What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Michael Hutter
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/cic
Efficient Boolean-to-Arithmetic Mask Conversion in Hardware.
Aein Rezaei Shahmirzadi
Michael Hutter
2020
journals/tches
Low-Latency Hardware Masking with Application to AES.
Pascal Sasdrich
Begül Bilgin
Michael Hutter
Mark E. Marson
2020
journals/joc
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
Michael Hutter
Erich Wenger
2018
journals/joc
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
Michael Hutter
Erich Wenger
2017
conf/ches
A Side-Channel Assisted Cryptanalytic Attack Against QcBits.
Melissa Rossi
Mike Hamburg
Michael Hutter
Mark E. Marson
2016
conf/ccs
Threshold Implementations in Industry: A Case Study on SHA-256.
Michael Hutter
2015
journals/tifs
Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness.
Honorio Martín
Thomas Korak
Enrique San Millán
Michael Hutter
2015
conf/ches
NaCl's Crypto_box in Hardware.
Michael Hutter
Jürgen Schilling
Peter Schwabe
Wolfgang Wieser
2014
conf/latincrypt
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers.
Gesine Hinterwälder
Amir Moradi
Michael Hutter
Peter Schwabe
Christof Paar
2014
conf/host
EM-based detection of hardware trojans on FPGAs.
Oliver Soll
Thomas Korak
Michael Muehlberghuber
Michael Hutter
2014
conf/fdtc
Clock Glitch Attacks in the Presence of Heating.
Thomas Korak
Michael Hutter
Baris Ege
Lejla Batina
2013
conf/ches
Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID.
Peter Pessl
Michael Hutter
2013
conf/ches
Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA.
Elke De Mulder
Michael Hutter
Mark E. Marson
Peter Pearson
2013
conf/africacrypt
NaCl on 8-Bit AVR Microcontrollers.
Michael Hutter
Peter Schwabe
2012
conf/africacrypt
Improved Fixed-Base Comb Method for Fast Scalar Multiplication.
Nashwa A. F. Mohamed
Mohsin H. A. Hashim
Michael Hutter
2011
conf/ches
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
Michael Hutter
Erich Wenger
2011
conf/africacrypt
Coordinate Representation.
Michael Hutter
Marc Joye
Yannick Sierra
2009
conf/acns
Attacking ECDSA-Enabled RFID Devices.
Michael Hutter
Marcel Medwed
Daniel M. Hein
Johannes Wolkerstorfer
2009
conf/wisa
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices.
Thomas Plos
Michael Hutter
Martin Feldhofer
2009
conf/fdtc
Optical Fault Attacks on AES: A Threat in Violet.
Jörn-Marc Schmidt
Michael Hutter
Thomas Plos
2008
conf/ches
RFID and Its Vulnerability to Faults.
Michael Hutter
Jörn-Marc Schmidt
Thomas Plos
2007
conf/ches
Power and EM Attacks on Passive 13.56 MHz RFID Devices.
Michael Hutter
Stefan Mangard
Martin Feldhofer
Coauthors
Aein Rezaei Shahmirzadi
(1)
Amir Moradi
(1)
Baris Ege
(1)
Begül Bilgin
(1)
Christof Paar
(1)
Daniel M. Hein
(1)
Elke De Mulder
(1)
Enrique San Millán
(1)
Erich Wenger
(3)
Gesine Hinterwälder
(1)
Honorio Martín
(1)
Johannes Wolkerstorfer
(1)
Jörn-Marc Schmidt
(2)
Jürgen Schilling
(1)
Lejla Batina
(1)
Marc Joye
(1)
Marcel Medwed
(1)
Mark E. Marson
(3)
Martin Feldhofer
(2)
Mélissa Rossi
(1)
Michael Hutter
(22)
Michael Muehlberghuber
(1)
Mike Hamburg
(1)
Mohsin H. A. Hashim
(1)
Nashwa A. F. Mohamed
(1)
Oliver Soll
(1)
Pascal Sasdrich
(1)
Peter Pearson
(1)
Peter Pessl
(1)
Peter Schwabe
(3)
Stefan Mangard
(1)
Thomas Korak
(3)
Thomas Plos
(3)
Wolfgang Wieser
(1)
Yannick Sierra
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to