BIKE: bit flipping key encapsulation N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 156 | 2022 |
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices J Richter-Brockmann, J Mono, T Güneysu IEEE Transactions on Computers, 2020 | 49 | 2020 |
FIVER–Robust Verification of Countermeasures against Fault Injections J Richter-Brockmann, AR Shahmirzadi, P Sasdrich, A Moradi, T Güneysu | 44 | 2021 |
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice J Richter-Brockmann, P Sasdrich, T Güneysu | 33 | 2021 |
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware J Richter-Brockmann, MS Chen, S Ghosh, T Güneysu IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021 | 24 | 2021 |
VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering J Richter-Brockmann, J Feldtkeller, P Sasdrich, T Güneysu Cryptology ePrint Archive, 2022 | 21 | 2022 |
Efficiently masking polynomial inversion at arbitrary order M Krausz, G Land, J Richter-Brockmann, T Güneysu International Conference on Post-Quantum Cryptography, 309-326, 2022 | 14 | 2022 |
CINI MINIS: domain isolation for fault and combined security J Feldtkeller, J Richter-Brockmann, P Sasdrich, T Güneysu Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 13 | 2022 |
Deep Learning Multi-Channel Fusion Attack Against Side-Channel Protected Hardware B Hettwer, D Fennes, S Leger, J Richter-Brockmann, S Gehrer, ... | 12 | 2020 |
Concurrent Error Detection Revisited: Hardware Protection against Fault and Side-Channel Attacks J Richter-Brockmann, P Sasdrich, F Bache, T Güneysu Proceedings of the 15th International Conference on Availability …, 2020 | 11 | 2020 |
A holistic approach towards side-channel secure fixed-weight polynomial sampling M Krausz, G Land, J Richter-Brockmann, T Güneysu IACR International Conference on Public-Key Cryptography, 94-124, 2023 | 9 | 2023 |
Combined private circuits-combined security refurbished J Feldtkeller, T Güneysu, T Moos, J Richter-Brockmann, S Saha, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures J Richter-Brockmann, T Güneysu 2020 IEEE 31th International Conference on Application-specific Systems …, 2020 | 4 | 2020 |
Revisiting ECM on GPUs J Wloka, J Richter-Brockmann, T Kleinjung, C Priplata, T Güneysu Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020 | 2 | 2020 |
Generic Accelerators for Costly-to-Mask PQC Components. M Krausz, G Land, F Stolz, D Naujoks, J Richter-Brockmann, T Güneysu, ... IACR Cryptol. ePrint Arch. 2023, 1287, 2023 | 1 | 2023 |
Gate-level masking of streamlined ntru prime decapsulation in hardware G Land, A Marotzke, J Richter-Brockmann, T Güneysu Cryptology ePrint Archive, 2023 | 1 | 2023 |
INDIANA-Verifying (Random) Probing Security through Indistinguishability Analysis C Beierle, J Feldtkeller, A Guinet, T Güneysu, G Leander, ... Cryptology ePrint Archive, 2024 | | 2024 |
Formal Definition and Verification for Combined Random Fault and Random Probing Security S Belaid, J Feldtkeller, T Güneysu, A Guinet, J Richter-Brockmann, ... Cryptology ePrint Archive, 2024 | | 2024 |
Combined Threshold Implementation J Feldtkeller, J Richter-Brockmann, P Sasdrich, T Güneysu Cryptology ePrint Archive, 2024 | | 2024 |
HADES: Automated Hardware Design Exploration for Cryptographic Primitives F Buschkowski, G Land, J Richter-Brockmann, P Sasdrich, T Güneysu Cryptology ePrint Archive, 2024 | | 2024 |