Tim Güneysu

According to our database1, Tim Güneysu authored at least 152 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Evaluation of (power) side-channels in cryptographic implementations.
it - Information Technology, 2019

Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto.
IACR Cryptology ePrint Archive, 2019

Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery.
IACR Cryptology ePrint Archive, 2019

Towards Practical Microcontroller Implementation of the Signature Scheme Falcon.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Securing Cryptographic Circuits by Exploiting Implementation Diversity and Partial Reconfiguration on FPGAs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
Practical CCA2-Secure and Masked Ring-LWE Implementation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Standard Lattice-Based Key Encapsulation on Embedded Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs.
IEEE Trans. Computers, 2018

Exploring RFC 7748 for Hardware Implementation: Curve25519 and Curve448 with Side-Channel Protection.
J. Hardware and Systems Security, 2018

Standard Lattice-Based Key Encapsulation on Embedded Devices.
IACR Cryptology ePrint Archive, 2018

Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Towards Self-Explaining Digital Systems: A Design Methodology for the Next Generation.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

Evaluation of Lattice-Based Signature Schemes in Embedded Systems.
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018

Exploring the Vulnerability of R-LWE Encryption to Fault Attacks.
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, 2018

Physical Protection of Lattice-Based Cryptography: Challenges and Solutions.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018

Confident leakage assessment - A side-channel evaluation framework based on confidence intervals.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

2017
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers.
ACM Trans. Embedded Comput. Syst., 2017

Compact Constant Weight Coding Engines for the Code-Based Cryptography.
IEEE Trans. on Circuits and Systems, 2017

Strong 8-bit Sboxes with efficient masking in hardware extended version.
J. Cryptographic Engineering, 2017

An Investigation of Sources of Randomness Within Discrete Gaussian Sampling.
IACR Cryptology ePrint Archive, 2017

CAKE: Code-based Algorithm for Key Encapsulation.
IACR Cryptology ePrint Archive, 2017

Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things.
IEEE Access, 2017

Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things.
Proceedings of the 18th International Symposium on Quality Electronic Design, 2017

CAKE: Code-Based Algorithm for Key Encapsulation.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

LWE-based lossless computational fuzzy extractor for the Internet of Things.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

A fair and comprehensive large-scale analysis of oscillation-based PUFs for FPGAs.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

Cryptography for Next Generation TLS: Implementing the RFC 7748 Elliptic Curve448 Cryptosystem in Hardware.
Proceedings of the 54th Annual Design Automation Conference, 2017

Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Introduction to the CHES 2015 special issue.
J. Cryptographic Engineering, 2016

Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms.
IACR Cryptology ePrint Archive, 2016

ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks.
IACR Cryptology ePrint Archive, 2016

Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware.
IACR Cryptology ePrint Archive, 2016

White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels.
IACR Cryptology ePrint Archive, 2016

Closing the Gap in RFC 7748: Implementing Curve448 in Hardware.
IACR Cryptology ePrint Archive, 2016

Practical CCA2-Secure and Masked Ring-LWE Implementation.
IACR Cryptology ePrint Archive, 2016

Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT.
IACR Cryptology ePrint Archive, 2016

Strong 8-bit Sboxes with Efficient Masking in Hardware.
IACR Cryptology ePrint Archive, 2016

Information reconciliation schemes in physical-layer security: A survey.
Computer Networks, 2016

Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation Beyond Gaussian Templates and Histograms.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

Secure software update and IP protection for untrusted devices in the Internet of Things via physically unclonable functions.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Lattice-based cryptography: From reconfigurable hardware to ASIC.
Proceedings of the International Symposium on Integrated Circuits, 2016

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Standard lattices in hardware.
Proceedings of the 53rd Annual Design Automation Conference, 2016

ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

Strong 8-bit Sboxes with Efficient Masking in Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Secure architectures of future emerging cryptography SAFEcrypto.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

ParTI: Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016

On the Energy Cost of Channel Based Key Agreement.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

High-Performance and Lightweight Lattice-Based Public-Key Encryption.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

A grain in the silicon: SCA-protected AES in less than 30 slices.
Proceedings of the 27th IEEE International Conference on Application-specific Systems, 2016

2015
Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography.
TRETS, 2015

Introduction for Embedded Platforms for Cryptography in the Coming Decade.
ACM Trans. Embedded Comput. Syst., 2015

Implementing QC-MDPC McEliece Encryption.
ACM Trans. Embedded Comput. Syst., 2015

Practical Lattice-Based Digital Signature Schemes.
ACM Trans. Embedded Comput. Syst., 2015

Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware.
IEEE Trans. Computers, 2015

Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs.
IACR Cryptology ePrint Archive, 2015

GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs.
IACR Cryptology ePrint Archive, 2015

Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order.
IACR Cryptology ePrint Archive, 2015

Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware.
IACR Cryptology ePrint Archive, 2015

Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs.
IACR Cryptology ePrint Archive, 2015

Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives.
IACR Cryptology ePrint Archive, 2015

Affine Equivalence and its Application to Tightening Threshold Implementations.
IACR Cryptology ePrint Archive, 2015

Speed Records for Ideal Lattice-Based Cryptography on AVR.
IACR Cryptology ePrint Archive, 2015

Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices.
IACR Cryptology ePrint Archive, 2015

Securing systems on the Internet of Things via physical properties of devices and communications.
Proceedings of the Annual IEEE Systems Conference, 2015

Affine Equivalence and Its Application to Tightening Threshold Implementations.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

Achieving side-channel protection with dynamic logic reconfiguration on modern FPGAs.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Security analysis of index-based syndrome coding for PUF-based key generation.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

New ASIC/FPGA Cost Estimates for SHA-1 Collisions.
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015

Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis.
Signal Processing Systems, 2014

Enhanced Lattice-Based Signatures on Reconfigurable Hardware.
IACR Cryptology ePrint Archive, 2014

A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems.
Proceedings of the 2014 International Conference on ReConFigurable Computing and FPGAs, 2014

Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

High-Speed Signatures from Standard Lattices.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Area optimization of lightweight lattice-based encryption on reconfigurable hardware.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

Enabling SRAM-PUFs on Xilinx FPGAs.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

THOR - The hardware onion router.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

Fault Sensitivity Analysis Meets Zero-Value Attack.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Enhanced Lattice-Based Signatures on Reconfigurable Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Efficient Elliptic-Curve Cryptography Using Curve25519 on Reconfigurable Devices.
Proceedings of the Reconfigurable Computing: Architectures, Tools, and Applications, 2014

MicroACP - A Fast and Secure Reconfigurable Asymmetric Crypto-Processor - -Overhead Evaluation of Side-Channel Countermeasures-.
Proceedings of the Reconfigurable Computing: Architectures, Tools, and Applications, 2014

2013
Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance.
J. Cryptographic Engineering, 2013

Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Software Speed Records for Lattice-Based Signatures.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

Efficient implementation of cryptographic primitives on the GA144 multi-core architecture.
Proceedings of the 24th International Conference on Application-Specific Systems, 2013

Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Using Data Contention in Dual-ported Memories for Security Applications.
Signal Processing Systems, 2012

Side channels as building blocks.
J. Cryptographic Engineering, 2012

PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptology ePrint Archive, 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptology ePrint Archive, 2012

Two IP protection schemes for multi-FPGA systems.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2012

IPSecco: A lightweight and reconfigurable IPSec core.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2012

Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Embedded Syndrome-Based Hashing.
Proceedings of the Progress in Cryptology, 2012

Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms.
Proceedings of the Computer Security - ESORICS 2012, 2012

Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Securely Sealing Multi-FPGA Systems.
Proceedings of the Reconfigurable Computing: Architectures, Tools and Applications, 2012

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
FPGAs in Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Utilizing hard cores of modern FPGA devices for high-performance cryptography.
J. Cryptographic Engineering, 2011

An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
IACR Cryptology ePrint Archive, 2011

Full Lattice Basis Reduction on Graphics Cards.
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011

MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-processor.
Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs, 2011

Decrypting HDCP-protected Video Streams Using Reconfigurable Hardware.
Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs, 2011

The future of high-speed cryptography: new computing platforms and new ciphers.
Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, 2011

Generic Side-Channel Countermeasures for Reconfigurable Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs.
TRETS, 2010

Kryptografie auf programmierbarer Hardware.
Datenschutz und Datensicherheit, 2010

True random number generation in block memories of reconfigurable devices.
Proceedings of the International Conference on Field-Programmable Technology, 2010

High-Performance Integer Factoring with Reconfigurable Devices.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

Modular Integer Arithmetic for Public Key Cryptography.
Proceedings of the Secure Integrated Circuits and Systems, 2010

2009
Cryptography and cryptanalysis on reconfigurable devices: security implementations for hardware and reprogrammable devices.
PhD thesis, 2009

Breaking ECC2K-130.
IACR Cryptology ePrint Archive, 2009

The Certicom Challenges ECC2-X.
IACR Cryptology ePrint Archive, 2009

Secure IP-Block Distribution for Hardware Devices.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Transforming write collisions in block RAMs into security applications.
Proceedings of the 2009 International Conference on Field-Programmable Technology, 2009

Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

MicroEliece: McEliece for Embedded Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem.
TRETS, 2008

Cryptanalysis with COPACOBANA.
IEEE Trans. Computers, 2008

Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis.
Proceedings of the FPL 2008, 2008

DSPs, BRAMs and a Pinch of Logic: New Recipes for AES on FPGAs.
Proceedings of the 16th IEEE International Symposium on Field-Programmable Custom Computing Machines, 2008

Breaking Legacy Banking Standards with Special-Purpose Hardware.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Exploiting the Power of GPUs for Asymmetric Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Ultra High Performance ECC over NIST Primes on Commercial FPGAs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
Efficient Hash Collision Search Strategies on Special-Purpose Hardware.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007

Parallel Computing with Low-Cost FPGAs: A Framework for COPACOBANA.
Proceedings of the Parallel Computing: Architectures, 2007

Cryptanalytic Time-Memory Tradeoffs on COPACOBANA.
Proceedings of the INFORMATIK 2007: Informatik trifft Logistik. Band 2. Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 2007

Dynamic Intellectual Property Protection for Reconfigurable Devices.
Proceedings of the 2007 International Conference on Field-Programmable Technology, 2007

Attacking elliptic curve cryptosystems with special-purpose hardware.
Proceedings of the ACM/SIGDA 15th International Symposium on Field Programmable Gate Arrays, 2007

New Protection Mechanisms for Intellectual Property in Reconfigurable Logic.
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007

Establishing Chain of Trust in Reconfigurable Hardware.
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007

Reconfigurable trusted computing in hardware.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007


  Loading...