Peter Langendörfer
Orcid: 0000-0002-6209-9048Affiliations:
- Technischen Universität Cottbus, Germany
- IHP GmbH - Leibniz Institute for Innovations for High Performance Microelectronics (former)
According to our database1,
Peter Langendörfer
authored at least 211 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on b-tu.de
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning.
Future Internet, February, 2024
Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions.
IEEE Access, 2024
2023
Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow.
Future Internet, June, 2023
Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices.
Ann. des Télécommunications, April, 2023
IEEE Trans. Dependable Secur. Comput., 2023
On the Stability and Homogeneous Ensemble of Feature Selection for Predictive Maintenance: A Classification Application for Tool Condition Monitoring in Milling.
Sensors, 2023
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023
Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023
Coarse-grained Control Flow Integrity Check for Processors with Sliding Register Windows.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023
Novel Approach to a Plant Inspired Distributed Security Scheme for Wireless Sensor Networks.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023
On the Influence of the Laser Illumination on the Logic Cells Current Consumption : First measurement results.
Proceedings of the 30th IEEE International Conference on Electronics, Circuits and Systems, 2023
Proceedings of the 53. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2023, Designing Future, 2023
Proceedings of the IEEE East-West Design & Test Symposium, 2023
Non-Profiled Semi-Supervised Horizontal Attack Against Elliptic Curve Scalar Multiplication Using Support Vector Machines.
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Machine Learning based Real Time Detection of Freezing of Gait of Parkinson Patients Running on a Body Worn Device.
Proceedings of the IEEE/ACM Conference on Connected Health: Applications, 2023
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks.
Sensors, 2022
Future Gener. Comput. Syst., 2022
Determining Distributions of Security Means for Wireless Sensor Networks based on the Model of a Neighbourhood Watch.
CoRR, 2022
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022
Distributed Artificial Intelligence as a Means to Achieve Self-X-Functions for Increasing Resilience: the First Steps.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022
Proceedings of the 23rd IEEE Latin American Test Symposium, 2022
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022
Proceedings of the XXVIII International Conference on Information, 2022
Combination of ROP Defense Mechanisms for Better Safety and Security in Embedded Systems.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022
2021
Microprocess. Microsystems, November, 2021
Microprocess. Microsystems, 2021
Future Internet, 2021
J. Electron. Test., 2021
Impact of Data Preparation in Freezing of Gait Detection Using Feature-Less Recurrent Neural Network.
IEEE Access, 2021
A TOPSIS-Assisted Feature Selection Scheme and SOM-Based Anomaly Detection for Milling Tools Under Different Operating Conditions.
IEEE Access, 2021
Proceedings of the 11th IFIP International Conference on New Technologies, 2021
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021
Multiplier as a Mean for Reducing Vulnerability of Atomic Patterns to Horizontal Address-Bit Attacks.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021
EC Scalar Multiplication: Successful Simple Address-Bit SCA Attack against Atomic Patterns.
Proceedings of the 22nd IEEE Latin American Test Symposium, 2021
Proceedings of the 30th IEEE International Symposium on Industrial Electronics, 2021
Vibration Analysis of a Wind Turbine Gearbox for Off-cloud Health Monitoring through Neuromorphic-computing.
Proceedings of the IECON 2021, 2021
Proceedings of the IECON 2021, 2021
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems, 2021
Proceedings of the 22nd IEEE International Conference on Industrial Technology, 2021
Simulation of Electromagnetic Emanation of Cryptographic ICs: Tools, Methods, Problems.
Proceedings of the IEEE East-West Design & Test Symposium, 2021
Proceedings of the 24th Euromicro Conference on Digital System Design, 2021
Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices.
Proceedings of the 5th Cyber Security in Networking Conference, 2021
Proceedings of the Body Area Networks. Smart IoT and Big Data for Intelligent Health Management, 2021
2020
Demonstration of WISDOM - a Wireless in Field Measurement and Debugging Platform for Wireless Sensor Networks and Devices.
WiPiEC Journal, 2020
Integr., 2020
Proceedings of the 28th International Conference on Software, 2020
Sensitivity of Standard Library Cells to Optical Fault Injection Attacks in IHP 250 nm Technology.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020
Proceedings of the IEEE Latin-American Test Symposium, 2020
Metal Fillers as Potential Low Cost Countermeasure against Optical Fault Injection Attacks.
Proceedings of the IEEE East-West Design & Test Symposium, 2020
Proceedings of the IEEE East-West Design & Test Symposium, 2020
Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA.
Proceedings of the 15th Design & Technology of Integrated Systems in Nanoscale Era, 2020
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
2019
Comput. Commun., 2019
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack.
Proceedings of the 2019 International Conference on ReConFigurable Computing and FPGAs, 2019
Proceedings of the 30th IEEE International Symposium on Personal, 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Resilience more than the Sum of Security and Dependability: Cognition is what makes the Difference.
Proceedings of the 8th Mediterranean Conference on Embedded Computing, 2019
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019
Using machine learning techniques for hardware performance counter classification and ROP attack detection.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019
Fast and Secure Unified Field Multiplier for ECC Based on the 4-Segment Karatsuba Multiplication.
Proceedings of the 2019 IEEE East-West Design & Test Symposium, 2019
Proceedings of the 2019 IEEE East-West Design & Test Symposium, 2019
Proceedings of the 2019 IEEE East-West Design & Test Symposium, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula.
Proceedings of the 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IEEE Access, 2018
FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA.
Proceedings of the 2018 International Conference on ReConFigurable Computing and FPGAs, 2018
Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA.
Proceedings of the 2018 International Conference on ReConFigurable Computing and FPGAs, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018
Proceedings of the 13th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2018
Unified field multiplier for ECC: Inherent resistance against horizontal SCA attacks.
Proceedings of the 13th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2018
2017
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2017
Shortening the security parameters in lightweight WSN applications for IoT - lessons learned.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks.
Proceedings of the 2017 IEEE East-West Design & Test Symposium, 2017
2016
Detecting Elementary Arm Movements by Tracking Upper Limb Joint Angles With MARG Sensors.
IEEE J. Biomed. Health Informatics, 2016
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016
Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
2015
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA.
IACR Cryptol. ePrint Arch., 2015
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015
Clockwise Randomization of the Observable Behaviour of Crypto ASICs to Counter Side Channel Attacks.
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015
Proceedings of the Ad Hoc Networks, 2015
2014
J. Cyber Secur. Mobil., 2014
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis.
IACR Cryptol. ePrint Arch., 2014
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 22nd International Conference on Software, 2014
Telemedicine system for game-based rehabilitation of stroke patients in the FP7-"StrokeBack" project.
Proceedings of the European Conference on Networks and Communications, 2014
2013
A Lifetime Forecast Scheme for a Distributed Low Duty Cycle Multi-Hop Routing in Wireless Sensor Networks.
Int. J. Bus. Data Commun. Netw., 2013
Overview and benchmarks of pragmatic debugging techniques for wireless sensor networks.
Proceedings of the 21st International Conference on Software, 2013
Proceedings of the 8th IEEE International Symposium on Industrial Embedded Systems, 2013
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks.
Proceedings of the Wireless Networks and Security, Issues, Challenges and Research Trends., 2013
2012
Support for a Long Lifetime and Short End-to-End Delays with TDMA Protocols in Sensor Networks.
Int. J. Distributed Sens. Networks, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k).
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012
Tool-Supported Methodology for Component-Based Design of Wireless Sensor Network Applications.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the 15th International Conference on Compilers, 2012
A Telemedicine System for Improved Rehabilitation of Stroke Patients.
Proceedings of the HEALTHINF 2012 - Proceedings of the International Conference on Health Informatics, Vilamoura, Algarve, Portugal, 1, 2012
2011
WiSec 2011 demo: demonstrating self-contained on-node counter measures for various jamming attacks in WSN.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011
J. Commun. Networks, 2011
Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ).
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011
The Impact of Social Networks on user Privacy - What Social Networks Really Learn about Their Users!
Proceedings of the WEBIST 2011, 2011
Symbiosis of a Lightweight ECC Security and Distributed Shared Memory Middleware in Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011
Towards a Secure Address Space Separation for Low Power Sensor Nodes.
Proceedings of the PECCS 2011, 2011
Proceedings of the 2nd Workshop on Software Engineering for Sensor Network Applications, 2011
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
2010
Application of wireless sensor networks in critical infrastructure protection: challenges and design options.
IEEE Wirel. Commun., 2010
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors.
Int. J. Distributed Sens. Networks, 2010
Int. J. Adapt. Resilient Auton. Syst., 2010
Proceedings of the Wired/Wireless Internet Communications, 8th International Conference, 2010
Short ECC - A Lightweight Security Approach for Wireless Sensor Networks.
Proceedings of the SECRYPT 2010, 2010
Automated mapping of MAC parameters into generic QoS parameters by Inter-MAC adaptors.
Proceedings of the IEEE 21st International Symposium on Personal, 2010
Proceedings of the 8th ACM International Workshop on Mobility Management & Wireless Access, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010
2009
Proceedings of the Wired/Wireless Internet Communications, 7th International Conference, 2009
Proceedings of the IEEE 20th International Symposium on Personal, 2009
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
Adaptive pruning of event decision trees for energy efficient collaboration in event-driven WSN.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009
A cross-layer approach for data replication and gathering in decentralized long-living wireless sensor networks.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009
An Engineering Approach for Secure and Safe Wireless Sensor and Actuator Networks for Industrial Automation Systems.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009
2008
Int. J. Sens. Networks, 2008
Int. J. Ad Hoc Ubiquitous Comput., 2008
Enhancing reliability of sensor networks by fine tuning their event observation behavior.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008
Privacy guaranteeing execution containers: one time use of personal data by location based services.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008
In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks.
Proceedings of the LCN 2008, 2008
2007
An Area Efficient Realisation of AES for Wireless Devices (Eine flächeneffiziente AES Hardwarerealisierung für drahtlose Geräte).
it Inf. Technol., 2007
Crosslayer firewall interaction as a means to provide effective and efficient protection at mobile devices.
Comput. Commun., 2007
Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
The Privacy Advocate (PrivAd) - A Framework for Negotiating Individual Privacy Contracts.
Proceedings of the WEBIST 2007, 2007
Proceedings of the Web Information Systems and Technologies, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007
Proceedings of the Fifth ACM International Workshop on Mobility Management & Wireless Access, 2007
Flexible hardware reduction for elliptic curve cryptography in GF(2<i><sup>m</sup></i>).
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
2006
Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks.
Internet Res., 2006
Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches.
Proceedings of the Wired/Wireless Internet Communications, 4th International Conference, 2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
2005
Charged Location Aware Services.
Proceedings of the Wireless Information Systems, 2005
Proceedings of the Software Engineering 2005, 2005
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method.
Proceedings of the 2005 Design, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
Proceedings of the 34. Jahrestagung der Gesellschaft für Informatik, 2004
2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
2002
IEEE Wirel. Commun., 2002
J. Supercomput., 2002
Towards User Defined Privacy in Location- Aware Platforms.
Proceedings of the International Conference on Internet Computing, 2002
2001
Gestaltung konfigurierbarer Codegeneratoren für die automatische Erzeugung effizienter Protokollimplementierungen.
PhD thesis, 2001
Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks.
J. Supercomput., 2001
Optimizing the Cooperation Between TCP and Wireless MAC.
Proceedings of the International Conference on Internet Computing, 2001
Automated Derivation of ILP Implementations from SDL Specifications.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2001
2000
Improving the efficiency of automated protocol implementations using a configurable FDT compiler.
Comput. Commun., 2000
Evaluation of Well-Known Protocol Implementation Techniques for Application in Mobile Networks.
Proceedings of the International Conference on Internet Computing, 2000
Leistungsbewertung von SDL-Spezifikationen - Ein Werkzeug zur Bewertung von Implementierungstechniken.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 2000
1999
Effiziente Abbildung von SDL-Spezifikationen auf Activity-Threads mittels Transition Reordering.
Prax. Inf.verarb. Kommun., 1999
COCOS - A configurable SDL compiler for generating efficient protocol implementations.
Proceedings of the SDL '99 The Next Millennium, 1999
Proceedings of the Seventh Annual International Conference on Network Protocols, 1999
Deriving Activity Thread Implementations from Formal Descriptions Using Transition Reordering.
Proceedings of the Formal Methods for Protocol Engineering and Distributed Systems, 1999
Automatische Generierung effizienter Protokollimplementierungen.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1999
1998
Eine SDL-Laufzeitumgebung zur Unterstützung unterschiedlicher Implementationsstrategien.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1998
1997
iSDL: Ein Ansatz zur Integration leistungssteigernder Implementierungsvorgaben in SDL'92.
Proceedings of the Formale Beschreibungstechniken für verteilte Systeme, 1997
1996
Design and Optimization of High-Performance Protocols with the DO-IT Toolbox.
Proceedings of the Formal Description Techniques IX: Theory, 1996