A timing attack against Patterson algorithm in the McEliece PKC A Shoufan, F Strenzke, HG Molter, M Stöttinger Information, Security and Cryptology–ICISC 2009: 12th International …, 2010 | 92 | 2010 |
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ... Journal of Cryptographic Engineering 4, 259-274, 2014 | 47 | 2014 |
A new difference method for side-channel analysis with high-dimensional leakage models A Heuser, M Kasper, W Schindler, M Stöttinger Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012 | 40 | 2012 |
A simple power analysis attack on a McEliece cryptoprocessor HG Molter, M Stöttinger, A Shoufan, F Strenzke Journal of Cryptographic Engineering 1, 29-36, 2011 | 40 | 2011 |
A stochastic method for security evaluation of cryptographic FPGA implementations M Kasper, W Schindler, M Stöttinger 2010 International Conference on Field-Programmable Technology, 146-153, 2010 | 37 | 2010 |
Support vector regression: exploiting machine learning techniques for leakage modeling D Jap, M Stöttinger, S Bhasin Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015 | 30 | 2015 |
Side channel analysis of the SHA-3 finalists M Zohner, M Kasper, M Stöttinger, SA Huss 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012 | 30 | 2012 |
Lms vs xmss: comparison of stateful hash-based signature schemes on arm cortex-m4 F Campos, T Kohlstadt, S Reith, M Stöttinger International Conference on Cryptology in Africa, 258-277, 2020 | 28 | 2020 |
Among slow dwarfs and fast giants: A systematic design space exploration of KECCAK B Jungk, M Stöttinger 2013 8th International Workshop on Reconfigurable and Communication-Centric …, 2013 | 28 | 2013 |
Revealing side-channel issues of complex circuits by enhanced leakage models A Heuser, W Schindler, M Stöttinger 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012 | 28 | 2012 |
Hardware trojan design and detection: a practical evaluation S Kutzner, AY Poschmann, M Stöttinger Proceedings of the Workshop on Embedded Systems Security, 1-9, 2013 | 25 | 2013 |
Efficient side-channel protections of ARX ciphers B Jungk, R Petri, M Stöttinger Cryptology ePrint Archive, 2018 | 24 | 2018 |
Verifying post-quantum signatures in 8 kB of RAM R Gonzalez, A Hülsing, MJ Kannwischer, J Krämer, T Lange, M Stöttinger, ... Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021 | 19 | 2021 |
Serialized lightweight SHA-3 FPGA implementations B Jungk, M Stöttinger Microprocessors and Microsystems 71, 102857, 2019 | 19 | 2019 |
Amasive: an adaptable and modular autonomous side-channel vulnerability evaluation framework SA Huss, M Stöttinger, M Zohner Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the …, 2013 | 18 | 2013 |
Trouble at the CSIDH: protecting CSIDH with dummy-operations against fault injection attacks F Campos, MJ Kannwischer, M Meyer, H Onuki, M Stöttinger 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 57-65, 2020 | 17 | 2020 |
Secure boot revisited: challenges for secure implementations in the automotive domain S Sanwald, L Kaneti, M Stöttinger, M Böhner SAE International Journal of Transportation Cybersecurity and Privacy 2 (11 …, 2020 | 17 | 2020 |
TROJANUS: An ultra-lightweight side-channel leakage generator for FPGAs S Kutzner, A Poschmann, M Stöttinger 2013 International Conference on Field-Programmable Technology (FPT), 160-167, 2013 | 16 | 2013 |
Side-channel resistant AES architecture utilizing randomized composite field representations B Jungk, M Stöttinger, J Gampe, S Reith, SA Huss 2012 International Conference on Field-Programmable Technology, 125-128, 2012 | 16 | 2012 |
How a symmetry metric assists side-channel evaluation-a novel model verification method for power analysis A Heuser, M Kasper, W Schindler, M Stottinger 2011 14th Euromicro Conference on Digital System Design, 674-681, 2011 | 16 | 2011 |