


Остановите войну!
for scientists:


default search action
Marc Stöttinger
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c31]Marc-André Kaufhold, Ali Sercan Basyurt, Kaan Eyilmez, Marc Stöttinger, Christian Reuter:
Cyber Threat Observatory: Design and Evaluation of an Interactive Dashboard for Computer Emergency Response Teams. ECIS 2022 - [i7]Fabio Campos, Michael Meyer, Krijn Reijnders, Marc Stöttinger:
Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE. IACR Cryptol. ePrint Arch. 2022: 904 (2022) - 2021
- [c30]Yi Wang, Marc Stöttinger, Yajun Ha:
A Fault Resistant AES via Input-Output Differential Tables with DPA Awareness. ISCAS 2021: 1-5 - [c29]Ruben Gonzalez, Andreas Hülsing
, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers
, Bo-Yin Yang:
Verifying Post-Quantum Signatures in 8 kB of RAM. PQCrypto 2021: 215-233 - [i6]Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, Bo-Yin Yang:
Verifying Post-Quantum Signatures in 8 kB of RAM. IACR Cryptol. ePrint Arch. 2021: 662 (2021) - 2020
- [c28]Fabio Campos
, Tim Kohlstadt, Steffen Reith, Marc Stöttinger:
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4. AFRICACRYPT 2020: 258-277 - [c27]Fabio Campos
, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki
, Marc Stöttinger:
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks. FDTC 2020: 57-65 - [i5]Wen Wang, Marc Stöttinger:
Post-Quantum Secure Architectures for Automotive Hardware Secure Modules. IACR Cryptol. ePrint Arch. 2020: 26 (2020) - [i4]Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stöttinger:
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2020: 470 (2020) - [i3]Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, Marc Stöttinger:
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2020: 1005 (2020)
2010 – 2019
- 2019
- [j4]Bernhard Jungk, Marc Stöttinger:
Serialized lightweight SHA-3 FPGA implementations. Microprocess. Microsystems 71 (2019) - [c26]Stefan Katzenbeisser, Ilia Polian, Francesco Regazzoni, Marc Stöttinger:
Security in Autonomous Systems. ETS 2019: 1-8 - [e1]Ilia Polian, Marc Stöttinger:
Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings. Lecture Notes in Computer Science 11421, Springer 2019, ISBN 978-3-030-16349-5 [contents] - [i2]Ingo Braun, Fabio Campos, Steffen Reith, Marc Stöttinger:
No RISC, no Fun: Comparison of Hardware Accelerated Hash Functions for XMSS. IACR Cryptol. ePrint Arch. 2019: 1403 (2019) - 2018
- [j3]Bernhard Jungk, Richard Petri
, Marc Stöttinger:
Efficient Side-Channel Protections of ARX Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 627-653 (2018) - [i1]Bernhard Jungk, Richard Petri, Marc Stöttinger:
Efficient Side-Channel Protections of ARX Ciphers. IACR Cryptol. ePrint Arch. 2018: 693 (2018) - 2016
- [c25]Marc Stöttinger, Bernhard Jungk:
There ain't no plain key: A PUF based first-order side-channel resistant encryption construction. ISIC 2016: 1-4 - [c24]Bernhard Jungk, Marc Stöttinger:
Hobbit - Smaller but faster than a dwarf: Revisiting lightweight SHA-3 FPGA implementations. ReConFig 2016: 1-7 - 2015
- [c23]Alexander Herrmann, Marc Stöttinger:
Evaluation Tools for Multivariate Side-Channel Analysis. CS2@HiPEAC 2015: 1-6 - [c22]Dirmanto Jap, Marc Stöttinger, Shivam Bhasin:
Support vector regression: exploiting machine learning techniques for leakage modeling. HASP@ISCA 2015: 2:1-2:8 - 2014
- [j2]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler
, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [c21]Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Marc Stöttinger:
Minimizing S-Boxes in Hardware by Utilizing Linear Transformations. AFRICACRYPT 2014: 235-250 - [c20]Aderinola Gbade-Alabi, David C. Keezer, Vincent John Mooney, Axel York Poschmann, Marc Stöttinger, Kshitij Divekar:
A signature based architecture for Trojan detection. WESS 2014: 3:1-3:10 - [c19]Marc Stöttinger, Gavin Xiaoxu Yao, Ray C. C. Cheung
:
Zero collision attack and its countermeasures on Residue Number System multipliers. ISIC 2014: 30-33 - [c18]Alexander Herrmann, Marc Stöttinger:
Constructive side-channel analysis for secure hardware design. ISIC 2014: 34-37 - 2013
- [c17]Sorin A. Huss, Marc Stöttinger, Michael Zohner:
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework. Number Theory and Cryptography 2013: 151-165 - [c16]Sebastian Kutzner, Axel York Poschmann, Marc Stöttinger:
Hardware trojan design and detection: a practical evaluation. WESS 2013: 1:1-1:9 - [c15]Sebastian Kutzner, Axel Poschmann, Marc Stöttinger:
TROJANUS: An ultra-lightweight side-channel leakage generator for FPGAs. FPT 2013: 160-167 - [c14]Fabrizio De Santis, Michael Kasper, Stefan Mangard, Georg Sigl, Oliver Stein, Marc Stöttinger:
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective. INDOCRYPT 2013: 215-226 - [c13]Bernhard Jungk, Marc Stöttinger:
Among slow dwarfs and fast giants: A systematic design space exploration of KECCAK. ReCoSoC 2013: 1-8 - 2012
- [b1]Marc Stöttinger:
Mutating runtime architectures as a countermeasure against power analysis attacks. Darmstadt University of Technology, Germany, 2012, pp. 1-161 - [c12]Michael Zohner, Michael Kasper, Marc Stöttinger:
Butterfly-Attack on Skein's Modular Addition. COSADE 2012: 215-230 - [c11]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models. CT-RSA 2012: 365-382 - [c10]Michael Zohner, Michael Kasper, Marc Stöttinger, Sorin A. Huss:
Side channel analysis of the SHA-3 finalists. DATE 2012: 1012-1017 - [c9]Annelie Heuser, Werner Schindler, Marc Stöttinger:
Revealing side-channel issues of complex circuits by enhanced leakage models. DATE 2012: 1179-1184 - [c8]Bernhard Jungk, Marc Stöttinger, Jan Gampe, Steffen Reith, Sorin A. Huss:
Side-channel resistant AES architecture utilizing randomized composite field representations. FPT 2012: 125-128 - [c7]Michael Zohner, Marc Stöttinger, Sorin A. Huss, Oliver Stein:
An adaptable, modular, and autonomous side-channel vulnerability evaluator. HOST 2012: 43-48 - 2011
- [j1]H. Gregor Molter
, Marc Stöttinger, Abdulhadi Shoufan
, Falko Strenzke:
A simple power analysis attack on a McEliece cryptoprocessor. J. Cryptogr. Eng. 1(1): 29-36 (2011) - [c6]Alexander Biedermann, Marc Stöttinger, Lijing Chen, Sorin A. Huss:
Secure Virtualization within a Multi-processor Soft-Core System-on-Chip Architecture. ARC 2011: 385-396 - [c5]Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger:
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis. DSD 2011: 674-681 - 2010
- [c4]Marc Stöttinger, Alexander Biedermann, Sorin Alexander Huss:
Virtualization within a Parallel Array of Homogeneous Processing Units. ARC 2010: 17-28 - [c3]Marc Stöttinger, Sorin A. Huss, Sascha Mühlbach, Andreas Koch:
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme. EUC 2010: 603-608 - [c2]Michael Kasper, Werner Schindler, Marc Stöttinger:
A stochastic method for security evaluation of cryptographic FPGA implementations. FPT 2010: 146-153 - [p1]Marc Stöttinger, Felix Madlener, Sorin A. Huss:
Procedures for Securing ECC Implementations Against Differential Power Analysis Using Reconfigurable Architectures. Dynamically Reconfigurable Systems 2010: 395-415
2000 – 2009
- 2009
- [c1]Abdulhadi Shoufan
, Falko Strenzke, H. Gregor Molter
, Marc Stöttinger:
A Timing Attack against Patterson Algorithm in the McEliece PKC. ICISC 2009: 161-175
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2022-10-04 22:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint