Thomas Pöppelmann

According to our database1, Thomas Pöppelmann authored at least 31 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Implementing RLWE-based Schemes Using an RSA Co-Processor.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2018
Practical CCA2-Secure and Masked Ring-LWE Implementation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Analysis of Error-Correcting Codes for Lattice-Based Key Exchange.
IACR Cryptology ePrint Archive, 2018

Learning with Errors on RSA Co-Processors.
IACR Cryptology ePrint Archive, 2018

2017
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers.
ACM Trans. Embedded Comput. Syst., 2017

Efficient implementation of ideal lattice-based cryptography.
it - Information Technology, 2017

Towards post-quantum security for IoT endpoints with NTRU.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

Do we need a holistic approach for the design of secure IoT systems?
Proceedings of the Computing Frontiers Conference, 2017

2016
Efficient implementation of ideal lattice-based cryptography.
PhD thesis, 2016

NewHope without reconciliation.
IACR Cryptology ePrint Archive, 2016

High-Performance and Lightweight Lattice-Based Public-Key Encryption.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

2015
Practical Lattice-Based Digital Signature Schemes.
ACM Trans. Embedded Comput. Syst., 2015

Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware.
IEEE Trans. Computers, 2015

Speed Records for Ideal Lattice-Based Cryptography on AVR.
IACR Cryptology ePrint Archive, 2015

Accelerating Homomorphic Evaluation on Reconfigurable Hardware.
IACR Cryptology ePrint Archive, 2015

Post-quantum key exchange - a new hope.
IACR Cryptology ePrint Archive, 2015

High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

2014
Enhanced Lattice-Based Signatures on Reconfigurable Hardware.
IACR Cryptology ePrint Archive, 2014

A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems.
Proceedings of the 2014 International Conference on ReConFigurable Computing and FPGAs, 2014

High-Speed Signatures from Standard Lattices.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Area optimization of lightweight lattice-based encryption on reconfigurable hardware.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Software Speed Records for Lattice-Based Signatures.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

2012
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptology ePrint Archive, 2012

IPSecco: A lightweight and reconfigurable IPSec core.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2012

Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
AmazonIA: when elasticity snaps back.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Trusted virtual domains on OpenSolaris: usable secure desktop environments.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010


  Loading...