Follow
Ingo von Maurich
Title
Cited by
Cited by
Year
Classic McEliece
DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ...
NIST Submission, 2017
224*2017
Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
S Heyse, I Maurich, T Güneysu
International Conference on Cryptographic Hardware and Embedded Systems, 273-292, 2013
1262013
Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices
I von Maurich, T Güneysu
Proceedings of the conference on Design, Automation & Test in Europe, 38, 2014
812014
Classic McEliece
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
NIST Post-Quantum Cryptography Standardization Project (Round 3), https …, 2020
752020
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
International Conference on Smart Card Research and Advanced Applications …, 2012
722012
Implementing qc-mdpc mceliece encryption
IV Maurich, T Oder, T Güneysu
ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-27, 2015
642015
Towards side-channel resistant implementations of QC-MDPC McEliece encryption on constrained devices
I Maurich, T Güneysu
International Workshop on Post-Quantum Cryptography, 266-282, 2014
572014
Differential power analysis of a McEliece cryptosystem
C Chen, T Eisenbarth, I Maurich, R Steinwandt
International Conference on Applied Cryptography and Network Security, 538-556, 2015
542015
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter
I von Maurich, L Heberle, T Güneysu
International Workshop on Post-Quantum Cryptography, 1-17, 2016
282016
Cloning Cryptographic RFID Cards for 25$
T Kasper, I von Maurich, D Oswald, C Paar
Benelux Workshop on Information and System Security, 29-30, 2010
262010
Horizontal and vertical side channel analysis of a McEliece cryptosystem
C Chen, T Eisenbarth, I von Maurich, R Steinwandt
IEEE Transactions on Information Forensics and Security 11 (6), 1093-1105, 2015
252015
Chameleon: A versatile emulator for contactless smartcards
T Kasper, I Maurich, D Oswald, C Paar
International Conference on Information Security and Cryptology, 189-206, 2010
242010
Faster hash-based signatures with bounded leakage
T Eisenbarth, I Maurich, X Ye
International Conference on Selected Areas in Cryptography, 223-243, 2013
212013
Masking Large Keys in Hardware: A Masked Implementation of McEliece
C Chen, T Eisenbarth, I von Maurich, R Steinwandt
202015
Evaluation of SHA-3 candidates for 8-bit embedded processors
S Heyse, I von Maurich, A Wild, C Reuber, J Rave, T Poeppelmann, ...
Presentation at the 2nd SHA-3 Candidate Conference, Santa Barbara, CA, USA, 2010
20*2010
A performance boost for hash-based signatures
T Eisenbarth, I Maurich, C Paar, X Ye
Number Theory and Cryptography, 166-182, 2013
82013
Efficient implementation of cryptographic primitives on the GA144 multi-core architecture
T Schneider, I Von Maurich, T Güneysu
2013 IEEE 24th International Conference on Application-Specific Systems …, 2013
72013
Embedded syndrome-based hashing
I Von Maurich, T Güneysu
International Conference on Cryptology in India, 339-357, 2012
72012
Cryptographic algorithms on the GA144 asynchronous multi-core processor
T Schneider, I von Maurich, T Güneysu, D Oswald
Journal of Signal Processing Systems 77 (1), 151-167, 2014
52014
Efficient Implementation of Code-and Hash-based Cryptography
I von Maurich
Bochum, Ruhr-Universität Bochum, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20