Tim Güneysu
Tim Güneysu
Chair for Security Engineering, Ruhr-Universität Bochum
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
J Borghoff, A Canteaut, T Güneysu, EB Kavun, M Knezevic, LR Knudsen, ...
International conference on the theory and application of cryptology and …, 2012
6582012
Practical lattice-based cryptography: A signature scheme for embedded systems
T Güneysu, V Lyubashevsky, T Pöppelmann
International Workshop on Cryptographic Hardware and Embedded Systems, 530-547, 2012
2532012
Exploiting the power of GPUs for asymmetric cryptography
R Szerwinski, T Güneysu
International Workshop on Cryptographic hardware and embedded systems, 79-99, 2008
2152008
Trojan side-channels: Lightweight hardware trojans through side-channel engineering
L Lin, M Kasper, T Güneysu, C Paar, W Burleson
International Workshop on Cryptographic Hardware and Embedded Systems, 382-395, 2009
1972009
Cryptanalysis with COPACOBANA
T Güneysu, T Kasper, M Novotný, C Paar, A Rupp
IEEE Transactions on computers 57 (11), 1498-1513, 2008
1962008
Ultra high performance ECC over NIST primes on commercial FPGAs
T Güneysu, C Paar
International Workshop on Cryptographic Hardware and Embedded Systems, 62-78, 2008
1732008
Towards practical lattice-based public-key encryption on reconfigurable hardware
T Pöppelmann, T Güneysu
International Conference on Selected Areas in Cryptography, 68-85, 2013
1462013
Enhanced lattice-based signatures on reconfigurable hardware
T Pöppelmann, L Ducas, T Güneysu
International Workshop on Cryptographic Hardware and Embedded Systems, 353-370, 2014
1312014
Generic side-channel countermeasures for reconfigurable devices
T Güneysu, A Moradi
International Workshop on Cryptographic Hardware and Embedded Systems, 33-48, 2011
1282011
Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware
T Pöppelmann, T Güneysu
International Conference on Cryptology and Information Security in Latin …, 2012
1262012
Compact implementation and performance evaluation of block ciphers in ATtiny devices
T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ...
International Conference on Cryptology in Africa, 172-187, 2012
1132012
High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
T Pöppelmann, T Oder, T Güneysu
International Conference on Cryptology and Information Security in Latin …, 2015
902015
Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
S Heyse, I Von Maurich, T Güneysu
International Conference on Cryptographic Hardware and Embedded Systems, 273-292, 2013
902013
Reconfigurable trusted computing in hardware
T Eisenbarth, T Güneysu, C Paar, AR Sadeghi, D Schellekens, M Wolf
Proceedings of the 2007 ACM workshop on Scalable trusted computing, 15-20, 2007
902007
MicroEliece: McEliece for embedded devices
T Eisenbarth, T Güneysu, S Heyse, C Paar
International Workshop on Cryptographic Hardware and Embedded Systems, 49-64, 2009
892009
Software speed records for lattice-based signatures
T Güneysu, T Oder, T Pöppelmann, P Schwabe
International Workshop on Post-Quantum Cryptography, 67-82, 2013
772013
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware
I Dinur, T Güneysu, C Paar, A Shamir, R Zimmermann
International Conference on the Theory and Application of Cryptology and …, 2011
762011
Practical lattice-based digital signature schemes
J Howe, T Pöppelmann, M O'neill, E O'sullivan, T Güneysu
ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-24, 2015
75*2015
ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks
T Schneider, A Moradi, T Güneysu
Annual International Cryptology Conference, 302-332, 2016
722016
Beyond ECDSA and RSA: Lattice-based digital signatures on constrained devices
T Oder, T Pöppelmann, T Güneysu
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6, 2014
662014
The system can't perform the operation now. Try again later.
Articles 1–20