Остановите войну!
for scientists:
default search action
Jan Richter-Brockmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu:
Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 1-26 (2024) - [i17]Fabian Buschkowski, Georg Land, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
HADES: Automated Hardware Design Exploration for Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2024: 130 (2024) - [i16]Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Combined Threshold Implementation. IACR Cryptol. ePrint Arch. 2024: 365 (2024) - [i15]Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. IACR Cryptol. ePrint Arch. 2024: 757 (2024) - [i14]Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, Pascal Sasdrich:
INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis. IACR Cryptol. ePrint Arch. 2024: 833 (2024) - 2023
- [b1]Jan Richter-Brockmann:
Secure and efficient hardware implementations for modern cryptography. Ruhr University Bochum, Germany, 2023 - [j5]Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice. IEEE Trans. Computers 72(2): 572-585 (2023) - [c9]Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert:
Combined Private Circuits - Combined Security Refurbished. CCS 2023: 990-1004 - [c8]Manil Dev Gomony, Anteneh Gebregiorgis, Moritz Fieback, Marc Geilen, Sander Stuijk, Jan Richter-Brockmann, Rajendra Bishnoi, Sven Argo, Lara Arche Andradas, Tim Güneysu, Mottaqiallah Taouil, Henk Corporaal, Said Hamdioui:
Dependability of Future Edge-AI Processors: Pandora's Box. ETS 2023: 1-6 - [c7]Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling. Public Key Cryptography (2) 2023: 94-124 - [i13]Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu:
Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware. IACR Cryptol. ePrint Arch. 2023: 105 (2023) - [i12]Markus Krausz, Georg Land, Florian Stolz, Dennis Naujoks, Jan Richter-Brockmann, Tim Güneysu, Lucie Johanna Kogelheide:
Generic Accelerators for Costly-to-Mask PQC Components. IACR Cryptol. ePrint Arch. 2023: 1287 (2023) - [i11]Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert:
Combined Private Circuits - Combined Security Refurbished. IACR Cryptol. ePrint Arch. 2023: 1341 (2023) - 2022
- [j4]Jan Richter-Brockmann, Johannes Mono, Tim Güneysu:
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices. IEEE Trans. Computers 71(5): 1204-1215 (2022) - [j3]Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu:
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 557-588 (2022) - [j2]Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu:
VERICA - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 255-284 (2022) - [c6]Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
CINI MINIS: Domain Isolation for Fault and Combined Security. CCS 2022: 1023-1036 - [c5]Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
Efficiently Masking Polynomial Inversion at Arbitrary Order. PQCrypto 2022: 309-326 - [i10]Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu:
VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering. IACR Cryptol. ePrint Arch. 2022: 484 (2022) - [i9]Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
Efficiently Masking Polynomial Inversion at Arbitrary Order. IACR Cryptol. ePrint Arch. 2022: 707 (2022) - [i8]Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
CINI MINIS: Domain Isolation for Fault and Combined Security. IACR Cryptol. ePrint Arch. 2022: 1131 (2022) - [i7]Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling. IACR Cryptol. ePrint Arch. 2022: 1740 (2022) - 2021
- [j1]Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
FIVER - Robust Verification of Countermeasures against Fault Injections. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 447-473 (2021) - [i6]Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice. IACR Cryptol. ePrint Arch. 2021: 296 (2021) - [i5]Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
FIVER - Robust Verification of Countermeasures against Fault Injections. IACR Cryptol. ePrint Arch. 2021: 936 (2021) - [i4]Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu:
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware. IACR Cryptol. ePrint Arch. 2021: 1344 (2021) - 2020
- [c4]Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache, Tim Güneysu:
Concurrent error detection revisited: hardware protection against fault and side-channel attacks. ARES 2020: 20:1-20:11 - [c3]Jan Richter-Brockmann, Tim Güneysu:
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures. ASAP 2020: 117-124 - [c2]Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu:
Revisiting ECM on GPUs. CANS 2020: 299-319 - [c1]Benjamin Hettwer, Daniel Fennes, Sebastien Leger, Jan Richter-Brockmann, Stefan Gehrer, Tim Güneysu:
Deep Learning Multi-Channel Fusion Attack Against Side-Channel Protected Hardware. DAC 2020: 1-6 - [i3]Jan Richter-Brockmann, Tim Güneysu:
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures. IACR Cryptol. ePrint Arch. 2020: 742 (2020) - [i2]Jan Richter-Brockmann, Tim Güneysu:
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices. IACR Cryptol. ePrint Arch. 2020: 897 (2020) - [i1]Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu:
Revisiting ECM on GPUs. IACR Cryptol. ePrint Arch. 2020: 1265 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-02 20:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint