default search action
Tim Güneysu
Person information
- affiliation: Ruhr University of Bochum, Germany
- affiliation: German Research Center for Artificial Intelligence (DFKI), Bremen, Germany
- affiliation: University of Bremen, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b2]Christof Paar, Jan Pelzl, Tim Güneysu:
Understanding Cryptography - From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms, Second Edition. Springer 2024, ISBN 978-3-662-69006-2, pp. 1-543 - [j46]Shivam Bhasin, Anupam Chattopadhyay, Tim Güneysu, Swarup Bhunia:
Special Issue on Postquantum Cryptography for Internet of Things. IEEE Des. Test 41(5): 5-6 (2024) - [j45]Anupam Chattopadhyay, Shivam Bhasin, Tim Güneysu, Swarup Bhunia:
Quantum-Safe Internet of Things. IEEE Des. Test 41(5): 36-45 (2024) - [j44]Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu:
Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 1-26 (2024) - [j43]Anna Guinet, Georg Land, Ioan Gabriel Bucur, Tim Güneysu:
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 27-50 (2024) - [j42]Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi:
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 25-75 (2024) - [j41]Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu:
Correction Fault Attacks on Randomized CRYSTALS-Dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 174-199 (2024) - [j40]Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Combined Threshold Implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 307-334 (2024) - [j39]Johannes Mono, Kamil Kluczniak, Tim Güneysu:
Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 633-656 (2024) - [j38]Jan Philipp Thoma, Darius Hartlief, Tim Güneysu:
Agile Acceleration of Stateful Hash-based Signatures in Hardware. ACM Trans. Embed. Comput. Syst. 23(2): 29:1-29:29 (2024) - [c134]Moritz Peters, Nicolas Gaudin, Jan Philipp Thoma, Vianney Lapôtre, Pascal Cotret, Guy Gogniat, Tim Güneysu:
On The Effect of Replacement Policies on The Security of Randomized Cache Architectures. AsiaCCS 2024 - [c133]Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. ASIACRYPT (7) 2024: 167-200 - [c132]Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders:
Practical Post-Quantum Signatures for Privacy. CCS 2024: 1523-1537 - [c131]Felix Staudigl, Jan Philipp Thoma, Christian Niesler, Karl J. X. Sturm, Rebecca Pelke, Dominik Germek, Jan Moritz Joseph, Tim Güneysu, Lucas Davi, Rainer Leupers:
NVM-Flip: Non-Volatile-Memory BitFlips on the System Level. SAT-CPS@CODASPY 2024: 11-20 - [c130]Markus Krausz, Jan Philipp Thoma, Florian Stolz, Marc Fyrbiak, Tim Güneysu:
Three Sidekicks to Support Spectre Countermeasures. DATE 2024: 1-6 - [c129]Jan Philipp Thoma, Florian Stolz, Tim Güneysu:
Cips: The Cache Intrusion Prevention System. ESORICS (4) 2024: 3-23 - [i72]Markus Krausz, Sven Peldszus, Francesco Regazzoni, Thorsten Berger, Tim Güneysu:
120 Domain-Specific Languages for Security. CoRR abs/2408.06219 (2024) - [i71]Fabian Schwarz, Jan Philipp Thoma, Christian Rossow, Tim Güneysu:
KeyVisor - A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies. CoRR abs/2410.01777 (2024) - [i70]Fabian Buschkowski, Georg Land, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
HADES: Automated Hardware Design Exploration for Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2024: 130 (2024) - [i69]Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders:
Practical Post-Quantum Signatures for Privacy. IACR Cryptol. ePrint Arch. 2024: 131 (2024) - [i68]Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu:
Correction Fault Attacks on Randomized CRYSTALS-Dilithium. IACR Cryptol. ePrint Arch. 2024: 138 (2024) - [i67]Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Combined Threshold Implementation. IACR Cryptol. ePrint Arch. 2024: 365 (2024) - [i66]Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. IACR Cryptol. ePrint Arch. 2024: 757 (2024) - [i65]Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, Pascal Sasdrich:
INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis. IACR Cryptol. ePrint Arch. 2024: 833 (2024) - 2023
- [j37]Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice. IEEE Trans. Computers 72(2): 572-585 (2023) - [j36]Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu:
Risky Translations: Securing TLBs against Timing Side Channels. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 1-31 (2023) - [j35]Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu:
Challenges and Opportunities of Security-Aware EDA. ACM Trans. Embed. Comput. Syst. 22(3): 43:1-43:34 (2023) - [c128]Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu:
Recommendation for a Holistic Secure Embedded ISA Extension. ACNS 2023: 62-84 - [c127]Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj:
Finding and Evaluating Parameters for BGV. AFRICACRYPT 2023: 370-394 - [c126]Johannes Mono, Tim Güneysu:
Implementing and Optimizing Matrix Triples with Homomorphic Encryption. AsiaCCS 2023: 29-40 - [c125]Jakob Feldtkeller, Tim Güneysu, Patrick Schaumont:
Quantitative Fault Injection Analysis. ASIACRYPT (4) 2023: 302-336 - [c124]Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert:
Combined Private Circuits - Combined Security Refurbished. CCS 2023: 990-1004 - [c123]Fabian Buschkowski, Pascal Sasdrich, Tim Güneysu:
EasiMask-Towards Efficient, Automated, and Secure Implementation of Masking in Hardware. DATE 2023: 1-6 - [c122]Manil Dev Gomony, Floran de Putter, Anteneh Gebregiorgis, Gianna Paulin, Linyan Mei, Vikram Jain, Said Hamdioui, Victor Sanchez, Tobias Grosser, Marc Geilen, Marian Verhelst, Friedemann Zenke, Frank K. Gürkaynak, Barry de Bruin, Sander Stuijk, Simon Davidson, Sayandip De, Mounir Ghogho, Alexandra Jimborean, Sherif Eissa, Luca Benini, Dimitrios Soudris, Rajendra Bishnoi, Sam Ainsworth, Federico Corradi, Ouassim Karrakchou, Tim Güneysu, Henk Corporaal:
PetaOps/W edge-AI $\mu$ Processors: Myth or reality? DATE 2023: 1-6 - [c121]Manil Dev Gomony, Anteneh Gebregiorgis, Moritz Fieback, Marc Geilen, Sander Stuijk, Jan Richter-Brockmann, Rajendra Bishnoi, Sven Argo, Lara Arche Andradas, Tim Güneysu, Mottaqiallah Taouil, Henk Corporaal, Said Hamdioui:
Dependability of Future Edge-AI Processors: Pandora's Box. ETS 2023: 1-6 - [c120]Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling. Public Key Cryptography (2) 2023: 94-124 - [c119]Hauke Malte Steffen, Georg Land, Lucie Johanna Kogelheide, Tim Güneysu:
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware. PQCrypto 2023: 688-711 - [c118]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization. USENIX Security Symposium 2023: 1937-1954 - [c117]Jan Philipp Thoma, Christian Niesler, Dominic A. Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu:
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions. USENIX Security Symposium 2023: 1991-2008 - [i64]Moritz Peters, Nicolas Gaudin, Jan Philipp Thoma, Vianney Lapôtre, Pascal Cotret, Guy Gogniat, Tim Güneysu:
On The Effect of Replacement Policies on The Security of Randomized Cache Architectures. CoRR abs/2312.06235 (2023) - [i63]Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu:
Recommendation for a holistic secure embedded ISA extension. IACR Cryptol. ePrint Arch. 2023: 22 (2023) - [i62]Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu:
Gate-Level Masking of Streamlined NTRU Prime Decapsulation in Hardware. IACR Cryptol. ePrint Arch. 2023: 105 (2023) - [i61]Johannes Mono, Tim Güneysu:
Implementing and Optimizing Matrix Triples with Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 593 (2023) - [i60]Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi:
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures. IACR Cryptol. ePrint Arch. 2023: 624 (2023) - [i59]Johannes Mono, Kamil Kluczniak, Tim Güneysu:
Improved Circuit Synthesis with Amortized Bootstrapping for FHEW-like Schemes. IACR Cryptol. ePrint Arch. 2023: 1223 (2023) - [i58]Markus Krausz, Georg Land, Florian Stolz, Dennis Naujoks, Jan Richter-Brockmann, Tim Güneysu, Lucie Johanna Kogelheide:
Generic Accelerators for Costly-to-Mask PQC Components. IACR Cryptol. ePrint Arch. 2023: 1287 (2023) - [i57]Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert:
Combined Private Circuits - Combined Security Refurbished. IACR Cryptol. ePrint Arch. 2023: 1341 (2023) - [i56]Johannes Mono, Tim Güneysu:
A New Perspective on Key Switching for BGV-like Schemes. IACR Cryptol. ePrint Arch. 2023: 1642 (2023) - [i55]Jakob Feldtkeller, Tim Güneysu, Patrick Schaumont:
Quantitative Fault Injection Analysis. IACR Cryptol. ePrint Arch. 2023: 1722 (2023) - [i54]Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, Ajith Suresh:
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC. IACR Cryptol. ePrint Arch. 2023: 1918 (2023) - 2022
- [j34]Jan Richter-Brockmann, Johannes Mono, Tim Güneysu:
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices. IEEE Trans. Computers 71(5): 1204-1215 (2022) - [j33]Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu:
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 557-588 (2022) - [j32]Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Randomness Optimization for Gadget Compositions in Higher-Order Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 188-227 (2022) - [j31]Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu:
VERICA - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 255-284 (2022) - [c116]Ming-Shing Chen, Tim Güneysu, Markus Krausz, Jan Philipp Thoma:
Carry-Less to BIKE Faster. ACNS 2022: 833-852 - [c115]Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
CINI MINIS: Domain Isolation for Fault and Combined Security. CCS 2022: 1023-1036 - [c114]Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha:
Proof-of-Possession for KEM Certificates using Verifiable Generation. CCS 2022: 1337-1351 - [c113]Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
Efficiently Masking Polynomial Inversion at Arbitrary Order. PQCrypto 2022: 309-326 - [c112]Jan Philipp Thoma, Tim Güneysu:
Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs. RAID 2022: 72-85 - [i53]Jan Philipp Thoma, Tim Güneysu:
Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs. CoRR abs/2209.01894 (2022) - [i52]Manil Dev Gomony, Floran de Putter, Anteneh Gebregiorgis, Gianna Paulin, Linyan Mei, Vikram Jain, Said Hamdioui, Victor Sanchez, Tobias Grosser, Marc Geilen, Marian Verhelst, Frank K. Zenke, Frank K. Gürkaynak, Barry de Bruin, Sander Stuijk, Simon Davidson, Sayandip De, Mounir Ghogho, Alexandra Jimborean, Sherif Eissa, Luca Benini, Dimitrios Soudris, Rajendra Bishnoi, S. Ainsworth, Federico Corradi, Ouassim Karrakchou, Tim Güneysu, Henk Corporaal:
CONVOLVE: Smart and seamless design of smart edge processors. CoRR abs/2212.00873 (2022) - [i51]Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu:
VERICA - Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering. IACR Cryptol. ePrint Arch. 2022: 484 (2022) - [i50]Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha:
Proof-of-possession for KEM certificates using verifiable generation. IACR Cryptol. ePrint Arch. 2022: 703 (2022) - [i49]Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj:
Finding and Evaluating Parameters for BGV. IACR Cryptol. ePrint Arch. 2022: 706 (2022) - [i48]Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
Efficiently Masking Polynomial Inversion at Arbitrary Order. IACR Cryptol. ePrint Arch. 2022: 707 (2022) - [i47]Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Randomness Optimization for Gadget Compositions in Higher-Order Masking. IACR Cryptol. ePrint Arch. 2022: 882 (2022) - [i46]Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
CINI MINIS: Domain Isolation for Fault and Combined Security. IACR Cryptol. ePrint Arch. 2022: 1131 (2022) - [i45]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization. IACR Cryptol. ePrint Arch. 2022: 1228 (2022) - [i44]Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu:
Risky Translations: Securing TLBs against Timing Side Channels. IACR Cryptol. ePrint Arch. 2022: 1394 (2022) - [i43]Hauke Malte Steffen, Georg Land, Lucie Johanna Kogelheide, Tim Güneysu:
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware. IACR Cryptol. ePrint Arch. 2022: 1410 (2022) - [i42]Markus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu:
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling. IACR Cryptol. ePrint Arch. 2022: 1740 (2022) - 2021
- [j30]Benjamin Hettwer, Sebastien Leger, Daniel Fennes, Stefan Gehrer, Tim Güneysu:
Side-Channel Analysis of the Xilinx Zynq UltraScale+ Encryption Engine. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 279-304 (2021) - [j29]Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier:
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 412-446 (2021) - [j28]Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
FIVER - Robust Verification of Countermeasures against Fault Injections. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 447-473 (2021) - [c111]Georg Land, Pascal Sasdrich, Tim Güneysu:
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware. CARDIS 2021: 210-230 - [c110]Arnold Abromeit, Florian Bache, Leon A. Becker, Marc Gourjon, Tim Güneysu, Sabrina Jorn, Amir Moradi, Maximilian Orlt, Falk Schellenberg:
Automated Masking of Software Implementations on Industrial Microcontrollers. DATE 2021: 1006-1011 - [c109]Ilia Polian, Frank Altmann, Tolga Arul, Christian Boit, Ralf Brederlow, Lucas Davi, Rolf Drechsler, Nan Du, Thomas Eisenbarth, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock, Stefan Katzenbeisser, Akash Kumar, Wolfgang Kunz, Thomas Mikolajick, Vivek Pachauri, Jean-Pierre Seifert, Frank Sill Torres, Jens Trommer:
Nano Security: From Nano-Electronics to Secure Systems. DATE 2021: 1334-1339 - [c108]Jan Philipp Thoma, Jakob Feldtkeller, Markus Krausz, Tim Güneysu, Daniel J. Bernstein:
BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs Faster. RAID 2021: 103-118 - [i41]Jan Philipp Thoma, Christian Niesler, Dominic A. Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu:
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions. CoRR abs/2104.11469 (2021) - [i40]Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice. IACR Cryptol. ePrint Arch. 2021: 296 (2021) - [i39]Jan Philipp Thoma, Tim Güneysu:
A Configurable Hardware Implementation of XMSS. IACR Cryptol. ePrint Arch. 2021: 352 (2021) - [i38]Georg Land, Pascal Sasdrich, Tim Güneysu:
A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2021: 355 (2021) - [i37]Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
FIVER - Robust Verification of Countermeasures against Fault Injections. IACR Cryptol. ePrint Arch. 2021: 936 (2021) - [i36]Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier:
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security. IACR Cryptol. ePrint Arch. 2021: 1277 (2021) - [i35]Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu:
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware. IACR Cryptol. ePrint Arch. 2021: 1344 (2021) - 2020
- [j27]Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Applications of machine learning techniques in side-channel attacks: a survey. J. Cryptogr. Eng. 10(2): 135-162 (2020) - [j26]Florian Bache, Clara Paglialonga, Tobias Oder, Tobias Schneider, Tim Güneysu:
High-Speed Masking for Polynomial Comparison in Lattice-based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 483-507 (2020) - [c107]Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache, Tim Güneysu:
Concurrent error detection revisited: hardware protection against fault and side-channel attacks. ARES 2020: 20:1-20:11 - [c106]Jan Richter-Brockmann, Tim Güneysu:
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures. ASAP 2020: 117-124 - [c105]Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu:
Revisiting ECM on GPUs. CANS 2020: 299-319 - [c104]Benjamin Hettwer, Daniel Fennes, Sebastien Leger, Jan Richter-Brockmann, Stefan Gehrer, Tim Güneysu:
Deep Learning Multi-Channel Fusion Attack Against Side-Channel Protected Hardware. DAC 2020: 1-6 - [c103]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. DATE 2020: 508-513 - [c102]Benjamin Hettwer, Kallyan Das, Sebastien Leger, Stefan Gehrer, Tim Güneysu:
Lightweight Side-Channel Protection using Dynamic Clock Randomization. FPL 2020: 200-207 - [c101]Vladimir Herdt, Daniel Große, Jonas Wloka, Tim Güneysu, Rolf Drechsler:
Verification of Embedded Binaries using Coverage-guided Fuzzing with SystemC-based Virtual Prototypes. ACM Great Lakes Symposium on VLSI 2020: 101-106 - [c100]Benjamin Hettwer, Tobias Horn, Stefan Gehrer, Tim Güneysu:
Encoding Power Traces as Images for Efficient Side-Channel Analysis. HOST 2020: 46-56 - [e4]Sonia Belaïd, Tim Güneysu:
Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11833, Springer 2020, ISBN 978-3-030-42067-3 [contents] - [i34]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. CoRR abs/2001.09672 (2020) - [i33]Benjamin Hettwer, Tobias Horn, Stefan Gehrer, Tim Güneysu:
Encoding Power Traces as Images for Efficient Side-Channel Analysis. CoRR abs/2004.11015 (2020) - [i32]Jan Philipp Thoma, Jakob Feldtkeller, Markus Krausz, Tim Güneysu, Daniel J. Bernstein:
BasicBlocker: Redesigning ISAs to Eliminate Speculative-Execution Attacks. CoRR abs/2007.15919 (2020) - [i31]Jan Richter-Brockmann, Tim Güneysu:
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures. IACR Cryptol. ePrint Arch. 2020: 742 (2020) - [i30]Jan Richter-Brockmann, Tim Güneysu:
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices. IACR Cryptol. ePrint Arch. 2020: 897 (2020) - [i29]Jonas Wloka, Jan Richter-Brockmann, Colin Stahlke, Thorsten Kleinjung, Christine Priplata, Tim Güneysu:
Revisiting ECM on GPUs. IACR Cryptol. ePrint Arch. 2020: 1265 (2020)
2010 – 2019
- 2019
- [j25]Florian Bache, Christina Plump, Jonas Wloka, Tim Güneysu, Rolf Drechsler:
Evaluation of (power) side-channels in cryptographic implementations. it Inf. Technol. 61(1): 15-28 (2019) - [c99]Benjamin Hettwer, Johannes Petersen, Stefan Gehrer, Heike Neumann, Tim Güneysu:
Securing Cryptographic Circuits by Exploiting Implementation Diversity and Partial Reconfiguration on FPGAs. DATE 2019: 260-263 - [c98]Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu:
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. Public Key Cryptography (2) 2019: 534-564 - [c97]Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu:
Towards Practical Microcontroller Implementation of the Signature Scheme Falcon. PQCrypto 2019: 65-80 - [c96]Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery. SAC 2019: 645-666 - [c95]Mario Bischof, Tobias Oder, Tim Güneysu:
Efficient Microcontroller Implementation of BIKE. SECITC 2019: 34-49 - [i28]Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery. IACR Cryptol. ePrint Arch. 2019: 143 (2019) - [i27]Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu:
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. IACR Cryptol. ePrint Arch. 2019: 910 (2019) - 2018
- [j24]Pascal Sasdrich, Tim Güneysu:
Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection. J. Hardw. Syst. Secur. 2(4): 297-313 (2018) - [j23]Alexander Wild, Amir Moradi, Tim Güneysu:
GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs. IEEE Trans. Computers 67(3): 375-387 (2018) - [j22]Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu:
Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 142-174 (2018) - [j21]James Howe, Tobias Oder, Markus Krausz, Tim Güneysu:
Standard Lattice-Based Key Encapsulation on Embedded Devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 372-393 (2018) - [c94]Florian Bache, Christina Plump, Tim Güneysu:
Confident leakage assessment - A side-channel evaluation framework based on confidence intervals. DATE 2018: 1117-1122 - [c93]Ayesha Khalid, Tobias Oder, Felipe Valencia, Máire O'Neill, Tim Güneysu, Francesco Regazzoni:
Physical Protection of Lattice-Based Cryptography: Challenges and Solutions. ACM Great Lakes Symposium on VLSI 2018: 365-370 - [c92]Felipe Valencia, Tobias Oder, Tim Güneysu, Francesco Regazzoni:
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks. CS2@HiPEAC 2018: 7-12 - [c91]Tim Güneysu, Markus Krausz, Tobias Oder, Julian Speith:
Evaluation of Lattice-Based Signature Schemes in Embedded Systems. ICECS 2018: 385-388 - [c90]Rolf Drechsler, Christoph Lüth, Görschwin Fey, Tim Güneysu:
Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation. IVSW 2018: 1-6 - [c89]Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge. SAC 2018: 479-498 - [i26]James Howe, Tobias Oder, Markus Krausz, Tim Güneysu:
Standard Lattice-Based Key Encapsulation on Embedded Devices. IACR Cryptol. ePrint Arch. 2018: 686 (2018) - 2017
- [j20]Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things. IEEE Access 5: 11909-11926 (2017) - [j19]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptogr. Eng. 7(2): 149-165 (2017) - [j18]Jingwei Hu, Ray C. C. Cheung, Tim Güneysu:
Compact Constant Weight Coding Engines for the Code-Based Cryptography. IEEE Trans. Circuits Syst. II Express Briefs 64-II(9): 1092-1096 (2017) - [j17]Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers. ACM Trans. Embed. Comput. Syst. 16(4): 117:1-117:24 (2017) - [c88]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. CT-RSA 2017: 131-146 - [c87]Pascal Sasdrich, Tim Güneysu:
Cryptography for Next Generation TLS: Implementing the RFC 7748 Elliptic Curve448 Cryptosystem in Hardware. DAC 2017: 16:1-16:6 - [c86]Florian Bache, Tobias Schneider, Amir Moradi, Tim Güneysu:
SPARX - A side-channel protected processor for ARX-based cryptography. DATE 2017: 990-995 - [c85]Alexander Wild, Georg T. Becker, Tim Güneysu:
A fair and comprehensive large-scale analysis of oscillation-based PUFs for FPGAs. FPL 2017: 1-7 - [c84]Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
LWE-based lossless computational fuzzy extractor for the Internet of Things. HOST 2017: 154 - [c83]Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-Based Algorithm for Key Encapsulation. IMACC 2017: 207-226 - [c82]Tim Güneysu, Tobias Oder:
Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things. ISQED 2017: 319-324 - [c81]Tobias Oder, Tim Güneysu:
Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs. LATINCRYPT 2017: 128-142 - [i25]Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O'Sullivan, Tim Güneysu, Francesco Regazzoni:
An Investigation of Sources of Randomness Within Discrete Gaussian Sampling. IACR Cryptol. ePrint Arch. 2017: 298 (2017) - [i24]Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-based Algorithm for Key Encapsulation. IACR Cryptol. ePrint Arch. 2017: 757 (2017) - 2016
- [j16]Christopher Huth, René Guillaume, Thomas Strohm, Paul Duplys, Irin Ann Samuel, Tim Güneysu:
Information reconciliation schemes in physical-layer security: A survey. Comput. Networks 109: 84-104 (2016) - [j15]Tim Güneysu, Helena Handschuh:
Introduction to the CHES 2015 special issue. J. Cryptogr. Eng. 6(2): 83-84 (2016) - [c80]Pascal Sasdrich, Tim Güneysu:
A grain in the silicon: SCA-protected AES in less than 30 slices. ASAP 2016: 25-32 - [c79]Johannes Buchmann, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann:
High-Performance and Lightweight Lattice-Based Public-Key Encryption. IoTPTS@AsiaCCS 2016: 2-9 - [c78]Christopher Huth, René Guillaume, Paul Duplys, Kumaragurubaran Velmurugan, Tim Güneysu:
On the Energy Cost of Channel Based Key Agreement. TrustED@CCS 2016: 31-41 - [c77]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI: Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks. TIS@CCS 2016: 39 - [c76]Xinxin Fan, Tim Güneysu:
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016). CCS 2016: 1888-1890 - [c75]Máire O'Neill, Elizabeth O'Sullivan, Gavin McWilliams, Markku-Juhani O. Saarinen, Ciara Moore, Ayesha Khalid, James Howe, Rafaël Del Pino, Michel Abdalla, Francesco Regazzoni, Felipe Valencia, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, David Lund:
Secure architectures of future emerging cryptography SAFEcrypto. Conf. Computing Frontiers 2016: 315-322 - [c74]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016: 171-193 - [c73]Tobias Schneider, Amir Moradi, Tim Güneysu:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. COSADE 2016: 199-217 - [c72]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks. CRYPTO (2) 2016: 302-332 - [c71]James Howe, Ciara Moore, Máire O'Neill, Francesco Regazzoni, Tim Güneysu, K. Beeden:
Standard lattices in hardware. DAC 2016: 162:1-162:6 - [c70]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -. FSE 2016: 185-203 - [c69]Alexander Wild, Georg T. Becker, Tim Güneysu:
On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs. HOST 2016: 103-108 - [c68]Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA. ICISC 2016: 28-48 - [c67]Tobias Oder, Tim Güneysu, Felipe Valencia, Ayesha Khalid, Máire O'Neill, Francesco Regazzoni:
Lattice-based cryptography: From reconfigurable hardware to ASIC. ISIC 2016: 1-4 - [c66]Christopher Huth, Paul Duplys, Tim Güneysu:
Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions. PerCom Workshops 2016: 1-6 - [c65]Ingo von Maurich, Lukas Heberle, Tim Güneysu:
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter. PQCrypto 2016: 1-17 - [c64]Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms. SAC 2016: 58-78 - [e3]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu:
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4567-5 [contents] - [e2]Tim Güneysu, Gregor Leander, Amir Moradi:
Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9542, Springer 2016, ISBN 978-3-319-29077-5 [contents] - [i23]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels. IACR Cryptol. ePrint Arch. 2016: 203 (2016) - [i22]Pascal Sasdrich, Tim Güneysu:
Closing the Gap in RFC 7748: Implementing Curve448 in Hardware. IACR Cryptol. ePrint Arch. 2016: 352 (2016) - [i21]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptol. ePrint Arch. 2016: 647 (2016) - [i20]Tobias Schneider, Amir Moradi, Tim Güneysu:
ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks. IACR Cryptol. ePrint Arch. 2016: 648 (2016) - [i19]Tobias Schneider, Amir Moradi, François-Xavier Standaert, Tim Güneysu:
Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms. IACR Cryptol. ePrint Arch. 2016: 719 (2016) - [i18]Christopher Huth, Daniela Becker, Jorge Guajardo, Paul Duplys, Tim Güneysu:
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT. IACR Cryptol. ePrint Arch. 2016: 982 (2016) - [i17]Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu:
Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Cryptol. ePrint Arch. 2016: 1109 (2016) - [i16]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2016: 1111 (2016) - 2015
- [j14]Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann:
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware. IEEE Trans. Computers 64(7): 1954-1967 (2015) - [j13]Patrick Schaumont, Máire O'Neill, Tim Güneysu:
Introduction for Embedded Platforms for Cryptography in the Coming Decade. ACM Trans. Embed. Comput. Syst. 14(3): 40:1-40:3 (2015) - [j12]James Howe, Thomas Pöppelmann, Máire O'Neill, Elizabeth O'Sullivan, Tim Güneysu:
Practical Lattice-Based Digital Signature Schemes. ACM Trans. Embed. Comput. Syst. 14(3): 41:1-41:24 (2015) - [j11]Ingo von Maurich, Tobias Oder, Tim Güneysu:
Implementing QC-MDPC McEliece Encryption. ACM Trans. Embed. Comput. Syst. 14(3): 44:1-44:27 (2015) - [j10]Pascal Sasdrich, Tim Güneysu:
Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography. ACM Trans. Reconfigurable Technol. Syst. 9(1): 3:1-3:15 (2015) - [c63]Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. ACNS 2015: 559-578 - [c62]Alexander Wild, Amir Moradi, Tim Güneysu:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. COSADE 2015: 81-94 - [c61]Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. COSADE 2015: 95-107 - [c60]Muhammad Hassan, Ayesha Khalid, Anupam Chattopadhyay, Christian Rechberger, Tim Güneysu, Christof Paar:
New ASIC/FPGA Cost Estimates for SHA-1 Collisions. DSD 2015: 669-676 - [c59]Georg T. Becker, Alexander Wild, Tim Güneysu:
Security analysis of index-based syndrome coding for PUF-based key generation. HOST 2015: 20-25 - [c58]Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu:
Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs. HOST 2015: 130-136 - [c57]Thomas Pöppelmann, Tobias Oder, Tim Güneysu:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers. LATINCRYPT 2015: 346-365 - [c56]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Affine Equivalence and Its Application to Tightening Threshold Implementations. SAC 2015: 263-276 - [c55]Christopher Huth, Jan Zibuschka, Paul Duplys, Tim Güneysu:
Securing systems on the Internet of Things via physical properties of devices and communications. SysCon 2015: 8-13 - [e1]Tim Güneysu, Helena Handschuh:
Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings. Lecture Notes in Computer Science 9293, Springer 2015, ISBN 978-3-662-48323-7 [contents] - [i15]Tobias Schneider, Amir Moradi, Tim Güneysu:
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. IACR Cryptol. ePrint Arch. 2015: 66 (2015) - [i14]Alexander Wild, Amir Moradi, Tim Güneysu:
GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs. IACR Cryptol. ePrint Arch. 2015: 124 (2015) - [i13]Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu:
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. IACR Cryptol. ePrint Arch. 2015: 198 (2015) - [i12]Alexander Wild, Amir Moradi, Tim Güneysu:
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. IACR Cryptol. ePrint Arch. 2015: 200 (2015) - [i11]Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu:
Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs. IACR Cryptol. ePrint Arch. 2015: 203 (2015) - [i10]Thomas Pöppelmann, Tobias Oder, Tim Güneysu:
Speed Records for Ideal Lattice-Based Cryptography on AVR. IACR Cryptol. ePrint Arch. 2015: 382 (2015) - [i9]Stefan Heyse, Ingo von Maurich, Tim Güneysu:
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. IACR Cryptol. ePrint Arch. 2015: 425 (2015) - [i8]Tobias Schneider, Amir Moradi, Tim Güneysu:
Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. IACR Cryptol. ePrint Arch. 2015: 571 (2015) - [i7]Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Affine Equivalence and its Application to Tightening Threshold Implementations. IACR Cryptol. ePrint Arch. 2015: 749 (2015) - 2014
- [j9]Tobias Schneider, Ingo von Maurich, Tim Güneysu, David F. Oswald:
Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis. J. Signal Process. Syst. 77(1-2): 151-167 (2014) - [c54]Pascal Sasdrich, Tim Güneysu:
Efficient Elliptic-Curve Cryptography Using Curve25519 on Reconfigurable Devices. ARC 2014: 25-36 - [c53]Christopher Pöpper, Oliver Mischke, Tim Güneysu:
MicroACP - A Fast and Secure Reconfigurable Asymmetric Crypto-Processor - -Overhead Evaluation of Side-Channel Countermeasures-. ARC 2014: 240-247 - [c52]Thomas Pöppelmann, Léo Ducas, Tim Güneysu:
Enhanced Lattice-Based Signatures on Reconfigurable Hardware. CHES 2014: 353-370 - [c51]Tobias Oder, Thomas Pöppelmann, Tim Güneysu:
Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices. DAC 2014: 110:1-110:6 - [c50]Ingo von Maurich, Tim Güneysu:
Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices. DATE 2014: 1-6 - [c49]Oliver Mischke, Amir Moradi, Tim Güneysu:
Fault Sensitivity Analysis Meets Zero-Value Attack. FDTC 2014: 59-67 - [c48]Tim Güneysu, Francesco Regazzoni, Pascal Sasdrich, Marcin Wójcik:
THOR - The hardware onion router. FPL 2014: 1-4 - [c47]Alexander Wild, Tim Güneysu:
Enabling SRAM-PUFs on Xilinx FPGAs. FPL 2014: 1-4 - [c46]Thomas Pöppelmann, Tim Güneysu:
Area optimization of lightweight lattice-based encryption on reconfigurable hardware. ISCAS 2014: 2796-2799 - [c45]Özgür Dagdelen, Rachid El Bansarkhani, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Ana Helena Sánchez, Peter Schwabe:
High-Speed Signatures from Standard Lattices. LATINCRYPT 2014: 84-103 - [c44]Ingo von Maurich, Tim Güneysu:
Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices. PQCrypto 2014: 266-282 - [c43]Maik Ender, Gerd Duppmann, Alexander Wild, Thomas Pöppelmann, Tim Güneysu:
A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems. ReConFig 2014: 1-6 - [i6]Thomas Pöppelmann, Léo Ducas, Tim Güneysu:
Enhanced Lattice-Based Signatures on Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2014: 254 (2014) - 2013
- [j8]Stefan Heyse, Tim Güneysu:
Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance. J. Cryptogr. Eng. 3(1): 29-43 (2013) - [c42]Alexander Wild, Tim Güneysu, Amir Moradi:
Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware. ACNS 2013: 389-404 - [c41]Tobias Schneider, Ingo von Maurich, Tim Güneysu:
Efficient implementation of cryptographic primitives on the GA144 multi-core architecture. ASAP 2013: 67-74 - [c40]Stefan Heyse, Ingo von Maurich, Tim Güneysu:
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. CHES 2013: 273-292 - [c39]Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Peter Schwabe:
Software Speed Records for Lattice-Based Signatures. PQCrypto 2013: 67-82 - [c38]Thomas Pöppelmann, Tim Güneysu:
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware. Selected Areas in Cryptography 2013: 68-85 - 2012
- [j7]Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne P. Burleson:
Side channels as building blocks. J. Cryptogr. Eng. 2(3): 143-159 (2012) - [j6]Tim Güneysu:
Using Data Contention in Dual-ported Memories for Security Applications. J. Signal Process. Syst. 67(1): 15-29 (2012) - [c37]Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel:
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. AFRICACRYPT 2012: 172-187 - [c36]Tim Güneysu, Igor L. Markov, André Weimerskirch:
Securely Sealing Multi-FPGA Systems. ARC 2012: 276-289 - [c35]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. ASIACRYPT 2012: 208-225 - [c34]Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. CARDIS 2012: 158-172 - [c33]Stefan Heyse, Tim Güneysu:
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware. CHES 2012: 340-355 - [c32]Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann:
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems. CHES 2012: 530-547 - [c31]Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann:
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms. ESORICS 2012: 716-733 - [c30]Ingo von Maurich, Tim Güneysu:
Embedded Syndrome-Based Hashing. INDOCRYPT 2012: 339-357 - [c29]Thomas Pöppelmann, Tim Güneysu:
Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware. LATINCRYPT 2012: 139-158 - [c28]Benedikt Driessen, Tim Güneysu, Elif Bilge Kavun, Oliver Mischke, Christof Paar, Thomas Pöppelmann:
IPSecco: A lightweight and reconfigurable IPSec core. ReConFig 2012: 1-7 - [c27]Lubos Gaspar, Viktor Fischer, Tim Güneysu, Zouha Cherif Jouini:
Two IP protection schemes for multi-FPGA systems. ReConFig 2012: 1-6 - [i5]Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. IACR Cryptol. ePrint Arch. 2012: 507 (2012) - [i4]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version). IACR Cryptol. ePrint Arch. 2012: 529 (2012) - 2011
- [j5]Tim Güneysu:
Utilizing hard cores of modern FPGA devices for high-performance cryptography. J. Cryptogr. Eng. 1(1): 37-55 (2011) - [c26]Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. ASIACRYPT 2011: 327-343 - [c25]Tim Güneysu, Amir Moradi:
Generic Side-Channel Countermeasures for Reconfigurable Devices. CHES 2011: 33-48 - [c24]Tim Güneysu, Stefan Heyse, Christof Paar:
The future of high-speed cryptography: new computing platforms and new ciphers. ACM Great Lakes Symposium on VLSI 2011: 461-466 - [c23]Michal Varchola, Tim Güneysu, Oliver Mischke:
MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-processor. ReConFig 2011: 204-210 - [c22]Benno Lomb, Tim Güneysu:
Decrypting HDCP-protected Video Streams Using Reconfigurable Hardware. ReConFig 2011: 249-254 - [c21]Timo Bartkewitz, Tim Güneysu:
Full Lattice Basis Reduction on Graphics Cards. WEWoRC 2011: 30-44 - [r1]Tim Güneysu:
FPGAs in Cryptography. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 499-501 - [i3]Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2011: 282 (2011) - 2010
- [j4]Tim Güneysu:
Kryptografie auf programmierbarer Hardware. Datenschutz und Datensicherheit 34(12): 832-837 (2010) - [j3]Saar Drimer, Tim Güneysu, Christof Paar:
DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs. ACM Trans. Reconfigurable Technol. Syst. 3(1): 3:1-3:27 (2010) - [c20]Ralf Zimmermann, Tim Güneysu, Christof Paar:
High-Performance Integer Factoring with Reconfigurable Devices. FPL 2010: 83-88 - [c19]Junfeng Fan, Daniel V. Bailey, Lejla Batina, Tim Güneysu, Christof Paar, Ingrid Verbauwhede:
Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware. FPL 2010: 133-138 - [c18]Tim Güneysu:
True random number generation in block memories of reconfigurable devices. FPT 2010: 200-207 - [p1]Tim Güneysu, Christof Paar:
Modular Integer Arithmetic for Public Key Cryptography. Secure Integrated Circuits and Systems 2010: 3-26
2000 – 2009
- 2009
- [b1]Tim Erhan Güneysu:
Cryptography and cryptanalysis on reconfigurable devices: security implementations for hardware and reprogrammable devices. Ruhr University Bochum, 2009, ISBN 978-3-89966-338-9, pp. 1-210 - [c17]Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar:
MicroEliece: McEliece for Embedded Devices. CHES 2009: 49-64 - [c16]Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne P. Burleson:
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. CHES 2009: 382-395 - [c15]Tim Güneysu, Christof Paar:
Transforming write collisions in block RAMs into security applications. FPT 2009: 128-134 - [c14]Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar, Christof Paar:
Secure IP-Block Distribution for Hardware Devices. HOST 2009: 82-89 - [i2]Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier Van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel:
The Certicom Challenges ECC2-X. IACR Cryptol. ePrint Arch. 2009: 466 (2009) - [i1]Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo de Meulenaer, Luis J. Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang:
Breaking ECC2K-130. IACR Cryptol. ePrint Arch. 2009: 541 (2009) - 2008
- [j2]Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Andy Rupp:
Cryptanalysis with COPACOBANA. IEEE Trans. Computers 57(11): 1498-1513 (2008) - [j1]Tim Güneysu, Christof Paar, Jan Pelzl:
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. ACM Trans. Reconfigurable Technol. Syst. 1(2): 8:1-8:21 (2008) - [c13]Tim Güneysu, Christof Paar:
Ultra High Performance ECC over NIST Primes on Commercial FPGAs. CHES 2008: 62-78 - [c12]Robert Szerwinski, Tim Güneysu:
Exploiting the Power of GPUs for Asymmetric Cryptography. CHES 2008: 79-99 - [c11]Tim Güneysu, Christof Paar:
Breaking Legacy Banking Standards with Special-Purpose Hardware. Financial Cryptography 2008: 128-140 - [c10]Saar Drimer, Tim Güneysu, Christof Paar:
DSPs, BRAMs and a Pinch of Logic: New Recipes for AES on FPGAs. FCCM 2008: 99-108 - [c9]Tim Güneysu, Christof Paar, Gerd Pfeiffer, Manfred Schimmler:
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis. FPL 2008: 675-678 - 2007
- [c8]Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, Marko Wolf:
Reconfigurable trusted computing in hardware. STC 2007: 15-20 - [c7]Tim Güneysu, Bodo Möller, Christof Paar:
New Protection Mechanisms for Intellectual Property in Reconfigurable Logic. FCCM 2007: 287-288 - [c6]Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier:
Establishing Chain of Trust in Reconfigurable Hardware. FCCM 2007: 289-290 - [c5]Tim Güneysu, Christof Paar, Jan Pelzl:
Attacking elliptic curve cryptosystems with special-purpose hardware. FPGA 2007: 207-215 - [c4]Tim Güneysu, Bodo Möller, Christof Paar:
Dynamic Intellectual Property Protection for Reconfigurable Devices. FPT 2007: 169-176 - [c3]Tim Güneysu, Andy Rupp, Stefan Spitz:
Cryptanalytic Time-Memory Tradeoffs on COPACOBANA. GI Jahrestagung (2) 2007: 205-209 - [c2]Tim Güneysu, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler, Christian Schleiffer:
Parallel Computing with Low-Cost FPGAs: A Framework for COPACOBANA. PARCO 2007: 741-748 - [c1]Tim Güneysu, Christof Paar, Sven Schäge:
Efficient Hash Collision Search Strategies on Special-Purpose Hardware. WEWoRC 2007: 39-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 19:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint