Thomas Plos
According to our database1,
Thomas Plos
authored at least 31 papers
between 2008 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
Proceedings of the Ninth International Conference on Availability, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography.
IEEE Trans. Very Large Scale Integr. Syst., 2013
Inf. Secur. Tech. Rep., 2013
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version).
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012
On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag.
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 14th Euromicro Conference on Digital System Design, 2011
2010
Int. J. Secur. Networks, 2010
Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
2009
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags.
Proceedings of the Topics in Cryptology, 2009
2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008