Marcin Wójcik

According to our database1, Marcin Wójcik authored at least 23 papers between 2010 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
An investigation of the aerodynamic parameters for Solar Plane wing profile using CFD modelling.
Comput. Sci., 2021

2019
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net.
J. Reliab. Intell. Environ., 2019

2018
The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

2017
Extending programs with debug-related features, with application to hardware development.
CoRR, 2017

On The Security Evaluation of Partial Password Implementations.
CoRR, 2017

Emu: Rapid Prototyping of Networking Services.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Re-architecting datacenter networks and stacks for low latency and high performance.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Where Has My Time Gone?
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

2016
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

2015
A Leakage Resilient MAC.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

2014
Hardware fabrics for cryptographic algorithms.
PhD thesis, 2014

ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2014

THOR - The hardware onion router.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

2013
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices.
IACR Cryptol. ePrint Arch., 2013

On the (re)design of an FPGA-based PUF.
IACR Cryptol. ePrint Arch., 2013

Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
A practical device authentication scheme using SRAM PUFs.
J. Cryptogr. Eng., 2012

An exploration of mechanisms for dynamic cryptographic instruction set extension.
J. Cryptogr. Eng., 2012

Security Analysis of an Open Car Immobilizer Protocol Stack.
IACR Cryptol. ePrint Arch., 2012

On Reconfigurable Fabrics and Generic Side-Channel Countermeasures.
IACR Cryptol. ePrint Arch., 2012

2011
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM.
Proceedings of the Trusted Systems - Third International Conference, 2011

2010
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture.
IACR Cryptol. ePrint Arch., 2010

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software.
Proceedings of the Trusted Systems - Second International Conference, 2010


  Loading...