Author of the publication

High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gröstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein.

, , , , , and . IACR Cryptology ePrint Archive, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optical Fault Attacks on AES: A Threat in Violet., , and . FDTC, page 13-22. IEEE Computer Society, (2009)Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps., , and . ARES, page 169-177. IEEE Computer Society, (2013)EM Leakage of RFID Devices - Comparison of Two Measurement Approaches., and . ARES, page 120-125. IEEE Computer Society, (2014)On the Applicability of Time-Driven Cache Attacks on Mobile Devices., and . NSS, volume 7873 of Lecture Notes in Computer Science, page 656-662. Springer, (2013)Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices., , , , , , , , , and 2 other author(s). AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 172-187. Springer, (2012)On the security of RFID devices against implementation attacks., , and . IJSN, 5 (2/3): 106-118 (2010)Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag., and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 426-435. Springer, (2011)On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller., and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 149-164. Springer, (2012)Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag., and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 207-222. Springer, (2013)Cache-Access Pattern Attack on Disaligned AES T-Tables., and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 200-214. Springer, (2013)