Marc Stöttinger
Title
Cited by
Cited by
Year
A timing attack against Patterson algorithm in the McEliece PKC
A Shoufan, F Strenzke, HG Molter, M Stöttinger
International Conference on Information Security and Cryptology, 161-175, 2009
762009
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4 (4), 259-274, 2014
352014
A stochastic method for security evaluation of cryptographic FPGA implementations
M Kasper, W Schindler, M Stöttinger
2010 International Conference on Field-Programmable Technology, 146-153, 2010
342010
A new difference method for side-channel analysis with high-dimensional leakage models
A Heuser, M Kasper, W Schindler, M Stöttinger
Cryptographers’ Track at the RSA Conference, 365-382, 2012
322012
A simple power analysis attack on a McEliece cryptoprocessor
HG Molter, M Stöttinger, A Shoufan, F Strenzke
Journal of Cryptographic Engineering 1 (1), 29-36, 2011
302011
Revealing side-channel issues of complex circuits by enhanced leakage models
A Heuser, W Schindler, M Stöttinger
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012
292012
Side channel analysis of the SHA-3 finalists
M Zohner, M Kasper, M Stöttinger, SA Huss
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012
272012
Among slow dwarfs and fast giants: A systematic design space exploration of KECCAK
B Jungk, M Stöttinger
2013 8th International Workshop on Reconfigurable and Communication-Centric …, 2013
242013
Hardware trojan design and detection: a practical evaluation
S Kutzner, AY Poschmann, M Stöttinger
Proceedings of the Workshop on Embedded Systems Security, 1-9, 2013
202013
Support vector regression: exploiting machine learning techniques for leakage modeling
D Jap, M Stöttinger, S Bhasin
Proceedings of the Fourth Workshop on Hardware and Architectural Support for …, 2015
162015
How a symmetry metric assists side-channel evaluation-a novel model verification method for power analysis
A Heuser, M Kasper, W Schindler, M Stottinger
2011 14th Euromicro Conference on Digital System Design, 674-681, 2011
152011
TROJANUS: An ultra-lightweight side-channel leakage generator for FPGAs
S Kutzner, A Poschmann, M Stöttinger
2013 International Conference on Field-Programmable Technology (FPT), 160-167, 2013
132013
Amasive: an adaptable and modular autonomous side-channel vulnerability evaluation framework
SA Huss, M Stöttinger, M Zohner
Number Theory and Cryptography, 151-165, 2013
122013
Efficient side-channel protections of ARX ciphers
B Jungk, R Petri, M Stöttinger
IACR Transactions on Cryptographic Hardware and Embedded Systems, 627-653, 2018
112018
Side-channel resistant AES architecture utilizing randomized composite field representations
B Jungk, M Stöttinger, J Gampe, S Reith, SA Huss
2012 International Conference on Field-Programmable Technology, 125-128, 2012
112012
Butterfly-attack on Skein’s modular addition
M Zohner, M Kasper, M Stöttinger
International Workshop on Constructive Side-Channel Analysis and Secure …, 2012
112012
Hobbit—Smaller but faster than a dwarf: Revisiting lightweight SHA-3 FPGA implementations
B Jungk, M Stöttinger
2016 International Conference on ReConFigurable Computing and FPGAs …, 2016
102016
Lms vs xmss: Comparison of stateful hash-based signature schemes on arm cortex-m4
F Campos, T Kohlstadt, S Reith, M Stöttinger
International Conference on Cryptology in Africa, 258-277, 2020
92020
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective
F De Santis, M Kasper, S Mangard, G Sigl, O Stein, M Stöttinger
International Conference on Cryptology in India, 215-226, 2013
92013
Power trace alignment for cryptosystems featuring random frequency countermeasures
Q Tian, A Shoufan, M Stoettinger, SA Huss
2012 Second International Conference on Digital Information Processing and …, 2012
92012
The system can't perform the operation now. Try again later.
Articles 1–20