Stefan Heyse

According to our database1, Stefan Heyse authored at least 16 papers between 2009 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys.
IACR Cryptol. ePrint Arch., 2018

2017
Brute-Force Search Strategies for Single-Trace and Few - Traces Template Attacks on the DES Round Keys of a Recent Smart Card.
IACR Cryptol. ePrint Arch., 2017

Single-Trace Template Attack on the DES Round Keys of a Recent Smart Card.
IACR Cryptol. ePrint Arch., 2017

2015
Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices.
IACR Cryptol. ePrint Arch., 2015

2014
Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

2013
Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance.
J. Cryptogr. Eng., 2013

2012
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012

Lapin: An Efficient Authentication Protocol Based on Ring-LPN.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Efficient Implementations of MQPKS on Constrained Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Implementation of McEliece Based on Quasi-dyadic Goppa Codes for Embedded Devices.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

The future of high-speed cryptography: new computing platforms and new ciphers.
Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, 2011

2010
Practical Power Analysis Attacks on Software Implementations of McEliece.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

Low-Reiter: Niederreiter Encryption Scheme for Embedded Microcontrollers.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

2009
MicroEliece: McEliece for Embedded Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009


  Loading...