BibTeX records: Christof Paar

download as .bib file

@article{DBLP:journals/tches/EnderHFMP24,
  author       = {Maik Ender and
                  Felix Hahn and
                  Marc Fyrbiak and
                  Amir Moradi and
                  Christof Paar},
  title        = {JustSTART: How to Find an {RSA} Authentication Bypass on Xilinx UltraScale(+)
                  with Fuzzing},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {426--450},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.426-450},
  doi          = {10.46586/TCHES.V2024.I2.426-450},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/EnderHFMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-09845,
  author       = {Maik Ender and
                  Felix Hahn and
                  Marc Fyrbiak and
                  Amir Moradi and
                  Christof Paar},
  title        = {JustSTART: How to Find an {RSA} Authentication Bypass on Xilinx UltraScale(+)
                  with Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2402.09845},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.09845},
  doi          = {10.48550/ARXIV.2402.09845},
  eprinttype    = {arXiv},
  eprint       = {2402.09845},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-09845.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-13773,
  author       = {Philipp Mackensen and
                  Paul Staat and
                  Stefan Roth and
                  Aydin Sezgin and
                  Christof Paar and
                  Veelasha Moonsamy},
  title        = {Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces},
  journal      = {CoRR},
  volume       = {abs/2402.13773},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.13773},
  doi          = {10.48550/ARXIV.2402.13773},
  eprinttype    = {arXiv},
  eprint       = {2402.13773},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-13773.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-15452,
  author       = {Ren{\'{e}} Walendy and
                  Markus Weber and
                  Jingjie Li and
                  Steffen Becker and
                  Carina Wiesen and
                  Malte Elson and
                  Younghyun Kim and
                  Kassem Fawaz and
                  Nikol Rummel and
                  Christof Paar},
  title        = {I see an {IC:} {A} Mixed-Methods Approach to Study Human Problem-Solving
                  Processes in Hardware Reverse Engineering},
  journal      = {CoRR},
  volume       = {abs/2402.15452},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.15452},
  doi          = {10.48550/ARXIV.2402.15452},
  eprinttype    = {arXiv},
  eprint       = {2402.15452},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-15452.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tochi/WiesenBWPR23,
  author       = {Carina Wiesen and
                  Steffen Becker and
                  Ren{\'{e}} Walendy and
                  Christof Paar and
                  Nikol Rummel},
  title        = {The Anatomy of Hardware Reverse Engineering: An Exploration of Human
                  Factors During Problem Solving},
  journal      = {{ACM} Trans. Comput. Hum. Interact.},
  volume       = {30},
  number       = {4},
  pages        = {62:1--62:44},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577198},
  doi          = {10.1145/3577198},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tochi/WiesenBWPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ashes/RothaugKABP0P23,
  author       = {Nils Rothaug and
                  Simon Klix and
                  Nicole Auth and
                  Sinan B{\"{o}}cker and
                  Endres Puschner and
                  Steffen Becker and
                  Christof Paar},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Lejla Batina and
                  Domenic Forte},
  title        = {Towards Unsupervised {SEM} Image Segmentation for {IC} Layout Extraction},
  booktitle    = {Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware
                  Security, {ASHES} 2023, Copenhagen, Denmark, 30 November 2023},
  pages        = {123--128},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605769.3624000},
  doi          = {10.1145/3605769.3624000},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ashes/RothaugKABP0P23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/AlbartusEMFPT23,
  author       = {Nils Albartus and
                  Maik Ender and
                  Jan{-}Niklas M{\"{o}}ller and
                  Marc Fyrbiak and
                  Christof Paar and
                  Russell Tessier},
  title        = {On the Malicious Potential of Xilinx' Internal Configuration Access
                  Port {(ICAP)}},
  booktitle    = {International Conference on Field Programmable Technology, {ICFPT}
                  2023, Yokohama, Japan, December 12-14, 2023},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICFPT59805.2023.00059},
  doi          = {10.1109/ICFPT59805.2023.00059},
  timestamp    = {Sat, 24 Feb 2024 20:42:47 +0100},
  biburl       = {https://dblp.org/rec/conf/fpt/AlbartusEMFPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/EngelsEP23,
  author       = {Susanne Engels and
                  Maik Ender and
                  Christof Paar},
  title        = {Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2023, San Jose, CA, USA, May 1-4, 2023},
  pages        = {13--23},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/HOST55118.2023.10133494},
  doi          = {10.1109/HOST55118.2023.10133494},
  timestamp    = {Mon, 11 Sep 2023 17:53:23 +0200},
  biburl       = {https://dblp.org/rec/conf/host/EngelsEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PuschnerMBKMP23,
  author       = {Endres Puschner and
                  Thorben Moos and
                  Steffen Becker and
                  Christian Kison and
                  Amir Moradi and
                  Christof Paar},
  title        = {Red Team vs. Blue Team: {A} Real-World Hardware Trojan Detection Case
                  Study Across Four Modern {CMOS} Technology Generations},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {56--74},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179341},
  doi          = {10.1109/SP46215.2023.10179341},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PuschnerMBKMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-14661,
  author       = {Timo Speith and
                  Julian Speith and
                  Steffen Becker and
                  Yixin Zou and
                  Asia Biega and
                  Christof Paar},
  title        = {Expanding Explainability: From Explainable Artificial Intelligence
                  to Explainable Hardware},
  journal      = {CoRR},
  volume       = {abs/2302.14661},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.14661},
  doi          = {10.48550/ARXIV.2302.14661},
  eprinttype    = {arXiv},
  eprint       = {2302.14661},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-14661.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-07015,
  author       = {Guyue Li and
                  Paul Staat and
                  Haoyu Li and
                  Markus Heinrichs and
                  Christian T. Zenger and
                  Rainer Kronberger and
                  Harald Elders{-}Boll and
                  Christof Paar and
                  Aiqun Hu},
  title        = {RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-based
                  Key Generation},
  journal      = {CoRR},
  volume       = {abs/2303.07015},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.07015},
  doi          = {10.48550/ARXIV.2303.07015},
  eprinttype    = {arXiv},
  eprint       = {2303.07015},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-07015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-08411,
  author       = {Alexander Warnecke and
                  Julian Speith and
                  Jan{-}Niklas M{\"{o}}ller and
                  Konrad Rieck and
                  Christof Paar},
  title        = {Evil from Within: Machine Learning Backdoors through Hardware Trojans},
  journal      = {CoRR},
  volume       = {abs/2304.08411},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.08411},
  doi          = {10.48550/ARXIV.2304.08411},
  eprinttype    = {arXiv},
  eprint       = {2304.08411},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-08411.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-05740,
  author       = {Steffen Becker and
                  Carina Wiesen and
                  Ren{\'{e}} Walendy and
                  Nikol Rummel and
                  Christof Paar},
  title        = {{REVERSIM:} {A} Game-Based Approach to Accessing Large Populations
                  for Studying Human Aspects in Hardware Reverse Engineering},
  journal      = {CoRR},
  volume       = {abs/2309.05740},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.05740},
  doi          = {10.48550/ARXIV.2309.05740},
  eprinttype    = {arXiv},
  eprint       = {2309.05740},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-05740.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-06195,
  author       = {Simon Klix and
                  Nils Albartus and
                  Julian Speith and
                  Paul Staat and
                  Alice Verstege and
                  Annika Wilde and
                  Daniel Lammers and
                  J{\"{o}}rn Langheinrich and
                  Christian Kison and
                  Sebastian Sester and
                  Daniel E. Holcomb and
                  Christof Paar},
  title        = {Stealing Maggie's Secrets - On the Challenges of {IP} Theft Through
                  {FPGA} Reverse Engineering},
  journal      = {CoRR},
  volume       = {abs/2312.06195},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.06195},
  doi          = {10.48550/ARXIV.2312.06195},
  eprinttype    = {arXiv},
  eprint       = {2312.06195},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-06195.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/EngelsHP22,
  author       = {Susanne Engels and
                  Max Hoffmann and
                  Christof Paar},
  title        = {A critical view on the real-world security of logic locking},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {3},
  pages        = {229--244},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00294-x},
  doi          = {10.1007/S13389-022-00294-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/EngelsHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/LiHSEZPH22,
  author       = {Guyue Li and
                  Lei Hu and
                  Paul Staat and
                  Harald Elders{-}Boll and
                  Christian T. Zenger and
                  Christof Paar and
                  Aiqun Hu},
  title        = {Reconfigurable Intelligent Surface for Physical Layer Key Generation:
                  Constructive or Destructive?},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {29},
  number       = {4},
  pages        = {146--153},
  year         = {2022},
  url          = {https://doi.org/10.1109/MWC.007.2100545},
  doi          = {10.1109/MWC.007.2100545},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/LiHSEZPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/StaatEHZP22,
  author       = {Paul Staat and
                  Harald Elders{-}Boll and
                  Markus Heinrichs and
                  Christian T. Zenger and
                  Christof Paar},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks
                  Based on Fast Software-Controlled Surfaces},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {208--221},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497767},
  doi          = {10.1145/3488932.3497767},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/StaatEHZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/EnderLMP22,
  author       = {Maik Ender and
                  Gregor Leander and
                  Amir Moradi and
                  Christof Paar},
  title        = {A Cautionary Note on Protecting Xilinx' UltraScale(+) Bitstream Encryption
                  and Authentication Engine},
  booktitle    = {30th {IEEE} Annual International Symposium on Field-Programmable Custom
                  Computing Machines, {FCCM} 2022, New York City, NY, USA, May 15-18,
                  2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/FCCM53951.2022.9786118},
  doi          = {10.1109/FCCM53951.2022.9786118},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fccm/EnderLMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SpeithSEF0P22,
  author       = {Julian Speith and
                  Florian Schweins and
                  Maik Ender and
                  Marc Fyrbiak and
                  Alexander May and
                  Christof Paar},
  title        = {How Not to Protect Your {IP} - An Industry-Wide Break of {IEEE} 1735
                  Implementations},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1656--1671},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833605},
  doi          = {10.1109/SP46214.2022.9833605},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SpeithSEF0P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/StaatM0MHKSP22,
  author       = {Paul Staat and
                  Simon Mulzer and
                  Stefan Roth and
                  Veelasha Moonsamy and
                  Markus Heinrichs and
                  Rainer Kronberger and
                  Aydin Sezgin and
                  Christof Paar},
  title        = {IRShield: {A} Countermeasure Against Adversarial Physical-Layer Wireless
                  Sensing},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1705--1721},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833676},
  doi          = {10.1109/SP46214.2022.9833676},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/StaatM0MHKSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/StaatTZP22,
  author       = {Paul Staat and
                  Johannes Tobisch and
                  Christian T. Zenger and
                  Christof Paar},
  title        = {Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1722--1736},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833631},
  doi          = {10.1109/SP46214.2022.9833631},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/StaatTZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/StaatJZEP22,
  author       = {Paul Staat and
                  Kai Jansen and
                  Christian T. Zenger and
                  Harald Elders{-}Boll and
                  Christof Paar},
  editor       = {Murtuza Jadliwala and
                  Yongdae Kim and
                  Alexandra Dmitrienko},
  title        = {Analog Physical-Layer Relay Attacks with Application to Bluetooth
                  and Phase-Based Ranging},
  booktitle    = {WiSec '22: 15th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022},
  pages        = {60--72},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507657.3528536},
  doi          = {10.1145/3507657.3528536},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/StaatJZEP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-06554,
  author       = {Paul Staat and
                  Kai Jansen and
                  Christian T. Zenger and
                  Harald Elders{-}Boll and
                  Christof Paar},
  title        = {Analog Physical-Layer Relay Attacks with Application to Bluetooth
                  and Phase-Based Ranging},
  journal      = {CoRR},
  volume       = {abs/2202.06554},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.06554},
  eprinttype    = {arXiv},
  eprint       = {2202.06554},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-06554.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PuschnerMBKMP22,
  author       = {Endres Puschner and
                  Thorben Moos and
                  Steffen Becker and
                  Christian Kison and
                  Amir Moradi and
                  Christof Paar},
  title        = {Red Team vs. Blue Team: {A} Real-World Hardware Trojan Detection Case
                  Study Across Four Modern {CMOS} Technology Generations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1720},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1720},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PuschnerMBKMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AzrielSAGMP21,
  author       = {Leonid Azriel and
                  Julian Speith and
                  Nils Albartus and
                  Ran Ginosar and
                  Avi Mendelson and
                  Christof Paar},
  title        = {A survey of algorithmic methods in {IC} reverse engineering},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {299--315},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00268-5},
  doi          = {10.1007/S13389-021-00268-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AzrielSAGMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HoffmannP21,
  author       = {Max Hoffmann and
                  Christof Paar},
  title        = {Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects
                  of Hardware Camouflaging},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {82--108},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.82-108},
  doi          = {10.46586/TCHES.V2021.I1.82-108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HoffmannP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/StolzASKNGFPGT21,
  author       = {Florian Stolz and
                  Nils Albartus and
                  Julian Speith and
                  Simon Klix and
                  Clemens Nasenberg and
                  Aiden Gula and
                  Marc Fyrbiak and
                  Christof Paar and
                  Tim G{\"{u}}neysu and
                  Russell Tessier},
  title        = {LifeLine for {FPGA} Protection: Obfuscated Cryptography for Real-World
                  Security},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {412--446},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.412-446},
  doi          = {10.46586/TCHES.V2021.I4.412-446},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/StolzASKNGFPGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HoffmannSP21,
  author       = {Max Hoffmann and
                  Falk Schellenberg and
                  Christof Paar},
  title        = {{ARMORY:} Fully Automated and Exhaustive Fault Simulation on {ARM-M}
                  Binaries},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {1058--1073},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3027143},
  doi          = {10.1109/TIFS.2020.3027143},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HoffmannSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PuschnerSWDKRPE21,
  author       = {Endres Puschner and
                  Christoph Saatjohann and
                  Markus Willing and
                  Christian Dresen and
                  Julia K{\"{o}}be and
                  Benjamin Rath and
                  Christof Paar and
                  Lars Eckardt and
                  Uwe Haverkamp and
                  Sebastian Schinzel},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Listen to Your Heart: Evaluation of the Cardiologic Ecosystem},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {10:1--10:10},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3465753},
  doi          = {10.1145/3465481.3465753},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PuschnerSWDKRPE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZimmerWZSP21,
  author       = {Pascal Zimmer and
                  Roland Weinreich and
                  Christian T. Zenger and
                  Aydin Sezgin and
                  Christof Paar},
  title        = {Keys from the Sky: {A} First Exploration of Physical-Layer Security
                  Using Satellite Links},
  booktitle    = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal,
                  QC, Canada, June 14-23, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICC42927.2021.9500958},
  doi          = {10.1109/ICC42927.2021.9500958},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ZimmerWZSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/StaatEHKZP21,
  author       = {Paul Staat and
                  Harald Elders{-}Boll and
                  Markus Heinrichs and
                  Rainer Kronberger and
                  Christian T. Zenger and
                  Christof Paar},
  title        = {Intelligent Reflecting Surface-Assisted Wireless Key Generation for
                  Low-Entropy Environments},
  booktitle    = {32nd {IEEE} Annual International Symposium on Personal, Indoor and
                  Mobile Radio Communications, {PIMRC} 2021, Helsinki, Finland, September
                  13-16, 2021},
  pages        = {745--751},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PIMRC50174.2021.9569556},
  doi          = {10.1109/PIMRC50174.2021.9569556},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/StaatEHKZP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlbartusNSFPT21,
  author       = {Nils Albartus and
                  Clemens Nasenberg and
                  Florian Stolz and
                  Marc Fyrbiak and
                  Christof Paar and
                  Russell Tessier},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {On the Design and Misuse of Microcoded (Embedded) Processors - {A}
                  Cautionary Note},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {267--284},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/albartus},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlbartusNSFPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13703,
  author       = {Susanne Engels and
                  Falk Schellenberg and
                  Christof Paar},
  title        = {{SPFA:} {SFA} on Multiple Persistent Faults},
  journal      = {CoRR},
  volume       = {abs/2105.13703},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13703},
  eprinttype    = {arXiv},
  eprint       = {2105.13703},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13703.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13725,
  author       = {Carina Wiesen and
                  Steffen Becker and
                  Nils Albartus and
                  Christof Paar and
                  Nikol Rummel},
  title        = {Promoting the Acquisition of Hardware Reverse Engineering Skills},
  journal      = {CoRR},
  volume       = {abs/2105.13725},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13725},
  eprinttype    = {arXiv},
  eprint       = {2105.13725},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13725.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13756,
  author       = {Maik Ender and
                  Amir Moradi and
                  Christof Paar},
  title        = {The Unpatchable Silicon: {A} Full Break of the Bitstream Encryption
                  of Xilinx 7-Series FPGAs},
  journal      = {CoRR},
  volume       = {abs/2105.13756},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13756},
  eprinttype    = {arXiv},
  eprint       = {2105.13756},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13756.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13769,
  author       = {Max Hoffmann and
                  Falk Schellenberg and
                  Christof Paar},
  title        = {{ARMORY:} Fully Automated and Exhaustive Fault Simulation on {ARM-M}
                  Binaries},
  journal      = {CoRR},
  volume       = {abs/2105.13769},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13769},
  eprinttype    = {arXiv},
  eprint       = {2105.13769},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14943,
  author       = {Steffen Becker and
                  Carina Wiesen and
                  Nils Albartus and
                  Nikol Rummel and
                  Christof Paar},
  title        = {An Exploratory Study of Hardware Reverse Engineering Technical and
                  Cognitive Processes},
  journal      = {CoRR},
  volume       = {abs/2105.14943},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14943},
  eprinttype    = {arXiv},
  eprint       = {2105.14943},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14943.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-01709,
  author       = {Paul Staat and
                  Harald Elders{-}Boll and
                  Markus Heinrichs and
                  Christian T. Zenger and
                  Christof Paar},
  title        = {Mirror Mirror on the Wall: Wireless Environment Reconfiguration Attacks
                  Based on Fast Software-Controlled Surfaces},
  journal      = {CoRR},
  volume       = {abs/2107.01709},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.01709},
  eprinttype    = {arXiv},
  eprint       = {2107.01709},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-01709.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-01967,
  author       = {Paul Staat and
                  Simon Mulzer and
                  Stefan Roth and
                  Veelasha Moonsamy and
                  Aydin Sezgin and
                  Christof Paar},
  title        = {IRShield: {A} Countermeasure Against Adversarial Physical-Layer Wireless
                  Sensing},
  journal      = {CoRR},
  volume       = {abs/2112.01967},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.01967},
  eprinttype    = {arXiv},
  eprint       = {2112.01967},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-01967.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-04838,
  author       = {Julian Speith and
                  Florian Schweins and
                  Maik Ender and
                  Marc Fyrbiak and
                  Alexander May and
                  Christof Paar},
  title        = {How Not to Protect Your {IP} - An Industry-Wide Break of {IEEE} 1735
                  Implementations},
  journal      = {CoRR},
  volume       = {abs/2112.04838},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.04838},
  eprinttype    = {arXiv},
  eprint       = {2112.04838},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-04838.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-09014,
  author       = {Paul Staat and
                  Johannes Tobisch and
                  Christian T. Zenger and
                  Christof Paar},
  title        = {Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems},
  journal      = {CoRR},
  volume       = {abs/2112.09014},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.09014},
  eprinttype    = {arXiv},
  eprint       = {2112.09014},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-09014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-10043,
  author       = {Guyue Li and
                  Lei Hu and
                  Paul Staat and
                  Harald Elders{-}Boll and
                  Christian T. Zenger and
                  Christof Paar and
                  Aiqun Hu},
  title        = {Reconfigurable Intelligent Surface for Physical Layer Key Generation:
                  Constructive or Destructive?},
  journal      = {CoRR},
  volume       = {abs/2112.10043},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.10043},
  eprinttype    = {arXiv},
  eprint       = {2112.10043},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-10043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbartusNSFPT21,
  author       = {Nils Albartus and
                  Clemens Nasenberg and
                  Florian Stolz and
                  Marc Fyrbiak and
                  Christof Paar and
                  Russell Tessier},
  title        = {On the Design and Misuse of Microcoded (Embedded) Processors - {A}
                  Cautionary Note},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/663},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbartusNSFPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StolzASKNGFPGT21,
  author       = {Florian Stolz and
                  Nils Albartus and
                  Julian Speith and
                  Simon Klix and
                  Clemens Nasenberg and
                  Aiden Gula and
                  Marc Fyrbiak and
                  Christof Paar and
                  Tim G{\"{u}}neysu and
                  Russell Tessier},
  title        = {LifeLine for {FPGA} Protection: Obfuscated Cryptography for Real-World
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1277},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1277},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StolzASKNGFPGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzrielSAGMP21,
  author       = {Leonid Azriel and
                  Julian Speith and
                  Nils Albartus and
                  Ran Ginosar and
                  Avi Mendelson and
                  Christof Paar},
  title        = {A survey of algorithmic methods in {IC} reverse engineering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1278},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1278},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzrielSAGMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PuschnerSWDKRPE21,
  author       = {Endres Puschner and
                  Christoph Saatjohann and
                  Markus Willing and
                  Christian Dresen and
                  Julia K{\"{o}}be and
                  Benjamin Rath and
                  Christof Paar and
                  Lars Eckardt and
                  Uwe Haverkamp and
                  Sebastian Schinzel},
  title        = {Listen to Your Heart: Evaluation of the Cardiologic Ecosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1297},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1297},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PuschnerSWDKRPE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SpeithBEPP20,
  author       = {Julian Speith and
                  Steffen Becker and
                  Maik Ender and
                  Endres Puschner and
                  Christof Paar},
  title        = {Hardware-Trojaner},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {446--450},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1303-3},
  doi          = {10.1007/S11623-020-1303-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SpeithBEPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/FyrbiakWRBP20,
  author       = {Marc Fyrbiak and
                  Sebastian Wallat and
                  Sascha Reinhard and
                  Nicolai Bissantz and
                  Christof Paar},
  title        = {Graph Similarity and its Applications to Hardware Security},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {4},
  pages        = {505--519},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2019.2953752},
  doi          = {10.1109/TC.2019.2953752},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/FyrbiakWRBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbartusHTAP20,
  author       = {Nils Albartus and
                  Max Hoffmann and
                  Sebastian Temme and
                  Leonid Azriel and
                  Christof Paar},
  title        = {{DANA} Universal Dataflow Analysis for Gate-Level Netlist Reverse
                  Engineering},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {309--336},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.309-336},
  doi          = {10.13154/TCHES.V2020.I4.309-336},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AlbartusHTAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/GhandaliMMP20,
  author       = {Samaneh Ghandali and
                  Thorben Moos and
                  Amir Moradi and
                  Christof Paar},
  title        = {Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {28},
  number       = {6},
  pages        = {1435--1448},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVLSI.2020.2982473},
  doi          = {10.1109/TVLSI.2020.2982473},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/GhandaliMMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/EngelsSP20,
  author       = {Susanne Engels and
                  Falk Schellenberg and
                  Christof Paar},
  title        = {{SPFA:} {SFA} on Multiple Persistent Faults},
  booktitle    = {17th Workshop on Fault Detection and Tolerance in Cryptography, {FDTC}
                  2020, Milan, Italy, September 13, 2020},
  pages        = {49--56},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/FDTC51366.2020.00014},
  doi          = {10.1109/FDTC51366.2020.00014},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/EngelsSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/0001WARP20,
  author       = {Steffen Becker and
                  Carina Wiesen and
                  Nils Albartus and
                  Nikol Rummel and
                  Christof Paar},
  editor       = {Heather Richter Lipford and
                  Sonia Chiasson},
  title        = {An Exploratory Study of Hardware Reverse Engineering - Technical and
                  Cognitive Processes},
  booktitle    = {Sixteenth Symposium on Usable Privacy and Security, {SOUPS} 2020,
                  August 7-11, 2020},
  pages        = {285--300},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/soups2020/presentation/becker},
  timestamp    = {Mon, 01 Feb 2021 08:41:55 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/0001WARP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Ender0P20,
  author       = {Maik Ender and
                  Amir Moradi and
                  Christof Paar},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {The Unpatchable Silicon: {A} Full Break of the Bitstream Encryption
                  of Xilinx 7-Series FPGAs},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1803--1819},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/ender},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Ender0P20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-03549,
  author       = {Benjamin Kollenda and
                  Philipp Koppe and
                  Marc Fyrbiak and
                  Christian Kison and
                  Christof Paar and
                  Thorsten Holz},
  title        = {An Exploratory Analysis of Microcode as a Building Block for System
                  Defenses},
  journal      = {CoRR},
  volume       = {abs/2007.03549},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.03549},
  eprinttype    = {arXiv},
  eprint       = {2007.03549},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-03549.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-06613,
  author       = {Paul Staat and
                  Harald Elders{-}Boll and
                  Markus Heinrichs and
                  Rainer Kronberger and
                  Christian T. Zenger and
                  Christof Paar},
  title        = {Intelligent Reflecting Surface-Assisted Wireless Key Generation for
                  Low-Entropy Environments},
  journal      = {CoRR},
  volume       = {abs/2010.06613},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.06613},
  eprinttype    = {arXiv},
  eprint       = {2010.06613},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-06613.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-07194,
  author       = {Pascal Zimmer and
                  Roland Weinreich and
                  Christian T. Zenger and
                  Aydin Sezgin and
                  Christof Paar},
  title        = {Keys from the Sky: {A} First Exploration of Physical-Layer Security
                  Using Satellite Links},
  journal      = {CoRR},
  volume       = {abs/2010.07194},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.07194},
  eprinttype    = {arXiv},
  eprint       = {2010.07194},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-07194.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannP20,
  author       = {Max Hoffmann and
                  Christof Paar},
  title        = {Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects
                  of Hardware Camouflaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {750},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/750},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbartusHTAP20,
  author       = {Nils Albartus and
                  Max Hoffmann and
                  Sebastian Temme and
                  Leonid Azriel and
                  Christof Paar},
  title        = {{DANA} - Universal Dataflow Analysis for Gate-Level Netlist Reverse
                  Engineering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/751},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbartusHTAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WichmannSP19,
  author       = {Astrid Wichmann and
                  M. Angela Sasse and
                  Christof Paar},
  title        = {IT-Sicherheit ist mehr als Technik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {673--674},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1186-3},
  doi          = {10.1007/S11623-019-1186-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WichmannSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BeckerWPR19,
  author       = {Steffen Becker and
                  Carina Wiesen and
                  Christof Paar and
                  Nikol Rummel},
  title        = {Wie arbeiten Reverse Engineers?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {11},
  pages        = {686--690},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1190-7},
  doi          = {10.1007/S11623-019-1190-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BeckerWPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FyrbiakWSHHWWTP19,
  author       = {Marc Fyrbiak and
                  Sebastian Wallat and
                  Pawel Swierczynski and
                  Max Hoffmann and
                  Sebastian Hoppach and
                  Matthias Wilhelm and
                  Tobias Weidlich and
                  Russell Tessier and
                  Christof Paar},
  title        = {{HAL} - The Missing Piece of the Puzzle for Hardware Reverse Engineering,
                  Trojan Detection and Insertion},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {3},
  pages        = {498--510},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2018.2812183},
  doi          = {10.1109/TDSC.2018.2812183},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FyrbiakWSHHWWTP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KisonAFP19,
  author       = {Christian Kison and
                  Omar Mohamed Awad and
                  Marc Fyrbiak and
                  Christof Paar},
  title        = {Security Implications of Intentional Capacitive Crosstalk},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {12},
  pages        = {3246--3258},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2900914},
  doi          = {10.1109/TIFS.2019.2900914},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KisonAFP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/WiesenA0BWFRP19,
  author       = {Carina Wiesen and
                  Nils Albartus and
                  Max Hoffmann and
                  Steffen Becker and
                  Sebastian Wallat and
                  Marc Fyrbiak and
                  Nikol Rummel and
                  Christof Paar},
  editor       = {Toshiyuki Shibuya},
  title        = {Towards cognitive obfuscation: impeding hardware reverse engineering
                  based on psychological insights},
  booktitle    = {Proceedings of the 24th Asia and South Pacific Design Automation Conference,
                  {ASPDAC} 2019, Tokyo, Japan, January 21-24, 2019},
  pages        = {104--111},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3287624.3288741},
  doi          = {10.1145/3287624.3288741},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aspdac/WiesenA0BWFRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/EnderSWWKP19,
  author       = {Maik Ender and
                  Pawel Swierczynski and
                  Sebastian Wallat and
                  Matthias Wilhelm and
                  Paul Martin Knopp and
                  Christof Paar},
  editor       = {Toshiyuki Shibuya},
  title        = {Insights into the mind of a trojan designer: the challenge to integrate
                  a trojan into the bitstream},
  booktitle    = {Proceedings of the 24th Asia and South Pacific Design Automation Conference,
                  {ASPDAC} 2019, Tokyo, Japan, January 21-24, 2019},
  pages        = {112--119},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3287624.3288742},
  doi          = {10.1145/3287624.3288742},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aspdac/EnderSWWKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HailfingerLP19,
  author       = {Carl{-}Daniel Hailfinger and
                  Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Sonia Bela{\"{\i}}d and
                  Tim G{\"{u}}neysu},
  title        = {CCCiCC: {A} Cross-Core Cache-Independent Covert Channel on {AMD} Family
                  15h CPUs},
  booktitle    = {Smart Card Research and Advanced Applications - 18th International
                  Conference, {CARDIS} 2019, Prague, Czech Republic, November 11-13,
                  2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11833},
  pages        = {159--175},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42068-0\_10},
  doi          = {10.1007/978-3-030-42068-0\_10},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/HailfingerLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/WallatA00EFDMP19,
  author       = {Sebastian Wallat and
                  Nils Albartus and
                  Steffen Becker and
                  Max Hoffmann and
                  Maik Ender and
                  Marc Fyrbiak and
                  Adrian Drees and
                  Sebastian Maa{\ss}en and
                  Christof Paar},
  editor       = {Francesca Palumbo and
                  Michela Becchi and
                  Martin Schulz and
                  Kento Sato},
  title        = {Highway to {HAL:} open-sourcing the first extendable gate-level netlist
                  reverse engineering framework},
  booktitle    = {Proceedings of the 16th {ACM} International Conference on Computing
                  Frontiers, {CF} 2019, Alghero, Italy, April 30 - May 2, 2019},
  pages        = {392--397},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3310273.3323419},
  doi          = {10.1145/3310273.3323419},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cf/WallatA00EFDMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/Wiesen0APR19,
  author       = {Carina Wiesen and
                  Steffen Becker and
                  Nils Albartus and
                  Christof Paar and
                  Nikol Rummel},
  title        = {Promoting the Acquisition of Hardware Reverse Engineering Skills},
  booktitle    = {{IEEE} Frontiers in Education Conference, {FIE} 2019, Cincinnati,
                  OH, USA, October 16-19, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/FIE43999.2019.9028668},
  doi          = {10.1109/FIE43999.2019.9028668},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fie/Wiesen0APR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00312,
  author       = {Carina Wiesen and
                  Steffen Becker and
                  Marc Fyrbiak and
                  Nils Albartus and
                  Malte Elson and
                  Nikol Rummel and
                  Christof Paar},
  title        = {Teaching Hardware Reverse Engineering: Educational Guidelines and
                  Practical Insights},
  journal      = {CoRR},
  volume       = {abs/1910.00312},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00312},
  eprinttype    = {arXiv},
  eprint       = {1910.00312},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00312.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00323,
  author       = {Carina Wiesen and
                  Nils Albartus and
                  Max Hoffmann and
                  Steffen Becker and
                  Sebastian Wallat and
                  Marc Fyrbiak and
                  Nikol Rummel and
                  Christof Paar},
  title        = {Towards Cognitive Obfuscation: Impeding Hardware Reverse Engineering
                  Based on Psychological Insights},
  journal      = {CoRR},
  volume       = {abs/1910.00323},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00323},
  eprinttype    = {arXiv},
  eprint       = {1910.00323},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00323.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00350,
  author       = {Sebastian Wallat and
                  Nils Albartus and
                  Steffen Becker and
                  Max Hoffmann and
                  Maik Ender and
                  Marc Fyrbiak and
                  Adrian Drees and
                  Sebastian Maa{\ss}en and
                  Christof Paar},
  title        = {Highway to {HAL:} Open-Sourcing the First Extendable Gate-Level Netlist
                  Reverse Engineering Framework},
  journal      = {CoRR},
  volume       = {abs/1910.00350},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00350},
  eprinttype    = {arXiv},
  eprint       = {1910.00350},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00350.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00735,
  author       = {Samaneh Ghandali and
                  Daniel E. Holcomb and
                  Christof Paar},
  title        = {Temperature-Based Hardware Trojan For Ring-Oscillator-Based TRNGs},
  journal      = {CoRR},
  volume       = {abs/1910.00735},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00735},
  eprinttype    = {arXiv},
  eprint       = {1910.00735},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00735.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00737,
  author       = {Samaneh Ghandali and
                  Thorben Moos and
                  Amir Moradi and
                  Christof Paar},
  title        = {Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations},
  journal      = {CoRR},
  volume       = {abs/1910.00737},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00737},
  eprinttype    = {arXiv},
  eprint       = {1910.00737},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00737.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00947,
  author       = {Pawel Swierczynski and
                  Marc Fyrbiak and
                  Philipp Koppe and
                  Amir Moradi and
                  Christof Paar},
  title        = {Interdiction in Practice - Hardware Trojan Against a High-Security
                  {USB} Flash Drive},
  journal      = {CoRR},
  volume       = {abs/1910.00947},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00947},
  eprinttype    = {arXiv},
  eprint       = {1910.00947},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00947.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00948,
  author       = {Philipp Koppe and
                  Benjamin Kollenda and
                  Marc Fyrbiak and
                  Christian Kison and
                  Robert Gawlik and
                  Christof Paar and
                  Thorsten Holz},
  title        = {Reverse Engineering x86 Processor Microcode},
  journal      = {CoRR},
  volume       = {abs/1910.00948},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00948},
  eprinttype    = {arXiv},
  eprint       = {1910.00948},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00948.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00949,
  author       = {Max Hoffmann and
                  Christof Paar},
  title        = {Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions
                  at Negligible Overhead},
  journal      = {CoRR},
  volume       = {abs/1910.00949},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00949},
  eprinttype    = {arXiv},
  eprint       = {1910.00949},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00949.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00981,
  author       = {Arunkumar Vijayakumar and
                  Vinay C. Patil and
                  Daniel E. Holcomb and
                  Christof Paar and
                  Sandip Kundu},
  title        = {Physical Design Obfuscation of Hardware: {A} Comprehensive Investigation
                  of Device- and Logic-Level Techniques},
  journal      = {CoRR},
  volume       = {abs/1910.00981},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00981},
  eprinttype    = {arXiv},
  eprint       = {1910.00981},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00981.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-01517,
  author       = {Maik Ender and
                  Pawel Swierczynski and
                  Sebastian Wallat and
                  Matthias Wilhelm and
                  Paul Martin Knopp and
                  Christof Paar},
  title        = {Insights into the Mind of a Trojan Designer: The Challenge to Integrate
                  a Trojan into the Bitstream},
  journal      = {CoRR},
  volume       = {abs/1910.01517},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.01517},
  eprinttype    = {arXiv},
  eprint       = {1910.01517},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-01517.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-01518,
  author       = {Marc Fyrbiak and
                  Sebastian Strau{\ss} and
                  Christian Kison and
                  Sebastian Wallat and
                  Malte Elson and
                  Nikol Rummel and
                  Christof Paar},
  title        = {Hardware Reverse Engineering: Overview and Open Challenges},
  journal      = {CoRR},
  volume       = {abs/1910.01518},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.01518},
  eprinttype    = {arXiv},
  eprint       = {1910.01518},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-01518.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-01519,
  author       = {Sebastian Wallat and
                  Marc Fyrbiak and
                  Moritz Schl{\"{o}}gel and
                  Christof Paar},
  title        = {A Look at the Dark Side of Hardware Reverse Engineering - {A} Case
                  Study},
  journal      = {CoRR},
  volume       = {abs/1910.01519},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.01519},
  eprinttype    = {arXiv},
  eprint       = {1910.01519},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-01519.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EngelsHP19,
  author       = {Susanne Engels and
                  Max Hoffmann and
                  Christof Paar},
  title        = {The End of Logic Locking? {A} Critical View on the Security of Logic
                  Locking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {796},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/796},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EngelsHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FyrbiakWRBP19,
  author       = {Marc Fyrbiak and
                  Sebastian Wallat and
                  Sascha Reinhard and
                  Nicolai Bissantz and
                  Christof Paar},
  title        = {Graph Similarity and Its Applications to Hardware Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {983},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/983},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FyrbiakWRBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FyrbiakWDABTP19,
  author       = {Marc Fyrbiak and
                  Sebastian Wallat and
                  Jonathan D{\'{e}}chelotte and
                  Nils Albartus and
                  Sinan B{\"{o}}cker and
                  Russell Tessier and
                  Christof Paar},
  title        = {On the Difficulty of FSM-based Hardware Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1163},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FyrbiakWDABTP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/FyrbiakRBTP18,
  author       = {Marc Fyrbiak and
                  Simon Rokicki and
                  Nicolai Bissantz and
                  Russell Tessier and
                  Christof Paar},
  title        = {Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded
                  Microprocessors},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {3},
  pages        = {307--321},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2017.2649520},
  doi          = {10.1109/TC.2017.2649520},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/FyrbiakRBTP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SwierczynskiBMP18,
  author       = {Pawel Swierczynski and
                  Georg T. Becker and
                  Amir Moradi and
                  Christof Paar},
  title        = {Bitstream Fault Injections (BiFI)-Automated Fault Attacks Against
                  SRAM-Based FPGAs},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {3},
  pages        = {348--360},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2016.2646367},
  doi          = {10.1109/TC.2016.2646367},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/SwierczynskiBMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HoffmannP18,
  author       = {Max Hoffmann and
                  Christof Paar},
  title        = {Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions
                  at Negligible Overhead},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {277--297},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.277-297},
  doi          = {10.13154/TCHES.V2018.I2.277-297},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HoffmannP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FyrbiakWDABTP18,
  author       = {Marc Fyrbiak and
                  Sebastian Wallat and
                  Jonathan D{\'{e}}chelotte and
                  Nils Albartus and
                  Sinan B{\"{o}}cker and
                  Russell Tessier and
                  Christof Paar},
  title        = {On the Difficulty of FSM-based Hardware Obfuscation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {293--330},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.293-330},
  doi          = {10.13154/TCHES.V2018.I3.293-330},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/FyrbiakWDABTP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KollendaKFKPH18,
  author       = {Benjamin Kollenda and
                  Philipp Koppe and
                  Marc Fyrbiak and
                  Christian Kison and
                  Christof Paar and
                  Thorsten Holz},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {An Exploratory Analysis of Microcode as a Building Block for System
                  Defenses},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1649--1666},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243861},
  doi          = {10.1145/3243734.3243861},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KollendaKFKPH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KeshavarzSRPH18,
  author       = {Shahrzad Keshavarz and
                  Falk Schellenberg and
                  Bastian Richter and
                  Christof Paar and
                  Daniel E. Holcomb},
  title        = {SAT-based reverse engineering of gate-level schematics using fault
                  injection and probing},
  booktitle    = {2018 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2018, Washington, DC, USA, April 30 - May 4, 2018},
  pages        = {215--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/HST.2018.8383918},
  doi          = {10.1109/HST.2018.8383918},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KeshavarzSRPH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tale/WiesenBFAERP18,
  author       = {Carina Wiesen and
                  Steffen Becker and
                  Marc Fyrbiak and
                  Nils Albartus and
                  Malte Elson and
                  Nikol Rummel and
                  Christof Paar},
  title        = {Teaching Hardware Reverse Engineering: Educational Guidelines and
                  Practical Insights},
  booktitle    = {{IEEE} International Conference on Teaching, Assessment, and Learning
                  for Engineering, {TALE} 2018, Wollongong, Australia, December 4-7,
                  2018},
  pages        = {438--445},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TALE.2018.8615270},
  doi          = {10.1109/TALE.2018.8615270},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/tale/WiesenBFAERP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-08916,
  author       = {Shahrzad Keshavarz and
                  Falk Schellenberg and
                  Bastian Richter and
                  Christof Paar and
                  Daniel E. Holcomb},
  title        = {SAT-based Reverse Engineering of Gate-Level Schematics using Fault
                  Injection and Probing},
  journal      = {CoRR},
  volume       = {abs/1802.08916},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.08916},
  eprinttype    = {arXiv},
  eprint       = {1802.08916},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-08916.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SwierczynskiFKM17,
  author       = {Pawel Swierczynski and
                  Marc Fyrbiak and
                  Philipp Koppe and
                  Amir Moradi and
                  Christof Paar},
  title        = {Interdiction in practice - Hardware Trojan against a high-security
                  {USB} flash drive},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {199--211},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0132-7},
  doi          = {10.1007/S13389-016-0132-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SwierczynskiFKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VijayakumarPHPK17,
  author       = {Arunkumar Vijayakumar and
                  Vinay C. Patil and
                  Daniel E. Holcomb and
                  Christof Paar and
                  Sandip Kundu},
  title        = {Physical Design Obfuscation of Hardware: {A} Comprehensive Investigation
                  of Device and Logic-Level Techniques},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {64--77},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2601067},
  doi          = {10.1109/TIFS.2016.2601067},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VijayakumarPHPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/ZengerPRBDBTP17,
  author       = {Christian T. Zenger and
                  Mario Pietersz and
                  Andreas Rex and
                  Jeremy Brauer and
                  Falk{-}Peter Dressler and
                  Christian Baiker and
                  Daniel Theis and
                  Christof Paar},
  editor       = {Michael B. Matthews},
  title        = {Implementing a real-time capable {WPLS} testbed for independent performance
                  and security analyses},
  booktitle    = {51st Asilomar Conference on Signals, Systems, and Computers, {ACSSC}
                  2017, Pacific Grove, CA, USA, October 29 - November 1, 2017},
  pages        = {9--13},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACSSC.2017.8335125},
  doi          = {10.1109/ACSSC.2017.8335125},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/ZengerPRBDBTP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/EnderG0P17,
  author       = {Maik Ender and
                  Samaneh Ghandali and
                  Amir Moradi and
                  Christof Paar},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {The First Thorough Side-Channel Hardware Trojan},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {755--780},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_26},
  doi          = {10.1007/978-3-319-70694-8\_26},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/EnderG0P17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Paar17,
  author       = {Christof Paar},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Hardware Trojans and Other Threats against Embedded Systems},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053885},
  doi          = {10.1145/3052973.3053885},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Paar17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KeshavarzPH17,
  author       = {Shahrzad Keshavarz and
                  Christof Paar and
                  Daniel E. Holcomb},
  editor       = {David Atienza and
                  Giorgio Di Natale},
  title        = {Design automation for obfuscated circuits with multiple viable functions},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2017, Lausanne, Switzerland, March 27-31, 2017},
  pages        = {886--889},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/DATE.2017.7927112},
  doi          = {10.23919/DATE.2017.7927112},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/KeshavarzPH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/FyrbiakSKWERP17,
  author       = {Marc Fyrbiak and
                  Sebastian Strauss and
                  Christian Kison and
                  Sebastian Wallat and
                  Malte Elson and
                  Nikol Rummel and
                  Christof Paar},
  title        = {Hardware reverse engineering: Overview and open challenges},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {88--94},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031550},
  doi          = {10.1109/IVSW.2017.8031550},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/FyrbiakSKWERP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivsw/WallatFSP17,
  author       = {Sebastian Wallat and
                  Marc Fyrbiak and
                  Moritz Schl{\"{o}}gel and
                  Christof Paar},
  title        = {A look at the dark side of hardware reverse engineering - a case study},
  booktitle    = {{IEEE} 2nd International Verification and Security Workshop, {IVSW}
                  2017, Thessaloniki, Greece, July 3-5, 2017},
  pages        = {95--100},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IVSW.2017.8031551},
  doi          = {10.1109/IVSW.2017.8031551},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivsw/WallatFSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KoppeKFKGPH17,
  author       = {Philipp Koppe and
                  Benjamin Kollenda and
                  Marc Fyrbiak and
                  Christian Kison and
                  Robert Gawlik and
                  Christof Paar and
                  Thorsten Holz},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Reverse Engineering x86 Processor Microcode},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1163--1180},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/koppe},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KoppeKFKGPH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZengerVZSP17,
  author       = {Christian T. Zenger and
                  Hendrik Vogt and
                  Jan Zimmer and
                  Aydin Sezgin and
                  Christof Paar},
  title        = {The Passive Eavesdropper Affects my Channel: Secret-Key Rates under
                  Real-World Conditions (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/1701.03904},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.03904},
  eprinttype    = {arXiv},
  eprint       = {1701.03904},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZengerVZSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KeshavarzPH17,
  author       = {Shahrzad Keshavarz and
                  Christof Paar and
                  Daniel E. Holcomb},
  title        = {Design Automation for Obfuscated Circuits with Multiple Viable Functions},
  journal      = {CoRR},
  volume       = {abs/1703.00475},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.00475},
  eprinttype    = {arXiv},
  eprint       = {1703.00475},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KeshavarzPH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FyrbiakWSHHWWTP17,
  author       = {Marc Fyrbiak and
                  Sebastian Wallat and
                  Pawel Swierczynski and
                  Max Hoffmann and
                  Sebastian Hoppach and
                  Matthias Wilhelm and
                  Tobias Weidlich and
                  Russell Tessier and
                  Christof Paar},
  title        = {{HAL-} The Missing Piece of the Puzzle for Hardware Reverse Engineering,
                  Trojan Detection and Insertion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {783},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/783},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FyrbiakWSHHWWTP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EnderG0P17,
  author       = {Maik Ender and
                  Samaneh Ghandali and
                  Amir Moradi and
                  Christof Paar},
  title        = {The First Thorough Side-Channel Hardware Trojan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {865},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/865},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EnderG0P17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZengerPZPLP16,
  author       = {Christian T. Zenger and
                  Mario Pietersz and
                  Jan Zimmer and
                  Jan{-}Felix Posielek and
                  Thorben Lenze and
                  Christof Paar},
  title        = {Authenticated key establishment for low-resource devices exploiting
                  correlated random channels},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {105--123},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.013},
  doi          = {10.1016/J.COMNET.2016.06.013},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ZengerPZPLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SanguinoLPEN16,
  author       = {Luis Alberto Benthin Sanguino and
                  Gregor Leander and
                  Christof Paar and
                  Bernhard Esslinger and
                  Ingo Niebel},
  title        = {Analyzing the Spanish strip cipher by combining combinatorial and
                  statistical methods},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {261--284},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1050332},
  doi          = {10.1080/01611194.2015.1050332},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SanguinoLPEN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GhandaliBHP16,
  author       = {Samaneh Ghandali and
                  Georg T. Becker and
                  Daniel E. Holcomb and
                  Christof Paar},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {A Design Methodology for Stealthy Parametric Trojans and Its Application
                  to Bug Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {625--647},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_30},
  doi          = {10.1007/978-3-662-53140-2\_30},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GhandaliBHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZengerVZSP16,
  author       = {Christian T. Zenger and
                  Hendrik Vogt and
                  Jan Zimmer and
                  Aydin Sezgin and
                  Christof Paar},
  title        = {The Passive Eavesdropper Affects My Channel: Secret-Key Rates under
                  Real-World Conditions},
  booktitle    = {2016 {IEEE} Globecom Workshops, Washington, DC, USA, December 4-8,
                  2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOMW.2016.7849064},
  doi          = {10.1109/GLOCOMW.2016.7849064},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZengerVZSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SchellenbergFGH16,
  author       = {Falk Schellenberg and
                  Markus Finkeldey and
                  Nils Gerhardt and
                  Martin Hofmann and
                  Amir Moradi and
                  Christof Paar},
  editor       = {William H. Robinson and
                  Swarup Bhunia and
                  Ryan Kastner},
  title        = {Large laser spots and fault sensitivity analysis},
  booktitle    = {2016 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016},
  pages        = {203--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HST.2016.7495583},
  doi          = {10.1109/HST.2016.7495583},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/SchellenbergFGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/SamarinLP16,
  author       = {Peter Samarin and
                  Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {William H. Robinson and
                  Swarup Bhunia and
                  Ryan Kastner},
  title        = {{IP} core protection using voltage-controlled side-channel receivers},
  booktitle    = {2016 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016},
  pages        = {217--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HST.2016.7495585},
  doi          = {10.1109/HST.2016.7495585},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/SamarinLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZengerPP16,
  author       = {Christian T. Zenger and
                  Mario Pietersz and
                  Christof Paar},
  title        = {Preventing relay attacks and providing perfect forward secrecy using
                  {PHYSEC} on 8-bit {\(\mathrm{\mu}\)}C},
  booktitle    = {{IEEE} International Conference on Communication, {ICC} 2015, London,
                  United Kingdom, June 8-12, 2015, Workshop Proceedings},
  pages        = {110--115},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCW.2016.7503773},
  doi          = {10.1109/ICCW.2016.7503773},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZengerPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AviramSSHDSVAHD16,
  author       = {Nimrod Aviram and
                  Sebastian Schinzel and
                  Juraj Somorovsky and
                  Nadia Heninger and
                  Maik Dankel and
                  Jens Steube and
                  Luke Valenta and
                  David Adrian and
                  J. Alex Halderman and
                  Viktor Dukhovni and
                  Emilia K{\"{a}}sper and
                  Shaanan Cohney and
                  Susanne Engels and
                  Christof Paar and
                  Yuval Shavitt},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {{DROWN:} Breaking {TLS} Using SSLv2},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {689--706},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aviram},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AviramSSHDSVAHD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ZengerZPDP16,
  author       = {Christian T. Zenger and
                  Jan Zimmer and
                  Mario Pietersz and
                  Benedikt Driessen and
                  Christof Paar},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {Constructive and Destructive Aspects of Adaptive Wormholes for the
                  5G Tactile Internet},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939923},
  doi          = {10.1145/2939918.2939923},
  timestamp    = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ZengerZPDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinELNPS016,
  author       = {Daniel J. Bernstein and
                  Susanne Engels and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Christof Paar and
                  Peter Schwabe and
                  Ralf Zimmermann},
  title        = {Faster discrete logarithms on FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinELNPS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhandaliBHP16,
  author       = {Samaneh Ghandali and
                  Georg T. Becker and
                  Daniel E. Holcomb and
                  Christof Paar},
  title        = {A Design Methodology for Stealthy Parametric Trojans and Its Application
                  to Bug Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/600},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhandaliBHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SwierczynskiB0P16,
  author       = {Pawel Swierczynski and
                  Georg T. Becker and
                  Amir Moradi and
                  Christof Paar},
  title        = {Bitstream Fault Injections (BiFI) - Automated Fault Attacks against
                  SRAM-based FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {641},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/641},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SwierczynskiB0P16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DullHHHPSS15,
  author       = {Michael D{\"{u}}ll and
                  Bj{\"{o}}rn Haase and
                  Gesine Hinterw{\"{a}}lder and
                  Michael Hutter and
                  Christof Paar and
                  Ana Helena S{\'{a}}nchez and
                  Peter Schwabe},
  title        = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {493--514},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0087-1},
  doi          = {10.1007/S10623-015-0087-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DullHHHPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZengerZP15,
  author       = {Christian T. Zenger and
                  Jan Zimmer and
                  Christof Paar},
  title        = {Security Analysis of Quantization Schemes for Channel-based Key Extraction},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {2},
  number       = {6},
  pages        = {e5},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.22-7-2015.2260194},
  doi          = {10.4108/EAI.22-7-2015.2260194},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ZengerZP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/SwierczynskiFKP15,
  author       = {Pawel Swierczynski and
                  Marc Fyrbiak and
                  Philipp Koppe and
                  Christof Paar},
  title        = {{FPGA} Trojans Through Detecting and Weakening of Cryptographic Primitives},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {34},
  number       = {8},
  pages        = {1236--1249},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCAD.2015.2399455},
  doi          = {10.1109/TCAD.2015.2399455},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/SwierczynskiFKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/GornikMOP15,
  author       = {Andreas Gornik and
                  Amir Moradi and
                  J{\"{u}}rgen Oehm and
                  Christof Paar},
  title        = {A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design,
                  Implementation, and Evaluation},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {34},
  number       = {8},
  pages        = {1308--1319},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCAD.2015.2423274},
  doi          = {10.1109/TCAD.2015.2423274},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/GornikMOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RuppBHP15,
  author       = {Andy Rupp and
                  Foteini Baldimtsi and
                  Gesine Hinterw{\"{a}}lder and
                  Christof Paar},
  title        = {Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving
                  Payments for Public Transport},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {10:1--10:31},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699904},
  doi          = {10.1145/2699904},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RuppBHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/SwierczynskiMOP15,
  author       = {Pawel Swierczynski and
                  Amir Moradi and
                  David F. Oswald and
                  Christof Paar},
  title        = {Physical Security Evaluation of the Bitstream Encryption Mechanism
                  of Altera Stratix {II} and Stratix {III} FPGAs},
  journal      = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume       = {7},
  number       = {4},
  pages        = {34:1--34:23},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629462},
  doi          = {10.1145/2629462},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trets/SwierczynskiMOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KisonFP15,
  author       = {Christian Kison and
                  J{\"{u}}rgen Frinken and
                  Christof Paar},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Finding the {AES} Bits in the Haystack: Reverse Engineering and {SCA}
                  Using Voltage Contrast},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {641--660},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_32},
  doi          = {10.1007/978-3-662-48324-4\_32},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KisonFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/StrobelBOSP15,
  author       = {Daehyun Strobel and
                  Florian Bache and
                  David F. Oswald and
                  Falk Schellenberg and
                  Christof Paar},
  editor       = {Wolfgang Nebel and
                  David Atienza},
  title        = {Scandalee: a side-channel-based disassembler using local electromagnetic
                  emanations},
  booktitle    = {Proceedings of the 2015 Design, Automation {\&} Test in Europe
                  Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March
                  9-13, 2015},
  pages        = {139--144},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2755784},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/StrobelBOSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/HassanKCRGP15,
  author       = {Muhammad Hassan and
                  Ayesha Khalid and
                  Anupam Chattopadhyay and
                  Christian Rechberger and
                  Tim G{\"{u}}neysu and
                  Christof Paar},
  title        = {New {ASIC/FPGA} Cost Estimates for {SHA-1} Collisions},
  booktitle    = {2015 Euromicro Conference on Digital System Design, {DSD} 2015, Madeira,
                  Portugal, August 26-28, 2015},
  pages        = {669--676},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSD.2015.78},
  doi          = {10.1109/DSD.2015.78},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/HassanKCRGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/SwierczynskiFPH15,
  author       = {Pawel Swierczynski and
                  Marc Fyrbiak and
                  Christof Paar and
                  Christophe Huriaux and
                  Russell Tessier},
  title        = {Protecting against Cryptographic Trojans in FPGAs},
  booktitle    = {23rd {IEEE} Annual International Symposium on Field-Programmable Custom
                  Computing Machines, {FCCM} 2015, Vancouver, BC, Canada, May 2-6, 2015},
  pages        = {151--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FCCM.2015.55},
  doi          = {10.1109/FCCM.2015.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/SwierczynskiFPH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/SchellenbergFRS15,
  author       = {Falk Schellenberg and
                  Markus Finkeldey and
                  Bastian Richter and
                  Maximilian Schapers and
                  Nils Gerhardt and
                  Martin Hofmann and
                  Christof Paar},
  editor       = {Naofumi Homma and
                  Victor Lomn{\'{e}}},
  title        = {On the Complexity Reduction of Laser Fault Injection Campaigns Using
                  {OBIC} Measurements},
  booktitle    = {2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2015, Saint Malo, France, September 13, 2015},
  pages        = {14--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FDTC.2015.10},
  doi          = {10.1109/FDTC.2015.10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/SchellenbergFRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/MalikBPB15,
  author       = {Shweta Malik and
                  Georg T. Becker and
                  Christof Paar and
                  Wayne P. Burleson},
  title        = {Development of a Layout-Level Hardware Obfuscation Tool},
  booktitle    = {2015 {IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2015,
                  Montpellier, France, July 8-10, 2015},
  pages        = {204--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISVLSI.2015.118},
  doi          = {10.1109/ISVLSI.2015.118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/MalikBPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/ZengerZPP15,
  author       = {Christian T. Zenger and
                  Jan Zimmer and
                  Jan{-}Felix Posielek and
                  Christof Paar},
  editor       = {Pei Zhang and
                  Jorge S{\'{a}} Silva and
                  Nic Lane and
                  Fernando Boavida and
                  Andr{\'{e}} Rodrigues},
  title        = {On-line Entropy Estimation for Secure Information Reconciliation},
  booktitle    = {Proceedings of the 12th {EAI} International Conference on Mobile and
                  Ubiquitous Systems: Computing, Networking and Services, MobiQuitous
                  2015, Coimbra, Portugal, July 22-24, 2015},
  pages        = {254--259},
  publisher    = {{ICST} / {ACM}},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.22-7-2015.2260196},
  doi          = {10.4108/EAI.22-7-2015.2260196},
  timestamp    = {Thu, 28 Feb 2019 17:25:24 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/ZengerZPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ZengerZPPP15,
  author       = {Christian T. Zenger and
                  Jan Zimmer and
                  Mario Pietersz and
                  Jan{-}Felix Posielek and
                  Christof Paar},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Exploiting the Physical Environment for Securing the Internet of Things},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {44--58},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841117},
  doi          = {10.1145/2841113.2841117},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ZengerZPPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/HinterwalderRP15,
  author       = {Gesine Hinterw{\"{a}}lder and
                  Felix Riek and
                  Christof Paar},
  editor       = {Stefan Mangard and
                  Patrick Schaumont},
  title        = {Efficient E-cash with Attributes on {MULTOS} Smartcards},
  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 11th
                  International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24,
                  2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9440},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24837-0\_9},
  doi          = {10.1007/978-3-319-24837-0\_9},
  timestamp    = {Mon, 15 Jun 2020 17:08:11 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/HinterwalderRP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/GuillaumeWCZP15,
  author       = {Ren{\'{e}} Guillaume and
                  Fredrik Winzer and
                  Andreas Czylwik and
                  Christian T. Zenger and
                  Christof Paar},
  title        = {Bringing PHY-Based Key Generation into the Field: An Evaluation for
                  Practical Scenarios},
  booktitle    = {{IEEE} 82nd Vehicular Technology Conference, {VTC} Fall 2015, Boston,
                  MA, USA, September 6-9, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/VTCFall.2015.7390857},
  doi          = {10.1109/VTCFALL.2015.7390857},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/GuillaumeWCZP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DullHHHPSS15,
  author       = {Michael D{\"{u}}ll and
                  Bj{\"{o}}rn Haase and
                  Gesine Hinterw{\"{a}}lder and
                  Michael Hutter and
                  Christof Paar and
                  Ana Helena S{\'{a}}nchez and
                  Peter Schwabe},
  title        = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DullHHHPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gor-nikMOP15,
  author       = {Andreas Gornik and
                  Amir Moradi and
                  J{\"{u}}rgen Oehm and
                  Christof Paar},
  title        = {A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design,
                  Implementation, and Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gor-nikMOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SwierczynskiFKM15,
  author       = {Pawel Swierczynski and
                  Marc Fyrbiak and
                  Philipp Koppe and
                  Amir Moradi and
                  Christof Paar},
  title        = {Interdiction in Practice - Hardware Trojan Against a High-Security
                  {USB} Flash Drive},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {768},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/768},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SwierczynskiFKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BeckerRPB14,
  author       = {Georg T. Becker and
                  Francesco Regazzoni and
                  Christof Paar and
                  Wayne P. Burleson},
  title        = {Stealthy dopant-level hardware Trojans: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {19--31},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0068-0},
  doi          = {10.1007/S13389-013-0068-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BeckerRPB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/StrobelORSP14,
  author       = {Daehyun Strobel and
                  David F. Oswald and
                  Bastian Richter and
                  Falk Schellenberg and
                  Christof Paar},
  title        = {Microcontrollers as (In)Security Devices for Pervasive Computing Applications},
  journal      = {Proc. {IEEE}},
  volume       = {102},
  number       = {8},
  pages        = {1157--1173},
  year         = {2014},
  url          = {https://doi.org/10.1109/JPROC.2014.2325397},
  doi          = {10.1109/JPROC.2014.2325397},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pieee/StrobelORSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balkancryptsec/ZengerAWPSP14,
  author       = {Christian T. Zenger and
                  Abhijit K. Ambekar and
                  Fredrik Winzer and
                  Thomas P{\"{o}}ppelmann and
                  Hans D. Schotten and
                  Christof Paar},
  editor       = {Berna {\"{O}}rs and
                  Bart Preneel},
  title        = {Preventing Scaling of Successful Attacks: {A} Cross-Layer Security
                  Architecture for Resource-Constrained Platforms},
  booktitle    = {Cryptography and Information Security in the Balkans - First International
                  Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17,
                  2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9024},
  pages        = {103--120},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21356-9\_8},
  doi          = {10.1007/978-3-319-21356-9\_8},
  timestamp    = {Tue, 16 Nov 2021 09:08:54 +0100},
  biburl       = {https://dblp.org/rec/conf/balkancryptsec/ZengerAWPSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Paar14,
  author       = {Christof Paar},
  editor       = {Gail{-}Joon Ahn and
                  Frederik Armknecht and
                  Jorge Guajardo},
  title        = {How to Build Hardware Trojans},
  booktitle    = {Proceedings of the 4th International Workshop on Trustworthy Embedded
                  Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages        = {57},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666141.2668384},
  doi          = {10.1145/2666141.2668384},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Paar14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtDKLPY14,
  author       = {Martin R. Albrecht and
                  Benedikt Driessen and
                  Elif Bilge Kavun and
                  Gregor Leander and
                  Christof Paar and
                  Tolga Yal{\c{c}}in},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Block Ciphers - Focus on the Linear Layer (feat. {PRIDE)}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_4},
  doi          = {10.1007/978-3-662-44371-2\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlbrechtDKLPY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DondaSSLP14,
  author       = {Ariano{-}Tim Donda and
                  Peter Samarin and
                  Jacek Samotyja and
                  Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Jooyoung Lee and
                  Jongsung Kim},
  title        = {Remote {IP} Protection Using Timing Channels},
  booktitle    = {Information Security and Cryptology - {ICISC} 2014 - 17th International
                  Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8949},
  pages        = {222--237},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15943-0\_14},
  doi          = {10.1007/978-3-319-15943-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/DondaSSLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/HinterwalderMHS14,
  author       = {Gesine Hinterw{\"{a}}lder and
                  Amir Moradi and
                  Michael Hutter and
                  Peter Schwabe and
                  Christof Paar},
  editor       = {Diego F. Aranha and
                  Alfred Menezes},
  title        = {Full-Size High-Security {ECC} Implementation on {MSP430} Microcontrollers},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference
                  on Cryptology and Information Security in Latin America, Florian{\'{o}}polis,
                  Brazil, September 17-19, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8895},
  pages        = {31--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16295-9\_2},
  doi          = {10.1007/978-3-319-16295-9\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/HinterwalderMHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/Heyse0P14,
  author       = {Stefan Heyse and
                  Ralf Zimmermann and
                  Christof Paar},
  editor       = {Michele Mosca},
  title        = {Attacking Code-Based Cryptosystems with Information Set Decoding Using
                  Special-Purpose Hardware},
  booktitle    = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014,
                  Waterloo, ON, Canada, October 1-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8772},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11659-4\_8},
  doi          = {10.1007/978-3-319-11659-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/Heyse0P14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaileyDP14,
  author       = {Daniel V. Bailey and
                  Markus D{\"{u}}rmuth and
                  Christof Paar},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Statistics on Password Re-use and Adaptive Strength for Financial
                  Accounts},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {218--235},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_13},
  doi          = {10.1007/978-3-319-10879-7\_13},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BaileyDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siot/ZengerCPPW14,
  author       = {Christian T. Zenger and
                  Markus{-}Julian Chur and
                  Jan{-}Felix Posielek and
                  Christof Paar and
                  Gerhard Wunder},
  editor       = {Gabriel Ghinita and
                  Razvan Rughinis and
                  Ahmad{-}Reza Sadeghi},
  title        = {A Novel Key Generating Architecture for Wireless Low-Resource Devices},
  booktitle    = {2014 International Workshop on Secure Internet of Things, SIoT 2014,
                  Wroclaw, Poland, September 10, 2014},
  pages        = {26--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SIoT.2014.7},
  doi          = {10.1109/SIOT.2014.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/siot/ZengerCPPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KasperOP14,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {Sweet Dreams and Nightmares: Security in the Internet of Things},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_1},
  doi          = {10.1007/978-3-662-43826-8\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KasperOP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDKLPY14,
  author       = {Martin R. Albrecht and
                  Benedikt Driessen and
                  Elif Bilge Kavun and
                  Gregor Leander and
                  Christof Paar and
                  Tolga Yal{\c{c}}in},
  title        = {Block Ciphers - Focus On The Linear Layer (feat. {PRIDE):} Full Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtDKLPY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SwierczynskiFKP14a,
  author       = {Pawel Swierczynski and
                  Marc Fyrbiak and
                  Philipp Koppe and
                  Christof Paar},
  title        = {{FPGA} Trojans through Detecting and Weakening of Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SwierczynskiFKP14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SwierczynskiLP13,
  author       = {Pawel Swierczynski and
                  Gregor Leander and
                  Christof Paar},
  title        = {Keccak und der {SHA-2}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {11},
  pages        = {712--719},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0299-3},
  doi          = {10.1007/S11623-013-0299-3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SwierczynskiLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MoradiMP13,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Christof Paar},
  title        = {One Attack to Rule Them All: Collision Timing Attack versus 42 {AES}
                  {ASIC} Cores},
  journal      = {{IEEE} Trans. Computers},
  volume       = {62},
  number       = {9},
  pages        = {1786--1798},
  year         = {2013},
  url          = {https://doi.org/10.1109/TC.2012.154},
  doi          = {10.1109/TC.2012.154},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/MoradiMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DriessenHWPH13,
  author       = {Benedikt Driessen and
                  Ralf Hund and
                  Carsten Willems and
                  Christof Paar and
                  Thorsten Holz},
  title        = {An experimental security analysis of two satphone standards},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {10},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535522},
  doi          = {10.1145/2535522},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DriessenHWPH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/EngelsKPYM13,
  author       = {Susanne Engels and
                  Elif Bilge Kavun and
                  Christof Paar and
                  Tolga Yal{\c{c}}in and
                  Hristina Mihajloska},
  editor       = {Alberto Nannarelli and
                  Peter{-}Michael Seidel and
                  Ping Tak Peter Tang},
  title        = {A Non-Linear/Linear Instruction Set Extension for Lightweight Ciphers},
  booktitle    = {21st {IEEE} Symposium on Computer Arithmetic, {ARITH} 2013, Austin,
                  TX, USA, April 7-10, 2013},
  pages        = {67--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARITH.2013.36},
  doi          = {10.1109/ARITH.2013.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/EngelsKPYM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/EisenbarthMPY13,
  author       = {Thomas Eisenbarth and
                  Ingo von Maurich and
                  Christof Paar and
                  Xin Ye},
  editor       = {Marc Fischlin and
                  Stefan Katzenbeisser},
  title        = {A Performance Boost for Hash-Based Signatures},
  booktitle    = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann
                  on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {8260},
  pages        = {166--182},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42001-6\_13},
  doi          = {10.1007/978-3-642-42001-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/EisenbarthMPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Paar13,
  author       = {Christof Paar},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Constructive and destructive aspects of embedded security in the internet
                  of things},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1495--1496},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516757},
  doi          = {10.1145/2508859.2516757},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Paar13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BeckerRPB13,
  author       = {Georg T. Becker and
                  Francesco Regazzoni and
                  Christof Paar and
                  Wayne P. Burleson},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Stealthy Dopant-Level Hardware Trojans},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {197--214},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_12},
  doi          = {10.1007/978-3-642-40349-1\_12},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BeckerRPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StrobelDKLOSP13,
  author       = {Daehyun Strobel and
                  Benedikt Driessen and
                  Timo Kasper and
                  Gregor Leander and
                  David F. Oswald and
                  Falk Schellenberg and
                  Christof Paar},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital
                  Locking and Access Control System},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {147--164},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_9},
  doi          = {10.1007/978-3-642-40041-4\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/StrobelDKLOSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RuppHBP13,
  author       = {Andy Rupp and
                  Gesine Hinterw{\"{a}}lder and
                  Foteini Baldimtsi and
                  Christof Paar},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {{P4R:} Privacy-Preserving Pre-Payments with Refunds for Transportation
                  Systems},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {205--212},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_17},
  doi          = {10.1007/978-3-642-39884-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RuppHBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/MoradiOPS13,
  author       = {Amir Moradi and
                  David F. Oswald and
                  Christof Paar and
                  Pawel Swierczynski},
  editor       = {Brad L. Hutchings and
                  Vaughn Betz},
  title        = {Side-channel attacks on the bitstream encryption mechanism of Altera
                  Stratix {II:} facilitating black-box analysis using software reverse-engineering},
  booktitle    = {The 2013 {ACM/SIGDA} International Symposium on Field Programmable
                  Gate Arrays, {FPGA} '13, Monterey, CA, USA, February 11-13, 2013},
  pages        = {91--100},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435264.2435282},
  doi          = {10.1145/2435264.2435282},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpga/MoradiOPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/HinterwalderZBLPB13,
  author       = {Gesine Hinterw{\"{a}}lder and
                  Christian T. Zenger and
                  Foteini Baldimtsi and
                  Anna Lysyanskaya and
                  Christof Paar and
                  Wayne P. Burleson},
  editor       = {Emiliano De Cristofaro and
                  Matthew K. Wright},
  title        = {Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation
                  Systems},
  booktitle    = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
                  2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7981},
  pages        = {40--59},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39077-7\_3},
  doi          = {10.1007/978-3-642-39077-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/HinterwalderZBLPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OswaldRP13,
  author       = {David F. Oswald and
                  Bastian Richter and
                  Christof Paar},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Side-Channel Attacks on the Yubikey 2 One-Time Password Generator},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {204--222},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_11},
  doi          = {10.1007/978-3-642-41284-4\_11},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OswaldRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/KasperKOZP13,
  author       = {Timo Kasper and
                  Alexander K{\"{u}}hn and
                  David F. Oswald and
                  Christian T. Zenger and
                  Christof Paar},
  editor       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Rights Management with {NFC} Smartphones and Electronic {ID} Cards:
                  {A} Proof of Concept for Modern Car Sharing},
  booktitle    = {Radio Frequency Identification - Security and Privacy Issues 9th International
                  Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8262},
  pages        = {34--53},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41332-2\_3},
  doi          = {10.1007/978-3-642-41332-2\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/KasperKOZP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/BatinaDEKMPVY13,
  author       = {Lejla Batina and
                  Amitabh Das and
                  Baris Ege and
                  Elif Bilge Kavun and
                  Nele Mentens and
                  Christof Paar and
                  Ingrid Verbauwhede and
                  Tolga Yal{\c{c}}in},
  editor       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy
                  and Area Analysis of Recently Developed Architectures},
  booktitle    = {Radio Frequency Identification - Security and Privacy Issues 9th International
                  Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8262},
  pages        = {103--112},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41332-2\_7},
  doi          = {10.1007/978-3-642-41332-2\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rfidsec/BatinaDEKMPVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/OswaldSSKP13,
  author       = {David F. Oswald and
                  Daehyun Strobel and
                  Falk Schellenberg and
                  Timo Kasper and
                  Christof Paar},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking
                  in Practice},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {571--588},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_29},
  doi          = {10.1007/978-3-662-43414-7\_29},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/OswaldSSKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StrobelDKLOSP13,
  author       = {Daehyun Strobel and
                  Benedikt Driessen and
                  Timo Kasper and
                  Gregor Leander and
                  David F. Oswald and
                  Falk Schellenberg and
                  Christof Paar},
  title        = {Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital
                  Locking and Access Control System - Full Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {598},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/598},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/StrobelDKLOSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatinaDEKMPVY13,
  author       = {Lejla Batina and
                  Amitabh Das and
                  Baris Ege and
                  Elif Bilge Kavun and
                  Nele Mentens and
                  Christof Paar and
                  Ingrid Verbauwhede and
                  Tolga Yal{\c{c}}in},
  title        = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy
                  and Area Analysis of Recently Developed Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatinaDEKMPVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DriessenP12,
  author       = {Benedikt Driessen and
                  Christof Paar},
  title        = {Angriff auf Thuraya Satellitentelefonie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {886--890},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0296-y},
  doi          = {10.1007/S11623-012-0296-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DriessenP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KasperMBMGPB12,
  author       = {Markus Kasper and
                  Amir Moradi and
                  Georg T. Becker and
                  Oliver Mischke and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Wayne P. Burleson},
  title        = {Side channels as building blocks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {143--159},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0040-4},
  doi          = {10.1007/S13389-012-0040-4},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/KasperMBMGPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BeckerSPB12,
  author       = {Georg T. Becker and
                  Daehyun Strobel and
                  Christof Paar and
                  Wayne P. Burleson},
  title        = {Detecting Software Theft in Embedded Systems: {A} Side-Channel Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {4},
  pages        = {1144--1154},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2191964},
  doi          = {10.1109/TIFS.2012.2191964},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BeckerSPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/MoradiKEP12,
  author       = {Amir Moradi and
                  Mario Kirschbaum and
                  Thomas Eisenbarth and
                  Christof Paar},
  title        = {Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power
                  Analysis Methods},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {20},
  number       = {9},
  pages        = {1578--1589},
  year         = {2012},
  url          = {https://doi.org/10.1109/TVLSI.2011.2160375},
  doi          = {10.1109/TVLSI.2011.2160375},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/MoradiKEP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BorghoffCGKKKLNPRRTY12,
  author       = {Julia Borghoff and
                  Anne Canteaut and
                  Tim G{\"{u}}neysu and
                  Elif Bilge Kavun and
                  Miroslav Knezevic and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Ventzislav Nikov and
                  Christof Paar and
                  Christian Rechberger and
                  Peter Rombouts and
                  S{\o}ren S. Thomsen and
                  Tolga Yal{\c{c}}in},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {{PRINCE} - {A} Low-Latency Block Cipher for Pervasive Computing Applications
                  - Extended Abstract},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {208--225},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_14},
  doi          = {10.1007/978-3-642-34961-4\_14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BorghoffCGKKKLNPRRTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/OswaldP12,
  author       = {David F. Oswald and
                  Christof Paar},
  editor       = {Stefan Mangard},
  title        = {Improving Side-Channel Analysis with Optimal Linear Transforms},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {219--233},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_15},
  doi          = {10.1007/978-3-642-37288-9\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/OswaldP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MoradiKP12,
  author       = {Amir Moradi and
                  Markus Kasper and
                  Christof Paar},
  editor       = {Orr Dunkelman},
  title        = {Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures
                  - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption
                  Mechanism},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_1},
  doi          = {10.1007/978-3-642-27954-6\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MoradiKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DurmuthGKPYZ12,
  author       = {Markus D{\"{u}}rmuth and
                  Tim G{\"{u}}neysu and
                  Markus Kasper and
                  Christof Paar and
                  Tolga Yal{\c{c}}in and
                  Ralf Zimmermann},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Evaluation of Standardized Password-Based Key Derivation against Parallel
                  Processing Platforms},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {716--733},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_41},
  doi          = {10.1007/978-3-642-33167-1\_41},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DurmuthGKPYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HeyseKLPP12,
  author       = {Stefan Heyse and
                  Eike Kiltz and
                  Vadim Lyubashevsky and
                  Christof Paar and
                  Krzysztof Pietrzak},
  editor       = {Anne Canteaut},
  title        = {Lapin: An Efficient Authentication Protocol Based on Ring-LPN},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {346--365},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_20},
  doi          = {10.1007/978-3-642-34047-5\_20},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HeyseKLPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Paar12,
  author       = {Christof Paar},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {The Yin and Yang Sides of Embedded Security},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {112--115},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_10},
  doi          = {10.1007/978-3-642-35371-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Paar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/DriessenGKMPP12,
  author       = {Benedikt Driessen and
                  Tim G{\"{u}}neysu and
                  Elif Bilge Kavun and
                  Oliver Mischke and
                  Christof Paar and
                  Thomas P{\"{o}}ppelmann},
  title        = {IPSecco: {A} lightweight and reconfigurable IPSec core},
  booktitle    = {2012 International Conference on Reconfigurable Computing and FPGAs,
                  ReConFig 2012, Cancun, Mexico, December 5-7, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ReConFig.2012.6416757},
  doi          = {10.1109/RECONFIG.2012.6416757},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/reconfig/DriessenGKMPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/HinterwalderPB12,
  author       = {Gesine Hinterw{\"{a}}lder and
                  Christof Paar and
                  Wayne P. Burleson},
  editor       = {Jaap{-}Henk Hoepman and
                  Ingrid Verbauwhede},
  title        = {Privacy Preserving Payments on Computational {RFID} Devices with Application
                  in Intelligent Transportation Systems},
  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 8th
                  International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July
                  2-3, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7739},
  pages        = {109--122},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36140-1\_8},
  doi          = {10.1007/978-3-642-36140-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/HinterwalderPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DriessenHWPH12,
  author       = {Benedikt Driessen and
                  Ralf Hund and
                  Carsten Willems and
                  Christof Paar and
                  Thorsten Holz},
  title        = {Don't Trust Satellite Phones: {A} Security Analysis of Two Satphone
                  Standards},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {128--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.18},
  doi          = {10.1109/SP.2012.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/DriessenHWPH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/DriessenP12,
  author       = {Benedikt Driessen and
                  Christof Paar},
  editor       = {Ferruh {\"{O}}zbudak and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Solving Binary Linear Equation Systems over the Rationals and Binaries},
  booktitle    = {Arithmetic of Finite Fields - 4th International Workshop, {WAIFI}
                  2012, Bochum, Germany, July 16-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7369},
  pages        = {187--195},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31662-3\_13},
  doi          = {10.1007/978-3-642-31662-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/DriessenP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2011,
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-25286-0},
  doi          = {10.1007/978-3-642-25286-0},
  isbn         = {978-3-642-25285-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorghoffCGKKKLNPRRTY12,
  author       = {Julia Borghoff and
                  Anne Canteaut and
                  Tim G{\"{u}}neysu and
                  Elif Bilge Kavun and
                  Miroslav Knezevic and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Ventzislav Nikov and
                  Christof Paar and
                  Christian Rechberger and
                  Peter Rombouts and
                  S{\o}ren S. Thomsen and
                  Tolga Yal{\c{c}}in},
  title        = {{PRINCE} - {A} Low-latency Block Cipher for Pervasive Computing Applications
                  (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/529},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorghoffCGKKKLNPRRTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KasperKMP11,
  author       = {Markus Kasper and
                  Timo Kasper and
                  Amir Moradi and
                  Christof Paar},
  title        = {Praktische Angriffe auf die Bitstromverschl{\"{u}}sselung von
                  Xilinx FPGAs},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {779--785},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0185-9},
  doi          = {10.1007/S11623-011-0185-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KasperKMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KasperOP11,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  title        = {Seitenkanalanalyse kontaktloser SmartCards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {786--790},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0186-8},
  doi          = {10.1007/S11623-011-0186-8},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KasperOP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PaarQS11,
  author       = {Christof Paar and
                  Jean{-}Jacques Quisquater and
                  Berk Sunar},
  title        = {Guest Editorial},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {245--246},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-011-9099-9},
  doi          = {10.1007/S00145-011-9099-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PaarQS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DinurGPSZ11,
  author       = {Itai Dinur and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Adi Shamir and
                  Ralf Zimmermann},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated
                  Reconfigurable Hardware},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {327--343},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_18},
  doi          = {10.1007/978-3-642-25385-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DinurGPSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoradiBKP11,
  author       = {Amir Moradi and
                  Alessandro Barenghi and
                  Timo Kasper and
                  Christof Paar},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {On the vulnerability of {FPGA} bitstream encryption against power
                  analysis attacks: extracting keys from xilinx Virtex-II FPGAs},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {111--124},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046722},
  doi          = {10.1145/2046707.2046722},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MoradiBKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OswaldP11,
  author       = {David F. Oswald and
                  Christof Paar},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Breaking Mifare DESFire {MF3ICD40:} Power Analysis and Templates in
                  the Real World},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_14},
  doi          = {10.1007/978-3-642-23951-9\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OswaldP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiMPLOS11,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Christof Paar and
                  Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {On the Power of Fault Sensitivity Analysis and Collision Side-Channel
                  Attacks in a Combined Setting},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {292--311},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_20},
  doi          = {10.1007/978-3-642-23951-9\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiMPLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MoradiPLPW11,
  author       = {Amir Moradi and
                  Axel Poschmann and
                  San Ling and
                  Christof Paar and
                  Huaxiong Wang},
  editor       = {Kenneth G. Paterson},
  title        = {Pushing the Limits: {A} Very Compact and a Threshold Implementation
                  of {AES}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {69--88},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_6},
  doi          = {10.1007/978-3-642-20465-4\_6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MoradiPLPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/GuneysuHP11,
  author       = {Tim G{\"{u}}neysu and
                  Stefan Heyse and
                  Christof Paar},
  editor       = {David Atienza and
                  Yuan Xie and
                  Jos{\'{e}} L. Ayala and
                  Ken S. Stevens},
  title        = {The future of high-speed cryptography: new computing platforms and
                  new ciphers},
  booktitle    = {Proceedings of the 21st {ACM} Great Lakes Symposium on {VLSI} 2010,
                  Lausanne, Switzerland, May 2-6, 2011},
  pages        = {461--466},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1973009.1973112},
  doi          = {10.1145/1973009.1973112},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/GuneysuHP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MoradiMP11,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Christof Paar},
  title        = {Practical evaluation of {DPA} countermeasures on reconfigurable hardware},
  booktitle    = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
                  Diego, California, {USA}},
  pages        = {154--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HST.2011.5955014},
  doi          = {10.1109/HST.2011.5955014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MoradiMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/StrobelP11,
  author       = {Daehyun Strobel and
                  Christof Paar},
  editor       = {Howon Kim},
  title        = {An Efficient Method for Eliminating Random Delays in Power Traces
                  of Embedded Software},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {48--60},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_4},
  doi          = {10.1007/978-3-642-31912-9\_4},
  timestamp    = {Wed, 01 Mar 2023 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/StrobelP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Paar11,
  author       = {Christof Paar},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {The Yin and Yang Sides of Embedded Security},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {93},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_8},
  doi          = {10.1007/978-3-642-25578-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Paar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/KasperOP11,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation},
  booktitle    = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  pages        = {61--77},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25286-0\_5},
  doi          = {10.1007/978-3-642-25286-0\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/KasperOP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/softcom/KasperOP11,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  title        = {Wireless security threats: Eavesdropping and detecting of active RFIDs
                  and remote controls in the wild},
  booktitle    = {19th International Conference on Software, Telecommunications and
                  Computer Networks, SoftCOM 2011, Split, Croatia, September 15-17,
                  2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/freeabs\_all.jsp?arnumber=6064450},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/softcom/KasperOP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Paar11,
  author       = {Christof Paar},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Exponentiation Algorithms},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {434--436},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_28},
  doi          = {10.1007/978-1-4419-5906-5\_28},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Paar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Paar11a,
  author       = {Christof Paar},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Inversion in Finite Fields and Rings},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {631--632},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_33},
  doi          = {10.1007/978-1-4419-5906-5\_33},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Paar11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/EisenbarthKPI11,
  author       = {Thomas Eisenbarth and
                  Timo Kasper and
                  Christof Paar and
                  Sebastiaan Indesteege},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Keeloq},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {671--673},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_587},
  doi          = {10.1007/978-1-4419-5906-5\_587},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crypt/EisenbarthKPI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Paar11b,
  author       = {Christof Paar},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Optimal Extension Fields (OEFs)},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {888--890},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_41},
  doi          = {10.1007/978-1-4419-5906-5\_41},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Paar11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Paar11c,
  author       = {Christof Paar},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Special-Purpose Cryptanalytical Hardware},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1242--1243},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_47},
  doi          = {10.1007/978-1-4419-5906-5\_47},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Paar11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiMP11,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Christof Paar},
  title        = {Collision Timing Attack when Breaking 42 {AES} {ASIC} Cores},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurGPSZ11,
  author       = {Itai Dinur and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Adi Shamir and
                  Ralf Zimmermann},
  title        = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated
                  Reconfigurable Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurGPSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiBKP11,
  author       = {Amir Moradi and
                  Alessandro Barenghi and
                  Timo Kasper and
                  Christof Paar},
  title        = {On the Vulnerability of {FPGA} Bitstream Encryption against Power
                  Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiBKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiKP11,
  author       = {Amir Moradi and
                  Markus Kasper and
                  Christof Paar},
  title        = {On the Portability of Side-Channel Attacks - An Analysis of the Xilinx
                  Virtex 4 and Virtex 5 Bitstream Encryption Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0023872,
  author       = {Christof Paar and
                  Jan Pelzl},
  title        = {Understanding Cryptography - {A} Textbook for Students and Practitioners},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-04101-3},
  doi          = {10.1007/978-3-642-04101-3},
  isbn         = {978-3-642-04100-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0023872.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/PoschmannRVP10,
  author       = {Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Frank Vater and
                  Christof Paar},
  title        = {Lightweight Cryptography and {RFID:} Tackling the Hidden Overhead},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {4},
  number       = {2},
  pages        = {98--116},
  year         = {2010},
  url          = {https://doi.org/10.3837/tiis.2010.04.002},
  doi          = {10.3837/TIIS.2010.04.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/PoschmannRVP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/EisenbarthPW10,
  author       = {Thomas Eisenbarth and
                  Christof Paar and
                  Bj{\"{o}}rn Weghenkel},
  title        = {Building a Side Channel Based Disassembler},
  journal      = {Trans. Comput. Sci.},
  volume       = {10},
  pages        = {78--99},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17499-5\_4},
  doi          = {10.1007/978-3-642-17499-5\_4},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/EisenbarthPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/KasperOP10,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  title        = {A Versatile Framework for Implementation Attacks on Cryptographic
                  RFIDs and Embedded Devices},
  journal      = {Trans. Comput. Sci.},
  volume       = {10},
  pages        = {100--130},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17499-5\_5},
  doi          = {10.1007/978-3-642-17499-5\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/KasperOP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/DrimerGP10,
  author       = {Saar Drimer and
                  Tim G{\"{u}}neysu and
                  Christof Paar},
  title        = {DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for {AES} on FPGAs},
  journal      = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume       = {3},
  number       = {1},
  pages        = {3:1--3:27},
  year         = {2010},
  url          = {https://doi.org/10.1145/1661438.1661441},
  doi          = {10.1145/1661438.1661441},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trets/DrimerGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BogdanovEPW10,
  author       = {Andrey Bogdanov and
                  Thomas Eisenbarth and
                  Christof Paar and
                  Malte Wienecke},
  editor       = {Josef Pieprzyk},
  title        = {Differential Cache-Collision Timing Attacks on {AES} with Applications
                  to Embedded CPUs},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {235--251},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_17},
  doi          = {10.1007/978-3-642-11925-5\_17},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BogdanovEPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BeckerLLEP10,
  author       = {Georg T. Becker and
                  Sherman C. Lo and
                  David S. De Lorenzo and
                  Per K. Enge and
                  Christof Paar},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {Secure Location Verification - {A} Security Analysis of {GPS} Signal
                  Authentication},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {366--373},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_29},
  doi          = {10.1007/978-3-642-13739-6\_29},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BeckerLLEP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KasperSP10,
  author       = {Timo Kasper and
                  Michael Silbermann and
                  Christof Paar},
  editor       = {Radu Sion},
  title        = {All You Can Eat or Breaking a Real-World Contactless Payment System},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {343--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_28},
  doi          = {10.1007/978-3-642-14577-3\_28},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KasperSP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/ZimmermannGP10,
  author       = {Ralf Zimmermann and
                  Tim G{\"{u}}neysu and
                  Christof Paar},
  title        = {High-Performance Integer Factoring with Reconfigurable Devices},
  booktitle    = {International Conference on Field Programmable Logic and Applications,
                  {FPL} 2010, August 31 2010 - September 2, 2010, Milano, Italy},
  pages        = {83--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FPL.2010.26},
  doi          = {10.1109/FPL.2010.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/ZimmermannGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/FanBBGPV10,
  author       = {Junfeng Fan and
                  Daniel V. Bailey and
                  Lejla Batina and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Ingrid Verbauwhede},
  title        = {Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware},
  booktitle    = {International Conference on Field Programmable Logic and Applications,
                  {FPL} 2010, August 31 2010 - September 2, 2010, Milano, Italy},
  pages        = {133--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FPL.2010.34},
  doi          = {10.1109/FPL.2010.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/FanBBGPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BeckerKMP10,
  author       = {Georg T. Becker and
                  Markus Kasper and
                  Amir Moradi and
                  Christof Paar},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Side-channel based Watermarks for Integrated Circuits},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {30--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513117},
  doi          = {10.1109/HST.2010.5513117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BeckerKMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KasperMOP10,
  author       = {Timo Kasper and
                  Ingo von Maurich and
                  David F. Oswald and
                  Christof Paar},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {Chameleon: {A} Versatile Emulator for Contactless Smartcards},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_13},
  doi          = {10.1007/978-3-642-24209-0\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KasperMOP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/HeyseMP10,
  author       = {Stefan Heyse and
                  Amir Moradi and
                  Christof Paar},
  editor       = {Nicolas Sendrier},
  title        = {Practical Power Analysis Attacks on Software Implementations of McEliece},
  booktitle    = {Post-Quantum Cryptography, Third International Workshop, PQCrypto
                  2010, Darmstadt, Germany, May 25-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6061},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12929-2\_9},
  doi          = {10.1007/978-3-642-12929-2\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/HeyseMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/GuneysuP10,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar},
  editor       = {Ingrid M. R. Verbauwhede},
  title        = {Modular Integer Arithmetic for Public Key Cryptography},
  booktitle    = {Secure Integrated Circuits and Systems},
  series       = {Integrated Circuits and Systems},
  pages        = {3--26},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-71829-3\_1},
  doi          = {10.1007/978-0-387-71829-3\_1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/10/GuneysuP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/RegazzoniEPGGMDPPLI09,
  author       = {Francesco Regazzoni and
                  Thomas Eisenbarth and
                  Axel Poschmann and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Frank K. G{\"{u}}rkaynak and
                  Marco Macchetti and
                  Zeynep Toprak Deniz and
                  Laura Pozzi and
                  Christof Paar and
                  Yusuf Leblebici and
                  Paolo Ienne},
  title        = {Evaluating Resistance of {MCML} Technology to Power Analysis Attacks
                  Using a Simulation-Based Methodology},
  journal      = {Trans. Comput. Sci.},
  volume       = {4},
  pages        = {230--243},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01004-0\_13},
  doi          = {10.1007/978-3-642-01004-0\_13},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcos/RegazzoniEPGGMDPPLI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/KasperKMP09,
  author       = {Markus Kasper and
                  Timo Kasper and
                  Amir Moradi and
                  Christof Paar},
  editor       = {Bart Preneel},
  title        = {Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {403--420},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_25},
  doi          = {10.1007/978-3-642-02384-2\_25},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/KasperKMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/EisenbarthGHP09,
  author       = {Thomas Eisenbarth and
                  Tim G{\"{u}}neysu and
                  Stefan Heyse and
                  Christof Paar},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {MicroEliece: McEliece for Embedded Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_4},
  doi          = {10.1007/978-3-642-04138-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/EisenbarthGHP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Paar09,
  author       = {Christof Paar},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Crypto Engineering: Some History and Some Case Studies},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {220--224},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_16},
  doi          = {10.1007/978-3-642-04138-9\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Paar09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LinKGPB09,
  author       = {Lang Lin and
                  Markus Kasper and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Wayne P. Burleson},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel
                  Engineering},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {382--395},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_27},
  doi          = {10.1007/978-3-642-04138-9\_27},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LinKGPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/PaarEKKM09,
  author       = {Christof Paar and
                  Thomas Eisenbarth and
                  Markus Kasper and
                  Timo Kasper and
                  Amir Moradi},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Elisabeth Oswald and
                  Jean{-}Pierre Seifert},
  title        = {KeeLoq and Side-Channel Analysis-Evolution of an Attack},
  booktitle    = {Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography,
                  {FDTC} 2009, Lausanne, Switzerland, 6 September 2009},
  pages        = {65--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FDTC.2009.44},
  doi          = {10.1109/FDTC.2009.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/PaarEKKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/GuneysuP09,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar},
  editor       = {Neil W. Bergmann and
                  Oliver Diessel and
                  Lesley Shannon},
  title        = {Transforming write collisions in block RAMs into security applications},
  booktitle    = {Proceedings of the 2009 International Conference on Field-Programmable
                  Technology, {FPT} 2009, Sydney, Australia, December 9-11, 2009},
  pages        = {128--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FPT.2009.5377631},
  doi          = {10.1109/FPT.2009.5377631},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fpt/GuneysuP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/GuajardoGKP09,
  author       = {Jorge Guajardo and
                  Tim G{\"{u}}neysu and
                  Sandeep S. Kumar and
                  Christof Paar},
  editor       = {Mohammad Tehranipoor and
                  Jim Plusquellic},
  title        = {Secure IP-Block Distribution for Hardware Devices},
  booktitle    = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
                  {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings},
  pages        = {82--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HST.2009.5224965},
  doi          = {10.1109/HST.2009.5224965},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/GuajardoGKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad/LinBP09,
  author       = {Lang Lin and
                  Wayne P. Burleson and
                  Christof Paar},
  editor       = {Jaijeet S. Roychowdhury},
  title        = {{MOLES:} Malicious off-chip leakage enabled by side-channels},
  booktitle    = {2009 International Conference on Computer-Aided Design, {ICCAD} 2009,
                  San Jose, CA, USA, November 2-5, 2009},
  pages        = {117--122},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1687399.1687425},
  doi          = {10.1145/1687399.1687425},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccad/LinBP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/BaileyBRP09,
  author       = {Daniel V. Bailey and
                  John G. Brainard and
                  Sebastian Rohde and
                  Christof Paar},
  editor       = {Mohammad S. Obaidat and
                  Joaquim Filipe},
  title        = {Wireless Authentication and Transaction-Confirmation Token},
  booktitle    = {e-Business and Telecommunications - 6th International Joint Conference,
                  {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {130},
  pages        = {186--198},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-20077-9\_13},
  doi          = {10.1007/978-3-642-20077-9\_13},
  timestamp    = {Sat, 19 Oct 2019 20:35:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/BaileyBRP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PoschmannRVP09,
  author       = {Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Frank Vater and
                  Christof Paar},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Lightweight Cryptography and {RFID:} Tackling the Hidden Overheads},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_10},
  doi          = {10.1007/978-3-642-14423-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PoschmannRVP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MoradiEPP09,
  author       = {Amir Moradi and
                  Thomas Eisenbarth and
                  Axel Poschmann and
                  Christof Paar},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Power Analysis of Single-Rail Storage Elements as Used in {MDPL}},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {146--160},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_11},
  doi          = {10.1007/978-3-642-14423-3\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MoradiEPP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BaileyBRP09,
  author       = {Daniel V. Bailey and
                  John G. Brainard and
                  Sebastian Rohde and
                  Christof Paar},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {One-touch Financial Transaction Authentication},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {5--12},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 21:15:22 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BaileyBRP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KasperOP09,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {{EM} Side-Channel Attacks on Commercial Contactless Smartcards Using
                  Low-Cost Equipment},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {79--93},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_7},
  doi          = {10.1007/978-3-642-10838-9\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KasperOP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MoradiMPS09,
  author       = {Amir Moradi and
                  Nima Mousavi and
                  Christof Paar and
                  Mahmoud Salmasizadeh},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {A Comparative Study of Mutual Information Analysis under a Gaussian
                  Assumption},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {193--205},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_15},
  doi          = {10.1007/978-3-642-10838-9\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MoradiMPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaileyBBBBBDMFGGKLMPRSU09,
  author       = {Daniel V. Bailey and
                  Brian Baldwin and
                  Lejla Batina and
                  Daniel J. Bernstein and
                  Peter Birkner and
                  Joppe W. Bos and
                  Gauthier Van Damme and
                  Giacomo de Meulenaer and
                  Junfeng Fan and
                  Tim G{\"{u}}neysu and
                  Frank K. G{\"{u}}rkaynak and
                  Thorsten Kleinjung and
                  Tanja Lange and
                  Nele Mentens and
                  Christof Paar and
                  Francesco Regazzoni and
                  Peter Schwabe and
                  Leif Uhsadel},
  title        = {The Certicom Challenges {ECC2-X}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaileyBBBBBDMFGGKLMPRSU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09,
  author       = {Daniel V. Bailey and
                  Lejla Batina and
                  Daniel J. Bernstein and
                  Peter Birkner and
                  Joppe W. Bos and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Gauthier Van Damme and
                  Giacomo de Meulenaer and
                  Luis J. Dominguez Perez and
                  Junfeng Fan and
                  Tim G{\"{u}}neysu and
                  Frank K. G{\"{u}}rkaynak and
                  Thorsten Kleinjung and
                  Tanja Lange and
                  Nele Mentens and
                  Ruben Niederhagen and
                  Christof Paar and
                  Francesco Regazzoni and
                  Peter Schwabe and
                  Leif Uhsadel and
                  Anthony Van Herrewege and
                  Bo{-}Yin Yang},
  title        = {Breaking {ECC2K-130}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EisenbarthKP08,
  author       = {Thomas Eisenbarth and
                  Timo Kasper and
                  Christof Paar},
  title        = {Sicherheit moderner Funkt{\"{u}}r{\"{o}}ffnersysteme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {32},
  number       = {8},
  pages        = {507--510},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11623-008-0121-9},
  doi          = {10.1007/S11623-008-0121-9},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/EisenbarthKP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/GuneysuKNPR08,
  author       = {Tim G{\"{u}}neysu and
                  Timo Kasper and
                  Martin Novotn{\'{y}} and
                  Christof Paar and
                  Andy Rupp},
  title        = {Cryptanalysis with {COPACOBANA}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {11},
  pages        = {1498--1513},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2008.80},
  doi          = {10.1109/TC.2008.80},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/GuneysuKNPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/GuneysuPP08,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar and
                  Jan Pelzl},
  title        = {Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm
                  Problem},
  journal      = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume       = {1},
  number       = {2},
  pages        = {8:1--8:21},
  year         = {2008},
  url          = {https://doi.org/10.1145/1371579.1371580},
  doi          = {10.1145/1371579.1371580},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trets/GuneysuPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/RolfesPLP08,
  author       = {Carsten Rolfes and
                  Axel Poschmann and
                  Gregor Leander and
                  Christof Paar},
  editor       = {Gilles Grimaud and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Ultra-Lightweight Implementations for Smart Devices - Security for
                  1000 Gate Equivalents},
  booktitle    = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2008, London, UK, September 8-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5189},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85893-5\_7},
  doi          = {10.1007/978-3-540-85893-5\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/RolfesPLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/RohdeEDBP08,
  author       = {Sebastian Rohde and
                  Thomas Eisenbarth and
                  Erik Dahmen and
                  Johannes Buchmann and
                  Christof Paar},
  editor       = {Gilles Grimaud and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fast Hash-Based Signatures on Constrained Devices},
  booktitle    = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2008, London, UK, September 8-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5189},
  pages        = {104--117},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85893-5\_8},
  doi          = {10.1007/978-3-540-85893-5\_8},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/RohdeEDBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuneysuP08,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Ultra High Performance {ECC} over {NIST} Primes on Commercial FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {62--78},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_5},
  doi          = {10.1007/978-3-540-85053-3\_5},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GuneysuP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovLPPRS08,
  author       = {Andrey Bogdanov and
                  Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Hash Functions and {RFID} Tags: Mind the Gap},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {283--299},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_18},
  doi          = {10.1007/978-3-540-85053-3\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovLPPRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EisenbarthKMPSS08,
  author       = {Thomas Eisenbarth and
                  Timo Kasper and
                  Amir Moradi and
                  Christof Paar and
                  Mahmoud Salmasizadeh and
                  Mohammad T. Manzuri Shalmani},
  editor       = {David A. Wagner},
  title        = {On the Power of Power Analysis in the Real World: {A} Complete Break
                  of the KeeLoqCode Hopping Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {203--220},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_12},
  doi          = {10.1007/978-3-540-85174-5\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/EisenbarthKMPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GuneysuP08,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar},
  editor       = {Gene Tsudik},
  title        = {Breaking Legacy Banking Standards with Special-Purpose Hardware},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {128--140},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_10},
  doi          = {10.1007/978-3-540-85230-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GuneysuP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/DrimerGP08,
  author       = {Saar Drimer and
                  Tim G{\"{u}}neysu and
                  Christof Paar},
  editor       = {Kenneth L. Pocek and
                  Duncan A. Buell},
  title        = {DSPs, BRAMs and a Pinch of Logic: New Recipes for {AES} on FPGAs},
  booktitle    = {16th {IEEE} International Symposium on Field-Programmable Custom Computing
                  Machines, {FCCM} 2008, 14-15 April 2008, Stanford, Palo Alto, California,
                  {USA}},
  pages        = {99--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FCCM.2008.42},
  doi          = {10.1109/FCCM.2008.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/DrimerGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/GuneysuPPS08,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar and
                  Gerd Pfeiffer and
                  Manfred Schimmler},
  title        = {Enhancing {COPACOBANA} for advanced applications in cryptography and
                  cryptanalysis},
  booktitle    = {{FPL} 2008, International Conference on Field Programmable Logic and
                  Applications, Heidelberg, Germany, 8-10 September 2008},
  pages        = {675--678},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/FPL.2008.4630037},
  doi          = {10.1109/FPL.2008.4630037},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/GuneysuPPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WolfP08,
  author       = {Marko Wolf and
                  Christof Paar},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Security Requirements Engineering in the Automotive Domain: On Specification
                  Procedures and Implementation Aspects},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {485--498},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21500},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WolfP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sies/MeiserELP08,
  author       = {Gordon Meiser and
                  Thomas Eisenbarth and
                  Kerstin Lemke{-}Rust and
                  Christof Paar},
  title        = {Efficient implementation of eSTREAM ciphers on 8-bit {AVR} microcontrollers},
  booktitle    = {{IEEE} Third International Symposium on Industrial Embedded Systems,
                  {SIES} 2008, Montpellier / La Grande Motte, France, June 11-13, 2008},
  pages        = {58--66},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/SIES.2008.4577681},
  doi          = {10.1109/SIES.2008.4577681},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/sies/MeiserELP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DriessenPP08,
  author       = {Benedikt Driessen and
                  Axel Poschmann and
                  Christof Paar},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {Comparison of innovative signature algorithms for WSNs},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {30--35},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352539},
  doi          = {10.1145/1352533.1352539},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/DriessenPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EisenbarthKMPSS08,
  author       = {Thomas Eisenbarth and
                  Timo Kasper and
                  Amir Moradi and
                  Christof Paar and
                  Mahmoud Salmasizadeh and
                  Mohammad T. Manzuri Shalmani},
  title        = {Physical Cryptanalysis of KeeLoq Code Hopping Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EisenbarthKMPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiEPRPSS08,
  author       = {Amir Moradi and
                  Thomas Eisenbarth and
                  Axel Poschmann and
                  Carsten Rolfes and
                  Christof Paar and
                  Mohammad T. Manzuri Shalmani and
                  Mahmoud Salmasizadeh},
  title        = {Information Leakage of Flip-Flops in DPA-Resistant Logic Styles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiEPRPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/EisenbarthKPPU07,
  author       = {Thomas Eisenbarth and
                  Sandeep S. Kumar and
                  Christof Paar and
                  Axel Poschmann and
                  Leif Uhsadel},
  title        = {A Survey of Lightweight-Cryptography Implementations},
  journal      = {{IEEE} Des. Test Comput.},
  volume       = {24},
  number       = {6},
  pages        = {522--533},
  year         = {2007},
  url          = {https://doi.org/10.1109/MDT.2007.178},
  doi          = {10.1109/MDT.2007.178},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/EisenbarthKPPU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PaarSSW07,
  author       = {Christof Paar and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk and
                  Christoph Wegener},
  title        = {Studieren mit Sicherheit in Bochum - Die Studieng{\"{a}}nge zum
                  Thema IT-Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {31},
  number       = {5},
  pages        = {338--342},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11623-007-0130-0},
  doi          = {10.1007/S11623-007-0130-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PaarSSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PaarW07,
  author       = {Christof Paar and
                  Andr{\'{e}} Weimerskirch},
  title        = {Embedded security in a pervasive world},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {12},
  number       = {3},
  pages        = {155--161},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.istr.2007.05.006},
  doi          = {10.1016/J.ISTR.2007.05.006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PaarW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/BaktirKPS07,
  author       = {Sel{\c{c}}uk Baktir and
                  Sandeep S. Kumar and
                  Christof Paar and
                  Berk Sunar},
  title        = {A State-of-the-art Elliptic Curve Cryptographic Processor Operating
                  in the Frequency Domain},
  journal      = {Mob. Networks Appl.},
  volume       = {12},
  number       = {4},
  pages        = {259--270},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11036-007-0022-4},
  doi          = {10.1007/S11036-007-0022-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/BaktirKPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EisenbarthGPSSW07,
  author       = {Thomas Eisenbarth and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Ahmad{-}Reza Sadeghi and
                  Dries Schellekens and
                  Marko Wolf},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Reconfigurable trusted computing in hardware},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314354.1314360},
  doi          = {10.1145/1314354.1314360},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EisenbarthGPSSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Lemke-RustP07,
  author       = {Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Gaussian Mixture Models for Higher-Order Side Channel Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_2},
  doi          = {10.1007/978-3-540-74735-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Lemke-RustP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Yannick Seurin and
                  C. Vikkelsoe},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{PRESENT:} An Ultra-Lightweight Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {450--466},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_31},
  doi          = {10.1007/978-3-540-74735-2\_31},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/RegazzoniEGBIKP07,
  author       = {Francesco Regazzoni and
                  Thomas Eisenbarth and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Luca Breveglieri and
                  Paolo Ienne and
                  Israel Koren and
                  Christof Paar},
  editor       = {Cristiana Bolchini and
                  Yong{-}Bin Kim and
                  Adelio Salsano and
                  Nur A. Touba},
  title        = {Power Attacks Resistance of Cryptographic S-Boxes with Added Error
                  Detection Circuits},
  booktitle    = {22nd {IEEE} International Symposium on Defect and Fault-Tolerance
                  in {VLSI} Systems {(DFT} 2007), 26-28 September 2007, Rome, Italy},
  pages        = {508--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/DFT.2007.61},
  doi          = {10.1109/DFT.2007.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/RegazzoniEGBIKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/UhsadelPP07,
  author       = {Leif Uhsadel and
                  Axel Poschmann and
                  Christof Paar},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_6},
  doi          = {10.1007/978-3-540-73275-4\_6},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/UhsadelPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Lemke-RustP07,
  author       = {Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Analyzing Side Channel Leakage of Masked Implementations with Stochastic
                  Methods},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {454--468},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_30},
  doi          = {10.1007/978-3-540-74835-9\_30},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Lemke-RustP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/GuneysuMP07,
  author       = {Tim G{\"{u}}neysu and
                  Bodo M{\"{o}}ller and
                  Christof Paar},
  editor       = {Kenneth L. Pocek and
                  Duncan A. Buell},
  title        = {New Protection Mechanisms for Intellectual Property in Reconfigurable
                  Logic},
  booktitle    = {{IEEE} Symposium on Field-Programmable Custom Computing Machines,
                  {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}},
  pages        = {287--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FCCM.2007.22},
  doi          = {10.1109/FCCM.2007.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/GuneysuMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/EisenbarthGPSWT07,
  author       = {Thomas Eisenbarth and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Ahmad{-}Reza Sadeghi and
                  Marko Wolf and
                  Russell Tessier},
  editor       = {Kenneth L. Pocek and
                  Duncan A. Buell},
  title        = {Establishing Chain of Trust in Reconfigurable Hardware},
  booktitle    = {{IEEE} Symposium on Field-Programmable Custom Computing Machines,
                  {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}},
  pages        = {289--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FCCM.2007.23},
  doi          = {10.1109/FCCM.2007.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/EisenbarthGPSWT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/GueneysuPP07,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar and
                  Jan Pelzl},
  editor       = {Andr{\'{e}} DeHon and
                  Mike Hutton},
  title        = {Attacking elliptic curve cryptosystems with special-purpose hardware},
  booktitle    = {Proceedings of the {ACM/SIGDA} 15th International Symposium on Field
                  Programmable Gate Arrays, {FPGA} 2007, Monterey, California, USA,
                  February 18-20, 2007},
  pages        = {207--215},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1216919.1216953},
  doi          = {10.1145/1216919.1216953},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpga/GueneysuPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/GuneysuMP07,
  author       = {Tim G{\"{u}}neysu and
                  Bodo M{\"{o}}ller and
                  Christof Paar},
  editor       = {Hideharu Amano and
                  Andy Ye and
                  Takeshi Ikenaga},
  title        = {Dynamic Intellectual Property Protection for Reconfigurable Devices},
  booktitle    = {2007 International Conference on Field-Programmable Technology, {ICFPT}
                  2007, Kitakyushu, Japan, December 12-14, 2007},
  pages        = {169--176},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/FPT.2007.4439246},
  doi          = {10.1109/FPT.2007.4439246},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fpt/GuneysuMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LeanderPPS07,
  author       = {Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Kai Schramm},
  editor       = {Alex Biryukov},
  title        = {New Lightweight {DES} Variants},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {196--210},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_13},
  doi          = {10.1007/978-3-540-74619-5\_13},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LeanderPPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/PaarP07,
  author       = {Christof Paar and
                  Axel Poschmann},
  editor       = {Rainer Koschke and
                  Otthein Herzog and
                  Karl{-}Heinz R{\"{o}}diger and
                  Marc Ronthaler},
  title        = {Hardware Optimierte Leichtgewichtige Blockchiffren f{\"{u}}r
                  {RFID-} und Sensor-Systeme},
  booktitle    = {37. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  trifft Logistik, {INFORMATIK} 2007, Bremen, Germany, September 24-27,
                  2007, Band 2},
  series       = {{LNI}},
  volume       = {{P-110}},
  pages        = {200--204},
  publisher    = {{GI}},
  year         = {2007},
  url          = {https://dl.gi.de/handle/20.500.12116/22480},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/PaarP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/PoschmannLSP07,
  author       = {Axel Poschmann and
                  Gregor Leander and
                  Kai Schramm and
                  Christof Paar},
  title        = {New Light-Weight Crypto Algorithms for {RFID}},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20
                  May 2007, New Orleans, Louisiana, {USA}},
  pages        = {1843--1846},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCAS.2007.378273},
  doi          = {10.1109/ISCAS.2007.378273},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/PoschmannLSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/LiuKLP07,
  author       = {Yifei Liu and
                  Timo Kasper and
                  Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {E-Passport: Cracking Basic Access Control Keys},
  booktitle    = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE,
                  GADA, and IS, {OTM} Confederated International Conferences CoopIS,
                  DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30,
                  2007, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4804},
  pages        = {1531--1547},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76843-2\_30},
  doi          = {10.1007/978-3-540-76843-2\_30},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/LiuKLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/parco/GuneysuPPPSS07,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar and
                  Jan Pelzl and
                  Gerd Pfeiffer and
                  Manfred Schimmler and
                  Christian Schleiffer},
  editor       = {Christian H. Bischof and
                  H. Martin B{\"{u}}cker and
                  Paul Gibbon and
                  Gerhard R. Joubert and
                  Thomas Lippert and
                  Bernd Mohr and
                  Frans J. Peters},
  title        = {Parallel Computing with Low-Cost FPGAs: {A} Framework for {COPACOBANA}},
  booktitle    = {Parallel Computing: Architectures, Algorithms and Applications, ParCo
                  2007, Forschungszentrum J{\"{u}}lich and {RWTH} Aachen University,
                  Germany, 4-7 September 2007},
  series       = {Advances in Parallel Computing},
  volume       = {15},
  pages        = {741--748},
  publisher    = {{IOS} Press},
  year         = {2007},
  timestamp    = {Mon, 16 Feb 2009 08:47:23 +0100},
  biburl       = {https://dblp.org/rec/conf/parco/GuneysuPPPSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/RegazzoniBEGPDMPPLI07,
  author       = {Francesco Regazzoni and
                  St{\'{e}}phane Badel and
                  Thomas Eisenbarth and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Axel Poschmann and
                  Zeynep Toprak Deniz and
                  Marco Macchetti and
                  Laura Pozzi and
                  Christof Paar and
                  Yusuf Leblebici and
                  Paolo Ienne},
  editor       = {Holger Blume and
                  Georgi Gaydadjiev and
                  C. John Glossner and
                  Peter M. W. Knijnenburg},
  title        = {A Simulation-Based Methodology for Evaluating the DPA-Resistance of
                  Cryptographic Functional Units with Application to {CMOS} and {MCML}
                  Technologies},
  booktitle    = {Proceedings of the 2007 International Conference on Embedded Computer
                  Systems: Architectures, Modeling and Simulation {(IC-SAMOS} 2007),
                  Samos, Greece, July 16-19, 2007},
  pages        = {209--214},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSAMOS.2007.4285753},
  doi          = {10.1109/ICSAMOS.2007.4285753},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/samos/RegazzoniBEGPDMPPLI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/GuneysuPS07,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar and
                  Sven Sch{\"{a}}ge},
  editor       = {Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christopher Wolf},
  title        = {Efficient Hash Collision Search Strategies on Special-Purpose Hardware},
  booktitle    = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
                  Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4945},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88353-1\_4},
  doi          = {10.1007/978-3-540-88353-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/GuneysuPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KasperCP07,
  author       = {Timo Kasper and
                  Dario Carluccio and
                  Christof Paar},
  editor       = {Damien Sauveron and
                  Constantinos Markantonakis and
                  Angelos Bilas and
                  Jean{-}Jacques Quisquater},
  title        = {An Embedded System for Practical Security Analysis of Contactless
                  Smartcards},
  booktitle    = {Information Security Theory and Practices. Smart Cards, Mobile and
                  Ubiquitous Computing Systems, First {IFIP} {TC6} / {WG} 8.8 / {WG}
                  11.2 International Workshop, {WISTP} 2007, Heraklion, Crete, Greece,
                  May 9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4462},
  pages        = {150--160},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72354-7\_13},
  doi          = {10.1007/978-3-540-72354-7\_13},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KasperCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/KumarWP06,
  author       = {Sandeep S. Kumar and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {Optimum Digit Serial GF(2{\^{}}m) Multipliers for Curve-Based Cryptography},
  journal      = {{IEEE} Trans. Computers},
  volume       = {55},
  number       = {10},
  pages        = {1306--1311},
  year         = {2006},
  url          = {https://doi.org/10.1109/TC.2006.165},
  doi          = {10.1109/TC.2006.165},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/KumarWP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LemkePS06,
  author       = {Kerstin Lemke and
                  Christof Paar and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Physical Security Bounds Against Tampering},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {253--267},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_17},
  doi          = {10.1007/11767480\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LemkePS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdes/KumarPPPS06,
  author       = {Sandeep S. Kumar and
                  Christof Paar and
                  Jan Pelzl and
                  Gerd Pfeiffer and
                  Manfred Schimmler},
  editor       = {Hamid R. Arabnia and
                  Mary Mehrnoosh Eshaghian{-}Wilner},
  title        = {A Configuration Concept for a Massively Parallel {FPGA} Architecture},
  booktitle    = {Proceedings of the 2006 International Conference on Computer Design
                  {\&} Conference on Computing in Nanotechnology, {CDES} 2006, Las
                  Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {207--212},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 04 May 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdes/KumarPPPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GierlichsLP06,
  author       = {Benedikt Gierlichs and
                  Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Templates vs. Stochastic Methods},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_2},
  doi          = {10.1007/11894063\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GierlichsLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KumarPPPS06,
  author       = {Sandeep S. Kumar and
                  Christof Paar and
                  Jan Pelzl and
                  Gerd Pfeiffer and
                  Manfred Schimmler},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Breaking Ciphers with {COPACOBANA} - {A} Cost-Optimized Parallel Code
                  Breaker},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {101--118},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_9},
  doi          = {10.1007/11894063\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KumarPPPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SchrammP06,
  author       = {Kai Schramm and
                  Christof Paar},
  editor       = {David Pointcheval},
  title        = {Higher Order Masking of the {AES}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {208--225},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_14},
  doi          = {10.1007/11605805\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SchrammP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/BogdanovM06,
  author       = {Andrey Bogdanov and
                  M. C. Mertens and
                  Christof Paar and
                  Jan Pelzl and
                  Andy Rupp},
  title        = {A Parallel Hardware Architecture for fast Gaussian Elimination over
                  {GF(2)}},
  booktitle    = {14th {IEEE} Symposium on Field-Programmable Custom Computing Machines
                  {(FCCM} 2006), 24-26 April 2006, Napa, CA, USA, Proceedings},
  pages        = {237--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/FCCM.2006.12},
  doi          = {10.1109/FCCM.2006.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/BogdanovM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/KumarPPPS06,
  author       = {Sandeep S. Kumar and
                  Christof Paar and
                  Jan Pelzl and
                  Gerd Pfeiffer and
                  Manfred Schimmler},
  title        = {{COPACOBANA} {A} Cost-Optimized Special-Purpose Hardware for Code-Breaking},
  booktitle    = {14th {IEEE} Symposium on Field-Programmable Custom Computing Machines
                  {(FCCM} 2006), 24-26 April 2006, Napa, CA, USA, Proceedings},
  pages        = {311--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/FCCM.2006.34},
  doi          = {10.1109/FCCM.2006.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/KumarPPPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/Lemke-RustP06,
  author       = {Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Luca Breveglieri and
                  Israel Koren and
                  David Naccache and
                  Jean{-}Pierre Seifert},
  title        = {An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic
                  Devices},
  booktitle    = {Fault Diagnosis and Tolerance in Cryptography, Third International
                  Workshop, {FDTC} 2006, Yokohama, Japan, October 10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4236},
  pages        = {131--143},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889700\_13},
  doi          = {10.1007/11889700\_13},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/Lemke-RustP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/WollingerBBP06,
  author       = {Thomas J. Wollinger and
                  Guido Bertoni and
                  Luca Breveglieri and
                  Christof Paar},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {Performance of {HECC} Coprocessors Using Inversion-Free Formulae},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3982},
  pages        = {1004--1012},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751595\_105},
  doi          = {10.1007/11751595\_105},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/WollingerBBP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/ElbirtP06,
  author       = {Adam J. Elbirt and
                  Christof Paar},
  title        = {Efficient Implementation of Galois Field Fixed Field Constant Multiplication},
  booktitle    = {Third International Conference on Information Technology: New Generations
                  {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}},
  pages        = {172--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ITNG.2006.59},
  doi          = {10.1109/ITNG.2006.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/ElbirtP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/CarluccioLPS06,
  author       = {Dario Carluccio and
                  Kerstin Lemke{-}Rust and
                  Christof Paar and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {E-Passport: The Global Traceability Or How to Feel Like a {UPS} Package},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {391--404},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_30},
  doi          = {10.1007/978-3-540-71093-6\_30},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/CarluccioLPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeimerskirchP06,
  author       = {Andr{\'{e}} Weimerskirch and
                  Christof Paar},
  title        = {Generalizations of the Karatsuba Algorithm for Efficient Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeimerskirchP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/WesthoffLPW05,
  author       = {Dirk Westhoff and
                  Bernd Lamparter and
                  Christof Paar and
                  Andr{\'{e}} Weimerskirch},
  title        = {On digital signatures in ad hoc networks},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {16},
  number       = {5},
  pages        = {411--425},
  year         = {2005},
  url          = {https://doi.org/10.1002/ett.1061},
  doi          = {10.1002/ETT.1061},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/WesthoffLPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/WollingerPP05,
  author       = {Thomas J. Wollinger and
                  Jan Pelzl and
                  Christof Paar},
  title        = {Cantor versus Harley: Optimization and Analysis of Explicit Formulae
                  for Hyperelliptic Curve Cryptosystems},
  journal      = {{IEEE} Trans. Computers},
  volume       = {54},
  number       = {7},
  pages        = {861--872},
  year         = {2005},
  url          = {https://doi.org/10.1109/TC.2005.109},
  doi          = {10.1109/TC.2005.109},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/WollingerPP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ElbirtP05,
  author       = {Adam J. Elbirt and
                  Christof Paar},
  title        = {An Instruction-Level Distributed Processor for Symmetric-Key Cryptography},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {16},
  number       = {5},
  pages        = {468--480},
  year         = {2005},
  url          = {https://doi.org/10.1109/TPDS.2005.51},
  doi          = {10.1109/TPDS.2005.51},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ElbirtP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchindlerLP05,
  author       = {Werner Schindler and
                  Kerstin Lemke and
                  Christof Paar},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {A Stochastic Model for Differential Side Channel Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {30--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_3},
  doi          = {10.1007/11545262\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SchindlerLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FrankeKPPPS05,
  author       = {Jens Franke and
                  Thorsten Kleinjung and
                  Christof Paar and
                  Jan Pelzl and
                  Christine Priplata and
                  Colin Stahlke},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {{SHARK:} {A} Realizable Special Hardware Sieving Device for Factoring
                  1024-Bit Integers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_9},
  doi          = {10.1007/11545262\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FrankeKPPPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/AmanorBPPS05,
  author       = {David Narh Amanor and
                  Viktor Bunimov and
                  Christof Paar and
                  Jan Pelzl and
                  Manfred Schimmler},
  editor       = {Tero Rissa and
                  Steven J. E. Wilton and
                  Philip Heng Wai Leong},
  title        = {Efficient Hardware Architectures for Modular Multiplication on FPGAs},
  booktitle    = {Proceedings of the 2005 International Conference on Field Programmable
                  Logic and Applications (FPL), Tampere, Finland, August 24-26, 2005},
  pages        = {539--542},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/FPL.2005.1515780},
  doi          = {10.1109/FPL.2005.1515780},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/AmanorBPPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WolfWP05,
  author       = {Marko Wolf and
                  Andr{\'{e}} Weimerskirch and
                  Christof Paar},
  editor       = {Hannes Federrath},
  title        = {Digital Rights Management Systeme {(DRMS)} als Enabling Technology
                  im Automobil},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {193--196},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28371},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WolfWP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2004,
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b105219},
  doi          = {10.1007/B105219},
  isbn         = {3-540-24396-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/LemkeP05,
  author       = {Kerstin Lemke and
                  Christof Paar},
  editor       = {Henk C. A. van Tilborg},
  title        = {Physical Attacks},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_300},
  doi          = {10.1007/0-387-23483-7\_300},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/LemkeP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Paar05,
  author       = {Christof Paar},
  editor       = {Henk C. A. van Tilborg},
  title        = {Exponentiation Algorithms},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_150},
  doi          = {10.1007/0-387-23483-7\_150},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Paar05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Paar05a,
  author       = {Christof Paar},
  editor       = {Henk C. A. van Tilborg},
  title        = {Inversion in Finite Fields and Rings},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_207},
  doi          = {10.1007/0-387-23483-7\_207},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Paar05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Paar05b,
  author       = {Christof Paar},
  editor       = {Henk C. A. van Tilborg},
  title        = {Optimal Extension Fields (OEFs)},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_289},
  doi          = {10.1007/0-387-23483-7\_289},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Paar05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/WollingerPWPSK04,
  author       = {Thomas J. Wollinger and
                  Jan Pelzl and
                  Volker Wittelsberger and
                  Christof Paar and
                  G{\"{o}}kay Saldamli and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Elliptic and hyperelliptic curves on embedded {\(\mathrm{\mu}\)}P},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {3},
  number       = {3},
  pages        = {509--533},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015047.1015051},
  doi          = {10.1145/1015047.1015051},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/WollingerPWPSK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/WollingerGP04,
  author       = {Thomas J. Wollinger and
                  Jorge Guajardo and
                  Christof Paar},
  title        = {Security on FPGAs: State-of-the-art implementations and attacks},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {3},
  number       = {3},
  pages        = {534--574},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015047.1015052},
  doi          = {10.1145/1015047.1015052},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/WollingerGP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/GrossschadlKP04,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Sandeep S. Kumar and
                  Christof Paar},
  title        = {Architectural Support for Arithmetic in Optimal Extension Fields},
  booktitle    = {15th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2004), 27-29 September 2004,
                  Galveston, TX, {USA}},
  pages        = {111--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ASAP.2004.10004},
  doi          = {10.1109/ASAP.2004.10004},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/GrossschadlKP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchrammLFP04,
  author       = {Kai Schramm and
                  Gregor Leander and
                  Patrick Felke and
                  Christof Paar},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {A Collision-Attack on {AES:} Combining Side Channel- and Differential-Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {163--175},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_12},
  doi          = {10.1007/978-3-540-28632-5\_12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SchrammLFP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LemkeSP04,
  author       = {Kerstin Lemke and
                  Kai Schramm and
                  Christof Paar},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {{DPA} on n-Bit Sized Boolean and Arithmetic Operations and Its Application
                  to IDEA, RC6, and the HMAC-Construction},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_15},
  doi          = {10.1007/978-3-540-28632-5\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LemkeSP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaESA/BarteskaPPWW04,
  author       = {E. Barteska and
                  Christof Paar and
                  Jan Pelzl and
                  Volker Wittelsberger and
                  Thomas J. Wollinger},
  editor       = {Hamid R. Arabnia and
                  Minyi Guo and
                  Laurence Tianruo Yang},
  title        = {Case Study: Compiler Comparison for an Embedded Cryptographical Application},
  booktitle    = {Proceedings of the International Conference on Embedded Systems and
                  Applications, {ESA} '04 {\&} Proceedings of the International
                  Conference on VLSI, {VLSI} '04, June 21-24, 2004, Las Vegas, Nevada,
                  {USA}},
  pages        = {589--595},
  publisher    = {{CSREA} Press},
  year         = {2004},
  timestamp    = {Thu, 16 Jun 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaESA/BarteskaPPWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/KumarP04,
  author       = {Sandeep S. Kumar and
                  Christof Paar},
  editor       = {J{\"{u}}rgen Becker and
                  Marco Platzner and
                  Serge Vernalde},
  title        = {Reconfigurable Instruction Set Extension for Enabling {ECC} on an
                  8-Bit Processor},
  booktitle    = {Field Programmable Logic and Application, 14th International Conference
                  , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3203},
  pages        = {586--595},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30117-2\_60},
  doi          = {10.1007/978-3-540-30117-2\_60},
  timestamp    = {Fri, 19 Jul 2019 13:02:47 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/KumarP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/SchrammP04,
  author       = {Kai Schramm and
                  Christof Paar},
  title        = {{IT} Security Project: Implementation of the Advanced Encryption Standard
                  {(AES)} on a Smart Card},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {176--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286446},
  doi          = {10.1109/ITCC.2004.1286446},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/SchrammP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/PelzlWP04,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems
                  of Genus Two},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {513--517},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286706},
  doi          = {10.1109/ITCC.2004.1286706},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/PelzlWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/BertoniBWP04,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic
                  Curve Cryptosystems},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {538},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286710},
  doi          = {10.1109/ITCC.2004.1286710},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/BertoniBWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimWCCP04,
  author       = {Howon Kim and
                  Thomas J. Wollinger and
                  YongJe Choi and
                  Kyoil Chung and
                  Christof Paar},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Hyperelliptic Curve Coprocessors on a {FPGA}},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {360--374},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_29},
  doi          = {10.1007/978-3-540-31815-6\_29},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimWCCP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniBWP04,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic
                  Curve Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniBWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/KocP03,
  author       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Guest Editors' Introduction to the Special Section on Cryptographic
                  Hardware and Embedded Systems},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {4},
  pages        = {401--402},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1190580},
  doi          = {10.1109/TC.2003.1190580},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/KocP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PelzlWGP03,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Jorge Guajardo and
                  Christof Paar},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to
                  Elliptic Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {351--365},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_28},
  doi          = {10.1007/978-3-540-45238-6\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PelzlWGP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BertoniGKOPW03,
  author       = {Guido Bertoni and
                  Jorge Guajardo and
                  Sandeep S. Kumar and
                  Gerardo Orlando and
                  Christof Paar and
                  Thomas J. Wollinger},
  editor       = {Marc Joye},
  title        = {Efficient GF(p\({}^{\mbox{m}}\)) Arithmetic Architectures for Cryptographic
                  Applications},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {158--175},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_11},
  doi          = {10.1007/3-540-36563-X\_11},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BertoniGKOPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/WollingerP03,
  author       = {Thomas J. Wollinger and
                  Christof Paar},
  editor       = {Peter Y. K. Cheung and
                  George A. Constantinides and
                  Jos{\'{e}} T. de Sousa},
  title        = {How Secure Are FPGAs in Cryptographic Applications?},
  booktitle    = {Field Programmable Logic and Application, 13th International Conference,
                  {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2778},
  pages        = {91--100},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45234-8\_10},
  doi          = {10.1007/978-3-540-45234-8\_10},
  timestamp    = {Tue, 07 May 2024 20:11:13 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/WollingerP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SchrammWP03,
  author       = {Kai Schramm and
                  Thomas J. Wollinger and
                  Christof Paar},
  editor       = {Thomas Johansson},
  title        = {A New Class of Collision Attacks and Its Application to {DES}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {206--222},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_16},
  doi          = {10.1007/978-3-540-39887-5\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SchrammWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/PaarW03,
  author       = {Christof Paar and
                  Thomas J. Wollinger},
  editor       = {Klaus R. Dittrich and
                  Wolfgang K{\"{o}}nig and
                  Andreas Oberweis and
                  Kai Rannenberg and
                  Wolfgang Wahlster},
  title        = {Eingebettete Sicherheit und Kryptographie im Automobil: Eine Einf{\"{u}}hrung},
  booktitle    = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Innovative
                  Informatikanwendungen, {INFORMATIK} 2003, Frankfurt am Main, Germany,
                  September 29 - October 2, 2003, Band 1},
  series       = {{LNI}},
  volume       = {{P-34}},
  pages        = {325--329},
  publisher    = {{GI}},
  year         = {2003},
  url          = {https://dl.gi.de/handle/20.500.12116/29791},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/PaarW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/ElbirtP03,
  author       = {Adam J. Elbirt and
                  Christof Paar},
  title        = {Instruction-Level Distributed Processing for Symmetric-Key Cryptography},
  booktitle    = {17th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings},
  pages        = {78},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IPDPS.2003.1213181},
  doi          = {10.1109/IPDPS.2003.1213181},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/ElbirtP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PelzlWP03,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Christof Paar},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {Low Cost Security: Explicit Formulae for Genus-4 Hyperelliptic Curves},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_1},
  doi          = {10.1007/978-3-540-24654-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PelzlWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2002,
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36400-5},
  doi          = {10.1007/3-540-36400-5},
  isbn         = {3-540-00409-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2003,
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6},
  doi          = {10.1007/978-3-540-45238-6},
  isbn         = {3-540-40833-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PelzlWGP03,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Jorge Guajardo and
                  Christof Paar},
  title        = {Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to
                  Elliptic Curves (Update)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PelzlWGP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PelzlWP03,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PelzlWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WollingerP03,
  author       = {Thomas J. Wollinger and
                  Christof Paar},
  title        = {How Secure Are FPGAs in Cryptographic Applications?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WollingerP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PelzlWP03a,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {High Performance Arithmetic for Hyperelliptic Curve Cryptosystems
                  of Genus Two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PelzlWP03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuajardoP02,
  author       = {Jorge Guajardo and
                  Christof Paar},
  title        = {Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography
                  and Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {25},
  number       = {2},
  pages        = {207--216},
  year         = {2002},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuajardoP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/WollingerP02,
  author       = {Thomas J. Wollinger and
                  Christof Paar},
  title        = {Hardware architectures proposed for cryptosystems based on hyperelliptic
                  curves},
  booktitle    = {Proceedings of the 2002 9th {IEEE} International Conference on Electronics,
                  Circuits and Systems, {ICECS} 2002, Dubrovnik, Croatia, September
                  15-18, 2002},
  pages        = {1159--1162},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICECS.2002.1046458},
  doi          = {10.1109/ICECS.2002.1046458},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/WollingerP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaileyP01,
  author       = {Daniel V. Bailey and
                  Christof Paar},
  title        = {Efficient Arithmetic in Finite Field Extensions with Application in
                  Elliptic Curve Cryptography},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {3},
  pages        = {153--176},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010012},
  doi          = {10.1007/S001450010012},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BaileyP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BlumP01,
  author       = {Thomas Blum and
                  Christof Paar},
  title        = {High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware},
  journal      = {{IEEE} Trans. Computers},
  volume       = {50},
  number       = {7},
  pages        = {759--764},
  year         = {2001},
  url          = {https://doi.org/10.1109/12.936241},
  doi          = {10.1109/12.936241},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/BlumP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/ElbirtYCP01,
  author       = {Adam J. Elbirt and
                  W. Yip and
                  B. Chetwynd and
                  Christof Paar},
  title        = {An FPGA-based performance evaluation of the {AES} block cipher candidate
                  algorithm finalists},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {9},
  number       = {4},
  pages        = {545--557},
  year         = {2001},
  url          = {https://doi.org/10.1109/92.931230},
  doi          = {10.1109/92.931230},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/ElbirtYCP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeimerskirchPS01,
  author       = {Andr{\'{e}} Weimerskirch and
                  Christof Paar and
                  Sheueling Chang Shantz},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Elliptic Curve Cryptography on a Palm {OS} Device},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {502--513},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_39},
  doi          = {10.1007/3-540-47719-5\_39},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WeimerskirchPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrlandoP01,
  author       = {Gerardo Orlando and
                  Christof Paar},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable
                  Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {348--363},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_29},
  doi          = {10.1007/3-540-44709-1\_29},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/OrlandoP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GuajardoBKP01,
  author       = {Jorge Guajardo and
                  Rainer Bl{\"{u}}mel and
                  Uwe Krieger and
                  Christof Paar},
  editor       = {Kwangjo Kim},
  title        = {Efficient Implementation of Elliptic Curve Cryptosystems on the {TI}
                  {MSP} 430x33x Family of Microcontrollers},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {365--382},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_27},
  doi          = {10.1007/3-540-44586-2\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GuajardoBKP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2001,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1},
  doi          = {10.1007/3-540-44709-1},
  isbn         = {3-540-42521-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/ElbirtYCP00,
  author       = {Adam J. Elbirt and
                  W. Yip and
                  B. Chetwynd and
                  Christof Paar},
  title        = {An {FPGA} Implementation and Performance Evaluation of the {AES} Block
                  Cipher Candidate Algorithm Finalists},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {13--27},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/ElbirtYCP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/WollingerWGP00,
  author       = {Thomas J. Wollinger and
                  Min Wang and
                  Jorge Guajardo and
                  Christof Paar},
  title        = {How Well Are High-End DSPs Suited for the {AES} Algorithms? {AES}
                  Algorithms on the TMS320C6x {DSP}},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {94--105},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/WollingerWGP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/WoodburyBP00,
  author       = {Adam D. Woodbury and
                  Daniel V. Bailey and
                  Christof Paar},
  editor       = {Josep Domingo{-}Ferrer and
                  David Chan and
                  Anthony Watson},
  title        = {Elliptic Curve Cryptography on Smart Cards without Coprocessors},
  booktitle    = {Smart Card Research and Advanced Applications, Proceedings of the
                  Fourth Working Conference on Smart Card Research and Advanced Applications,
                  {CARDIS} 2000, September 20-22, 2000, Bristol, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {180},
  pages        = {71--92},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Thu, 01 Aug 2002 11:36:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/WoodburyBP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrlandoP00,
  author       = {Gerardo Orlando and
                  Christof Paar},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A High Performance Reconfigurable Elliptic Curve Processor for GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {41--56},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_3},
  doi          = {10.1007/3-540-44499-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrlandoP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/ElbirtP00,
  author       = {Adam J. Elbirt and
                  Christof Paar},
  editor       = {Steve Trimberger and
                  Scott Hauck},
  title        = {An {FPGA} implementation and performance evaluation of the Serpent
                  block cipher},
  booktitle    = {Proceedings of the {ACM/SIGDA} International Symposium on Field Programmable
                  Gate Arrays, {FPGA} 2000, Monterey, CA, USA, February 10-11, 2000},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/329166.329176},
  doi          = {10.1145/329166.329176},
  timestamp    = {Tue, 06 Nov 2018 16:58:22 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/ElbirtP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2000,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8},
  doi          = {10.1007/3-540-44499-8},
  isbn         = {3-540-41455-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KapsP99,
  author       = {Jens{-}Peter Kaps and
                  Christof Paar},
  title        = {{DES} auf FPGAs - Hochgeschwindigkeits-Architekturen f{\"{u}}r
                  den Data Encryption Standard auf rekonfigurierbarer Hardware},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {23},
  number       = {9},
  year         = {1999},
  timestamp    = {Thu, 18 Dec 2003 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KapsP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Paar99,
  author       = {Christof Paar},
  title        = {Algorithmenunabh{\"{a}}ngige Krypto-Hardware - Moderne Sicherheitsprotokolle
                  erfordern den Wechsel zwischen kryptographischen Algorithmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {23},
  number       = {9},
  year         = {1999},
  timestamp    = {Thu, 18 Dec 2003 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Paar99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/PaarFS99,
  author       = {Christof Paar and
                  Peter Fleischmann and
                  Pedro Soria{-}Rodriguez},
  title        = {Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite
                  Exponents},
  journal      = {{IEEE} Trans. Computers},
  volume       = {48},
  number       = {10},
  pages        = {1025--1034},
  year         = {1999},
  url          = {https://doi.org/10.1109/12.805153},
  doi          = {10.1109/12.805153},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/PaarFS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/OrlandoP99,
  author       = {Gerardo Orlando and
                  Christof Paar},
  title        = {A Super-Serial Galois Fields Multiplier for FPGAs and its Application
                  to Public-Key Algorithms},
  booktitle    = {7th {IEEE} Symposium on Field-Programmable Custom Computing Machines
                  {(FCCM} '99), 21-23 April 1999, Napa, CA, {USA}},
  pages        = {232--239},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/FPGA.1999.803685},
  doi          = {10.1109/FPGA.1999.803685},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/OrlandoP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/1999,
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems, First International Workshop,
                  CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1717},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48059-5},
  doi          = {10.1007/3-540-48059-5},
  isbn         = {3-540-66646-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/PaarFR98,
  author       = {Christof Paar and
                  Peter Fleischmann and
                  Peter Roelse},
  title        = {Efficient Multiplier Architectures for Galois Fields {GF(2} \({}^{\mbox{4n}}\))},
  journal      = {{IEEE} Trans. Computers},
  volume       = {47},
  number       = {2},
  pages        = {162--170},
  year         = {1998},
  url          = {https://doi.org/10.1109/12.663762},
  doi          = {10.1109/12.663762},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/PaarFR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaileyP98,
  author       = {Daniel V. Bailey and
                  Christof Paar},
  editor       = {Hugo Krawczyk},
  title        = {Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {472--485},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055748},
  doi          = {10.1007/BFB0055748},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaileyP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KapsP98,
  author       = {Jens{-}Peter Kaps and
                  Christof Paar},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Fast {DES} Implementation for FPGAs and Its Application to a Universal
                  Key-Search Machine},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {234--247},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_19},
  doi          = {10.1007/3-540-48892-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KapsP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuajardoP97,
  author       = {Jorge Guajardo and
                  Christof Paar},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Efficient Algorithms for Elliptic Curve Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {342--356},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052247},
  doi          = {10.1007/BFB0052247},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuajardoP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PaarR97,
  author       = {Christof Paar and
                  Pedro Soria{-}Rodriguez},
  editor       = {Walter Fumy},
  title        = {Fast Arithmetic Architectures for Public-Key Algorithms over Galois
                  Fields GF((2\({}^{\mbox{n}}\))\({}^{\mbox{m}}\))},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {363--378},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_25},
  doi          = {10.1007/3-540-69053-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PaarR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/PaarR97,
  author       = {Christof Paar and
                  Martin Rosner},
  title        = {Comparison of arithmetic architectures for Reed-Solomon decoders in
                  reconfigurable hardware},
  booktitle    = {5th {IEEE} Symposium on Field-Programmable Custom Computing Machines
                  {(FCCM} '97), 16-18 April 1997, Napa Valley, CA, {USA}},
  pages        = {219--225},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/FPGA.1997.624622},
  doi          = {10.1109/FPGA.1997.624622},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/PaarR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Paar96,
  author       = {Christof Paar},
  title        = {A New Architecture for a Parallel Finite Field Multiplier with Low
                  Complexity Based on Composite Fields},
  journal      = {{IEEE} Trans. Computers},
  volume       = {45},
  number       = {7},
  pages        = {856--861},
  year         = {1996},
  url          = {https://doi.org/10.1109/12.508323},
  doi          = {10.1109/12.508323},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Paar96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Paar94,
  author       = {Christof Paar},
  title        = {Efficient {VLSI} architectures for bit parallel computation in Galios
                  [Galois] fields},
  school       = {University of Duisburg-Essen, Germany},
  year         = {1994},
  url          = {https://d-nb.info/943307856},
  isbn         = {978-3-18-332810-9},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Paar94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics