BIKE: bit flipping key encapsulation N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy, JC Deneuville, ... | 177 | 2022 |
Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices J Richter-Brockmann, J Mono, T Güneysu IEEE Transactions on Computers, 2020 | 60 | 2020 |
FIVER–Robust Verification of Countermeasures against Fault Injections J Richter-Brockmann, AR Shahmirzadi, P Sasdrich, A Moradi, T Güneysu | 54 | 2021 |
Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice J Richter-Brockmann, P Sasdrich, T Güneysu | 40 | 2021 |
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware J Richter-Brockmann, MS Chen, S Ghosh, T Güneysu IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021 | 34 | 2021 |
VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering J Richter-Brockmann, J Feldtkeller, P Sasdrich, T Güneysu Cryptology ePrint Archive, 2022 | 23 | 2022 |
Efficiently masking polynomial inversion at arbitrary order M Krausz, G Land, J Richter-Brockmann, T Güneysu International Conference on Post-Quantum Cryptography, 309-326, 2022 | 15 | 2022 |
A holistic approach towards side-channel secure fixed-weight polynomial sampling M Krausz, G Land, J Richter-Brockmann, T Güneysu IACR International Conference on Public-Key Cryptography, 94-124, 2023 | 13 | 2023 |
CINI MINIS: domain isolation for fault and combined security J Feldtkeller, J Richter-Brockmann, P Sasdrich, T Güneysu Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 13 | 2022 |
Concurrent Error Detection Revisited: Hardware Protection against Fault and Side-Channel Attacks J Richter-Brockmann, P Sasdrich, F Bache, T Güneysu Proceedings of the 15th International Conference on Availability …, 2020 | 12 | 2020 |
Deep Learning Multi-Channel Fusion Attack Against Side-Channel Protected Hardware B Hettwer, D Fennes, S Leger, J Richter-Brockmann, S Gehrer, ... | 12 | 2020 |
Combined private circuits-combined security refurbished J Feldtkeller, T Güneysu, T Moos, J Richter-Brockmann, S Saha, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 9 | 2023 |
Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures J Richter-Brockmann, T Güneysu 2020 IEEE 31th International Conference on Application-specific Systems …, 2020 | 6 | 2020 |
Generic Accelerators for Costly-to-Mask PQC Components. M Krausz, G Land, F Stolz, D Naujoks, J Richter-Brockmann, T Güneysu, ... IACR Cryptol. ePrint Arch. 2023, 1287, 2023 | 2 | 2023 |
Revisiting ECM on GPUs J Wloka, J Richter-Brockmann, T Kleinjung, C Priplata, T Güneysu Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020 | 2 | 2020 |
Formal Definition and Verification for Combined Random Fault and Random Probing Security S Belaïd, J Feldtkeller, T Güneysu, A Guinet, J Richter-Brockmann, ... International Conference on the Theory and Application of Cryptology and …, 2025 | 1 | 2025 |
To extend or not to extend: Agile Masking Instructions for PQC M Krausz, G Land, F Stolz, D Naujoks, J Richter-Brockmann, T Güneysu, ... Cryptology ePrint Archive, 2023 | 1 | 2023 |
Gate-level masking of streamlined ntru prime decapsulation in hardware G Land, A Marotzke, J Richter-Brockmann, T Güneysu Cryptology ePrint Archive, 2023 | 1 | 2023 |
Combined Threshold Implementation J Feldtkeller, J Richter-Brockmann, P Sasdrich, T Güneysu IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (4 …, 2024 | | 2024 |
INDIANA-Verifying (Random) Probing Security through Indistinguishability Analysis C Beierle, J Feldtkeller, A Guinet, T Güneysu, G Leander, ... Cryptology ePrint Archive, 2024 | | 2024 |