Re-architecting datacenter networks and stacks for low latency and high performance M Handley, C Raiciu, A Agache, A Voinescu, AW Moore, G Antichi, ... Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017 | 432 | 2017 |
Does my device leak information? an a priori statistical power analysis of leakage detection tests L Mather, E Oswald, J Bandenburg, M Wójcik International Conference on the Theory and Application of Cryptology and …, 2013 | 111 | 2013 |
Where has my time gone? N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ... International Conference on Passive and Active Network Measurement, 201-214, 2017 | 54 | 2017 |
Where Has My Time Gone? N Zilberman, M Grosvenor, DA Popescu, N Manihatty-Bojan, G Antichi, ... International Conference on Passive and Active Network Measurement, 201-214, 2017 | 54 | 2017 |
Emu: Rapid prototyping of networking services N Sultana, S Galea, D Greaves, M Wójcik, J Shipton, R Clegg, L Mai, ... 2017 USENIX Annual Technical Conference (USENIX ATC 17), 459-471, 2017 | 44 | 2017 |
Emu: Rapid prototyping of networking services N Sultana, S Galea, D Greaves, M Wójcik, J Shipton, R Clegg, L Mai, ... 2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17), 459-471, 2017 | 44 | 2017 |
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ... 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and …, 2016 | 36 | 2016 |
Security analysis of an open car immobilizer protocol stack S Tillich, M Wójcik International Conference on Trusted Systems, 83-94, 2012 | 35 | 2012 |
Evaluation of a PUF device authentication scheme on a discrete 0.13 um SRAM P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik International Conference on Trusted Systems, 271-288, 2011 | 34 | 2011 |
A leakage resilient MAC DP Martin, E Oswald, M Stam, M Wójcik IMA International Conference on Cryptography and Coding, 295-310, 2015 | 29 | 2015 |
ICEPOLE: high-speed, hardware-oriented authenticated encryption P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ... International Workshop on Cryptographic Hardware and Embedded Systems, 392-413, 2014 | 26 | 2014 |
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software JF Gallais, J Großschädl, N Hanley, M Kasper, M Medwed, F Regazzoni, ... International Conference on Trusted Systems, 253-270, 2010 | 26 | 2010 |
The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication RC Staudemeyer, HC Pöhls, M Wójcik 2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018 | 14 | 2018 |
ICEPOLE v1 P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ... Submission to CAESAR, 2014 | 14 | 2014 |
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net RC Staudemeyer, HC Pöhls, M Wójcik Journal of Reliable Intelligent Environments 5 (1), 41-64, 2019 | 13 | 2019 |
A practical device authentication scheme using SRAM PUFs P Koeberl, J Li, R Maes, A Rajan, C Vishik, M Wójcik, W Wu Journal of Cryptographic Engineering 2 (4), 255-269, 2012 | 9 | 2012 |
An exploration of mechanisms for dynamic cryptographic instruction set extension P Grabher, J Großschädl, S Hoerder, K Järvinen, D Page, S Tillich, ... Journal of Cryptographic Engineering 2 (1), 1-18, 2012 | 7 | 2012 |
On The Security Evaluation of Partial Password Implementations T Mourouzis, M Wojcik, N Komninos arXiv preprint arXiv:1701.00104, 2016 | 6 | 2016 |
ICEPOLE v1. submission to CAESAR competition P Morawiecki, K Gaj, E Homsirikamol, K Matusiewicz, J Pieprzyk, ... | 6 | 2015 |
On the (re) design of an FPGA-based PUF. P Grabher, D Page, M Wójcik IACR Cryptol. ePrint Arch. 2013, 195, 2013 | 6 | 2013 |