Name
Affiliation
Papers
CHRISTOF PAAR
Horst Görtz Institute for IT-Security, Ruhr University Bochum, Bochum, Germany
246
Collaborators
Citations 
PageRank 
345
3794
442.62
Referers 
Referees 
References 
5438
2571
2466
Search Limit
1001000
Title
Citations
PageRank
Year
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations00.342022
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.00.342021
<italic>ARMORY</italic>: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries00.342021
On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note00.342021
Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments10.382021
Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging.00.342021
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security.00.342021
An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes.00.342020
IT-Sicherheit ist mehr als Technik00.342019
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework00.342019
Security Implications of Intentional Capacitive Crosstalk30.452019
The End of Logic Locking? A Critical View on the Security of Logic Locking.00.342019
Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights00.342018
An Exploratory Analysis of Microcode as a Building Block for System Defenses.00.342018
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version).00.342017
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods10.362016
Drown: Breaking Tls Using Sslv2161.102016
Authenticated key establishment for low-resource devices exploiting correlated random channels.50.442016
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport30.402015
Efficient E-cash with Attributes on MULTOS Smartcards20.382015
On-line Entropy Estimation for Secure Information Reconciliation.40.392015
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers.291.212015
On the Complexity Reduction of Laser Fault Injection Campaigns Using OBIC Measurements.20.432015
Statistics on Password Re-use and Adaptive Strength for Financial Accounts.70.542014
Remote IP Protection Using Timing Channels.10.432014
A Novel Key Generating Architecture for Wireless Low-Resource Devices140.692014
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version.10.382014
Full-Size High-Security Ecc Implementation On Msp430 Microcontrollers40.442014
Sweet Dreams and Nightmares: Security in the Internet of Things.20.372014
Block Ciphers - Focus on the Linear Layer (feat. PRIDE).431.532014
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version.10.352013
Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems.120.532013
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System.120.992013
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures.120.692013
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice.20.362013
Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing.00.342013
Lapin: an efficient authentication protocol based on Ring-LPN80.502012
Masked dual-rail precharge logic encounters state-of-the-art power analysis methods70.602012
Black-Box side-channel attacks highlight the importance of countermeasures: an analysis of the xilinx virtex-4 and virtex-5 bitstream encryption mechanism170.922012
Improving side-channel analysis with optimal linear transforms170.792012
Privacy preserving payments on computational RFID devices with application in intelligent transportation systems80.502012
Solving binary linear equation systems over the rationals and binaries00.342012
Angriff auf Thuraya Satellitentelefonie.00.342012
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms.80.612012
Collision Timing Attack when Breaking 42 AES ASIC Cores.50.582011
Breaking mifare DESFire MF3ICD40: power analysis and templates in the real world582.792011
An experimentally verified attack on full grain-128 using dedicated reconfigurable hardware311.162011
Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild30.452011
Differential cache-collision timing attacks on AES with applications to embedded CPUs321.412010
Secure location verification: a security analysis of GPS signal authentication00.342010
  • 1
  • 2