Michael Hutter

According to our database1, Michael Hutter authored at least 52 papers between 1992 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021

2020
Low-Latency Hardware Masking with Application to AES.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
J. Cryptol., 2020

2019
Constant-time higher-order Boolean-to-arithmetic masking.
J. Cryptogr. Eng., 2019

Protecting RISC-V against Side-Channel Attacks.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Protecting Triple-DES Against DPA - A Practical Application of Domain-Oriented Masking.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2017
A Side-Channel Assisted Cryptanalytic Attack Against QcBits.
IACR Cryptol. ePrint Arch., 2017

2016
NaCl's Crypto_Box in Hardware.
IACR Cryptol. ePrint Arch., 2016

Threshold Implementations in Industry: A Case Study on SHA-256.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016

2015
Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness.
IEEE Trans. Inf. Forensics Secur., 2015

Multiprecision multiplication on AVR revisited.
J. Cryptogr. Eng., 2015

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers.
Des. Codes Cryptogr., 2015

Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version.
J. Cryptogr. Eng., 2014

The Temperature Side Channel and Heating Fault Attacks.
IACR Cryptol. ePrint Arch., 2014

Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

PIONEER - a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

On the power of active relay attacks using custom-made proxies.
Proceedings of the IEEE International Conference on RFID, 2014

Full-Size High-Security ECC Implementation on MSP430 Microcontrollers.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

EM-based detection of hardware trojans on FPGAs.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

Clock Glitch Attacks in the Presence of Heating.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

Efficient Multiplication on Low-Resource Devices.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

2013
Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography.
IEEE Trans. Very Large Scale Integr. Syst., 2013

Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID.
IACR Cryptol. ePrint Arch., 2013

Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA.
IACR Cryptol. ePrint Arch., 2013

NaCl on 8-Bit AVR Microcontrollers.
IACR Cryptol. ePrint Arch., 2013

Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC.
Proceedings of the HASP 2013, 2013

2012
Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Exploiting the Difference of Side-Channel Leakages.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Putting together What Fits together - GrÆStl.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Improved Fixed-Base Comb Method for Fast Scalar Multiplication.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
An approach to introducing locality in remote attestation using near field communications.
J. Supercomput., 2011

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

Elliptic Curve Cryptography on the WISP UHF RFID Tag.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations.
Proceedings of the Information Security Technology for Applications, 2011

A Hardware Processor Supporting Elliptic Curve Cryptography for Less than 9 kGEs.
Proceedings of the Smart Card Research and Advanced Applications, 2011

Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-<i>Z</i> Coordinate Representation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
On the security of RFID devices against implementation attacks.
Int. J. Secur. Networks, 2010

An ECDSA Processor for RFID Authentication.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Semi-passive RFID development platform for implementing and attacking security tags.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Side-Channel Leakage across Borders.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey.
Proceedings of the SECRYPT 2009, 2009

Embedded system management using WBEM.
Proceedings of the Integrated Network Management, 2009

Optical Fault Attacks on AES: A Threat in Violet.
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009

Contact-based fault injections and power analysis on RFID tags.
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009

Attacking ECDSA-Enabled RFID Devices.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
RFID and Its Vulnerability to Faults.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Security processor with quantum key distribution.
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008

2007
Power and EM Attacks on Passive 13.56 MHz RFID Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

1992
Selbstorganisation in sozialen Systemen - Eine Theorie und ihre Anwendung auf Wirtschaftssysteme.
Proceedings of the Aspekte der Selbstorganisation, 1992


  Loading...