Tim Güneysu
Tim Güneysu
Chair for Security Engineering, Ruhr-Universität Bochum
Zweryfikowany adres z rub.de - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
J Borghoff, A Canteaut, T Güneysu, EB Kavun, M Knezevic, LR Knudsen, ...
International Conference on the Theory and Application of Cryptology and …, 2012
7552012
Practical lattice-based cryptography: A signature scheme for embedded systems
T Güneysu, V Lyubashevsky, T Pöppelmann
International Workshop on Cryptographic Hardware and Embedded Systems, 530-547, 2012
2902012
Exploiting the power of GPUs for asymmetric cryptography
R Szerwinski, T Güneysu
International Workshop on Cryptographic hardware and embedded systems, 79-99, 2008
2242008
Trojan side-channels: Lightweight hardware trojans through side-channel engineering
L Lin, M Kasper, T Güneysu, C Paar, W Burleson
International Workshop on Cryptographic Hardware and Embedded Systems, 382-395, 2009
2232009
Cryptanalysis with COPACOBANA
T Güneysu, T Kasper, M Novotný, C Paar, A Rupp
IEEE Transactions on computers 57 (11), 1498-1513, 2008
2092008
Ultra high performance ECC over NIST primes on commercial FPGAs
T Güneysu, C Paar
International Workshop on Cryptographic Hardware and Embedded Systems, 62-78, 2008
1812008
Towards practical lattice-based public-key encryption on reconfigurable hardware
T Pöppelmann, T Güneysu
International Conference on Selected Areas in Cryptography, 68-85, 2013
1642013
Enhanced lattice-based signatures on reconfigurable hardware
T Pöppelmann, L Ducas, T Güneysu
International Workshop on Cryptographic Hardware and Embedded Systems, 353-370, 2014
1462014
Generic side-channel countermeasures for reconfigurable devices
T Güneysu, A Moradi
International Workshop on Cryptographic Hardware and Embedded Systems, 33-48, 2011
1452011
Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware
T Pöppelmann, T Güneysu
International conference on cryptology and information security in Latin …, 2012
1422012
Compact implementation and performance evaluation of block ciphers in ATtiny devices
T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ...
International Conference on Cryptology in Africa, 172-187, 2012
1262012
High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
T Pöppelmann, T Oder, T Güneysu
International conference on cryptology and information security in Latin …, 2015
1102015
Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
S Heyse, I Von Maurich, T Güneysu
International Conference on Cryptographic Hardware and Embedded Systems, 273-292, 2013
982013
Reconfigurable trusted computing in hardware
T Eisenbarth, T Güneysu, C Paar, AR Sadeghi, D Schellekens, M Wolf
Proceedings of the 2007 ACM workshop on Scalable trusted computing, 15-20, 2007
982007
ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks
T Schneider, A Moradi, T Güneysu
Annual International Cryptology Conference, 302-332, 2016
912016
MicroEliece: McEliece for embedded devices
T Eisenbarth, T Güneysu, S Heyse, C Paar
International Workshop on Cryptographic Hardware and Embedded Systems, 49-64, 2009
892009
Practical CCA2-secure and masked ring-LWE implementation
T Oder, T Schneider, T Pöppelmann, T Güneysu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 142-174, 2018
852018
Software speed records for lattice-based signatures
T Güneysu, T Oder, T Pöppelmann, P Schwabe
International Workshop on Post-Quantum Cryptography, 67-82, 2013
852013
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware
I Dinur, T Güneysu, C Paar, A Shamir, R Zimmermann
International Conference on the Theory and Application of Cryptology and …, 2011
772011
Beyond ECDSA and RSA: Lattice-based digital signatures on constrained devices
T Oder, T Pöppelmann, T Güneysu
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2014
732014
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20