Baehr, Johanna;Bernardini, Alessandro;Sigl, Georg;Schlichtmann, UlfMachine learning and structural characteristics for reverse engineeringIntegration2020721 - 12
Pehl, Michael and Tretschok, Tobias and Becker, Daniel and Immler, VincentSpatial Context Tree Weighting for Physical Unclonable Functions2020 European Conference on Circuit Theory and Design ECCTDSofia, Bulgaria2020
Tebelmann, Lars;Danger, Jean-Luc;Pehl, MichaelSelf-secured PUF: Protecting the Loop PUF by MaskingConstructive Side-Channel Analysis and Secure DesignSpringer International Publishing2020
Maringer, Georg; Fritzmann, Tim; Sepúlveda, JohannaThe Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption FailuresInternational Conference on Information and Communications SecurityCopenhagen, Denmark (virtuell)Springer International Publishing2020
Schamberger, Thomas; Renner, Julian; Sigl, Georg; Wachter-Zeh, AntoniaA Power Side-Channel Attack on the CCA2-Secure HQC KEMSmart Card Research and Advanced ApplicationsSpringer International Publishing2020
Alam, Manaar;Bag, Arnab;Roy, Debapriya Basu;Jap, Dirmanto;Breier, Jakub;Bhasin, Shivam;Mukhopadhyay, DebdeepNeural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy ChecksACM Journal on Emerging Technologies in Computing Systems (JETC)2020171Sep1--30
Saha, Sayandeep;Bag, Arnab;Roy, Debapriya Basu;Patranabis, Sikhar;Mukhopadhyay, DebdeepFault Template Attacks on Block Ciphers Exploiting Fault PropagationAnnual International Conference on the Theory and Applications of Cryptographic TechniquesZagreb, Croatia (Virtual)2020
Roy, Debapriya Basu;Fritzmann, Tim;Sigl, GeorgEfficient hardware/software co-design for post-quantum crypto algorithm SIKE on ARM and RISC-V based microcontrollersProceedings of the 39th International Conference on Computer-Aided DesignSan Diego, USA (Virtual)2020
Bag, Arnab;Patranabis, Sikhar;Roy, Debapriya Basu;Mukhopadhyay, DebdeepCryptographically secure multi-tenant provisioning of FPGAsInternational Conference on Security, Privacy, and Applied Cryptography EngineeringKolkata, India (Virtual)2020
Gruber, M.;Probst, M.;Tempelmeier, M.Statistical Ineffective Fault Analysis of GIMLI2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)IEEE International Symposium on Hardware Oriented Security and Trust (HOST)2020