecture for Wireless Low-Resource Devices | 14 | 0.69 | 2014 |
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version. | 1 | 0.38 | 2014 |
Full-Size High-Security Ecc Implementation On Msp430 Microcontrollers | 4 | 0.44 | 2014 |
Sweet Dreams and Nightmares: Security in the Internet of Things. | 2 | 0.37 | 2014 |
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). | 43 | 1.53 | 2014 |
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version. | 1 | 0.35 | 2013 |
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems. | 12 | 0.53 | 2013 |
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System. | 12 | 0.99 | 2013 |
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. | 12 | 0.69 | 2013 |
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice. | 2 | 0.36 | 2013 |
Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing. | 0 | 0.34 | 2013 |
Lapin: an efficient authentication protocol based on Ring-LPN | 8 | 0.50 | 2012 |
Masked dual-rail precharge logic encounters state-of-the-art power analysis methods | 7 | 0.60 | 2012 |
Black-Box side-channel attacks highlight the importance of countermeasures: an analysis of the xilinx virtex-4 and virtex-5 bitstream encryption mechanism | 17 | 0.92 | 2012 |
Improving side-channel analysis with optimal linear transforms | 17 | 0.79 | 2012 |
Privacy preserving payments on computational RFID devices with application in intelligent transportation systems | 8 | 0.50 | 2012 |
Solving binary linear equation systems over the rationals and binaries | 0 | 0.34 | 2012 |
Angriff auf Thuraya Satellitentelefonie. | 0 | 0.34 | 2012 |
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms. | 8 | 0.61 | 2012 |
Collision Timing Attack when Breaking 42 AES ASIC Cores. | 5 | 0.58 | 2011 |
Breaking mifare DESFire MF3ICD40: power analysis and templates in the real world | 58 | 2.79 | 2011 |
An experimentally verified attack on full grain-128 using dedicated reconfigurable hardware | 31 | 1.16 | 2011 |
Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild | 3 | 0.45 | 2011 |
Differential cache-collision timing attacks on AES with applications to embedded CPUs | 32 | 1.41 | 2010 |
Secure location verification: a security analysis of GPS signal authentication | 0 | 0.34 | 2010 |