What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Christof Paar
Google Scholar
111
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces.
Philipp Mackensen
Paul Staat
Stefan Roth
Aydin Sezgin
Christof Paar
Veelasha Moonsamy
2025
conf/wisec
Anti-Tamper Radio Meets Reconfigurable Intelligent Surface for System-Level Tamper Detection.
Maryam Shaygan Tabar
Johannes Kortz
Paul Staat
Harald Elders-Boll
Christof Paar
Christian T. Zenger
2024
journals/tches
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing.
Maik Ender
Felix Hahn
Marc Fyrbiak
Amir Moradi
Christof Paar
2024
journals/tifs
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation.
Guyue Li
Paul Staat
Haoyu Li
Markus Heinrichs
Christian T. Zenger
Rainer Kronberger
Harald Elders-Boll
Christof Paar
Aiqun Hu
2024
conf/ccs
Stealing Maggie's Secrets-On the Challenges of IP Theft Through FPGA Reverse Engineering.
Simon Klix
Nils Albartus
Julian Speith
Paul Staat
Alice Verstege
Annika Wilde
Daniel Lammers
Jörn Langheinrich
Christian Kison
Sebastian Sester-Wehle
Daniel E. Holcomb
Christof Paar
2024
conf/crypto
HAWKEYE - Recovering Symmetric Cryptography From Hardware Circuits.
Gregor Leander
Christof Paar
Julian Speith
Lukas Stennes
2024
conf/acsac
Evil from Within: Machine Learning Backdoors Through Dormant Hardware Trojans.
Alexander Warnecke
Julian Speith
Jan-Niklas Möller
Konrad Rieck
Christof Paar
2023
conf/sp
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.
Endres Puschner
Thorben Moos
Steffen Becker
Christian Kison
Amir Moradi
Christof Paar
2023
conf/host
Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs.
Susanne Engels
Maik Ender
Christof Paar
2022
conf/sp
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.
Julian Speith
Florian Schweins
Maik Ender
Marc Fyrbiak
Alexander May
Christof Paar
2022
conf/sp
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.
Paul Staat
Simon Mulzer
Stefan Roth
Veelasha Moonsamy
Markus Heinrichs
Rainer Kronberger
Aydin Sezgin
Christof Paar
2022
conf/sp
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems.
Paul Staat
Johannes Tobisch
Christian T. Zenger
Christof Paar
2022
conf/asiaccs
Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces.
Paul Staat
Harald Elders-Boll
Markus Heinrichs
Christian T. Zenger
Christof Paar
2022
conf/wisec
Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging.
Paul Staat
Kai Jansen
Christian T. Zenger
Harald Elders-Boll
Christof Paar
2021
journals/tches
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security.
Florian Stolz
Nils Albartus
Julian Speith
Simon Klix
Clemens Nasenberg
Aiden Gula
Marc Fyrbiak
Christof Paar
Tim Güneysu
Russell Tessier
2021
journals/tches
Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging.
Max Hoffmann
Christof Paar
2021
journals/tifs
ARMORY: Fully Automated and Exhaustive Fault Simulation on ARM-M Binaries.
Max Hoffmann
Falk Schellenberg
Christof Paar
2021
conf/uss
On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note.
Nils Albartus
Clemens Nasenberg
Florian Stolz
Marc Fyrbiak
Christof Paar
Russell Tessier
2020
journals/tches
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering.
Nils Albartus
Max Hoffmann
Sebastian Temme
Leonid Azriel
Christof Paar
2020
conf/uss
The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs.
Maik Ender
Amir Moradi
Christof Paar
2020
conf/soups
An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes.
Steffen Becker
Carina Wiesen
Nils Albartus
Nikol Rummel
Christof Paar
2020
conf/fdtc
SPFA: SFA on Multiple Persistent Faults.
Susanne Engels
Falk Schellenberg
Christof Paar
2019
journals/tifs
Security Implications of Intentional Capacitive Crosstalk.
Christian Kison
Omar Mohamed Awad
Marc Fyrbiak
Christof Paar
2018
journals/tches
On the Difficulty of FSM-based Hardware Obfuscation.
Marc Fyrbiak
Sebastian Wallat
Jonathan Déchelotte
Nils Albartus
Sinan Böcker
Russell Tessier
Christof Paar
2018
journals/tches
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead.
Max Hoffmann
Christof Paar
2018
conf/ccs
An Exploratory Analysis of Microcode as a Building Block for System Defenses.
Benjamin Kollenda
Philipp Koppe
Marc Fyrbiak
Christian Kison
Christof Paar
Thorsten Holz
2018
conf/host
SAT-based reverse engineering of gate-level schematics using fault injection and probing.
Shahrzad Keshavarz
Falk Schellenberg
Bastian Richter
Christof Paar
Daniel E. Holcomb
2017
journals/tifs
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques.
Arunkumar Vijayakumar
Vinay C. Patil
Daniel E. Holcomb
Christof Paar
Sandip Kundu
2017
conf/ccs
Hardware Trojans and Other Threats against Embedded Systems.
Christof Paar
2017
conf/uss
Reverse Engineering x86 Processor Microcode.
Philipp Koppe
Benjamin Kollenda
Marc Fyrbiak
Christian Kison
Robert Gawlik
Christof Paar
Thorsten Holz
2017
conf/asiacrypt
The First Thorough Side-Channel Hardware Trojan.
Maik Ender
Samaneh Ghandali
Amir Moradi
Christof Paar
2016
conf/uss
DROWN: Breaking TLS Using SSLv2.
Nimrod Aviram
Sebastian Schinzel
Juraj Somorovsky
Nadia Heninger
Maik Dankel
Jens Steube
Luke Valenta
David Adrian
J. Alex Halderman
Viktor Dukhovni
Emilia Käsper
Shaanan Cohney
Susanne Engels
Christof Paar
Yuval Shavitt
2016
conf/ches
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.
Samaneh Ghandali
Georg T. Becker
Daniel E. Holcomb
Christof Paar
2016
conf/host
Large laser spots and fault sensitivity analysis.
Falk Schellenberg
Markus Finkeldey
Nils Gerhardt
Martin Hofmann
Amir Moradi
Christof Paar
2016
conf/host
IP core protection using voltage-controlled side-channel receivers.
Peter Samarin
Kerstin Lemke-Rust
Christof Paar
2016
conf/wisec
Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet.
Christian T. Zenger
Jan Zimmer
Mario Pietersz
Benedikt Driessen
Christof Paar
2015
conf/nspw
Exploiting the Physical Environment for Securing the Internet of Things.
Christian T. Zenger
Jan Zimmer
Mario Pietersz
Jan-Felix Posielek
Christof Paar
2015
conf/ches
Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast.
Christian Kison
Jürgen Frinken
Christof Paar
2015
conf/fdtc
On the Complexity Reduction of Laser Fault Injection Campaigns Using OBIC Measurements.
Falk Schellenberg
Markus Finkeldey
Bastian Richter
Maximilian Schapers
Nils Gerhardt
Martin Hofmann
Christof Paar
2014
conf/latincrypt
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers.
Gesine Hinterwälder
Amir Moradi
Michael Hutter
Peter Schwabe
Christof Paar
2014
conf/ccs
How to Build Hardware Trojans.
Christof Paar
2014
conf/crypto
Block Ciphers - Focus on the Linear Layer (feat. PRIDE).
Martin R. Albrecht
Benedikt Driessen
Elif Bilge Kavun
Gregor Leander
Christof Paar
Tolga Yalçin
2014
conf/icisc
Remote IP Protection Using Timing Channels.
Ariano-Tim Donda
Peter Samarin
Jacek Samotyja
Kerstin Lemke-Rust
Christof Paar
2013
conf/ccs
Constructive and destructive aspects of embedded security in the internet of things.
Christof Paar
2013
conf/crypto
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System.
Daehyun Strobel
Benedikt Driessen
Timo Kasper
Gregor Leander
David F. Oswald
Falk Schellenberg
Christof Paar
2013
conf/fc
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems.
Andy Rupp
Gesine Hinterwälder
Foteini Baldimtsi
Christof Paar
2013
conf/ches
Stealthy Dopant-Level Hardware Trojans.
Georg T. Becker
Francesco Regazzoni
Christof Paar
Wayne P. Burleson
2013
conf/sacrypt
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice.
David F. Oswald
Daehyun Strobel
Falk Schellenberg
Timo Kasper
Christof Paar
2012
journals/tifs
Detecting Software Theft in Embedded Systems: A Side-Channel Approach.
Georg T. Becker
Daehyun Strobel
Christof Paar
Wayne P. Burleson
2012
conf/fse
Lapin: An Efficient Authentication Protocol Based on Ring-LPN.
Stefan Heyse
Eike Kiltz
Vadim Lyubashevsky
Christof Paar
Krzysztof Pietrzak
2012
conf/sp
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards.
Benedikt Driessen
Ralf Hund
Carsten Willems
Christof Paar
Thorsten Holz
2012
conf/esorics
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms.
Markus Dürmuth
Tim Güneysu
Markus Kasper
Christof Paar
Tolga Yalçin
Ralf Zimmermann
2012
conf/ctrsa
Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism.
Amir Moradi
Markus Kasper
Christof Paar
2012
conf/asiacrypt
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Julia Borghoff
Anne Canteaut
Tim Güneysu
Elif Bilge Kavun
Miroslav Knezevic
Lars R. Knudsen
Gregor Leander
Ventzislav Nikov
Christof Paar
Christian Rechberger
Peter Rombouts
Søren S. Thomsen
Tolga Yalçin
2011
journals/joc
Guest Editorial.
Christof Paar
Jean-Jacques Quisquater
Berk Sunar
2011
conf/ccs
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs.
Amir Moradi
Alessandro Barenghi
Timo Kasper
Christof Paar
2011
conf/icisc
An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software.
Daehyun Strobel
Christof Paar
2011
conf/ches
Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World.
David F. Oswald
Christof Paar
2011
conf/ches
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting.
Amir Moradi
Oliver Mischke
Christof Paar
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2011
conf/host
Practical evaluation of DPA countermeasures on reconfigurable hardware.
Amir Moradi
Oliver Mischke
Christof Paar
2011
conf/eurocrypt
Pushing the Limits: A Very Compact and a Threshold Implementation of AES.
Amir Moradi
Axel Poschmann
San Ling
Christof Paar
Huaxiong Wang
2011
conf/asiacrypt
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
Itai Dinur
Tim Güneysu
Christof Paar
Adi Shamir
Ralf Zimmermann
2010
conf/fc
All You Can Eat or Breaking a Real-World Contactless Payment System.
Timo Kasper
Michael Silbermann
Christof Paar
2010
conf/icisc
Chameleon: A Versatile Emulator for Contactless Smartcards.
Timo Kasper
Ingo von Maurich
David F. Oswald
Christof Paar
2010
conf/host
Side-channel based Watermarks for Integrated Circuits.
Georg T. Becker
Markus Kasper
Amir Moradi
Christof Paar
2010
conf/ctrsa
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.
Andrey Bogdanov
Thomas Eisenbarth
Christof Paar
Malte Wienecke
2009
conf/icisc
Lightweight Cryptography and RFID: Tackling the Hidden Overheads.
Axel Poschmann
Matthew J. B. Robshaw
Frank Vater
Christof Paar
2009
conf/icisc
Power Analysis of Single-Rail Storage Elements as Used in MDPL.
Amir Moradi
Thomas Eisenbarth
Axel Poschmann
Christof Paar
2009
conf/ches
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering.
Lang Lin
Markus Kasper
Tim Güneysu
Christof Paar
Wayne P. Burleson
2009
conf/ches
MicroEliece: McEliece for Embedded Devices.
Thomas Eisenbarth
Tim Güneysu
Stefan Heyse
Christof Paar
2009
conf/ches
Crypto Engineering: Some History and Some Case Studies.
Christof Paar
2009
conf/host
Secure IP-Block Distribution for Hardware Devices.
Jorge Guajardo
Tim Güneysu
Sandeep S. Kumar
Christof Paar
2009
conf/wisa
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.
Timo Kasper
David F. Oswald
Christof Paar
2009
conf/wisa
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption.
Amir Moradi
Nima Mousavi
Christof Paar
Mahmoud Salmasizadeh
2009
conf/fdtc
KeeLoq and Side-Channel Analysis-Evolution of an Attack.
Christof Paar
Thomas Eisenbarth
Markus Kasper
Timo Kasper
Amir Moradi
2009
conf/africacrypt
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed.
Markus Kasper
Timo Kasper
Amir Moradi
Christof Paar
2008
conf/crypto
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme.
Thomas Eisenbarth
Timo Kasper
Amir Moradi
Christof Paar
Mahmoud Salmasizadeh
Mohammad T. Manzuri Shalmani
2008
conf/fc
Breaking Legacy Banking Standards with Special-Purpose Hardware.
Tim Güneysu
Christof Paar
2008
conf/ches
Ultra High Performance ECC over NIST Primes on Commercial FPGAs.
Tim Güneysu
Christof Paar
2008
conf/ches
Hash Functions and RFID Tags: Mind the Gap.
Andrey Bogdanov
Gregor Leander
Christof Paar
Axel Poschmann
Matthew J. B. Robshaw
Yannick Seurin
2008
conf/wisec
Comparison of innovative signature algorithms for WSNs.
Benedikt Driessen
Axel Poschmann
Christof Paar
2007
journals/istr
Embedded security in a pervasive world.
Christof Paar
André Weimerskirch
2007
conf/fse
New Lightweight DES Variants.
Gregor Leander
Christof Paar
Axel Poschmann
Kai Schramm
2007
conf/ccs
Reconfigurable trusted computing in hardware.
Thomas Eisenbarth
Tim Güneysu
Christof Paar
Ahmad-Reza Sadeghi
Dries Schellekens
Marko Wolf
2007
conf/esorics
Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods.
Kerstin Lemke-Rust
Christof Paar
2007
conf/ches
PRESENT: An Ultra-Lightweight Block Cipher.
Andrey Bogdanov
Lars R. Knudsen
Gregor Leander
Christof Paar
Axel Poschmann
Matthew J. B. Robshaw
Yannick Seurin
C. Vikkelsoe
2007
conf/ches
Gaussian Mixture Models for Higher-Order Side Channel Analysis.
Kerstin Lemke-Rust
Christof Paar
2006
conf/acns
Physical Security Bounds Against Tampering.
Kerstin Lemke
Christof Paar
Ahmad-Reza Sadeghi
2006
conf/ches
Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker.
Sandeep S. Kumar
Christof Paar
Jan Pelzl
Gerd Pfeiffer
Manfred Schimmler
2006
conf/ches
Templates vs. Stochastic Methods.
Benedikt Gierlichs
Kerstin Lemke-Rust
Christof Paar
2006
conf/wisa
E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Dario Carluccio
Kerstin Lemke-Rust
Christof Paar
Ahmad-Reza Sadeghi
2006
conf/ctrsa
Higher Order Masking of the AES.
Kai Schramm
Christof Paar
2006
conf/fdtc
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices.
Kerstin Lemke-Rust
Christof Paar
2005
conf/ches
A Stochastic Model for Differential Side Channel Cryptanalysis.
Werner Schindler
Kerstin Lemke
Christof Paar
2005
conf/ches
SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers.
Jens Franke
Thorsten Kleinjung
Christof Paar
Jan Pelzl
Christine Priplata
Colin Stahlke
2004
conf/ches
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.
Kerstin Lemke
Kai Schramm
Christof Paar
2004
conf/ches
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack.
Kai Schramm
Gregor Leander
Patrick Felke
Christof Paar
2004
conf/wisa
Hyperelliptic Curve Coprocessors on a FPGA.
Howon Kim
Thomas J. Wollinger
YongJe Choi
Kyoil Chung
Christof Paar
2003
conf/fse
A New Class of Collision Attacks and Its Application to DES.
Kai Schramm
Thomas J. Wollinger
Christof Paar
2003
conf/ches
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves.
Jan Pelzl
Thomas J. Wollinger
Jorge Guajardo
Christof Paar
2003
conf/ctrsa
Efficient GF(p<sup>m</sup>) Arithmetic Architectures for Cryptographic Applications.
Guido Bertoni
Jorge Guajardo
Sandeep S. Kumar
Gerardo Orlando
Christof Paar
Thomas J. Wollinger
2003
conf/sacrypt
Low Cost Security: Explicit Formulae for Genus-4 Hyperelliptic Curves.
Jan Pelzl
Thomas J. Wollinger
Christof Paar
2001
journals/joc
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography.
Daniel V. Bailey
Christof Paar
2001
conf/acisp
Elliptic Curve Cryptography on a Palm OS Device.
André Weimerskirch
Christof Paar
Sheueling Chang Shantz
2001
conf/ches
A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware.
Gerardo Orlando
Christof Paar
2001
conf/pkc
Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers.
Jorge Guajardo
Rainer Blümel
Uwe Krieger
Christof Paar
2000
conf/ches
A High Performance Reconfigurable Elliptic Curve Processor for GF(2<sup>m</sup>).
Gerardo Orlando
Christof Paar
1998
conf/crypto
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms.
Daniel V. Bailey
Christof Paar
1998
conf/sacrypt
Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine.
Jens-Peter Kaps
Christof Paar
1997
conf/crypto
Efficient Algorithms for Elliptic Curve Cryptosystems.
Jorge Guajardo
Christof Paar
1997
conf/eurocrypt
Fast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2<sup>n</sup>)<sup>m</sup>).
Christof Paar
Pedro Soria-Rodriguez
Coauthors
Adi Shamir
(1)
Ahmad-Reza Sadeghi
(3)
Aiden Gula
(1)
Aiqun Hu
(1)
Alessandro Barenghi
(1)
Alexander May
(1)
Alexander Warnecke
(1)
Alice Verstege
(1)
Amir Moradi
(17)
André Weimerskirch
(2)
Andrey Bogdanov
(3)
Andy Rupp
(1)
Anne Canteaut
(1)
Annika Wilde
(1)
Ariano-Tim Donda
(1)
Arunkumar Vijayakumar
(1)
Axel Poschmann
(7)
Aydin Sezgin
(2)
Bastian Richter
(2)
Benedikt Driessen
(5)
Benedikt Gierlichs
(1)
Benjamin Kollenda
(2)
Berk Sunar
(1)
C. Vikkelsoe
(1)
Carina Wiesen
(1)
Carsten Willems
(1)
Christian Kison
(6)
Christian Rechberger
(1)
Christian T. Zenger
(7)
Christine Priplata
(1)
Christof Paar
(111)
Clemens Nasenberg
(2)
Colin Stahlke
(1)
Daehyun Strobel
(4)
Daniel E. Holcomb
(4)
Daniel Lammers
(1)
Daniel V. Bailey
(2)
Dario Carluccio
(1)
David Adrian
(1)
David F. Oswald
(5)
Dries Schellekens
(1)
Eike Kiltz
(1)
Elif Bilge Kavun
(2)
Emilia Käsper
(1)
Endres Puschner
(1)
Falk Schellenberg
(7)
Felix Hahn
(1)
Florian Schweins
(1)
Florian Stolz
(2)
Foteini Baldimtsi
(1)
Francesco Regazzoni
(1)
Frank Vater
(1)
Georg T. Becker
(4)
Gerardo Orlando
(3)
Gerd Pfeiffer
(1)
Gesine Hinterwälder
(2)
Gregor Leander
(8)
Guido Bertoni
(1)
Guyue Li
(1)
Haoyu Li
(1)
Harald Elders-Boll
(4)
Howon Kim
(1)
Huaxiong Wang
(1)
Ingo von Maurich
(1)
Itai Dinur
(1)
J. Alex Halderman
(1)
Jacek Samotyja
(1)
Jan Pelzl
(4)
Jan Zimmer
(2)
Jan-Felix Posielek
(1)
Jan-Niklas Möller
(1)
Jean-Jacques Quisquater
(1)
Jens Franke
(1)
Jens Steube
(1)
Jens-Peter Kaps
(1)
Johannes Kortz
(1)
Johannes Tobisch
(1)
Jonathan Déchelotte
(1)
Jorge Guajardo
(5)
Jörn Langheinrich
(1)
Julia Borghoff
(1)
Julian Speith
(5)
Juraj Somorovsky
(1)
Jürgen Frinken
(1)
Kai Jansen
(1)
Kai Schramm
(5)
Kazuo Ohta
(1)
Kazuo Sakiyama
(1)
Kerstin Lemke
(3)
Kerstin Lemke-Rust
(7)
Konrad Rieck
(1)
Krzysztof Pietrzak
(1)
Kyoil Chung
(1)
Lang Lin
(1)
Lars R. Knudsen
(2)
Leonid Azriel
(1)
Lukas Stennes
(1)
Luke Valenta
(1)
Mahmoud Salmasizadeh
(2)
Maik Dankel
(1)
Maik Ender
(5)
Malte Wienecke
(1)
Manfred Schimmler
(1)
Marc Fyrbiak
(8)
Mario Pietersz
(2)
Marko Wolf
(1)
Markus Dürmuth
(1)
Markus Finkeldey
(2)
Markus Heinrichs
(3)
Markus Kasper
(6)
Martin Hofmann
(2)
Martin R. Albrecht
(1)
Maryam Shaygan Tabar
(1)
Matthew J. B. Robshaw
(3)
Max Hoffmann
(4)
Maximilian Schapers
(1)
Michael Hutter
(1)
Michael Silbermann
(1)
Miroslav Knezevic
(1)
Mohammad T. Manzuri Shalmani
(1)
Nadia Heninger
(1)
Nikol Rummel
(1)
Nils Albartus
(6)
Nils Gerhardt
(2)
Nima Mousavi
(1)
Nimrod Aviram
(1)
Oliver Mischke
(2)
Omar Mohamed Awad
(1)
Patrick Felke
(1)
Paul Staat
(8)
Pedro Soria-Rodriguez
(1)
Peter Rombouts
(1)
Peter Samarin
(2)
Peter Schwabe
(1)
Philipp Koppe
(2)
Philipp Mackensen
(1)
Rainer Blümel
(1)
Rainer Kronberger
(2)
Ralf Hund
(1)
Ralf Zimmermann
(2)
Robert Gawlik
(1)
Russell Tessier
(3)
Samaneh Ghandali
(2)
San Ling
(1)
Sandeep S. Kumar
(3)
Sandip Kundu
(1)
Sebastian Schinzel
(1)
Sebastian Sester-Wehle
(1)
Sebastian Temme
(1)
Sebastian Wallat
(1)
Shaanan Cohney
(1)
Shahrzad Keshavarz
(1)
Sheueling Chang Shantz
(1)
Simon Klix
(2)
Simon Mulzer
(1)
Sinan Böcker
(1)
Stefan Heyse
(2)
Stefan Roth
(2)
Steffen Becker
(2)
Susanne Engels
(3)
Søren S. Thomsen
(1)
Thomas Eisenbarth
(6)
Thomas J. Wollinger
(5)
Thorben Moos
(1)
Thorsten Holz
(3)
Thorsten Kleinjung
(1)
Tim Güneysu
(10)
Timo Kasper
(9)
Tolga Yalçin
(3)
Uwe Krieger
(1)
Vadim Lyubashevsky
(1)
Veelasha Moonsamy
(2)
Ventzislav Nikov
(1)
Viktor Dukhovni
(1)
Vinay C. Patil
(1)
Wayne P. Burleson
(3)
Werner Schindler
(1)
Yang Li
(1)
Yannick Seurin
(2)
YongJe Choi
(1)
Yuval Shavitt
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to