What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Georg Sigl
Google Scholar
40
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/csr2
A Lightweight Firmware Resilience Engine for Real-Time Operating Systems.
Utku Budak
Fabrizio De Santis
Osman Yasar
Malek Safieh
Georg Sigl
2024
conf/csr2
A Lightweight Firmware Resilience Engine for IoT Devices Leveraging Minimal Processor Features.
Utku Budak
Fabrizio De Santis
Georg Sigl
2024
conf/host
DOMREP II.
Matthias Probst
Manuel Brosch
Michael Gruber
Georg Sigl
2024
conf/fdtc
Switch-Glitch : Location of Fault Injection Sweet Spots by Electro-Magnetic Emanation.
Matthias Probst
Michael Gruber
Manuel Brosch
Tim Music
Georg Sigl
2022
journals/tches
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography.
Tim Fritzmann
Michiel Van Beirendonck
Debapriya Basu Roy
Patrick Karl
Thomas Schamberger
Ingrid Verbauwhede
Georg Sigl
2022
journals/tches
On the application of Two-Photon Absorption for Laser Fault Injection attacks Pushing the physical boundaries for Laser-based Fault Injection.
Bodo Selmke
Maximilian Pollanka
Andreas Duensing
Emanuele Strieder
Hayden Wen
Michael Mittermair
Reinhard Kienberger
Georg Sigl
2021
journals/tifs
DOMREP-An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection.
Michael Gruber
Matthias Probst
Patrick Karl
Thomas Schamberger
Lars Tebelmann
Michael Tempelmeier
Georg Sigl
2021
journals/tifs
Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA.
Alexander Kulow
Thomas Schamberger
Lars Tebelmann
Georg Sigl
2021
conf/fdtc
Algebraic Fault Analysis of Subterranean 2.0.
Michael Gruber
Patrick Karl
Georg Sigl
2020
journals/tches
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography.
Tim Fritzmann
Georg Sigl
Johanna Sepúlveda
2020
conf/host
Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks.
Stefan Hristozov
Manuel Huber
Georg Sigl
2020
conf/wisec
Secure and user-friendly over-the-air firmware distribution in a portable faraday cage.
Martin Striegel
Johann Heyszl
Florian Jakobsmeier
Yacov Matveev
Georg Sigl
2019
journals/tches
Secure Physical Enclosures from Covers with Tamper-Resistance.
Vincent Immler
Johannes Obermaier
Kuan Kuan Ng
Fei Xiang Ke
JinYu Lee
Yak Peng Lim
Wei Koon Oh
Keng Hoong Wee
Georg Sigl
2019
conf/ccs
Breaking TrustZone Memory Isolation through Malicious Hardware on a Modern FPGA-SoC.
Mathieu Gross
Nisha Jacob
Andreas Zankl
Georg Sigl
2019
conf/host
Improving on State Register Identification in Sequential Hardware Reverse Engineering.
Michaela Brunner
Johanna Baehr
Georg Sigl
2019
conf/host
Using Hardware Software Codesign for Optimised Implementations of High-Speed and Defence in Depth CAESAR Finalists.
Michael Tempelmeier
Maximilian Werner
Georg Sigl
2018
journals/tches
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve.
Philipp Koppermann
Fabrizio De Santis
Johann Heyszl
Georg Sigl
2018
conf/uss
DATA - Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries.
Samuel Weiser
Andreas Zankl
Raphael Spreitzer
Katja Miller
Stefan Mangard
Georg Sigl
2018
conf/host
The CAESAR-API in the real world - Towards a fair evaluation of hardware CAESAR candidates.
Michael Tempelmeier
Fabrizio De Santis
Georg Sigl
Jens-Peter Kaps
2018
conf/host
B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection.
Vincent Immler
Johannes Obermaier
Martin König
Matthias Hiller
Georg Sigl
2018
conf/host
Dividing the threshold: Multi-probe localized EM analysis on threshold implementations.
Robert Specht
Vincent Immler
Florian Unterstein
Johann Heyszl
Georg Sigl
2018
conf/ctrsa
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And an Improved Construction.
Florian Unterstein
Johann Heyszl
Fabrizio De Santis
Robert Specht
Georg Sigl
2018
conf/fdtc
Locked out by Latch-up? An Empirical Study on Laser Fault Injection into Arm Cortex-M Processors.
Bodo Selmke
Kilian Zinnecker
Philipp Koppermann
Katja Miller
Johann Heyszl
Georg Sigl
2017
conf/ccs
EM Side-Channel Analysis of BCH-based Error Correction for PUF-based Key Generation.
Lars Tebelmann
Michael Pehl
Georg Sigl
2017
conf/ches
How to Break Secure Boot on FPGA SoCs Through Malicious Hardware.
Nisha Jacob
Johann Heyszl
Andreas Zankl
Carsten Rolfes
Georg Sigl
2017
conf/host
Automatic generation of high-performance modular multipliers for arbitrary mersenne primes on FPGAs.
Philipp Koppermann
Fabrizio De Santis
Johann Heyszl
Georg Sigl
2017
conf/host
Take a moment and have some t: Hypothesis testing on raw PUF data.
Vincent Immler
Matthias Hiller
Johannes Obermaier
Georg Sigl
2016
journals/tifs
Cherry-Picking Reliable PUF Bits With Differential Sequence Coding.
Matthias Hiller
Meng-Day (Mandel) Yu
Georg Sigl
2016
conf/ccs
Online Reliability Testing for PUF Key Derivation.
Matthias Hiller
Aysun Gurur Önalan
Georg Sigl
Martin Bossert
2016
conf/ccs
Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box.
Fabrizio De Santis
Tobias Bauer
Georg Sigl
2016
conf/esorics
Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors.
Andreas Zankl
Katja Miller
Johann Heyszl
Georg Sigl
2016
conf/host
An area-optimized serial implementation of ICEPOLE authenticated encryption schemes.
Michael Tempelmeier
Fabrizio De Santis
Jens-Peter Kaps
Georg Sigl
2016
conf/fdtc
Attack on a DFA Protected AES by Simultaneous Laser Fault Injections.
Bodo Selmke
Johann Heyszl
Georg Sigl
2014
conf/lightsec
Ciphertext-Only Fault Attacks on PRESENT.
Fabrizio De Santis
Oscar M. Guillen
Ermin Sakic
Georg Sigl
2013
conf/ccs
Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes.
Matthias Hiller
Michael Weiner
Leandro Rodrigues Lima
Maximilian Birkner
Georg Sigl
2013
conf/host
Localized electromagnetic analysis of RO PUFs.
Dominik Merli
Johann Heyszl
Benedikt Heinz
Dieter Schuster
Frederic Stumpf
Georg Sigl
2012
conf/host
Complementary IBS: Application specific error correction for PUFs.
Matthias Hiller
Dominik Merli
Frederic Stumpf
Georg Sigl
2012
conf/host
Detection of probing attempts in secure ICs.
Salvador Manich
Markus S. Wamser
Georg Sigl
2012
conf/ctrsa
Localized Electromagnetic Analysis of Cryptographic Implementations.
Johann Heyszl
Stefan Mangard
Benedikt Heinz
Frederic Stumpf
Georg Sigl
2011
conf/fdtc
A Cost-Effective FPGA-based Fault Simulation Environment.
Angelika Janning
Johann Heyszl
Frederic Stumpf
Georg Sigl
Coauthors
Alexander Kulow
(1)
Andreas Duensing
(1)
Andreas Zankl
(4)
Angelika Janning
(1)
Aysun Gurur Önalan
(1)
Benedikt Heinz
(2)
Bodo Selmke
(3)
Carsten Rolfes
(1)
Debapriya Basu Roy
(1)
Dieter Schuster
(1)
Dominik Merli
(2)
Emanuele Strieder
(1)
Ermin Sakic
(1)
Fabrizio De Santis
(9)
Fei Xiang Ke
(1)
Florian Jakobsmeier
(1)
Florian Unterstein
(2)
Frederic Stumpf
(4)
Georg Sigl
(40)
Hayden Wen
(1)
Ingrid Verbauwhede
(1)
Jens-Peter Kaps
(2)
JinYu Lee
(1)
Johann Heyszl
(12)
Johanna Baehr
(1)
Johanna Sepúlveda
(1)
Johannes Obermaier
(3)
Katja Miller
(3)
Keng Hoong Wee
(1)
Kilian Zinnecker
(1)
Kuan Kuan Ng
(1)
Lars Tebelmann
(3)
Leandro Rodrigues Lima
(1)
Malek Safieh
(1)
Manuel Brosch
(2)
Manuel Huber
(1)
Markus S. Wamser
(1)
Martin Bossert
(1)
Martin König
(1)
Martin Striegel
(1)
Mathieu Gross
(1)
Matthias Hiller
(6)
Matthias Probst
(3)
Maximilian Birkner
(1)
Maximilian Pollanka
(1)
Maximilian Werner
(1)
Meng-Day (Mandel) Yu
(1)
Michael Gruber
(4)
Michael Mittermair
(1)
Michael Pehl
(1)
Michael Tempelmeier
(4)
Michael Weiner
(1)
Michaela Brunner
(1)
Michiel Van Beirendonck
(1)
Nisha Jacob
(2)
Oscar M. Guillen
(1)
Osman Yasar
(1)
Patrick Karl
(3)
Philipp Koppermann
(3)
Raphael Spreitzer
(1)
Reinhard Kienberger
(1)
Robert Specht
(2)
Salvador Manich
(1)
Samuel Weiser
(1)
Stefan Hristozov
(1)
Stefan Mangard
(2)
Thomas Schamberger
(3)
Tim Fritzmann
(2)
Tim Music
(1)
Tobias Bauer
(1)
Utku Budak
(2)
Vincent Immler
(4)
Wei Koon Oh
(1)
Yacov Matveev
(1)
Yak Peng Lim
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to